Category Archives: Podcast

Defensive Security Podcast Episode 309

Like what we’re doing with the DefSec Podcast and want to help support us? Donate here: https://www.patreon.com/defensivesec

Links: 

https://www.theregister.com/2025/06/06/chatgpt_for_evil/
https://www.theregister.com/2025/06/06/ransomware_negotiation/
https://www.darkreading.com/cyber-risk/how-to-approach-security-era-ai-agents
https://www.bleepingcomputer.com/news/security/coinbase-breach-tied-to-bribed-taskus-support-agents-in-india/
https://www.theregister.com/2025/06/04/kiranapro_cyberattack_deletes_cloud_resources/ / https://x.com/deepakravindran/status/1930776943101894869

Defensive Security Podcast Episode 307

In this episode of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kalat discuss various cybersecurity topics, including a significant data breach at Coinbase, the challenges of cryptocurrency security, the importance of patch management, and the evolving landscape of cyber threats. They also discuss insider threats, the failures of rigid security programs, and the overlooked cybersecurity risks in mergers and acquisitions. The episode concludes with a discussion on emerging threats, particularly the potential for ransomware to infect CPUs.

Like what we’re doing and want to help support us? Donate here: https://www.patreon.com/defensivesec

Links:
https://go.theregister.com/feed/www.theregister.com/2025/05/21/coinbase_confirms_insider_breach_affects/
https://www.theregister.com/2025/05/14/improve_patching_strategies/
https://www.bleepingcomputer.com/news/security/ransomware-gangs-increasingly-use-skitnet-post-exploitation-malware/
https://www.darkreading.com/vulnerabilities-threats/rigid-security-programs-fail
https://www.darkreading.com/cyber-risk/hidden-cybersecurity-risks-mergers-acquisitions
https://www.theregister.com/2025/05/11/cpu_ransomware_rapid7/

Defensive Security Podcast Episode 304

In this episode of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kalat discuss the latest trends in cybersecurity, focusing on the rise of BEC scams and the significant losses attributed to cybercrime in 2024. They explore emerging threats, including social engineering tactics and hardware vulnerabilities, particularly in management interfaces. The conversation also delves into the complexities of vulnerability management, the risks associated with supply chain attacks in open source software, and the alarming rate at which CVEs are being exploited. The hosts emphasize the need for organizations to be proactive in their security measures and to understand the evolving landscape of cyber threats.

Links:

  • https://www.cybersecuritydive.com/news/fbi-internet-crime-bec-scams-investment-fraud-losses/746181/
  • https://www.bleepingcomputer.com/news/security/asus-releases-fix-for-ami-bug-that-lets-hackers-brick-servers/
  • https://www.theregister.com/2025/04/21/microsoft_apple_patch/
  • https://thehackernews.com/2025/04/ripples-xrpljs-npm-package-backdoored.html
  • https://thehackernews.com/2025/04/159-cves-exploited-in-q1-2025-283.html

Like what we’re doing and want to help support us? Donate here: https://www.patreon.com/defensivesec

Defensive Security Podcast Episode 300

Summary

In this episode, we celebrate the 300th episode of the Defensive Security Podcast then discuss various cybersecurity topics including the rise of AI-driven threats, the importance of zero trust architecture, best practices for incident response, the impact of human error on security breaches, and the risks associated with collaboration tools. We also cover the dangers of malvertising campaigns exploiting platforms like GitHub.

Like what we’re doing and want to help support us? Donate here: https://www.patreon.com/defensivesec

Links:

  • https://venturebeat.com/security/51-seconds-to-breach-how-cisos-are-fighting-back-against-lightning-fast-attacks/
  • https://www.theregister.com/2025/03/10/incident_response_advice/
  • https://www.scworld.com/news/95-of-data-breaches-involve-human-error-report-reveals
  • https://www.darkreading.com/cyber-risk/remote-access-infra-remains-riskiest-corp-attack-surface
  • https://www.bleepingcomputer.com/news/security/microsoft-says-malvertising-campaign-impacted-1-million-pcs/

Defensive Security Podcast Episode 299

Summary

In this episode of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kalat discuss various cybersecurity topics, including a Disney employee’s mishap with an AI tool that led to a significant hack, vulnerabilities in VMware ESX hypervisors, and a developer’s sabotage of their ex-employer. They also explore the implications of GitHub repository exposure and the growing risks associated with third-party vendors in cybersecurity.

Link to support Andy and Jerry’s work creating the Defensive Security Podcast: https://www.patreon.com/defensivesec

Story links:

Defensive Security Podcast Episode 297

 

Become a Patreon supporter of the show here: https://www.patreon.com/defensivesec

Links:

  • https://www.cybersecuritydive.com/news/ransomware-gangs–tactics-/739937/
  • https://www.bleepingcomputer.com/news/security/over-12-000-keriocontrol-firewalls-exposed-to-exploited-rce-flaw/
  • https://arstechnica.com/information-technology/2025/02/russian-spies-use-device-code-phishing-to-hijack-microsoft-accounts/
  • https://www.darkreading.com/cyber-risk/open-source-ai-models-pose-risks-of-malicious-code-vulnerabilities
  • https://www.csoonline.com/article/3823429/24-of-vulnerabilities-are-abused-before-a-patch-is-available.html

Defensive Security Podcast Episode 295

 

In this episode of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kalat discuss various cybersecurity topics, including the alarming statistics surrounding ransomware attacks, the implications of paying ransoms, and the evolving nature of ransomware as a broader category of cyber threats. They also discuss the consolidation of security tools and the skepticism surrounding it, particularly in light of a recent report by Palo Alto and IBM. The conversation shifts to the risks associated with AI, highlighted by the DeepSeek incident, and concludes with a discussion on the importance of securing management interfaces and the ongoing challenges in the cybersecurity landscape.

