エピソード

  • S4E15 – RSAC, Iranian hackers, White House's Cyber Strategy and Cyber EOs, the Future of TPRM
    2026/03/17

    Iran-linked hackers claim responsibility for attack on US medical device maker Stryker

    Attackers tied to Iran say they hit Stryker, and investors punished the stock as the company scrambled to assess exposure.

    Trump Signs Executive Order Aimed at Cybercrime Gangs

    The President issued an order to tide together federal tools, international partners, and private-sector incentives for hunting down and disrupting ransomware crews.

    President Trump’s Cyber Strategy for America

    The new national cyber strategy leans hard on resilience, collaboration with allies, and deterring Beijing through offensive-ready posture.

    The future of third-party risk is NOT better questionnaires

    The author argues that automation and better data sharing—not more paperwork—are what finally move the needle on vendor risk management.

    Hosts:

    Jerry Perullo (Founder, https://adversarial.com/)

    Sounil Yu (Founder, https://www.knostic.ai/)

    Mario Duarte (Founder, stealth startup)

    Producer: Tillson Galloway (Founder, http://githoundexplore.com/)

    続きを読む 一部表示
    1 時間 10 分
  • S4E14 – Federal Gov vs. Anthropic, 40% layoff at Blocks due to AI
    2026/03/03

    Claude Code Security research preview Claude now reasons about code like a human researcher, re-checks its own findings for confidence, and surfaces patch suggestions in a dashboard while keeping humans in control—limited preview for Enterprise/Team customers plus expedited access for open-source maintainers.

    Pentagon gives Anthropic a best-and-final offer With a deadline looming, the Pentagon demanded full lawful-use access, threatening supply-chain risk and even a Defense Production Act push, but Anthropic stood firm on guardrails around mass surveillance and autonomous weapons.

    State Department and other agencies ditch Anthropic for OpenAI State, Treasury, HHS, and others are dropping Claude after Trump’s directive to cancel Anthropic contracts, swapping in OpenAI’s GPT-4.1 for tools like StateChat as the broader federal boycott takes shape.

    New AirSnitch attack bypasses Wi-Fi encryption AirSnitch leverages cross-layer identity desync to nullify client isolation on routers from Netgear to Cisco, giving nearby attackers full MitM access to intercept and tamper with otherwise encrypted traffic.

    Your password manager’s “zero knowledge” promise is broken ETH Zürich’s USENIX paper proves that malicious servers controlling Bitwarden/Dashlane/LastPass infrastructure can hijack everyday vault interactions and read users’ encrypted data despite the “zero knowledge” pitch.

    Researchers find critical vulnerabilities in cloud-based password managers The ETH team demonstrated a dozen attacks on Bitwarden, seven on LastPass, six on Dashlane, and even a 1Password flaw, showing compromised servers—without exotic hardware—can view or rewrite entire vaults.

    Hosts:

    Jerry Perullo (Founder, https://adversarial.com/)

    Sounil Yu (Founder, https://www.knostic.ai/)

    Mario Duarte (Founder, stealth startup)

    Producer: Tillson Galloway (Founder, http://githoundexplore.com/)

    続きを読む 一部表示
    1 時間 2 分
  • S4E13 – Munich Security Conference, hiring AI specialists, Gemini used by criminals
    2026/02/18

    GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use Google’s threat team distills red-team learnings from sophisticated experimentation as it hardens defenses and anticipates adversarial AI backdoors.

    New Trump Cyber Strategy Prompts Companies to Mull Legal Limits The administration’s aggressive cyber doctrine is forcing firms to reconsider how far they can legally follow the offensive playbook.

    The Trump Administration’s Cyber Strategy Fundamentally Misunderstands China’s Threat | Council on Foreign Relations CFR analysis warns that the new strategy oversimplifies China’s capabilities and risks misaligning priorities.

    CISA will shutter some missions to prioritize others. CISA’s Cybersecurity Division is reorganizing to better match a layered threat-response posture.

    Google TIG disrupts “world’s largest residential proxy network” The threat-intel team dismantled a sprawling residential proxy operation that was selling access to anonymized traffic, curbing a major enabler of fraud and abuse.

    Hosts: Jerry Perullo (Founder, https://adversarial.com/)

    Sounil Yu (Founder, https://www.knostic.ai/)

    Mario Duarte (Founder, stealth startup)

    Producer: Tillson Galloway (Founder, http://githoundexplore.com/)

    続きを読む 一部表示
    1 時間 13 分
  • Adversarial Podcast S4E12 – Curl shuts down bug bounty program, most expensive security control that gave zero security
    2026/02/05

    The end of the curl bug bounty program. Curl’s creator Daniel Stenberg announced the shutdown of the project’s bug-bounty program because overwhelming volumes of low-quality and AI-generated reports, coupled with bad-faith security submissions, impose excessive mental and time costs while providing little real improvement to the software.

