On this week’s show Patrick Gray talks through the news with Chris Krebs and Dmitri Alperovitch. They discuss:
The SEC enforcement action against Solarwinds’ CISOThe White House AI Executive OrderCitrixBleed exploitation goes wideHow Kaspersky captured some (likely) Five Eyes iOS 0dayElon Musk’s Gaza Strip adventuresMuch, much moreThis week’s show is brought to you by Greynoise. Andrew Morris, Greynoise’s founder and CEO, is this week’s sponsor guest. He talks about how Greynoise is using large language models to help them analyse massive quantities of malicious internet traffic.
Show notes
comp-pr2023-227.pdfBiden signs executive order to oversee and invest in AI techRisky Biz News: CitrixBleed vulnerability goes from bad to disastrousAndrew Morris on X: "Confluence bug is popping off. VAST majority of it is blasting thru Tor, similar to the first wave of Log4J exploitation two years ago. If you haven't patched, it's probably popped. https://t.co/4JC0uiTaqc https://t.co/wLDgQpq7r0" / XAndrew Morris on X: "Confluence bug is popping off. VAST majority of it is blasting thru Tor, similar to the first wave of Log4J exploitation two years ago. If you haven't patched, it's probably popped. https://t.co/4JC0uiTaqc https://t.co/wLDgQpq7r0" / XHow Kaspersky obtained all stages of Operation Triangulation | SecurelistKaspersky reveals 'elegant' malware resembling NSA code | CyberScoopSophisticated StripedFly Spy Platform Masqueraded for Years as Crypto MinerA cascade of compromise: unveiling Lazarus' new campaign | SecurelistNear-total internet and cellular blackout hits Gaza as Israel ramps up strikesAmichai Stein on X: "Israel's Communications Minister @shlomo_karhi in response to Elon Musk: Israel will use all the means at its disposal to fight this. Hamas will use this for terrorist activity. There is no doubt about it. We know it, and Musk knows it. Hamas is ISIS." / XShashank Joshi on X: "Wonder what encryption, if any, they use? Vulnerable to tapping. "Hamas has maintained operational security by going “stone age” and using hard-wired phone lines while eschewing devices that are hackable or emit an electronic signature." https://t.co/ALVSXb55Zn" / XHackers that breached Las Vegas casinos rely on violent threats, research shows | CyberScoopOcto Tempest crosses boundaries to facilitate extortion, encryption, and destruction | Microsoft Security BlogGitHub - cloudflare/har-sanitizerRussia to launch its own version of VirusTotal due to US snooping fearsiPhones have been exposing your unique MAC despite Apple’s promises otherwise | Ars TechnicaVMware warns of critical vulnerability affecting vCenter Server productJudge tosses Khashoggi widow’s lawsuit against NSO Group