Below the Surface (Audio) - The Supply Chain Security Podcast

Eclypsium
undefined
Jul 24, 2025 • 47min

Netgear, Gigabyte, and Rowhammer Vulnerabilities - BTS #55

In this episode of Below the Surface, the hosts discuss critical cybersecurity topics including vulnerabilities in Netgear and Gigabyte devices, the importance of asset inventory, and the implications of Row Hammer attacks on memory integrity. They emphasize the need for organizations to implement compensating controls and monitor for potential threats, especially in the context of supply chain security and IoT devices. Chapters 00:00 Introduction to Cybersecurity Challenges 02:20 Exploring Netgear's Role in Enterprise Security 09:08 The Impact of Shadow IT on Network Security 15:04 Firmware Integrity and Security Measures 18:05 Gigabyte's UEFI Vulnerabilities and Industry Implications 22:25 Understanding UEFI Vulnerabilities 28:46 Consumer vs. Enterprise Hardware Security 35:06 Monitoring and Mitigating Firmware Risks 41:11 The Impact of ECC on AI Performance
undefined
Jul 8, 2025 • 56min

CVE-2024-54085: The First of Its Kind - BTS #54

The discussion centers around the critical vulnerabilities of Baseboard Management Controllers, specifically CVE-2024-54085. The hosts explain how easily attackers can exploit this vulnerability and its implications for data center security. They tackle challenges in detecting and mitigating these risks, emphasizing the importance of firmware updates. Practical operational advice includes the need for organizations to patch systems and limit BMC network access. Community tools that aid in vulnerability detection also receive significant attention.
undefined
Jul 7, 2025 • 51min

Exploring the Evolution of Zero Trust - BTS #53

In this episode, the hosts discuss the evolving landscape of AI infrastructure security, focusing on the complexities of building and maintaining AI data centers. They explore the critical role of Baseboard Management Controllers (BMCs) as an attack surface, the importance of supply chain security, and best practices for hardware procurement. The conversation underscores the importance of validating hardware and firmware integrity for organizations while also addressing the significant security risks associated with AI workloads. As AI data centers continue to grow, understanding these challenges and implementing robust security measures will be essential for future success. Chapters 00:00 Introduction to Zero Trust and Its Evolution 03:33 Current State of Zero Trust Implementation 05:22 Micro-Segmentation and Infrastructure Security 10:02 Zero Trust and Lateral Movement Prevention 11:32 The Role of Zero Trust in Ransomware Defense 14:51 Chase Cunningham's Insights on Cyber Warfare 16:23 The Intersection of Cyber Warfare and Modern Conflicts 21:35 The Future of Warfare: Drones and Cybersecurity 24:01 Understanding the Drone Threat 28:28 The Evolution of Cyber Warfare 35:00 The State of Critical Infrastructure 39:26 The Economics of Breaches 44:29 Incentivizing Cybersecurity Improvements
undefined
5 snips
Jul 1, 2025 • 1h 1min

Securing the Future of AI Infrastructure - BTS #52

Chase Snyder, a security practitioner specialized in infrastructure and supply chain risk, and Wes Dauberi, an expert in hardware and data center security, delve into the intricate world of AI infrastructure security. They highlight threats to AI data centers, particularly the vulnerabilities posed by Baseboard Management Controllers (BMCs). The discussion also emphasizes the need for stringent hardware and firmware validation techniques, as well as best practices for procurement to mitigate risks in the rapidly evolving landscape of AI workloads.
undefined
May 30, 2025 • 54min

When Windows 10 Expires - BTS #51

In this episode, the hosts discuss the impending end of life for Windows 10 and the necessary preparations for upgrading to Windows 11. They explore the specific hardware requirements for Windows 11, including the importance of Secure Boot and TPM 2.0, and the challenges enterprises face in managing large-scale migrations. The conversation underscores the importance of meticulous planning to prevent costly failures and the influence of legacy systems on the upgrade process. In this conversation, the speakers discuss the implications of transitioning to Windows 11, focusing on the challenges posed by legacy systems, supply chain issues, and the importance of modern hardware for security. They delve into the Black Lotus UEFI boot kit and the necessary mitigations, emphasizing the need for organizations to validate their security controls and establish a robust trust framework. The discussion also highlights the growing importance of third-party risk management in cybersecurity, particularly in relation to supply chain security.
undefined
May 15, 2025 • 45min

