Cybersecurity Podcasts
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityPodcastsPoisoned at the Source. [OMITB]
Poisoned at the Source. [OMITB]
Cybersecurity

Hacking Humans

Poisoned at the Source. [OMITB]

Hacking Humans
•January 6, 2026•44 min
0
Hacking Humans•Jan 6, 2026

Key Takeaways

  • •Nation‑state actors targeting software supply chains via source‑code theft.
  • •F5 and BigIP breach illustrates persistent access across vendors.
  • •Criminal groups backdoor Android firmware, compromising millions of devices.
  • •SBOM adoption remains low, hindering transparency in software components.
  • •Trust in consumer products fuels supply‑chain risk and counterfeit threats.

Pulse Analysis

The episode opens with a deep dive into the evolving threat of software supply‑chain compromises. 2025’s high‑profile F5 and BigIP breach mirrors the SolarWinds incident, showing how nation‑state actors—now shifting from Russian to Chinese groups—exfiltrate source code and internal vulnerability data to gain long‑term, stealthy footholds across hundreds of downstream customers. By compromising development environments, attackers embed malicious code that appears legitimate, allowing them to live off the land and evade traditional network defenses.

Beyond nation‑states, the hosts highlight a surge in criminal‑level supply‑chain attacks, notably the Triada campaign that backdoors Android firmware on counterfeit devices sold worldwide. With an estimated 85 million compromised devices, these implants can harvest communications, act as proxies, and bypass app‑store vetting. The discussion also touches on overlooked vectors such as routers, printers, and open‑source utilities like XZ Utils, emphasizing that attackers exploit any component lacking endpoint monitoring, turning everyday hardware into covert espionage platforms.

Mitigation strategies dominate the final segment. While Software Bills of Materials (SBOMs) promise ingredient‑level transparency, adoption remains uneven, leaving many enterprises blind to hidden risks. The panel urges a security‑by‑design mindset: rigorous verification of third‑party code, robust zero‑trust controls, and careful integration of AI tools that could inadvertently introduce poisoned dependencies. Strengthening vendor vetting, employing allow‑listing solutions, and maintaining continuous visibility across the entire supply chain are presented as essential steps to restore trust in both enterprise and consumer technology ecosystems.

Episode Description

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is ⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠ intelligence analyst and host of their podcast ⁠⁠⁠⁠⁠DISCARDED⁠⁠⁠⁠⁠. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts ⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠⁠⁠⁠Qintel⁠⁠⁠⁠.

Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we dive into supply chain attacks through the lens of a massive Android malware campaign that infects devices before they ever reach users, embedding itself in firmware and reseller-installed system images. We connect the dots to other high-impact supply chain incidents—from SolarWinds to the recent F5 breach—and share new intelligence on Android devices compromised during manufacturing and distribution in China. Together, these cases highlight how attacks at the source can quietly scale, persist, and evade traditional defenses.

Show Notes

0

Comments

Want to join the conversation?

Loading comments...