Breaking Badness

Zero-Knowledge Threats, Shadow AI, and the Future of Cyber Attribution

Jun 18, 2025
Join experts Yonatan Khen from Hunters, Tal Darsan, and Etay Maor from Cato Networks as they unpack the latest in cyber threats. They delve into AI-powered evasion tactics used by attackers, drawing lessons from notorious ransomware groups. Khen reveals key insights on a privilege escalation vulnerability in Google Workspace, shedding light on modern cloud attack vectors. The conversation also touches on the complexities of cyber attribution and the growing challenges posed by shadow AI, emphasizing the need for proactive security measures.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Living Off The Land Tactics

  • Threat actors increasingly use legitimate tools and cloud features to evade detection.
  • This strategy blurs attribution as attacks don't trigger typical security alerts.
ADVICE

Enable TLS Inspection

  • Enable TLS decryption or inspection in your network security tools to detect hidden threats.
  • Misconfigurations and disabled inspection allow threats to evade detection, causing breaches.
ANECDOTE

Ransomware Groups Vary Speeds

  • Different ransomware groups use similar tools but vary attack speeds from days to weeks.
  • Some groups moved very slowly while others enacted attacks in just three to four days.
Get the Snipd Podcast app to discover more snips from this episode
Get the app