Security Weekly Podcast Network (Audio) Toilet Cams, N. Korea, Brickstorm, MCP, React2Shell, Proxmox, Metaverse, Josh Marpet - SWN #535
Dec 5, 2025
Dive into the world of North Korea's recruitment schemes that use AI and stolen identities. Learn about BrickStorm's backdoor threats targeting VMware and the risks tied to new AI interfaces. Discover the fallout from India's controversial government app mandate. Hear the buzz about critical React flaws exploited by groups linked to China. Plus, an entertaining live report from a wedding, a quirky discussion on a $600 Kohler toilet camera, and insights into the Metaverse's impact on business risks.
AI Snips
Chapters
Transcript
Episode notes
Fake Employees Used To Monetize Talent
- North Korean groups rent U.S. identities and use AI, confederates, and remote machines to take tech jobs and funnel money home.
- Doug White warns employers to verify that employees are doing their own work and not acting as fronts for state-sponsored operations.
Harden DMZ And Hypervisor Access
- Block unnecessary direct access from DMZ hosts to internal hypervisors and closely monitor any DMZ connectivity.
- Use filtering, authorization, and detection rules to prevent lateral movement and backdoor deployment like BrickStorm.
Agentic AI Needs Protocol-Level Controls
- MCP introduces a machine-readable protocol that lets agentic AI control external systems, raising new systemic risks.
- OWASP published secure usage guidance recommending privilege assessment, zero trust, and continuous monitoring for MCP deployments.
