Ahead of the Threat Podcast: Season 2, Episode 5 — Joe Levy

FBI
FBIApr 9, 2026

Why It Matters

The episode underscores that inadequate security leadership and unchecked development pipelines leave enterprises vulnerable to sophisticated supply‑chain and nation‑state attacks, threatening both operational continuity and national economic security.

Key Takeaways

  • Only 1 in 10,000 firms have a CISO-equivalent role.
  • FBI Cyber Action Team deploys rapid response teams for intrusion incidents.
  • Recent supply‑chain attacks compromised trusted open‑source tools like Trivy and Axios.
  • Complex CI/CD pipelines increase risk when security oversight is lacking.
  • Nation‑state actors target messaging apps, exploiting human factors over encryption.

Summary

The latest episode of “Ahead of the Threat” spotlights the stark "cyber security poverty line" – fewer than one in 10,000 global businesses have a dedicated CISO‑equivalent, leaving most to buy products without strategy, metrics, or risk management. Brett Leatherman of the FBI Cyber Division explains the agency’s Cyber Action Team, a rapid‑deployment unit of special agents, computer scientists and analysts that rushes to compromised sites, gathers forensic evidence, and supports both victim remediation and criminal prosecution. Key insights include the FBI’s rigorous selection and training for CAT members, the alarming supply‑chain compromises of widely used open‑source tools such as Trivy and the Axios JavaScript library, and the growing complexity of CI/CD pipelines that many organizations fail to secure. Adam Maddock emphasizes that developers often rely on automated build tools they don’t fully understand, creating blind spots for credential theft and malicious package injection. Levy’s “cyber security poverty line” concept is illustrated by concrete examples: Team PCP’s injection of credential‑stealing code into 76 of 77 Trivy versions, and UNC 1069’s brief but damaging backdoor releases for Axios. The episode also details nation‑state campaigns—Russian phishing against Signal users and Iran’s Telegram‑based command‑and‑control malware—showing attackers bypass encryption by targeting human operators. The implications are clear: businesses must elevate security leadership, embed robust incident‑response capabilities, harden CI/CD workflows, and adopt continuous intelligence on third‑party components. Without these measures, organizations risk becoming the weak links that adversaries exploit to infiltrate critical infrastructure and supply chains.

Original Description

Joining the show is a security practitioner who also happens to be a CEO. Joe Levy of Sophos and host Brett Leatherman, head of the FBI’s Cyber Division, discuss the application of Operation Winter SHIELD with Levy calling it one of the most effective and approachable lists of cybersecurity tips available. Adopting just one of the plan’s 10 steps will make any company “infinitely better off,” Levy said.
Their conversation also highlights the “cybersecurity poverty line” that details the lack of CISOs in the workforce, the inherent risk and recommended research of third-party vendors, and a detailed examination of how a Sophos compromise was tracked to a device that displayed a greeting message on an office monitor.
To start the show, Brett is joined by Adam Maddock, the FBI’s section chief of the Cyber Technical Analysis and Operations Section. They discuss the highly technical Cyber Action Team and current news items that discuss software supply chain attacks, a “compromise” of Signal and Telegram, and the growing trend of hackers infiltrating everyday home devices.
---------------------------------------------------
Subscribe to Inside the FBI wherever you get your podcasts:
Follow us on social media:
YouTube: youtube.com/user/fbi

Comments

Want to join the conversation?

Loading comments...