Security Weekly Podcast Network (Audio)

Toilet Cams, N. Korea, Brickstorm, MCP, React2Shell, Proxmox, Metaverse, Josh Marpet - SWN #535

Dec 5, 2025
Dive into the world of North Korea's recruitment schemes that use AI and stolen identities. Learn about BrickStorm's backdoor threats targeting VMware and the risks tied to new AI interfaces. Discover the fallout from India's controversial government app mandate. Hear the buzz about critical React flaws exploited by groups linked to China. Plus, an entertaining live report from a wedding, a quirky discussion on a $600 Kohler toilet camera, and insights into the Metaverse's impact on business risks.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Fake Employees Used To Monetize Talent

  • North Korean groups rent U.S. identities and use AI, confederates, and remote machines to take tech jobs and funnel money home.
  • Doug White warns employers to verify that employees are doing their own work and not acting as fronts for state-sponsored operations.
ADVICE

Harden DMZ And Hypervisor Access

  • Block unnecessary direct access from DMZ hosts to internal hypervisors and closely monitor any DMZ connectivity.
  • Use filtering, authorization, and detection rules to prevent lateral movement and backdoor deployment like BrickStorm.
INSIGHT

Agentic AI Needs Protocol-Level Controls

  • MCP introduces a machine-readable protocol that lets agentic AI control external systems, raising new systemic risks.
  • OWASP published secure usage guidance recommending privilege assessment, zero trust, and continuous monitoring for MCP deployments.
Get the Snipd Podcast app to discover more snips from this episode
Get the app