DiscoverBelow the Surface (Audio) - The Supply Chain Security PodcastPatching, Evil AI, Supply Chain Breaches - BTS #64
Patching, Evil AI, Supply Chain Breaches - BTS #64

Patching, Evil AI, Supply Chain Breaches - BTS #64

Update: 2025-11-24
Share

Description

Summary

In this episode, the hosts discuss various cybersecurity topics, including recent vulnerabilities in Fortinet products, the implications of supply chain breaches, the evolving role of AI in cybersecurity, and updates to the OWASP Top 10 list. They emphasize the importance of firmware security and the need for better visibility and standards in the industry. The conversation highlights the challenges faced by defenders in a rapidly changing threat landscape and the necessity for proactive measures to secure systems.


Takeaways

Fortinet vulnerabilities are critical and require immediate attention.
Silent patches can lead to significant security risks.
AI is being used by both attackers and defenders in cybersecurity.
The OWASP Top 10 has been updated to include software supply chain failures.
Firmware security is often overlooked but is essential for device safety.
Supply chain breaches can have far-reaching implications for organizations.
Visibility into firmware and device security is lacking in the industry.
Standards for software security are necessary to protect against vulnerabilities.
Defenders need better tools to combat evolving threats.
The cybersecurity landscape is becoming increasingly complex and interconnected.

Chapters

00:00 Introduction and Technical Setup
03:08 Fortinet Vulnerabilities and Exploits
06:05 Public Exploits and Path Traversal Vulnerabilities
09:00 Chaining Vulnerabilities and Risk Assessment
11:50 Authentication and Vulnerability Scoring
15:04 Operational Complexity in Patch Management
17:55 Silent Patches and Their Implications
20:58 Challenges with Network Device Security
24:55 Cyber Insurance and Vulnerability Trends
27:58 The Impact of Silent Patches
30:46 End of Life Devices and Legacy Systems
34:58 Supply Chain Security and Source Code Theft
39:44 AI in Cybersecurity: Opportunities and Threats
47:17 Navigating AI's Guardrails and Malicious Use Cases
49:24 The Dilemma of AI and Harmful Intentions
52:44 The Need for Researcher Access to AI Tools
58:36 OWASP Top 10 Updates and Supply Chain Security
01:05:12 The Challenges of Firmware and Device Security

Comments 
loading
00:00
00:00
1.0x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Patching, Evil AI, Supply Chain Breaches - BTS #64

Patching, Evil AI, Supply Chain Breaches - BTS #64

Paul Asadooorian