
Sign up to save your podcasts
Or


In this episode of Below the Surface, Paul Asadoorian, Vlad Babkin, and Adrian Sanabria discuss the ongoing vulnerabilities in network edge devices, the implications of legacy systems like Avanti, and the strategies employed by threat actors. They explore the importance of monitoring and detection in cybersecurity, as well as innovative deception techniques to enhance security measures against exploitation. In this conversation, the speakers delve into various aspects of cybersecurity, including innovative strategies to enhance security, the challenges posed by vendor cooperation, the implications of cyber insurance, and the importance of visibility in threat detection. They discuss the use of canary tokens, the exploitation of edge devices, and the reality of zero-day vulnerabilities. The conversation also touches on the need for firmware updates, the shift towards open-source solutions, and the role of AI in developing cybersecurity tools.
Chapters
00:00 Introduction to Below the Surface Podcast
03:27 Network Edge Vulnerabilities and Trends
10:02 Understanding Avanti and Its Impact
12:44 The Consequences of Legacy Systems
18:03 Exploitation Techniques and Threat Actor Strategies
26:50 The Importance of Monitoring and Detection
31:14 Deception Techniques for Enhanced Security
32:55 Leveraging Canary Tokens for Enhanced Security
34:41 The Challenge of Vendor Cooperation in Cybersecurity
35:30 Understanding Cyber Insurance and Its Implications
36:25 The Importance of Visibility in Cyber Defense
39:12 Utilizing Low-Interaction Honeypots for Threat Intelligence
41:48 Exploiting Vulnerabilities in Edge Devices
43:27 The Reality of Zero-Day Vulnerabilities
45:04 Analyzing Recent Exploits in Network Devices
49:02 The Need for Firmware Updates and Alternatives
50:33 Exploring Tailscale and Remote Access Solutions
54:33 Building Secure Lab Environments
56:52 The Shift Towards Open Source in Cybersecurity
01:00:27 Innovations in Memory Forensics
01:03:02 AI's Role in Enhancing Cybersecurity Tools
By Eclypsium5
22 ratings
In this episode of Below the Surface, Paul Asadoorian, Vlad Babkin, and Adrian Sanabria discuss the ongoing vulnerabilities in network edge devices, the implications of legacy systems like Avanti, and the strategies employed by threat actors. They explore the importance of monitoring and detection in cybersecurity, as well as innovative deception techniques to enhance security measures against exploitation. In this conversation, the speakers delve into various aspects of cybersecurity, including innovative strategies to enhance security, the challenges posed by vendor cooperation, the implications of cyber insurance, and the importance of visibility in threat detection. They discuss the use of canary tokens, the exploitation of edge devices, and the reality of zero-day vulnerabilities. The conversation also touches on the need for firmware updates, the shift towards open-source solutions, and the role of AI in developing cybersecurity tools.
Chapters
00:00 Introduction to Below the Surface Podcast
03:27 Network Edge Vulnerabilities and Trends
10:02 Understanding Avanti and Its Impact
12:44 The Consequences of Legacy Systems
18:03 Exploitation Techniques and Threat Actor Strategies
26:50 The Importance of Monitoring and Detection
31:14 Deception Techniques for Enhanced Security
32:55 Leveraging Canary Tokens for Enhanced Security
34:41 The Challenge of Vendor Cooperation in Cybersecurity
35:30 Understanding Cyber Insurance and Its Implications
36:25 The Importance of Visibility in Cyber Defense
39:12 Utilizing Low-Interaction Honeypots for Threat Intelligence
41:48 Exploiting Vulnerabilities in Edge Devices
43:27 The Reality of Zero-Day Vulnerabilities
45:04 Analyzing Recent Exploits in Network Devices
49:02 The Need for Firmware Updates and Alternatives
50:33 Exploring Tailscale and Remote Access Solutions
54:33 Building Secure Lab Environments
56:52 The Shift Towards Open Source in Cybersecurity
01:00:27 Innovations in Memory Forensics
01:03:02 AI's Role in Enhancing Cybersecurity Tools

187 Listeners