We're sunsetting PodQuest on 2025-07-28. Thank you for your support!
Export Podcast Subscriptions
cover of episode The Red Teamer

The Red Teamer

2025/2/21
logo of podcast Hacked

Hacked

AI Deep Dive AI Chapters Transcript
People
A
Adam
主持和编辑 STAT 的生物技术播客 “The Readout LOUD”,专注于生物技术新闻和行业分析。
Topics
我作为一名红队成员,亲历了攻击面从网络到终端再到身份的转变。起初,攻击者主要针对网络进行攻击,例如扫描端口和漏洞。随着网络安全的加强,攻击者开始将目标转向终端设备,利用恶意软件等手段进行攻击。如今,攻击者主要针对的是浏览器中的用户身份信息,通过购买泄露的凭据或进行网络钓鱼等方式进行攻击。 Snowflake数据泄露事件就是一个典型的例子,攻击者仅仅通过购买凭据就获得了对大量数据的访问权限。这表明,企业需要将安全重点放在保护用户身份信息上,而不是仅仅关注网络或终端设备的安全。 为了应对身份攻击,我们需要采取多种措施,例如加强多因素身份验证、使用更强的密码、提高员工的安全意识等。此外,还需要关注SaaS应用的安全,防止攻击者通过这些应用绕过主要身份提供商的防护。 我创立Push Security就是为了解决身份攻击的问题。我们的产品能够在浏览器中检测和阻止身份攻击,并提供多种安全防护措施,例如检测密码重用、恶意链接等。 网络钓鱼攻击也在不断演变,例如中间人攻击和浏览器中间人攻击等新型攻击方式可以绕过多因素身份验证。为了应对这些攻击,我们需要不断改进安全技术,例如使用更先进的检测技术、提高安全意识等。 此外,网络犯罪活动可以看作是一个供应链,有专门窃取凭据的人,也有专门购买和利用凭据的人。我们需要从整个供应链的角度来考虑安全问题,才能有效地应对身份攻击。

Deep Dive

Chapters
This chapter explores the shift in attack vectors over time, from network vulnerabilities to endpoint compromises and finally to identity-based attacks. The Snowflake breach is highlighted as a pivotal moment demonstrating the dominance of identity compromise as the most efficient method for attackers.
  • Attackers exploit the path of least resistance.
  • Attack surface shifted from networks to endpoints to identities.
  • Snowflake breach: attackers logged in, not hacked in.
  • Identity attacks are cost-effective for attackers.

Shownotes Transcript

Adam used to break into companies for a living—legally. As a red teamer, he watched the attack surface shift from networks to endpoints to something new: identity. The Snowflake breach proved it—attackers aren’t breaking in anymore, they’re logging in. Adam saw it coming, founded Push Security to stop it, and now he’s here to break it all down. They’re our new sponsor, so if that’s not your thing, no worries—catch you in the next one. But his story? Fascinating.

Hacked is brought to you by Push Security—helping companies stop identity attacks before they happen. Phishing, credential stuffing, session hijacking—Push tackles it right where it starts: in the browser. Smart, seamless, and built for how people actually work. Check them out at pushsecurity.com).

Learn more about your ad choices. Visit podcastchoices.com/adchoices)