Episodes

  • Adversarial Podcast Ep. 16 - Cyber policy wishlist, RedNote/TikTok, Marsh's cyber insurance report, do CISOs need deep technical skills?
    Jan 28 2025

    ⬇️ See below for timestamps/summaries/references for each topic

    1:33 Biden's Executive Order on Cyber Security

    5:18 Cyber policy wishlist

    21:30 TikTok and RedNote

    29:36 Marsh's report on cyber insurance

    49:21 Do CISOs need to be highly technical?

    Executive Order on Strengthening and Promoting Innovation in the Nation’s Cybersecurity The outgoing Biden administration issues an executive order aimed at enhancing cybersecurity innovation in the U.S. The order focuses on strengthening national cybersecurity infrastructure, promoting technological advancements, and ensuring robust defenses against cyber threats.

    📖 References: https://web.archive.org/web/20250119001804/https://www.whitehouse.gov/briefing-room/presidential-actions/2025/01/16/executive-order-on-strengthening-and-promoting-innovation-in-the-nations-cybersecurity/

    TikTok Refugees Flock to China’s RedNote Amid U.S. Ban Concerns Following increased scrutiny and potential bans on TikTok in the U.S., over half a million users migrate to China’s RedNote platform. This shift highlights growing concerns over data privacy, national security, and the geopolitical tensions surrounding Chinese-owned apps.

    📖 References: https://www.reuters.com/technology/over-half-million-tiktok-refugees-flock-chinas-rednote-2025-01-14/

    Using Cybersecurity Analytics to Prioritize Cybersecurity Investments This article by Marsh explores how organizations can leverage cybersecurity analytics to make informed decisions about where to allocate resources for maximum impact. By analyzing data on threats, vulnerabilities, and past incidents, businesses can prioritize investments in areas that will most effectively reduce risk and enhance their overall security posture.

    📖 References: https://www.marsh.com/en/services/cyber-risk/insights/using-cybersecurity-analytics-to-prioritize-cybersecurity-investments.html

    No, you probably don't need a technical CISO An article argues that organizations may not necessarily require a highly technical Chief Information Security Officer (CISO). Instead, it emphasizes the importance of leadership, strategic thinking, and the ability to manage risk effectively in the role. 📖 References: https://www.linkedin.com/pulse/you-probably-dont-need-technical-ciso-shaun-marion-u0pmc

    Show More Show Less
    1 hr and 5 mins
  • The Adversarial Podcast Ep. 15 - US-China-Taiwan cyber relations, mobile app ads facilitating spying, holiday DoS vulnerabilities
    Jan 14 2025

    Join former CISOs Jerry, Mario, and Sounil as they dissect the latest cybersecurity news, discuss evolving threats, and share their seasoned perspectives on infosec.

    00:00 Highlight

    00:32 Intro

    1:48 China accuses US of stealing trade secrets

    10:05 Taiwan reports 2.4M Chinese cyberattacks/day

    18:21 Christmas day Chrome Extension hacks, including Cyberhaven

    23:28 Krebs: U.S. Army Soldier arrested for Snowflake customer extortions

    26:40 Wired: Popular apps hijacked to spy on locations through ad tracking

    33:28 Holiday DoS vulnerabilities in Palo Alto and Windows LDAP

    34:36 Are DoS vulnerabilities neglected by security programs?

    40:37 TI news feeds are noisy and vulnerabilities are overhyped

    49:37 Are Passkeys ready for prime time?

    54:49 Adversarial Podcast YouTube comments

    57:06 YouTube comment cryptowallet scams

    59:24 What should security teams try to accomplish during offsites?

