Safe Mode Podcast Podcast Por Safe Mode Podcast arte de portada

Safe Mode Podcast

Safe Mode Podcast

De: Safe Mode Podcast
Escúchala gratis

Podcast by Safe Mode PodcastAll rights reserved Política y Gobierno
Episodios
  • What does industry think of the White House's cybersecurity strategy?
    Apr 10 2026
    Bob Ackerman (founder of Allegis Cyber and a partner at DataTribe) joins Safe Mode to talk about where the new national cybersecurity strategy is trying to push the industry—especially around more open, coordinated “active disruption” with government support (and what that does not mean, like hack-back). He shares what he’s hearing from leaders who want clearer “rules of the road,” and why it’s tough to move from reactive collaboraBob Ackerman (founder of Allegiance Cyber and a partner at DataTribe) joins Safe Mode to talk about where the new national cybersecurity strategy is trying to push the industry—especially around more open, coordinated “active disruption” with government support (and what that does not mean, like hack-back). He shares what he’s hearing from leaders who want clearer “rules of the road,” and why it’s tough to move from reactive collaboration to getting ahead of threats. The conversation then turns to AI and why the next couple of years could get “a little spicy,” with offensive tooling accelerating fast and defenders struggling with visibility, noise, and prioritization. Ackerman’s bottom line: don’t get distracted by shiny objects—double down on fundamentals and hygiene, because you can’t defend what you can’t see.tion to getting ahead of threats. The conversation then turns to AI and why the next couple of years could get “a little spicy,” with offensive tooling accelerating fast and defenders struggling with visibility, noise, and prioritization. Ackerman’s bottom line: don’t get distracted by shiny objects—double down on fundamentals and hygiene, because you can’t defend what you can’t see. In our reporter chat, Greg talks with Tim Starks about the proposed CISA budget and warnings that Iran is going after critical infrastructure in cyber domain.
    Más Menos
    31 m
  • When iPhone exploits turn into commodities
    Mar 26 2026
    A sophisticated iPhone exploit kit known as DarkSword has escaped the world of targeted espionage and landed in public view—leaked on GitHub in a form that researchers say is trivial to repurpose and deploy. With the barrier to entry collapsing to “copy, paste, host,” the immediate concern is no longer whether advanced actors can use it, but how quickly criminal groups and opportunistic attackers will operationalize it against the enormous population of out-of-date iOS devices.
 In this episode, Jame’s Michael Covington joins us for a practitioner-level breakdown of what the DarkSword leak changes, who’s exposed, and what defenders can do right now. We dig into the real enterprise blast radius for organizations with BYOD and partially managed fleets, what meaningful detection and response looks like on iOS when visibility is limited, and how to prioritize patch enforcement, quarantine decisions, and Lockdown Mode for high-risk users. We also zoom out to the bigger pattern: highly capable mobile exploitation frameworks (including recent reporting on Coruna) increasingly surfacing outside tightly controlled circles—reshaping the threat model for Apple devices in the enterprise.

In our reporter chat, Greg talks with Matt Kapko on what they heard during their many conversations during their time at the RSAC 2026 Conference.
    Más Menos
    35 m
  • Behind the scenes of the Socksescort takedown
    Mar 19 2026
    In this episode, we sit down with Chris Formosa to break down the Socksescort disruption—a proxy botnet powered by AVRecon that compromised edge devices at scale. Chris walks us through why the operation was so dangerous, how investigators tracked its command-and-control infrastructure, and what changed between the 2023 disclosure and the eventual takedown in coordination with the Department of Justice. We also dig into why edge devices remain prime targets, where most organizations still have visibility gaps, and what the next evolution of this threat could be. In our reporter chat, Greg Otto and Tim Starks break down DarkSword, a iOS exploit kit that could impact hundreds of millions of people.
    Más Menos
    35 m
Todavía no hay opiniones