

The SMB slip-up.
6 snips Oct 21, 2025
In this engaging discussion, Josh Kamdjou, CEO of Sublime Security and former DoD white-hat hacker, shares insights on anticipating social engineering tactics from the notorious Scattered Spider. He emphasizes the importance of layered defenses and mapping valuable assets to mitigate risks. The conversation also dives into the rise of AI-driven email threats and how his company employs customized detection strategies to defend against them. Kamdjou highlights the balance between automation and human oversight in cybersecurity, ensuring rapid and accurate responses.
AI Snips
Chapters
Transcript
Episode notes
Supply Chain Malware Uses Invisible Unicode
- GlassWorm hides malicious logic with invisible Unicode to infect developer ecosystems and steal credentials.
- The campaign’s final payload fetch uses Solana transactions, Google Calendar, and IP fallbacks to evade takedowns.
Harden Developer Accounts And Repos
- Treat extensions and developer tools as supply-chain risks and enforce MFA and least privilege on developer accounts.
- Scan repos for invisible or unusual characters and monitor outbound proxy/HVNC traffic.
Adversaries Use Diverse, AI-Driven Social Engineering
- Scattered Spider leverages diverse social-engineering channels and rapidly adapts tactics using generative AI to scale attacks.
- Tailored, context-aware attacks now dominate, making centralized detection models less effective.