    China Accuses US of Cyberattacks: https://www.reuters.com/world/china/chinas-internet-emergency-center-says-it-dealt-with-two-us-cyber-attacks-against-2024-12-18/

    Taiwan Reports 2.4M Chinese Cyberattacks Daily: https://www.reuters.com/technology/cybersecurity/chinese-cyberattacks-taiwan-government-averaged-24-mln-day-2024-report-says-2025-01-06/

    Christmas Day Chrome Extension Hacks: https://thehackernews.com/2024/12/16-chrome-extensions-hacked-exposing.html https://adversarialgroup.slack.com/archives/C073BTZ6ZSR/p1735336226170729

    U.S. Army Soldier Arrested for AT&T and Verizon Extortions: https://krebsonsecurity.com/2024/12/u-s-army-soldier-arrested-in-att-verizon-extortions/

    Geo-Data Privacy and App Hijacks: https://www.wired.com/story/gravy-location-data-app-leak-rtb/

    Holiday DoS Vulnerabilities: https://security.paloaltonetworks.com/CVE-2024-3393 https://www.securityweek.com/exploit-code-published-for-potentially-dangerous-windows-ldap-vulnerability/

    Passkeys: Are They Ready for Prime Time: https://arstechnica.com/security/2024/12/passkey-technology-is-elegant-but-its-most-definitely-not-usable-security/

    Cryptowallet Scams and YouTube Comments: https://www.kaspersky.com/blog/cryptowallet-free-seed-phrase-scam/52810

    Show More Show Less
    1 hr and 8 mins
  • The Adversarial Podcast Ep. 14 - Future of CISA/SEC under Trump, US Telco news, DAO faces $50M hack
    Dec 23 2024

    In this episode of The Adversarial Podcast, Jerry Perullo, Mario Duarte, and Sounil Yu discuss the latest developments in cybersecurity, geopolitical threats, and emerging trends as 2025 approaches.

    00:00 Introduction

    02:06 Trump 2.0's effect on security

    03:25 Future of CISA

    09:00 Future of SEC cyber reports

    15:57 Possible Trump 2.0 priorities

    19:40 Spying on US Telco

    20:20 What is SS7?

    24:04 SS7 vs. SMS interception

    25:40 Privacy impact of SS7 attacks

    30:12 National security

    31:17 CISA's guidance for telco

    36:58 DPRK targets DAO network, $50M heist using macOS malware

    46:30 DOJ indicts 14 DPRK nationals

    The Future of SEC/CISA under Trump 2.0. With Trump returning to office, the hosts discuss possible changes to SEC-mandated cybersecurity disclosures and the potential of priorities shifting away from CISA as Jenny Easterly’s resignation looms.

    References: https://www.cfodive.com/news/sec-cybersecurity-enforcement-outlook-uncertain-as-trump-returns/735728/, https://www.bankinfosecurity.com/cisa-faces-uncertain-future-under-trump-a-26829

    China, Russia, and Iran spying on US Telco networks. Adversaries are abusing SS7 vulnerabilities and are hacking into Telco networks to spy on U.S. citizens. The hosts unpack CISA's new recommendations for encrypted communications and discuss the history of SS7 vulnerabilities.

    References: https://www.404media.co/dhs-says-china-russia-iran-and-israel-are-spying-on-people-in-us-with-ss7/, https://www.reuters.com/technology/cybersecurity/china-affiliated-actors-compromised-networks-multiple-telecom-companies-us-says-2024-11-13/, https://www.cisa.gov/sites/default/files/2024-12/guidance-mobile-communications-best-practices.pdf

    DPRK Targets macOS hosts in $50M heist from DAO network. The hosts discuss recent DPRK-aligned Mac malware involved in a $50M cryptocurrency heist. The team discusses the sophistication of the attack, parallels to the attacks against US financial services companies, and why the crypto space remains a goldmine for state-sponsored cybercriminals.

    References: https://medium.com/@RadiantCapital/radiant-capital-incident-update-e56d8c23829e

    DOJ indicts 14 DPRK nationals for fraudulent worker scheme and extortions. We return to the ongoing surge in DPRK-funded actors illegallying work in IT roles within the US using false identities. The hosts unpack raise questions about insider threats and remote work challenges.

    References: https://www.justice.gov/opa/pr/fourteen-north-korean-nationals-indicted-carrying-out-multi-year-fraudulent-information?&web_view=true

    Show More Show Less
    54 mins
  • The Adversarial Podcast Ep. 13 - East/west coast CISOs, top CISO expenses in 2024, crypto regulation
    Dec 10 2024

    In this episode of The Adversarial Podcast, Jerry, Mario, and Sounil bring their adversarial insights to a packed discussion of the latest topics in enterprise cybersecurity.

