
Sign up to save your podcasts
Or


In this episode of Below the Surface, the hosts discuss various cybersecurity topics, including the Red November campaign targeting network edge devices, the implications of the Cisco SNMP vulnerability, and the recent vulnerabilities associated with Cisco ASA devices. They also delve into the hybrid Petya ransomware and its connection to supply chain security, emphasizing the need for better visibility and security measures in network devices.
Chapters:
00:00 Introduction and Overview of Cybersecurity Trends
02:09 Red November Campaign: Targeting Network Edge Devices
11:06 The Shift in Attack Vectors: From Windows to Network Edge
14:59 Cisco SNMP Vulnerability: A Legacy Issue
21:21 The Implications of Targeting Network Edge Devices
28:20 Addressing Legacy Issues in Cybersecurity
29:41 Emerging Threats in Cybersecurity
32:19 The Age of Vulnerabilities
33:40 The Importance of Asset Inventory
35:38 Challenges in Device Security
37:22 Visibility and Detection Limitations
39:28 Vendor Responses to Vulnerabilities
41:24 Supply Chain Security Crisis
46:59 Understanding Hybrid Petya
52:11 The Evolution of Attack Techniques
By Eclypsium5
22 ratings
In this episode of Below the Surface, the hosts discuss various cybersecurity topics, including the Red November campaign targeting network edge devices, the implications of the Cisco SNMP vulnerability, and the recent vulnerabilities associated with Cisco ASA devices. They also delve into the hybrid Petya ransomware and its connection to supply chain security, emphasizing the need for better visibility and security measures in network devices.
Chapters:
00:00 Introduction and Overview of Cybersecurity Trends
02:09 Red November Campaign: Targeting Network Edge Devices
11:06 The Shift in Attack Vectors: From Windows to Network Edge
14:59 Cisco SNMP Vulnerability: A Legacy Issue
21:21 The Implications of Targeting Network Edge Devices
28:20 Addressing Legacy Issues in Cybersecurity
29:41 Emerging Threats in Cybersecurity
32:19 The Age of Vulnerabilities
33:40 The Importance of Asset Inventory
35:38 Challenges in Device Security
37:22 Visibility and Detection Limitations
39:28 Vendor Responses to Vulnerabilities
41:24 Supply Chain Security Crisis
46:59 Understanding Hybrid Petya
52:11 The Evolution of Attack Techniques

228,524 Listeners

2,004 Listeners

209 Listeners

265 Listeners

374 Listeners

637 Listeners

89 Listeners

322 Listeners

8,020 Listeners

61 Listeners

586 Listeners

1 Listeners