 

Links:

  • https://www.infosecurity-magazine.com/news/ransomware-victims-shut-operations/
  • https://www.cybersecuritydive.com/news/consolidation-security-tools/738912/
  • https://9to5mac.com/2025/01/31/security-bite-top-macos-threat-found-riding-the-deepseek-wave/
  • https://www.securityweek.com/sonicwall-confirms-exploitation-of-new-sma-zero-day/
  • https://www.theregister.com/2025/01/30/deepseek_database_left_open/

 

Takeaways

  • 58% of ransomware victims had to shut down operations temporarily.
  • Only 13% of victims who paid ransom got all their data back.
  • The ransomware ecosystem relies on the belief that victims will recover their data.
  • Organizations average 83 different security tools, leading to inefficiencies.
  • Speed in deploying AI can compromise security practices.
  • DeepSeek incident highlights risks of using unverified AI models.
  • SonicWall’s zero-day vulnerability emphasizes the need for secure management practices.
  • Security tool consolidation may not always lead to better outcomes.
  • Phishing and RDP compromises are common entry points for ransomware.
  • The evolving nature of ransomware requires a broader understanding of cyber threats.

Defensive Security Podcast Episode 294

In this episode of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kalat discuss various cybersecurity topics, including a hidden backdoor in Juniper routers, PayPal’s recent data breach settlement, the exploitation of older Ivanti bugs, the PowerSchool data breach affecting millions, and CISA’s new software security recommendations. The conversation emphasizes the importance of proactive security measures and the evolving landscape of cybersecurity threats.

 

If you find this podcast useful, please consider supporting us here: https://www.patreon.com/defensivesec

Takeaways

  • The hidden backdoor in Juniper routers raises concerns about network security.
  • PayPal’s settlement highlights the need for better data protection practices.
  • Older vulnerabilities in Ivanti products continue to be exploited, stressing the importance of timely patching.
  • The PowerSchool data breach underscores the risks of inadequate credential protection.
  • CISA’s recommendations aim to improve software security across critical infrastructure.

Links:

  • https://www.theregister.com/2025/01/25/mysterious_backdoor_juniper_routers/
  • https://www.bleepingcomputer.com/news/security/paypal-to-pay-2-million-settlement-over-2022-data-breach/
  • https://www.bleepingcomputer.com/news/security/cisa-hackers-still-exploiting-older-ivanti-bugs-to-breach-networks/
  • https://www.securityweek.com/millions-impacted-by-powerschool-data-breach/
  • https://www.securityweek.com/cisa-fbi-update-software-security-recommendations/

Defensive Security Podcast Episode 292

In this episode of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kalat discuss various cybersecurity topics, including the dangers of malware disguised as proof of concept code on GitHub, the alarming rise in phishing attacks, the implications of a recent Treasury hack, and the targeted attacks on Ivanti’s security products. The conversation emphasizes the need for skepticism in security research, the importance of creating a safer environment for users, and the ongoing challenges posed by sophisticated threat actors.

Links:

  • https://www.bleepingcomputer.com/news/security/fake-ldapnightmware-exploit-on-github-spreads-infostealer-malware/
  • https://www.forbes.com/sites/daveywinder/2025/01/09/do-not-click-new-gmail-outlook-apple-mail-warning-for-billions/
  • https://www.bleepingcomputer.com/news/security/treasury-hackers-also-breached-us-foreign-investments-review-office/
  • https://www.bleepingcomputer.com/news/security/google-chinese-hackers-likely-behind-ivanti-vpn-zero-day-attacks/

Defensive Security Podcast Episode 291

Summary

In this episode of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kalat discuss various cybersecurity topics, including a significant incident involving a Tenable plugin update that disrupted Nessus agents worldwide. They delve into the implications of malicious Chrome extensions and sophisticated phishing attacks, particularly focusing on a recent incident involving OAuth trust exploitation. The conversation shifts to new HIPAA cybersecurity rules that aim to enhance security measures in healthcare, followed by a discussion on the rise of AI-generated phishing emails targeting executives. Finally, they explore the challenges of passkey technology in achieving usable security across different platforms.

 

Links:

  • https://www.bleepingcomputer.com/news/security/bad-tenable-plugin-updates-take-down-nessus-agents-worldwide/
  • https://www.bleepingcomputer.com/news/security/new-details-reveal-how-hackers-hijacked-35-google-chrome-extensions/
  • https://www.darkreading.com/vulnerabilities-threats/hipaa-security-rules-pull-no-punches
  • https://arstechnica.com/security/2025/01/ai-generated-phishing-emails-are-getting-very-good-at-targeting-executives/
  • https://arstechnica.com/security/2024/12/passkey-technology-is-elegant-but-its-most-definitely-not-usable-security/