Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

Jerry Bell and Andrew Kalat
undefined
May 5, 2025 • 1h 25min

Defensive Security Podcast Episode 305

In this episode, we discuss the Google Mandiant 2025 M-Trends report.  The report is available here: https://services.google.com/fh/files/misc/m-trends-2025-en.pdf Like what we’re doing and want to help support us? Donate here: https://www.patreon.com/defensivesec
undefined
Apr 28, 2025 • 1h 3min

Defensive Security Podcast Episode 304

In this episode of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kalat discuss the latest trends in cybersecurity, focusing on the rise of BEC scams and the significant losses attributed to cybercrime in 2024. They explore emerging threats, including social engineering tactics and hardware vulnerabilities, particularly in management interfaces. The conversation also delves into the complexities of vulnerability management, the risks associated with supply chain attacks in open source software, and the alarming rate at which CVEs are being exploited. The hosts emphasize the need for organizations to be proactive in their security measures and to understand the evolving landscape of cyber threats. Links: https://www.cybersecuritydive.com/news/fbi-internet-crime-bec-scams-investment-fraud-losses/746181/ https://www.bleepingcomputer.com/news/security/asus-releases-fix-for-ami-bug-that-lets-hackers-brick-servers/ https://www.theregister.com/2025/04/21/microsoft_apple_patch/ https://thehackernews.com/2025/04/ripples-xrpljs-npm-package-backdoored.html https://thehackernews.com/2025/04/159-cves-exploited-in-q1-2025-283.html Like what we’re doing and want to help support us? Donate here: https://www.patreon.com/defensivesec
undefined
Apr 14, 2025 • 1h 2min

Defensive Security Podcast Episode 303

Summary In this episode of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kalat discuss various cybersecurity topics, including the rise of ransomware, the importance of backup strategies, and the implications of AI in phishing attacks. They discuss into the challenges of managing non-human identities and the need for effective communication of security metrics. The conversation also touches on the recent Oracle breach and the evolving landscape of cybersecurity threats. Links: https://www.cybersecuritydive.com/news/remote-access-tools-ransomware-entry/745144/ https://www.darkreading.com/cyberattacks-data-breaches/oracle-breach-2-obsolete-servers https://thehackernews.com/2025/04/explosive-growth-of-non-human.html?m=1 https://thehackernews.com/2025/04/security-theater-vanity-metrics-keep.html?m=1 https://www.securityweek.com/ai-now-outsmarts-humans-in-spear-phishing-analysis-shows/ Like what we’re doing and want to help support us? Donate here: https://www.patreon.com/defensivesec
undefined
Apr 7, 2025 • 1h 12min

Defensive Security Podcast Episode 302

In this episode, Jerry and Andrew discuss various cybersecurity topics, including the recent Oracle Cloud security breach, a GitHub supply chain attack, insider threats, and the implications of AI in cybersecurity. They explore the challenges of maintaining trust in cloud services, the complexities of insider threats, and the evolving landscape of cybercrime driven by AI advancements. The conversation emphasizes the need for robust security measures and the importance of adapting to emerging threats in the cybersecurity realm. Links: https://www.bleepingcomputer.com/news/security/oracle-privately-confirms-cloud-breach-to-customers/ https://www.bleepingcomputer.com/news/security/recent-github-supply-chain-attack-traced-to-leaked-spotbugs-token/ ttps://www.securityweek.com/39-million-secrets-leaked-on-github-in-2024/ https://www.theregister.com/2025/04/02/deel_rippling_espionage/ https://www.securityweek.com/ai-giving-rise-of-the-zero-knowledge-threat-actor/ Like what we’re doing and want to help support us? Donate here: https://www.patreon.com/defensivesec
undefined
Apr 1, 2025 • 1h 9min

Defensive Security Podcast Episode 301

In this episode of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kalat discuss a range of cybersecurity topics, including the recent Oracle Cloud breach, the challenges of asset management in large environments, and the importance of prioritizing vulnerabilities. They also explore the findings from a pen test report, the implications of emerging threats like Medusa ransomware, and the need for better security practices in organizations. Links: https://www.bleepingcomputer.com/news/security/oracle-customers-confirm-data-stolen-in-alleged-cloud-breach-is-valid/ https://thehackernews.com/2025/03/10-critical-network-pentest-findings-it.html?m=1 https://www.horizon3.ai/attack-research/attack-blogs/critical-or-clickbait-github-actions-and-apache-tomcat-rce-vulnerabilities-2025/ https://www.forbes.com/sites/daveywinder/2025/03/30/fbi-warns-use-2fa-as-time-traveling-hackers-strike/ https://www.reversinglabs.com/blog/epss-is-not-foolproof-shift-your-appsec-beyond-vulnerabilities Like what we’re doing and want to help support us? Donate here: https://www.patreon.com/defensivesec
undefined
Mar 18, 2025 • 1h 2min

