The Unstoppable Phish: A Discussion with Vivek Ramachandran

The Unstoppable Phish: A Discussion with Vivek Ramachandran

Season 3, Episode 10: Elliot chat’s with Vivek Ramachandran of SquareX about his approach to tackling the impossible: Social engineering.

Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here.

For nearly three decades, social engineering, particularly phishing, has been one of the most impactful and financially draining cyber threats. Between security awareness training, email security gateways, generative AI, enterprise browsers, and a slew of other tech like EDRs and XDRs, social engineering has yet to be thoroughly thwarted. The reason for that is straightforward enough: social engineering is a psychological threat, not just a technological one.

In our last round of interviews from RSA, we chatted with Vivek Ramachandran, the founder of SquareX, who is attempting to tackle the challenge. Vivek also walks us through a more realistic perspective of how threat actors use generative AI today, which goes beyond the more unique what-if scenarios we’ve seen in headlines in the past two years.

Key Takeaways
  • Social engineering and phishing attacks remain a significant threat, and everyone can be a target. The sophistication of these attacks has increased due to advances in AI.
  • AI can craft messages that sound remarkably like someone the recipient knows, enabling rapid scalability.
  • Social media platforms are becoming common channels for launching phishing attacks. Attackers exploit the trust that users place in these platforms and their contacts.
  • Vivek Ramachandran's company, SquareX, deploys a browser extension that can attribute attacks and detect and block them in real-time, providing valuable information to the enterprise.
  • Traditional technologies like Secure Web Gateways (SWG) have matured, and attackers can easily bypass them.
  • Enterprise browsers solve the problem for a small niche group of websites but have adoption friction due to the inconvenience of having a dedicated browser.

Hosted on Acast. See acast.com/privacy for more information.

Episoder(58)

The Security Debt We Pretend Isn’t There

The Security Debt We Pretend Isn’t There

As organizations push return-to-office (RTO) mandates and chase efficiency, many security teams are quietly accumulating debt they don’t know how to unwind.In this episode, we are joined by Lea Cure T...

29 Jan 50min

Whisper Leak: How Encrypted AI Chats Still Leak Conversation Topics

Whisper Leak: How Encrypted AI Chats Still Leak Conversation Topics

In this episode, we break down Whisper Leak, a newly disclosed side-channel issue affecting encrypted LLM communications. JBO explains how attackers can infer conversation topics using packet size and...

11 Des 202531min

How Critical Infrastructure Leaders Are Rethinking Cybersecurity

How Critical Infrastructure Leaders Are Rethinking Cybersecurity

In this episode of Adopting Zero Trust, hosts Elliot Volkman and Neal Dennis discuss critical infrastructure security with expert guest Ian Branson, Vice President of Global Industrial Cybersecurity a...

17 Apr 202544min

Shadows Within Shadows: How AI is Challenging IT Teams

Shadows Within Shadows: How AI is Challenging IT Teams

In this episode of Adoption Zero Trust (AZT), host Neal Dennis and producer Elliot Volkman sit down with Bradon Rogers, Chief Customer Officer at Island, to discuss how AI is compounding the already e...

20 Mar 202548min

Live at ZTW2025: Cyberwire Daily’s Dave Bittner + Dr. Zero Trust

Live at ZTW2025: Cyberwire Daily’s Dave Bittner + Dr. Zero Trust

Catch this episode on YouTube, Apple, Spotify, or Amazon. You can read the show notes here.Live from ThreatLocker’s Zero Trust World (ZTW), cybersecurity heavyweights Dave Bittner, host of CyberWire D...

6 Mar 202532min

Rapid fire update: Silk Typhoon and DOJ's indictment of twelve Chinese nationals

Rapid fire update: Silk Typhoon and DOJ's indictment of twelve Chinese nationals

New intelligence: Silk Typhoon, formerly tracked as HAFNIUM, is a China-based threat actor most recently observed targeting IT supply chains in the US. Today, we released a new report in conjunction w...

5 Mar 20253min

Predicting the year of cybersecurity ahead (minus regulations)

Predicting the year of cybersecurity ahead (minus regulations)

It’s mid-February, but somehow, we’ve already been through what feels like a year's worth of change in the cybersecurity and regulation world. Beyond the standard incidents, outages, and attacks… ther...

18 Feb 20251h 2min

Kicking Off Season 4 of Adoption Zero Trust (AZT)

Kicking Off Season 4 of Adoption Zero Trust (AZT)

Catch this episode on YouTube, Apple, Spotify, or Amazon. You can read the show notes here.Neal and I are excited to welcome you back to AZT as we kick off our fourth season. After four years of tryin...

11 Feb 202522min

Populært innen Teknologi

romkapsel
tomprat-med-gunnar-tjomlid
rss-avskiltet
teknisk-sett
nasjonal-sikkerhetsmyndighet-nsm
energi-og-klima
shifter
lydartikler-fra-aftenposten
elektropodden
rss-impressions-2
fornybaren
hans-petter-og-co
rss-alt-vi-kan
rss-ki-praten
pedagogisk-intelligens
smart-forklart
rss-fish-ships
rss-trippel-bunnlinje
rss-alt-som-gar-pa-strom
rss-ai-forklart