    Changing Federal Reserve Regulations. The memo directs Federal Reserve supervisory staff to shift toward a more risk-focused, judgment-driven, and proportionate supervisory model that prioritizes material financial risks, relies more on other regulators’ and firms’ internal audit work, reduces procedural and duplicative oversight, and sharpens the clarity and impact of supervisory findings and enforcement.

    Reddit: "What is the most expensive security control you added that gave zero security." An online discussion thread about security controls.

    Hosts:

    Jerry Perullo (Founder, https://adversarial.com/)

    Sounil Yu (Founder, https://www.knostic.ai/)

    Mario Duarte (Founder, stealth startup)

    Producer: Tillson Galloway (Founder, http://githoundexplore.com/)

    続きを読む 一部表示
    1 時間 18 分
  • Adversarial Podcast S4E11 – Iran Internet blackout, threat intelligence briefings, cyber framework alignment
    2026/01/20

    00:00 Intro

    01:40 Iran's Internet blackout

    48:06 U.S. Weighs Expanding Private Companies’ Role in Cyberwarfare

    57:35 Aligning cybersecurity programs to frameworks

    There's an internet blackout in Iran. How are videos and images getting out? During Iran’s nationwide internet blackout imposed amid widespread anti-government protests, some citizens have been using Elon Musk’s Starlink satellite service to bypass state-controlled communication blackouts and share information with the outside world despite government efforts to restrict or jam such access.

    Lawmakers to Restart Efforts to Revive Lapsed Cyber Intel Bill. U.S. lawmakers are preparing to revive and reauthorize the lapsed Cybersecurity Information Sharing Act, a key bill that facilitates sharing of cyber threat intelligence between the federal government and the private sector, with bipartisan momentum to include it in broader funding legislation as concerns grow about rising cyber threats and gaps left by the law’s expiration.

    U.S. Weighs Expanding Private Companies’ Role in Cyberwarfare. The U.S. administration is considering a significant shift in cyber strategy that would allow private companies, beyond their current contractor roles, to directly participate in offensive cyber operations against foreign adversaries—a move that would require new legal authorities and raises legal, ethical and oversight concerns.

    Should Our Security Controls Be More Like North Korea or Norway? Security programs work better when they resemble Norway’s balanced, trust-based model rather than North Korea’s heavy-handed, surveillance-first approach.

    Hosts:

    Jerry Perullo (Founder, https://adversarial.com/)

    Sounil Yu (Founder, https://www.knostic.ai/)

    Mario Duarte (Founder, stealth startup)

    Producer: Tillson Galloway (Founder, http://githoundexplore.com/)

    続きを読む 一部表示
    1 時間 15 分
  • Adversarial Podcast S4E10 – AI impact on cyber jobs, SOC 2 fraud, CISA polygraph failure
    2026/01/14

    Cloudy Outlook for Cyber Jobs as AI Fills Security Gaps. Cybersecurity hiring growth slowed to 7% in 2025 amid flat budgets and economic uncertainty, with firms shifting spend toward AI automation over expanding teams.

    Coupang, Inc. (CPNG) Class Period Expanded in Pending Investor Securities Lawsuit - Hagens Berman. Hagens Berman expanded a securities class action against Coupang over alleged cybersecurity misstatements after massive data breach disclosures and losses.

    Jaguar Land Rover wholesale volumes down 43% after cyberattack. Jaguar Land Rover’s September 2025 cyberattack cut Q3 wholesale volumes 43%, disrupted production, cost £196 million, and triggered UK government intervention.

    Security Chiefs Plan New Uses for AI in 2026. Security leaders say AI sharply improved their defenses in 2025 and they plan to expand its use in 2026 for tasks like spotting vulnerabilities and automating identity checks.

    Acting CISA director failed a polygraph. Career staff are now under investigation. CISA’s acting director failed a polygraph, triggering a DHS investigation and suspension of multiple career staff accused of misleading leadership.

    Possible instances of SOC 2 Fraud. A whistleblower exposed an alleged SOC 2 fraud scheme where automation platforms and audit firms rubber-stamped fake compliance reports at scale.

    Hosts:

    Jerry Perullo (Founder, https://adversarial.com/)

    Sounil Yu (Founder, https://www.knostic.ai/)

    Mario Duarte (Founder, stealth startup)

    Producer: Tillson Galloway (Founder, http://githoundexplore.com/)

    続きを読む 一部表示
    1 時間 7 分
  • Adversarial Podcast S4E09 – New Pentagon CIO, age verification in Australia, Microsoft overhauls bug bounty program
    2025/12/24

    Nation Cyber Strategy Forthcoming The Trump administration is preparing a new national cyber strategy that increasingly relies on private companies to conduct offensive cyber operations on behalf of the U.S. government.