    - East Coast vs. West Coast CISOs: The trio explores the divide between East Coast and West Coast CISOs. Is the East too focused on risk? Does the West overfit to AppSec and "shift-left" practices?

    - 2024 CISO Budget Report: Where are CISOs spending their increasing budgets in 2024? The hosts chat about the increasing expenses in identity management and generative AI security.

    - AI and Crypto Regulation: A discussion of AI and crypto regulation, emphasizing the need for clarity in regulatory goals while raising questions about their broader implications.

    - The GitHub Security Gap: The hosts discuss securing GitHub environments in increasingly BYOD environments.

    - Pegasus Malware: The group examines modern attack vectors, from sophisticated supply chain threats to Pegasus malware's unexpected victims.

    - Deep Fakes and Vishing: Staying on the topic of mobile attacks, the hosts debate how to best hinder deep fake-powered vishing attacks.

    - South Korean CEO arrested for adding DDoS feature to satellite receivers: A discussion of a recent story involving supply chain injection of DDoS features in Korea.

    Show More Show Less
    1 hr and 12 mins
  • The Adversarial Podcast Ep. 12 - RSA Conference making competition winners accept investment, inefficacy of phishing training
    Nov 26 2024

    In this episode of The Adversarial Podcast, former CISOs Jerry Perullo, Mario Duarte, and Sounil Yu explore critical topics shaping the cybersecurity landscape.

    1. Crosspoint Capital’s RSA Innovation Sandbox Model The hosts discuss Crosspoint Capital's controversial $5 million SAFE investment requirement for Innovation Sandbox finalists. They examine the implications for startups, founders, and the cybersecurity ecosystem as a whole, weighing its potential to drive innovation against the risks of stifling participation.

    Reference: RSA’s Innovation Sandbox: Cybersecurity Startups Must Accept $5 Million Investment - https://www.securityweek.com/rsa-conference-will-take-equity-in-innovation-sandbox-startup-finalists/

    2. The Effectiveness of Phishing Simulations and Training Phishing simulations are dissected, from their role in training effectiveness to their limitations. The hosts share personal experiences, propose smarter testing methods, and stress the need for customized, relevant security awareness programs.

    Reference: Understanding the Efficacy of Phishing Training in Practice - https://www.computer.org/csdl/proceedings-article/sp/2025/223600a076/21B7RjYyG9q

    3. Insights from a CISA Red Team Report A recent CISA red team assessment of critical infrastructure prompts discussions on systemic security flaws, logging and monitoring challenges, and the importance of infrastructure segmentation. The team critiques current approaches and highlights the risks of improper cleanup after penetration testing.

    Reference: Enhancing Cyber Resilience: Insights from CISA Red Team Assessment of a US Critical Infrastructure Sector Organization - https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-326a

    4. Cookie Theft and FBI Warnings The conversation shifts to session cookie theft, a rising threat targeting big identity providers like Google and Microsoft. The hosts explore technical solutions like device-bound session cookies and discuss why such attacks bypass MFA, affecting both enterprises and public users.

    Reference: https://www.fbi.gov/contact-us/field-offices/atlanta/news/cybercriminals-are-stealing-cookies-to-bypass-multifactor-authentication

    Show More Show Less
    1 hr and 12 mins
  • The Adversarial Podcast Ep. 11 - Incoming Trump administration, Microsoft's leaked SaaS creds, and software liability policy
    Nov 19 2024

    Introduction:

    • The episode opens with a discussion on securing devices for employees traveling to high-risk countries, like China, as a way to protect corporate data and maintain customer trust.
    • Hosts Jerry, Sounil, and Mario welcome listeners and discuss recent events, including the FS-ISAC Fall Summit in Atlanta and geopolitical implications of the recent election.

