Security Weekly Podcast Network (Audio)

Iran vs Everyone: 2FA-Bypass Phish, APT41 Drive, iOS 0days, Josh Marpet, and More - SWN #561

8 snips
Mar 6, 2026
Coverage of Iran scanning IP cameras and how cyber activity ties to kinetic events. Discussion of camera vulnerabilities, supply-chain spillover, and UK warnings. Breakdown of large-scale phishing-as-a-service takedown and MFA-bypass phishing techniques. Examination of APT41 activity using Cobalt Strike and Google Drive for C2. Reports on firmware backdoors and a multi-exploit iOS kit targeting wallets.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Iran Using Camera Scans For Kinetic Reconnaissance

  • Iran is scanning IP cameras consistent with operational support and battle damage assessment rather than casual probing.
  • Telemetry shows targeting since Jan 2026 across Israel, Gulf states, Cyprus, and Lebanon, using exposed Hikvision/Dahua bugs and config probes.
ADVICE

Treat CCTV As A Kill Chain Component

  • Monitor camera segments for repeated ORTH attempts, config probes, exploit requests, and unexpected outbound connections.
  • Treat CCTV as potential kill-chain infrastructure and prioritize patching vulnerable camera models and CVEs.
INSIGHT

AI Widens Offense Advantage And Forces Continuity Focus

  • Israel's cyber chief warns AI accelerates attacker throughput faster than defenders can keep up, shifting operations to faster, lower-artifact campaigns.
  • Organizations must focus on continuity under compromise: fast containment, automated response, and service resiliency.
Get the Snipd Podcast app to discover more snips from this episode
Get the app