    Kirsten Davies Confirmed as Pentagon CIO The U.S. Senate confirmed Kirsten Davies as the Department of Defense’s Chief Information Officer, placing her in charge of modernizing and securing the Pentagon’s vast IT infrastructure.

    North Korean IT Worker Caught Inside Amazon A North Korean operative was discovered working remotely in Amazon’s IT department after analysts flagged suspicious keystroke latency suggesting the employee was operating from overseas.

    Australia Bans Social Media for Children Under 16 Australia passed a landmark law banning children under 16 from social media platforms, reigniting global debate over age verification, surveillance, and online privacy.

    Venezuela Blames Cyberattack on the U.S. After Tanker Seizure Venezuela’s state oil company accused the United States of launching a cyberattack following tanker seizures, with disruptions severe enough that the company’s main website remains offline.

    Microsoft Overhauls Bug Bounty Program Microsoft revamped its bug bounty program to make all vulnerabilities “in scope by default,” addressing long-standing complaints from security researchers about unclear reward boundaries.

    Kevin Mandia Launches Armadin Former Mandiant CEO Kevin Mandia unveiled Armadin, a startup offering AI-powered red-teaming services designed to stress-test AI systems against emerging threats.

    Microsoft Finally Kills a Long-Broken Cipher. Microsoft announced it will disable an obsolete cryptographic cipher that has been exploited for decades, closing a long-standing security hole across Windows systems.

    Hosts:

    Jerry Perullo (Founder, https://adversarial.com/)

    Sounil Yu (Founder, https://www.knostic.ai/)

    Mario Duarte (Founder, stealth startup)

    Producer: Tillson Galloway (Founder, http://githoundexplore.com/)

    続きを読む 一部表示
    1 時間 10 分
  • Adversarial Podcast S4E08 – Shai-Hulud worm strikes again, critical React vuln, CrowdStrike insider threat
    2025/12/09

    00:00 Intro

    02:33 Shai Hulud 2.0

    17:12 Max severity React vulnerability

    29:23 CrowdStrike catches insider feeding information to hackers

    46:24 Anthropic disruptes AI-orchestrated cyber campaign

    52:35 Uncertain economy takes effect on cyber teams

    Shai-Hulud 2.0 Aftermath: Trends, Victimology and Impact

    Researchers report that Shai-Hulud 2.0 is an ongoing npm supply-chain worm that has compromised hundreds of packages and tens of thousands of GitHub repositories and siphoned secrets through CI/CD pipelines.

    Critical React Server Components Vulnerability CVE-2025-55182

    React vulnerability React Server Components (RSC) — tracked as CVE-2025-55182 — is a critical (CVSS 10.0) flaw that allows unauthenticated attackers to execute arbitrary code on servers just by sending a crafted HTTP request to vulnerable packages.

    CrowdStrike catches insider feeding information to hackers

    CrowdStrike caught an insider who had secretly shared screenshots of internal systems with hackers linked to Scattered Lapsus$ Hunters — though the company says no breach of its infrastructure occurred and no customer data was compromised.

    Comcast's 2025 Cybersecurity Threat Report

    Comcast Business’s 2025 Cybersecurity Threat Report finds that over the 12-month period ending May 31, 2025 the company recorded 34.6 billion cyber events — including 4.7 billion phishing attempts, 9.7 billion “drive-by” compromise attacks, 44,000 DDoS attacks, and 19.5 billion resource-development activities.

    Disrupting the first reported AI-orchestrated cyber espionage campaign

    Anthropic reports disrupting what it assesses to be the first large-scale, AI-orchestrated cyber espionage campaign, in which a Chinese state-linked group jailbroke Claude Code to autonomously conduct reconnaissance, exploit vulnerabilities, and exfiltrate data across dozens of global targets with minimal human involvement.

    Uncertain Economy Takes Toll on Cybersecurity Teams

    Economic uncertainty has hit corporate cyber operations: Artico Search and IANS Research report that cybersecurity budgets rose just 4% in 2025 (a five-year low), hiring growth slowed to 7% (down from 12% in 2024), and many security-teams are grappling with tighter budgets, fewer hires, and slower wage growth.

    Hosts:

    Jerry Perullo (Founder, https://adversarial.com/)

    Sounil Yu (Founder, https://www.knostic.ai/)

    Mario Duarte (Founder, stealth startup)

    Producer: Tillson Galloway (Founder, http://githoundexplore.com/)

    続きを読む 一部表示
    1 時間 2 分