The AI That Tried to Escape with Ron Eddings

The AI That Tried to Escape with Ron Eddings

What happens when AI refuses to be replaced? This episode kicks off with a chilling real-world example of an AI threatening blackmail—and only gets more intense from there.

Host Ron Eddings unpacks the terrifyingly innovative ways AI is altering the cybersecurity threat landscape. From deepfakes convincing enough to fool your own family to auto-summarizing email clients acting as unintentional insiders, the stakes have never been higher. Ron also shares insights from his brand-new book Attack Surface Management, co-authored with MJ Kaufman and published by O'Reilly, and breaks down why the simplest social engineering tactics remain the most dangerous—even in the age of advanced AI.

Impactful Moments:

00:00 - Introduction

02:30 - Model Context Protocol explained

05:00 - Google's VEO-3 and fake riot videos

07:00 - Fake Facebook ads pushing malware

09:30 - Social engineering still reigns supreme

13:30 - Using AI to write malicious emails

16:30 - Calendly phishing and credential theft

19:00 - Gemini and the risk of auto-summarization

21:30 - LLM access to your private documents

22:45 - Takeaways and protecting your environment

Links:

Connect with Ron on LinkedIn: https://www.linkedin.com/in/ronaldeddings/

Grab a copy of Ron’s new book, “Attack Surface Management: Strategies and Techniques for Safeguarding Your Digital Assets”: https://a.co/d/1nmPod2

Check out the full article on “The Rise of ‘Vibe Hacking’ Is the Next AI Nightmare” here: https://www.wired.com/story/youre-not-ready-for-ai-hacker-agents/

Check out our upcoming events: https://www.hackervalley.com/livestreams

Join our creative mastermind and stand out as a cybersecurity professional:

https://www.patreon.com/hackervalleystudio

Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

Continue the conversation by joining our Discord: https://hackervalley.com/discord

Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

Jaksot(389)

Episode 13 - A Journey Through Venture Capitalism: Mentoring and Leading in Silicon Valley

Episode 13 - A Journey Through Venture Capitalism: Mentoring and Leading in Silicon Valley

Mentors and Leaders help shape our profession and our future. In this episode, Didi Dayton from Wing Venture Capital joins the podcast to discuss the importance of mentoring and leadership. Didi has scaled and shaped successful channel programs - She's now shaping and scaling to a greater magnitude in her new role as Partner at Wing VC. Didi Dayton https://www.linkedin.com/in/didi-dayton-8204501/

14 Elo 201927min

Episode 12 - Physical Red Teaming: No Lock Left Secured

Episode 12 - Physical Red Teaming: No Lock Left Secured

Robert Pingor is the equalizer to Physical and Network Red Teaming. Chris has had the opportunity to moonlight his career with Robert and witness him obtain mastery at his craft. During this interview, Chris, Ron, and Robert share red team stories and resources for Red Team Alliance.

13 Elo 201915min

Episode 11 - Selling Cybersecurity: Doing Business in an Increasingly Connected World

Episode 11 - Selling Cybersecurity: Doing Business in an Increasingly Connected World

Information Security vendors offer a wide variety of products and services that can enable success for organizations. Derek Eid joins us this episode to share wisdom in selling products and services. Derek is an expert communicator and leverages technical and non-technical conversations to capture necessities for existing and potential customers. Derek's most effective tool in his repertoire is his ability to listen. Tune in and learn how he uses this powerful tool to help enable his success.

23 Heinä 201937min

Episode 10 - Breaking Barriers, Gatekeepers, and Glass Ceilings

Episode 10 - Breaking Barriers, Gatekeepers, and Glass Ceilings

Neelima Rustagi joins Chris and Ron in this episode to share her experiences creating valuable work to dissolve barriers, gatekeepers, and glass ceilings. While transitioning from Software Engineer to Cybersecurity Product Manager, Neelima provided value to her stakeholders, mentors and advocates to position herself as a key resource in the industry. Neelima celebrates a decorated background in startups and Fortune cybersecurity companies.

16 Heinä 201939min

Episode 9 - The Intelligence Easy Button

Episode 9 - The Intelligence Easy Button

In this Episode, Ron and Napoleon put Chris in the hot seat and reviewed his EASY framework for making an impact in threat intelligence.   - Elicit Requirements - Assess Collection - Plan Strive for Impact - Yield to Feedback   All four pillars are vital for ensuring success during each phase of providing threat intelligence as a service

7 Heinä 201919min

Episode 8 - Serverless Threat Intel Bot

Episode 8 - Serverless Threat Intel Bot

New Member Alert 🚨! Napoleon Bing joins forces with Chris and Ron and present a Serverless Threat Intel Bot. As organizations mature and scale their security infrastructure, it's vital that analysts, engineers, and other team members are able to query and enrich data on demand. Additionally, application features are being introduced at an increasing rate, creating the need for software defined infrastructure. In this project, we'll be exploring scaling automation efforts - with a focus on Threat Intelligence. This project can serve as a guide for when to leverage an interactive bot, creating API endpoints, serverless architecture, and applying actionable threat intelligence.

7 Heinä 201913min

Episode 7 - Layer 8 - Vulnerability And Diversity

Episode 7 - Layer 8 - Vulnerability And Diversity

How important is being vulnerable in life and in your career? In Episode 7, our guest of honor - Charles Nwatu (https://www.linkedin.com/in/cnwatu/) joins Ron and Chris in starting the conversation about vulnerability and diversity. Charles Nwatu celebrates a decorated infosec career - and has built security teams at companies such as Twilio, Stitch Fix, and Netflix.

7 Heinä 201944min

Episode 6 - MITRE ATT&CK™ Matrix Overview

Episode 6 - MITRE ATT&CK™ Matrix Overview

In this episode, Chris Cochran and Ronald Eddings review the MITRE ATTACK Matrix and discuss related threat actors, TTPs, Threat Intelligence, and vendor evaluations.

7 Heinä 201921min

Suosittua kategoriassa Koulutus

rss-murhan-anatomia
psykopodiaa-podcast
voi-hyvin-meditaatiot-2
rss-vegaaneista-tykkaan
aamukahvilla
rss-narsisti
rss-valo-minussa-2
adhd-podi
rss-duodecim-lehti
psykologia
aloita-meditaatio
jari-sarasvuo-podcast
rss-tripsteri
rss-vapaudu-voimaasi
queen-talk
rss-laadukasta-ensihoitoa
ilona-rauhala
puhutaan-koiraa
rss-lasnaolon-hetkia-mindfulness-tutuksi
adhd-tyylilla