    Key Topics:

    1. Geopolitical Risks:
      • The group explores China's espionage activities and Russia's geopolitical maneuvers, predicting shifts in attacker strategies depending on U.S. political leadership.
      • Concerns about China's possible invasion of Taiwan and its implications for global tech, particularly chip manufacturing, are highlighted.
    2. Cybersecurity and Crypto:
      • The hosts discuss the post-election stock market bump, particularly in the tech and crypto sectors, and note the growing reliance on platforms like Coinbase.
      • They debate the perception and reality of cryptocurrency stability.
    3. Travel Security Policies:
      • The panel critiques outdated views on China-focused security policies and suggests broadening these policies to apply to all non-extradition countries.
      • Anecdotes on “burner laptops” and espionage myths are shared, emphasizing a need for realistic threat modeling.
    4. InfoStealers and SaaS Security:
      • Rising threats from InfoStealer malware, which targets stored credentials, are explored.
      • A specific case involving Snowflake and ServiceNow platforms highlights vulnerabilities tied to single-factor authentication and API misuse.
      • Debate on whether such findings should be within the scope of bug bounty programs arises.
    5. Shift Toward Hybrid and On-Prem Models:
      • Discussion on whether critical applications are moving back on-premises due to high cloud costs, especially for AI workloads.
      • The hosts argue the shift is likely economic rather than security-driven.
    6. EU Product Liability Directive:
      • The EU’s new directive introduces potential liability for software developers and companies, even extending to individual coders.
      • The implications for open source and global software markets are debated, with concerns about increased costs for doing business in the EU.
    7. CrowdStrike vs. Delta Lawsuit:
      • The CrowdStrike-Delta legal battle is analyzed, focusing on issues like the discovery of risk registers and internal chats, and how this might expose Delta's cybersecurity weaknesses.
      • Potential ripple effects for CrowdStrike's reputation and customer base are considered.

    Closing Thoughts:

    • The episode ends with reflections on regulatory landscapes, including GDPR and how enforcement levels shape software innovation and compliance strategies.
    • The hosts tease ongoing developments in the CrowdStrike case as a topic to watch closely.

    This episode combines high-level geopolitical discussions with detailed analysis of pressing cybersecurity trends, offering a mix of technical insights and industry perspectives.

    Show More Show Less
    54 mins
  • The Adversarial Podcast Ep. 10 - the CISO job market, CRQ, beg bounties, and cryptography
    Oct 22 2024

    (00:00) Intro

    (5:15) The CISO job market: present and future

    (25:57) Handling beg bounties and VDP

    (41:30) Quantum cryptography – how important is cryptography, really?

    Stories:

    • “Chinese Researchers Reportedly Crack Encryption With Quantum Computer” - https://www.pcmag.com/news/chinese-researchers-reportedly-crack-encryption-with-quantum-computer

    Hosts:

    • Jerry Perullo: https://www.linkedin.com/in/perullo/
    • Mario Duarte: https://www.linkedin.com/in/mario-duarte-7855237/
    • Sounil Yu: https://www.linkedin.com/in/sounil/

    Producer: Tillson Galloway (linkedin.com/in/tillson)

    Show More Show Less
    55 mins
  • The Adversarial Podcast Ep. 9 - NIST password guidelines, CUPS vulnerabilities, breach vs. hack
    Oct 8 2024

    (00:00) Intro & NIST’s new password complexity requirements

    (13:19) CUPS vulnerability: critical or a distraction

    (31:26) Federal standards for cybersecurity in health care: should legal responsibility fall on individuals?

    (47:30) What constitutes a hack vs a breach?

    Stories:

    • “NIST Drops Password Complexity, Mandatory Reset Rules” - https://www.darkreading.com/identity-access-management-security/nist-drops-password-complexity-mandatory-reset-rules
    • “Critical Linux CUPS Printing System Flaws Could Allow Remote Command Execution” - https://thehackernews.com/2024/09/critical-linux-cups-printing-system.html
    • “Wyden and Warner Introduce Bill to Set Strong Cybersecurity Standards for American Health Care System” - https://www.finance.senate.gov/chairmans-news/wyden-and-warner-introduce-bill-to-set-strong-cybersecurity-standards-for-american-health-care-system

    Hosts:

    • Jerry Perullo: https://www.linkedin.com/in/perullo/
    • Mario Duarte: https://www.linkedin.com/in/mario-duarte-7855237/
    • Sounil Yu: https://www.linkedin.com/in/sounil/
    Show More Show Less
    1 hr and 1 min