iPhone MIE, Microsoft - Israel MOD, npm supply chain attacks

iPhone MIE, Microsoft - Israel MOD, npm supply chain attacks

Summary

In this episode, hosts Andy Jaw and Adam Brewer discuss the newly announced iPhone 17 and its enhanced security features, particularly the memory integrity enforcement that aims to protect user data from spyware. They also delve into Microsoft's response to allegations regarding the use of Azure by the Israeli Defense Force for surveillance purposes, emphasizing the company's commitment to privacy. The conversation concludes with a discussion on recent supply chain attacks affecting NPM packages and the proactive measures being taken to enhance security in the software development ecosystem.

----------------------------------------------------

YouTube Video Link: ⁠⁠⁠⁠⁠https://youtu.be/YLTiud1ibhU

----------------------------------------------------

Documentation:

https://www.theverge.com/news/775234/iphone-17-air-a19-memory-integrity-enforcement-mte-security

https://security.apple.com/blog/memory-integrity-enforcement/

https://blogs.microsoft.com/on-the-issues/2025/09/25/update-on-ongoing-microsoft-review/

https://www.bleepingcomputer.com/news/security/self-propagating-supply-chain-attack-hits-187-npm-packages/

https://github.blog/security/supply-chain-security/our-plan-for-a-more-secure-npm-supply-chain/

----------------------------------------------------

Contact Us:

Website: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://bluesecuritypod.com

Bluesky: https://bsky.app/profile/bluesecuritypod.com

LinkedIn: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/company/bluesecpod

YouTube: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.youtube.com/c/BlueSecurityPodcast

-----------------------------------------------------------

Andy Jaw

Bluesky: https://bsky.app/profile/ajawzero.com

LinkedIn: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/andyjaw/

Email: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠andy@bluesecuritypod.com⁠

----------------------------------------------------

Adam Brewer

Twitter: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/ajbrewer

LinkedIn: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/adamjbrewer/

Email: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠adam@bluesecuritypod.com

Avsnitt(269)

Modern Device Management

Modern Device Management

This week, Adam and Andy go over modern device management. They discuss how to use device based conditional access to make access decisions on corporate or personal devices spanning different operating systems in the modern "work from home" and post-COVID world. ---------------------------------------------- YouTube Video Link: https://youtu.be/s46ZhXnngjg ---------------------------------------------- Documentation: Windows Autopilot https://docs.microsoft.com/en-us/mem/autopilot/windows-autopilot Apple Business Manager https://support.apple.com/guide/apple-business-manager/what-is-apple-business-manager-apdd344cdd9d/web Android Enterprise Enrollment https://www.android.com/enterprise/enrollment/ Android Device Manager Deprecation https://www.blog.google/products/android-enterprise/da-migration/ JAMF Apple Device Management https://www.jamf.com ---------------------------------------------- Contact: Website: http://bluesecuritypod.com Twitter: https://twitter.com/bluesecuritypod Instagram: https://www.instagram.com/bluesecuritypodcast/ Facebook: https://www.facebook.com/bluesecpod ---------------------------------------------- Andy Jaw Twitter: https://twitter.com/ajawzero LinkedIn: https://www.linkedin.com/in/andyjaw/ Email: andy@bluesecuritypod.com ---------------------------------------------- Adam Brewer Twitter: https://twitter.com/ajbrewer LinkedIn: https://www.linkedin.com/in/adamjbrewer/ Email: adam@bluesecuritypod.com

8 Feb 202144min

Real-world Ransomware Experience with Special Guest Gavin Ashton

Real-world Ransomware Experience with Special Guest Gavin Ashton

This week, Adam and Andy speak with Stealthbits security strategist, Gavin Aston. Gavin wrote the blog "Maersk, me & notPetya" and brings a unique percepective to information security defense as someone who's survived a ransomware attack. Youtube Video Link Documentation: Maersk, me & notPetya Protecting Microsoft 365 from on-premises attacks Contact: Gavin Aston Twitter: @gvnshtn Andy Jaw Twitter: @ajawzero LinkedIn: andyjaw Email: andy@bluesecuritypod.com Adam Brewer Twitter: @ajbrewer LinkedIn: adambrewer Email: adam@bluesecuritypod.com ---------------------------------------------- Twitter: @bluesecuritypod Instagram: @bluesecuritypodcast Facebook: @bluesecpod

1 Feb 202140min

Application Security with Special Guest Tanya Janca

Application Security with Special Guest Tanya Janca

This week, Adam and Andy speak with application security guru, Tanya Janca, author of Alice and Bob learn Application Security. It was an amazing conversation where they touched on secure app design practices, password requirements, and infosec industry mentorship and education. Youtube Video Link Documentation: Alice and Bob learn Application Security We Hack Purple Academy We Hack Purple Youtube/Podcast Contact: Tanya Janca Twitter: @shehackspurple LinkedIn: tanya-janca Andy Jaw Twitter: @ajawzero LinkedIn: andyjaw Email: andy@bluesecuritypod.com Adam Brewer Twitter: @ajbrewer LinkedIn: adambrewer Email: adam@bluesecuritypod.com ---------------------------------------------- Twitter: @bluesecuritypod Instagram: @bluesecuritypodcast Facebook: @bluesecpod

