
The Everything Feed - All Packet Pushers Pods NB548: Broadcom Brings Chips to Wi-Fi 8 Party; Attorneys General Scrutinize HPE/Juniper Settlement
Oct 20, 2025
In this engaging discussion, F5 faces consequences after a security breach involving state-backed actors. North Korean hackers are using the blockchain to hide malware, adding a twist to cybersecurity threats. Broadcom introduces its powerful 800G NIC aimed at enhancing AI workloads and samples early Wi-Fi 8 chips design. Meanwhile, a legal challenge arises as twelve state attorneys general scrutinize the settlement of HPE's Juniper acquisition. There's also a critical warning about a severe flaw in Azure Access door controllers that poses a risk for IoT security.
AI Snips
Chapters
Books
Transcript
Episode notes
F5 Breach Reveals Source Code Exposure
- F5 discovered state-backed attackers accessed internal systems and Big-IP source code in August and delayed public disclosure with DOJ approval.
- F5, external security firms, and agencies found no evidence of source-code tampering but released patches and guidance.
Malware Hidden In Public Blockchains
- Google's Threat Intelligence Group observed North Korean actors using smart contracts to host and deliver malware via public blockchains like Ethereum.
- This 'Ether Hiding Technique' supports short-term crypto theft and long-term credential capture for espionage.
Broadcom Ships 800G NIC For AI Fabric
- Broadcom announced an 800G NIC, Thor Ultra, targeting AI workloads with UEC-compliant RDMA and features that approximate lossless fabrics.
- The NIC supports packet-level multipathing, out-of-packet delivery to XPU memory, and programmable congestion control.