SBOMs, HBOMs, and Supply Chain Visibility - BTS #50

Summary In this episode, Paul Asadoorian and Joshua Marpet delve into the complexities of compliance, inventory management, and the emerging concepts of SBOMs, HBOMs, and FBOMs (no, not that FBOM). They discuss the importance of understanding the components and origins of hardware and software, the challenges of managing technology lifecycles, and the need for clear standards and regulations in the tech industry. The conversation emphasizes the critical role of asset inventories in maintaining security and compliance in an ever-evolving technological landscape. In this conversation, Joshua Marpet and Paul Asadoorian delve into the complexities of hardware security, the cultural shifts needed in security practices, and the importance of transparency in software and firmware management. They discuss the challenges posed by hardware backdoors, the necessity of Software Bill of Materials (SBOMs), and the hidden risks associated with firmware updates. The dialogue emphasizes the need for a cultural change in how organizations approach security and compliance, advocating for continuous management and transparency to inspire confidence in security practices. Chapters 00:00 Introduction and Technical Challenges 02:02 Exploring Compliance and Frameworks 05:06 Understanding S-bombs, H-bombs, and F-bombs 10:10 The Importance of Inventory and Asset Management 15:01 Navigating Hardware and Software Lifecycle 19:58 Standards and Regulations in Technology 23:56 The Manchurian Microchip and Hardware Backdoors 27:44 Cultural Change in Security Practices 30:47 The Importance of Transparency and SBOMs 36:39 Challenges in Compliance and Risk Management 42:42 The Hidden Risks of Firmware and Hardware Updates
undefined
May 6, 2025 • 53min

The Hidden Risks of Open Source Components - BTS #49

Josh Bressers, a supply chain and open source security expert at Anchore, dives into the intricate world of open source components. He discusses the pervasive challenges of managing vulnerabilities in legacy systems and the critical role of Software Bill of Materials (SBOMs). They tackle regulatory pressures around software liability and the automation needed to tackle the increasing volume of CVEs. Josh also highlights innovative tools like SIFT and Gripe, emphasizing their importance in enhancing transparency and security in software development.
undefined
16 snips
Apr 7, 2025 • 54min

Hardware Hacking Tips & Tricks - BTS #48

Explore the intriguing world of hardware hacking with insights on powerful devices like the Flipper Zero and ESP32. Discover their practical applications, from RFID to Wi-Fi attacks, and learn how these tools influence the hacking community. The hosts uncover vulnerabilities in hotel security systems and the challenges posed by legacy systems. They also highlight the importance of validating firmware in supply chains and discuss the implications of secure boot complexities. Join the conversation as hardware hacking reshapes the cybersecurity landscape!
undefined
Mar 19, 2025 • 49min

BMC&C Part 3 - BTS #47

In this episode, Paul Asadoorian, Vlad Babkin, and Chase Snyder delve into the latest vulnerability disclosures related to Baseboard Management Controllers (BMCs), specifically focusing on AMI Megarac and Redfish. They discuss the nature of the vulnerabilities, the discovery process, and the potential impacts of a BMC compromise. The conversation highlights the importance of understanding BMCs in the context of supply chain security and the risks associated with exposing these components to the internet. The conversation delves into the vulnerabilities associated with Baseboard Management Controllers (BMCs), particularly focusing on the Redfish API and the potential for exploitation. The speakers discuss the implications of these vulnerabilities on hardware, the challenges faced by vendors in patching, and the importance of network segmentation and monitoring. They also highlight the limitations of logging and the effectiveness of Web Application Firewalls (WAFs) in this context. The discussion emphasizes the need for robust security measures to protect enterprise networks from potential attacks.
undefined
Mar 5, 2025 • 52min

Black Basta - Threat Intelligence Insights - BTS #46

In this episode, Paul Asadoorian, Vlad Babkin, and Chase Snyder delve into the recent leaks from the Black Basta ransomware group, exploring the implications of the leaked chat logs, the operational tactics of the group, and the evolving landscape of ransomware attacks. The conversation highlights the importance of understanding threat intelligence derived from these leaks, the significance of targeting exposed devices, and the necessity of robust security measures to mitigate risks. In this conversation, the speakers delve into the evolving tactics of ransomware groups, emphasizing the importance of understanding their operational scale and methodologies. They discuss the significance of early detection and the necessity for organizations to adopt robust defensive strategies, particularly in credential management and vulnerability monitoring. The conversation highlights the need for enterprises to harden their defenses against potential intrusions and the critical role of effective password management in mitigating risks.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app