25 Jan 202159min

Secure Messaging

Secure Messaging

This week, Adam and Andy go over some news about Microsoft Defender for Identity and Intel's new CPU ransomware protection. There was also some news about Whatsapp's new privacy policy. Adam and Andy dive into a comparison of the most popular secure messaging apps including an exploit that would affect all secure messengers. Documentation: Whatsapp's Updated Privacy Policy Signal Messenger Threem Messenger Secure Messaging Apps Comparison Contact: Twitter: @bluesecuritypod Instagram: @bluesecuritypodcast Andy Jaw Twitter: @ajawzero LinkedIn: andyjaw Email: andy@bluesecuritypod.com Adam Brewer Twitter: @ajbrewer LinkedIn: adambrewer Email: adam@bluesecuritypod.com

18 Jan 202137min

Solarwinds Revisited and Tech Policy under a Biden Administration

Solarwinds Revisited and Tech Policy under a Biden Administration

This week, Adam and Andy revisit some more guidance that has come out about Sunburst/Solarigate since the initial breach. Additionally, they share some thoughts about this week's insurrection at the US Capitol and the cybersecurity implications. Finally, with a Biden administration and a Democratic controlled government, Andy and Adam speculate on what might be taken up as priority when it comes to tech policy. Documentation: Microsoft Solarigate Resource Center Using Splunk to Detect Sunburst Backdoor Analyzing Solorigate, the compromised DLL file that started a sophisticated cyberattack, and how Microsoft Defender helps protect customers Using Microsoft 365 Defender to protect against Solorigate M365 advanced hunting queries Understanding "Solorigate"'s Identity IOCs - for Identity Vendors and their customers Protecting Microsoft 365 from on-premises attacks Contact: Twitter: @bluesecuritypod Instagram: @bluesecuritypodcast Andy Jaw Twitter: @ajawzero LinkedIn: andyjaw Email: andy@bluesecuritypod.com Adam Brewer Twitter: @ajbrewer LinkedIn: adambrewer Email: adam@bluesecuritypod.com

11 Jan 202135min

Information Security Tips & Tricks for Parents

Information Security Tips & Tricks for Parents

Happy New Year! To ring in the new year, this week's episode focuses on parents who are working from home while having to help home school their kids as well. Adam and Andy go through a lot of tips and tricks that will help secure home networks, devices, and cloud accounts. Documentation: Setup OpenDNS Quad9 Disney Circle Eero Wifi How to change your wireless router's admin password 3-router method (Stacking routers for security) Ubiquiti Unifi Apple's Data Access when personal safety is at risk Microsoft Families Apple Families Google Families Contact: Twitter: @bluesecuritypod Instagram: @bluesecuritypodcast Andy Jaw Twitter: @ajawzero LinkedIn: andyjaw Email: andy@bluesecuritypod.com Adam Brewer Twitter: @ajbrewer LinkedIn: adambrewer Email: adam@bluesecuritypod.com

4 Jan 202131min

Merry Christmas! Learn how to spin up your own VM lab and dev environments

Merry Christmas! Learn how to spin up your own VM lab and dev environments

This holiday week, Adam and Andy give you some advice on how to spin up your own virtual machine lab and dev environment. They go through SaaS applications that have free dev environments as well as tools to use to manage VM's. They also give tips on what you can do with that lab environment from testing policies to managing devices in Intune and even learning about tools like Mimikatz and John the Ripper. Documentation: Lab Building Guide: Virtual Active Directory Script to spin up AD controllers quickly Microsoft Developer Subscription Android Images Andy Jaw Twitter: @ajawzero LinkedIn: https://www.linkedin.com/in/andyjaw/ Adam Brewer Twitter: @ajbrewer LinkedIn: https://www.linkedin.com/in/adamjbrewer/

27 Dec 202033min

Our thoughts on Fireeye, Solarwinds, and Sunburst

Our thoughts on Fireeye, Solarwinds, and Sunburst

This week, Adam and Andy give you their thoughts on the Fireeye and Solarwinds breach. They also give defenders advice on immediate steps to help strengthen their organizations as well as some future insights on the direction security may be heading in terms on identity and device management. Finally, they give some thoughts on why it is important for security, business, and technical teams need to work as one cohesive unit in order to make security programs successful. Documentation: Unauthorized Access of FireEye Red Team Tools Check Point Response to FireEye Red Team Tools Leak CISA Updates Alert and Releases Supplemental Guidance on Emergency Directive for SolarWinds Orion Compromise Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor "The Chat" by Gavin Ashton Becoming resilient by understanding cybersecurity risks: Part 2 Detecting Abuse of Authentication Mechanisms by the NSA Protecting Microsoft 365 from on-premises attacks Andy Jaw Twitter: @ajawzero LinkedIn: https://www.linkedin.com/in/andyjaw/ Adam Brewer Twitter: @ajbrewer LinkedIn: https://www.linkedin.com/in/adamjbrewer/

21 Dec 202034min

Populärt inom Teknik

uppgang-och-fall
market-makers
rss-badfluence
rss-racevecka
elbilsveckan
rss-laddstationen-med-elbilen-i-sverige
rss-technokratin
solcellskollens-podcast
skogsforum-podcast
natets-morka-sida
hej-bruksbil
rss-elektrikerpodden
bilar-med-sladd
garagehang
rss-uppgang-och-fall
rss-veckans-ai
developers-mer-an-bara-kod
teknikveckan
rss-digitala-influencer-podden
rss-snacka-om-ai