Defensive Security Podcast Episode 300

Summary In this episode, we celebrate the 300th episode of the Defensive Security Podcast then discuss various cybersecurity topics including the rise of AI-driven threats, the importance of zero trust architecture, best practices for incident response, the impact of human error on security breaches, and the risks associated with collaboration tools. We also cover the dangers of malvertising campaigns exploiting platforms like GitHub. Like what we’re doing and want to help support us? Donate here: https://www.patreon.com/defensivesec Links: https://venturebeat.com/security/51-seconds-to-breach-how-cisos-are-fighting-back-against-lightning-fast-attacks/ https://www.theregister.com/2025/03/10/incident_response_advice/ https://www.scworld.com/news/95-of-data-breaches-involve-human-error-report-reveals https://www.darkreading.com/cyber-risk/remote-access-infra-remains-riskiest-corp-attack-surface https://www.bleepingcomputer.com/news/security/microsoft-says-malvertising-campaign-impacted-1-million-pcs/
undefined
Mar 10, 2025 • 1h 8min

Defensive Security Podcast Episode 299

A Disney security breach highlights the dangers of unapproved AI tools, showing how easy it is to compromise sensitive data. The discussion dives into VMware ESX vulnerabilities and their implications for corporate cybersecurity. Listeners learn about the complexities of vulnerability management, emphasizing the need for proactive strategies. The potential risks of third-party vendors and the exposure of sensitive data on GitHub also raise alarms. As technology evolves, so do the threats, prompting a call for vigilance in security practices.
undefined
Feb 22, 2025 • 1h 17min

Defensive Security Podcast Episode 298

In this episode of the Defense of Security podcast, hosts Jerry Bell and Andrew Kalat discuss various cybersecurity topics, including a recent incident involving notorious hackers breaching a company network in under an hour, strategies to defend against deepfake attacks, the targeting of freelance developers by North Korean adversaries, vulnerabilities in Palo Alto firewalls, and the emergence of ghost ransomware. The conversation emphasizes the importance of proactive security measures and the evolving landscape of cyber threats. Want to support the Defensive Security Podcast?  You can donate here: https://www.patreon.com/defensivesec Takeaways: The speed of cyber attacks is increasing, with breaches occurring in under an hour. Organizations must implement robust processes to defend against deepfake attacks. Freelance developers are at risk of being targeted by sophisticated cybercriminals. Palo Alto firewalls are vulnerable to attacks if management interfaces are exposed to the internet. Ghost ransomware is a growing threat, often using familiar tactics to exploit vulnerabilities. Links: https://arstechnica.com/security/2025/02/notorious-crooks-broke-into-a-company-network-in-48-minutes-heres-how/ https://www.darkreading.com/vulnerabilities-threats/4-low-cost-ways-defend-organization-against-deepfakes https://www.welivesecurity.com/en/eset-research/deceptivedevelopment-targets-freelance-developers/ https://www.theregister.com/2025/02/19/palo_alto_firewall_attack/ https://hackread.com/fbi-cisa-ghost-ransomware-threat-to-firms-worldwide/
undefined
Feb 18, 2025 • 1h 4min

Defensive Security Podcast Episode 297

The discussion dives into the changing tactics of ransomware, highlighting a shift from encryption to outright data theft for extortion. It reveals the challenges organizations face with data loss prevention and the vulnerabilities linked to internet exposure. Device code phishing, especially tied to Russian tactics, raises alarm bells, while AI's role in cybersecurity brings both threats and vulnerabilities to light. The hosts blend insightful commentary with humor, making this complex landscape engaging and accessible.
undefined
Feb 9, 2025 • 1h 10min

Defensive Security Podcast Episode 296

The discussion dives into the latest ransomware tactics, revealing how attackers target employees to exploit insider threats. There’s a deep look at the rise of LLM hijackers manipulating cloud accounts, highlighting the urgent need for better security measures. The ethics of phishing simulations come under scrutiny, advocating for supportive training instead of punitive measures. Cybersecurity professionals face challenges balancing risk with effective security, especially with the implications of generative AI in the workplace, where sensitive data can be at stake.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app