Security Weekly Podcast Network (Audio) Iran vs Everyone: 2FA-Bypass Phish, APT41 Drive, iOS 0days, Josh Marpet, and More - SWN #561
8 snips
Mar 6, 2026 Coverage of Iran scanning IP cameras and how cyber activity ties to kinetic events. Discussion of camera vulnerabilities, supply-chain spillover, and UK warnings. Breakdown of large-scale phishing-as-a-service takedown and MFA-bypass phishing techniques. Examination of APT41 activity using Cobalt Strike and Google Drive for C2. Reports on firmware backdoors and a multi-exploit iOS kit targeting wallets.
AI Snips
Chapters
Transcript
Episode notes
Iran Using Camera Scans For Kinetic Reconnaissance
- Iran is scanning IP cameras consistent with operational support and battle damage assessment rather than casual probing.
- Telemetry shows targeting since Jan 2026 across Israel, Gulf states, Cyprus, and Lebanon, using exposed Hikvision/Dahua bugs and config probes.
Treat CCTV As A Kill Chain Component
- Monitor camera segments for repeated ORTH attempts, config probes, exploit requests, and unexpected outbound connections.
- Treat CCTV as potential kill-chain infrastructure and prioritize patching vulnerable camera models and CVEs.
AI Widens Offense Advantage And Forces Continuity Focus
- Israel's cyber chief warns AI accelerates attacker throughput faster than defenders can keep up, shifting operations to faster, lower-artifact campaigns.
- Organizations must focus on continuity under compromise: fast containment, automated response, and service resiliency.
