Crying Out Cloud

Wiz
undefined
Mar 31, 2024 โ€ข 13min

CROC News - XZ Utils backdoor explained

The backdoor in XZ Utils is shaking the industry ๐Ÿ”” How could we not talk about it? Tune in to the special unscheduled episode of Crying Out Cloud with Eden Naftali and Amitai Cohen as they delve into the stealthy supply chain attack! In this episode: ๐Ÿ” The Alert from CISA regarding CVE-2024-3094, a vulnerability in XZ Utils Data Compression Library versions 5.6.0 and 5.6.1 ๐Ÿ›‘ The potential risks posed by the embedded malicious code and the unauthorized access it may grant to affected systems ๐Ÿ›ก๏ธ Security Team Action Plans Tune in now!
undefined
Mar 26, 2024 โ€ข 32min

CROC News: Malicious Repos, Bandwidth Theft, & NVD or NoVD?

๐ŸŽ™๏ธ What is a better way to stay updated on cloud security than a NEW Crying Out Cloud episode! Join Eden Naftali and Amitai Cohen as they explore what is new and ๐Ÿ”ฅ: ๐Ÿ‘พ Open-source repos flooded by malicious code. ๐Ÿ’ป What is to become of the National Vulnerability Database? โ›“๏ธ Proof of bandwidth cryptojacking ๐Ÿ› ๏ธ Critical vulnerabilities discovered in popular CI/CD tool Links:   https://apiiro.com/blog/malicious-code-campaign-github-repo-confusion-attack/  https://github.blog/2024-02-29-keeping-secrets-out-of-public-repositories/  https://research.openanalysis.net/github/lua/2024/03/03/lua-malware.html  https://resilientcyber.substack.com/p/death-knell-of-the-nvd  https://sysdig.com/blog/cloud-threats-deploying-crypto-cdn/ 
undefined
Mar 20, 2024 โ€ข 41min

CROC Talks: Bug Bounty Hunting & Pen Testing with Sam Curry

The NEW exclusive interview with hacker extraordinaire Sam Curry on Crying Out Cloud is out! Join Eden Naftali and Amitai Cohen as they explore the role of a Bug-Bounty Hunter with Sam Curry: ๐Ÿ”‘ Learn about Sam's journey into security research ๐Ÿ› ๏ธ Favorite tools and underrated platforms ๐Ÿค– The trustworthiness implications of AI-driven technologies in transportation. ๐Ÿ”’ Vulnerabilities within a major tech company's infrastructure. The tradeoff between scanning gigantic IP ranges and selecting the best research targets. Important links: https://samcurry.net/web-hackers-vs-the-auto-industry/ https://samcurry.net/hacking-apple/ https://samcurry.net/points-com/
undefined
Feb 22, 2024 โ€ข 28min

CROC News: Automotive Code Leak & Midnight Blizzard's Heist

Loading from the Cloud... Season 2 of "CRYING OUT CLOUD" is here! Join our hosts, Eden and Amitai, as they dive into the latest cloud stories that we can't wait to share with you Here's a sneak peek into the season's opening: ๐Ÿš— Mercedes-Benz Source Code Exposure: A public GitHub Repo was exposed - allowing unauthorized access to the company's internal servers, including AWS and Azure subscriptions. The credentials remained publicly accessible for 3-4 months. ๐Ÿ˜ฑ ๐ŸŒจ๏ธ Midnight Blizzard Hits Microsoft: Russian actors (Midnight Blizzard) got into Microsoft's network and stole employee emails, finding a misconfigured account with a weak password. Among other things, they tried to find out what Microsoft knew about their activity. ๐Ÿ” Ivanti Vulnerabilities: Ivanti's VPN products exposed vulnerabilities, allowing remote code execution and authentication bypass, exploited by a Chinese Threat Actor.
undefined
Dec 21, 2023 โ€ข 34min

#15 - Yinon Costica on AI risks, the importance of positivity and his new year's resolutions

