CyberWire Daily

Apple’s race to secure your iPhone.

Feb 11, 2025
In this engaging conversation, John Fokker, Head of Threat Intelligence at Trellix, sheds light on the alarming convergence of nation-state actors and cybercriminals. He discusses Apple’s crucial security updates addressing a zero-day vulnerability that threatens iPhone users. The dialogue also dives into the rising brute-force attacks on edge devices and the complexities of incident response. Fokker emphasizes the urgent need for legislation to protect encryption, highlighting the intricate dance between security and rising cyber threats.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Attribution Difficulty

  • Attribution in cyberattacks is increasingly difficult due to the blurring lines between nation-states and cybercriminals.
  • Attackers may use proxies or work together, making it hard to determine the true source.
INSIGHT

Living off the Land

  • Both nation-state and cybercriminal actors are increasingly adopting "living off the land" techniques.
  • This involves using existing tools on a victim's system, making detection harder.
ANECDOTE

Shared Infrastructure

  • Fokker recalls instances from his law enforcement background where the same hosting provider served both state-sponsored actors and cybercriminals.
  • This highlights the shared infrastructure used by different threat groups.
Get the Snipd Podcast app to discover more snips from this episode
Get the app