loader from loading.io

SBOMs, HBOMs, and Supply Chain Visibility - BTS #50

Below the Surface (Audio) - The Supply Chain Security Podcast

Release Date: 05/15/2025

AI-Powered Firmware Hacking: The Future of Vulnerability Discovery - BTS #72 show art AI-Powered Firmware Hacking: The Future of Vulnerability Discovery - BTS #72

Below the Surface (Audio) - The Supply Chain Security Podcast

In this episode, the hosts explore the latest in cybersecurity, including AI-driven vulnerability discovery, firmware analysis tools, secure boot complexities, and recent CVE trends. They discuss practical techniques for hacking devices, the challenges of firmware emulation, and the implications of new security policies on consumer and enterprise hardware. Chapters 00:00 Introduction to Hacking and Security Updates 03:24 Exploring Samsung TV Hacking 06:34 AI in Vulnerability Research 11:17 The Role of AI in Exploiting Vulnerabilities 15:18 CVE Disclosure and Ethical Considerations 20:43 AI...

info_outline
What Makes a Device a Router? - BTS #71 show art What Makes a Device a Router? - BTS #71

Below the Surface (Audio) - The Supply Chain Security Podcast

 summary In this episode, the hosts discuss the new FCC regulations regarding consumer routers, exploring the implications for cybersecurity, the definitions of what constitutes a router, and the challenges of manufacturing compliant devices. They delve into the debate surrounding the effectiveness of these regulations in mitigating cyber risks, the role of hardware versus software vulnerabilities, and the potential impact on consumers and existing devices in homes. In this conversation, the hosts discuss the implications of the FCC's decision to decertify routers and firmware, the...

info_outline
How Cheap KVMs Could Be Your Network's Weak Link - BTS #70 show art How Cheap KVMs Could Be Your Network's Weak Link - BTS #70

Below the Surface (Audio) - The Supply Chain Security Podcast

In this episode, we explore the security vulnerabilities of low-cost IP-based KVMs, including firmware flaws, default credentials, and insecure update mechanisms. Two Eclypsium researchers, Paul and Rey, discovered the vulnerabilities and shared the details and behind-the-scenes details! We also discuss real-world testing, vendor responses, and best practices for securing remote management devices in enterprise environments. Chapters 00:00 Introduction to KVM Vulnerabilities 03:00 Research Background and Team Introduction 05:57 Exploring GLINet and Initial Findings 09:03 Firmware Analysis and...

info_outline
Navigating Network Edge Vulnerabilities - BTS #69 show art Navigating Network Edge Vulnerabilities - BTS #69

Below the Surface (Audio) - The Supply Chain Security Podcast

In this episode of Below the Surface, Paul Asadoorian, Vlad Babkin, and Adrian Sanabria discuss the ongoing vulnerabilities in network edge devices, the implications of legacy systems like Avanti, and the strategies employed by threat actors. They explore the importance of monitoring and detection in cybersecurity, as well as innovative deception techniques to enhance security measures against exploitation. In this conversation, the speakers delve into various aspects of cybersecurity, including innovative strategies to enhance security, the challenges posed by vendor cooperation, the...

info_outline
Attacking Power Grids - BTS #68 show art Attacking Power Grids - BTS #68

Below the Surface (Audio) - The Supply Chain Security Podcast

In this episode, the hosts discuss various cybersecurity threats, including Russian cyber attacks on critical infrastructure, the vulnerabilities in firewalls and VPNs, and the implications of AI in cybersecurity. They explore the increasing trend of using Python for malicious purposes and the challenges posed by gaming anti-cheat drivers. The conversation also touches on the escalation of cyber warfare and the confused deputy problem in AI, highlighting the need for better security measures and awareness in the industry. Chapters   00:00 Introduction to Cybersecurity Threats 02:52...

info_outline
BIOS Password Cracking, Secure Boot, and Stackwarp - BTS #67 show art BIOS Password Cracking, Secure Boot, and Stackwarp - BTS #67

Below the Surface (Audio) - The Supply Chain Security Podcast

In this episode, the hosts discuss various cybersecurity topics, including the challenges of BIOS password cracking, the implications of AMD's Stack Warp vulnerability, and the importance of up-to-date secure boot certificates. They also explore the risks associated with network security appliances, the costs of cybersecurity, and the role of marketing in raising awareness. Additionally, they share insights from an X-ray analysis of USB cables, highlighting the differences between quality and counterfeit products.   BIOS password cracking can be complex and time-consuming. Physical...

