Security Weekly Podcast Network (Audio) Going Around EDR - PSW #900
Nov 13, 2025
In this engaging discussion, Jeff Mann, a cybersecurity expert, shares insights on the recent SonicWall breach, highlighting the risks for device manufacturers. Lee Neely delves into creative hardware hacks, even running Minecraft on a lightbulb. Mandy Logan discusses vulnerabilities in the construction sector, emphasizing IoT risks. Sam Bound addresses the implications of Google’s Gemini research on privacy and data access. Together, they explore trends in EDR evasion and the evolving landscape of cybersecurity challenges.
AI Snips
Chapters
Books
Transcript
Episode notes
Attackers Target Edge Device Vendors
- Edge device vendors are high-value targets because attackers can compromise manufacturer backends to gain broad customer access.
- Breaches like SonicWall and F5 show attackers favor supplier-level access to amplify impact.
Control Your Cloud Backup Keys
- Avoid storing unencrypted device backups in vendor clouds without controlling keys.
- Use customer-controlled encryption keys or keep sensitive backups offline to reduce breach impact.
Adversaries Move To Devices Without EDR
- Attackers increasingly target specialized devices lacking EDR like printers, routers, and VPN appliances.
- EDR success on endpoints pushes adversaries toward less-monitored infrastructure.