๐Ÿ›ก๏ธ Join Eden Naftali & Amitai Cohen's exclusive interview with Yinon Costica, as he brings unparalleled expertise to the table. From his beginnings in Israel's 8200 intelligence unit, through Adallom, which was acquired by Microsoft, to co-founding Wiz
undefined
Dec 10, 2023 โ€ข 35min

#14 - On Executive Orders And AI (Special Guest - Chris Hughes)

๐ŸŽ™๏ธ NEW SPECIAL PODCAST EPISODE WITH @CHRIS HUGHES! ๐ŸŽ™๏ธ Here's a sneak peek into our chat: ๐Ÿ›ก๏ธ Join Chris, Amitai, and Eden as they unveil intriguing security nuances between public and private sectors. Gain exclusive insights into FedRAMP, straight from Chris's expertise, and his take on the implications of President Biden's AI order for the cybersecurity landscape. ๐ŸŒ How exactly does SBOM adoption act as a shield against supply chain breaches? What other strategies can fortify against such attacks? ๐Ÿ” Delve into the post-COVID startup world. Chris touches on the intricacies of the challenges faced, offering a glimpse into how these innovative ventures navigate a changed landscape. Tune in for a captivating talk below!
undefined
Nov 30, 2023 โ€ข 23min

#13 - Leaky CLIs, glitchy CPUs and risky HARs

๐ŸŽ™๏ธ NEW PODCAST EPISODE ALERT! Eden and Amitai are back with another wild ride through the cloudy skies on "Crying Out Cloud"! Here's the scoop for today's adventure: 01:36 - Okta Support System Compromise: ๐Ÿ•ต๏ธโ€โ™‚๏ธ We unravel the mystery surrounding an unknown threat actor's access to Okta's customer support system. What's an HAR file, and why should you care? 06:30 - Azure CLI Credential Leak (CVE-2023-36052): ๐Ÿ’ป Get the lowdown on Microsoft's Azure CLI vulnerability and how this leak happened, why defaults matter, and what the patch means for your Azure CLI setup. 13:17 - Reptar and Cachewarp CPU Vulnerabilities: ๐Ÿ’ก CPU vulnerabilities are a trend we can't ignore! Discover why Reptar and Cachewarp CPU vulnerabilities might sound daunting but aren't necessarily the cloud apocalypse. Plus, the juicy details on who's patched and who's snoozing on this issue Links: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36052https://cloud.google.com/blog/products/identity-security/google-researchers-discover-reptar-a-new-cpu-vulnerabilityhttps://lock.cmpxchg8b.com/reptar.htmlhttps://cachewarpattack.com/https://sec.okta.com/harfiles
undefined
Oct 19, 2023 โ€ข 33min

#12 - Chomping at the Bits with Chompie

In our new Crying Out Cloud podcast episode, we're joined by the LEGENDARY Valentina Palmiotti, the one and only Chompie ๐Ÿš€ โœจ In this episode, you'll find: 1. The surprising story behind her hacker alias - "Chompie," ๐Ÿ•ต๏ธโ€โ™€๏ธ 2. Valentina's insights from her Blackhat presentation, where she challenges security boundaries with kernel post-exploitation techniques ๐Ÿคฏ 3. A peek into her day-to-day at IBM X-Force, from research to code auditing and vulnerability analysis ๐Ÿ’ผ And more!
undefined
Sep 21, 2023 โ€ข 22min

#11 - From SAS token to AI data exposure (with special guest - Hillai Ben-Sasson)

More info here: https://www.wiz.io/blog/38-terabytes-of-private-data-accidentally-exposed-by-microsoft-ai-researchers
undefined
Sep 19, 2023 โ€ข 29min

#10 - fwd:cloudsec With Special Guest Scott Piper

fwd:cloudsec event highlights podcast special - Featuring our special wizard guest Scott Piper, who is also the co-founder of fwd:cloudsec! A non-profit conference on cloud security that discusses all the major cloud platforms, both attack and defense research, limitations of security features, the pros and cons of different security strategies, and more! fwd:cloudsec 2023 videos: https://www.youtube.com/playlist?list=PLCPCP1pNWD7MR1SwekwbZls9TGzqo_LHx

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app