info_outline
Beyond the Label: The Truth About Hardware Trust - BTS #66 show art Beyond the Label: The Truth About Hardware Trust - BTS #66

Below the Surface (Audio) - The Supply Chain Security Podcast

In this episode of Below the Surface, host Paul Asadoorian is joined by co-hosts Larry Pesci, Joshua Marpet, and Vlad Babkin to delve into the complexities of hardware supply chain security. The discussion is sparked by a presentation from Andrew 'Bunny' Wong at Black Hat Asia, which raised critical questions about how we can trust the silicon in our devices. The conversation explores the challenges of validating hardware components, the potential for backdoors in devices, and the implications of counterfeit components in the supply chain. The hosts share anecdotes and insights about their...

info_outline
Exploring AI in Firmware Analysis - BTS #65 show art Exploring AI in Firmware Analysis - BTS #65

Below the Surface (Audio) - The Supply Chain Security Podcast

Summary In this episode, special guest Matt Brown joins us to discuss the integration of AI in firmware analysis, exploring its benefits and challenges. We delve into the transition from traditional methods to AI-driven approaches, emphasizing the importance of prompt specificity for effective vulnerability discovery. The conversation also covers the role of open-source components, the need for guardrails in AI use, and the implications of AI-generated reports in cybersecurity. Additionally, they touch on man-in-the-middle techniques and the future of AI in firmware development, highlighting...

info_outline
Patching, Evil AI, Supply Chain Breaches - BTS #64 show art Patching, Evil AI, Supply Chain Breaches - BTS #64

Below the Surface (Audio) - The Supply Chain Security Podcast

Summary In this episode, the hosts discuss various cybersecurity topics, including recent vulnerabilities in Fortinet products, the implications of supply chain breaches, the evolving role of AI in cybersecurity, and updates to the OWASP Top 10 list. They emphasize the importance of firmware security and the need for better visibility and standards in the industry. The conversation highlights the challenges faced by defenders in a rapidly changing threat landscape and the necessity for proactive measures to secure systems. Takeaways Fortinet vulnerabilities are critical and require immediate...

info_outline
F5 Breach, Linux Malware, and Hacking Banks - BTS #63 show art F5 Breach, Linux Malware, and Hacking Banks - BTS #63

Below the Surface (Audio) - The Supply Chain Security Podcast

Summary   In this episode of Below the Surface, Paul Asadoorian and Chase Snyder delve into various cybersecurity topics, including the use of Raspberry Pi in cyber attacks, the implications of the F5 breach, and the emergence of Polar Edge malware targeting QNAP devices. They also discuss the innovative Two-Face Rust binary technique, the critical nature of authentication bypass vulnerabilities, and the evolving landscape of air-gapped systems. The conversation highlights the increasing risk posed by old vulnerabilities and the need for improved security measures in the face of advancing...

info_outline
 
More Episodes

Summary

In this episode, Paul Asadoorian and Joshua Marpet delve into the complexities of compliance, inventory management, and the emerging concepts of SBOMs, HBOMs, and FBOMs (no, not that FBOM). They discuss the importance of understanding the components and origins of hardware and software, the challenges of managing technology lifecycles, and the need for clear standards and regulations in the tech industry. The conversation emphasizes the critical role of asset inventories in maintaining security and compliance in an ever-evolving technological landscape. In this conversation, Joshua Marpet and Paul Asadoorian delve into the complexities of hardware security, the cultural shifts needed in security practices, and the importance of transparency in software and firmware management. They discuss the challenges posed by hardware backdoors, the necessity of Software Bill of Materials (SBOMs), and the hidden risks associated with firmware updates. The dialogue emphasizes the need for a cultural change in how organizations approach security and compliance, advocating for continuous management and transparency to inspire confidence in security practices.

Chapters

00:00 Introduction and Technical Challenges
02:02 Exploring Compliance and Frameworks
05:06 Understanding S-bombs, H-bombs, and F-bombs
10:10 The Importance of Inventory and Asset Management
15:01 Navigating Hardware and Software Lifecycle
19:58 Standards and Regulations in Technology
23:56 The Manchurian Microchip and Hardware Backdoors
27:44 Cultural Change in Security Practices
30:47 The Importance of Transparency and SBOMs
36:39 Challenges in Compliance and Risk Management
42:42 The Hidden Risks of Firmware and Hardware Updates