12min chapter

80,000 Hours Podcast cover image

#195 – Sella Nevo on who's trying to steal frontier AI models, and what they could do with them

80,000 Hours Podcast

CHAPTER

Exploiting Security Gaps: The Stuxnet Case

This chapter investigates the intricacies of cybersecurity, focusing on how sophisticated attackers exploit vulnerabilities in systems, particularly air-gapped networks. It details methods such as the use of USB drives for infiltration, highlighting both common misconceptions and real-world examples like the infamous Stuxnet malware. The discussion emphasizes the alarming risks posed by hidden threats in technology and the evolving landscape of cybersecurity challenges.

00:00

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode