On this week’s show Patrick Gray talks through the news with Chris Krebs and Dmitri Alperovitch. They discuss:

The SEC enforcement action against Solarwinds’ CISO
The White House AI Executive Order
CitrixBleed exploitation goes wide
How Kaspersky captured some (likely) Five Eyes iOS 0day
Elon Musk’s Gaza Strip adventures
Much, much more

This week’s show is brought to you by Greynoise. Andrew Morris, Greynoise’s founder and CEO, is this week’s sponsor guest. He talks about how Greynoise is using large language models to help them analyse massive quantities of malicious internet traffic.



Show notes


comp-pr2023-227.pdf


Biden signs executive order to oversee and invest in AI tech


Risky Biz News: CitrixBleed vulnerability goes from bad to disastrous


Andrew Morris on X: "Confluence bug is popping off. VAST majority of it is blasting thru Tor, similar to the first wave of Log4J exploitation two years ago. If you haven't patched, it's probably popped. https://t.co/4JC0uiTaqc https://t.co/wLDgQpq7r0" / X


Andrew Morris on X: "Confluence bug is popping off. VAST majority of it is blasting thru Tor, similar to the first wave of Log4J exploitation two years ago. If you haven't patched, it's probably popped. https://t.co/4JC0uiTaqc https://t.co/wLDgQpq7r0" / X


How Kaspersky obtained all stages of Operation Triangulation | Securelist


Kaspersky reveals 'elegant' malware resembling NSA code | CyberScoop


Sophisticated StripedFly Spy Platform Masqueraded for Years as Crypto Miner


A cascade of compromise: unveiling Lazarus' new campaign | Securelist


Near-total internet and cellular blackout hits Gaza as Israel ramps up strikes


Amichai Stein on X: "Israel's Communications Minister @shlomo_karhi in response to Elon Musk: Israel will use all the means at its disposal to fight this. Hamas will use this for terrorist activity. There is no doubt about it. We know it, and Musk knows it. Hamas is ISIS." / X


Shashank Joshi on X: "Wonder what encryption, if any, they use? Vulnerable to tapping. "Hamas has maintained operational security by going “stone age” and using hard-wired phone lines while eschewing devices that are hackable or emit an electronic signature." https://t.co/ALVSXb55Zn" / X


Hackers that breached Las Vegas casinos rely on violent threats, research shows | CyberScoop


Octo Tempest crosses boundaries to facilitate extortion, encryption, and destruction | Microsoft Security Blog


GitHub - cloudflare/har-sanitizer


Russia to launch its own version of VirusTotal due to US snooping fears


iPhones have been exposing your unique MAC despite Apple’s promises otherwise | Ars Technica


VMware warns of critical vulnerability affecting vCenter Server product


Judge tosses Khashoggi widow’s lawsuit against NSO Group

Twitter Mentions