.NET Rocks!

Coding for Security with Chris Ayers

Mar 25, 2026
Chris Ayers, an Azure reliability engineer and security expert, explains attacker-focused thinking with the MITRE ATT&CK matrix. Conversation highlights logging and behavioral detection, supply chain and package risks, AI-accelerated threats, and prioritizing CVEs and pipeline protections. Short, practical topics about spotting persistence, data exfiltration, and hardening build systems.
Ask episode
AI Snips
Chapters
Books
Transcript
Episode notes
INSIGHT

MITRE ATT&CK Changes How You Think About Threats

  • MITRE ATT&CK reframes defense by modeling attacker behavior as tactics and techniques rather than isolated vulnerabilities.
  • Chris Ayers explains ATT&CK catalogs real attacker playbooks so teams can think like attackers and close detection gaps.
ADVICE

Alert On Anomalous Logins And Data Exports

  • Do instrument and alert on anomalous authentication and query behavior to detect compromised accounts early.
  • Chris Ayers recommends alerts for patterns like many requests from one IP or millions of rows exported within normal rate limits.
ANECDOTE

Maintainer Trust Was Exploited In A Supply Chain Con

  • Chris Ayers recounts a malicious maintainer who slipped a payload into a trusted open-source package used by major distros.
  • The attacker built trust via contributions, then introduced a decompression payload that caused real-world incidents before being caught.
Get the Snipd Podcast app to discover more snips from this episode
Get the app