<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/atom+xml" href="https://feeds.transistor.fm/conversinglabs-podcast" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>ConversingLabs Podcast</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/conversinglabs-podcast</itunes:new-feed-url>
    <description>ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, and software supply chain security. Hosted by Paul Roberts, director of editorial and content at ReversingLabs, ConversingLabs digs into cutting edge topics that are most pressing in the world of cybersecurity.   </description>
    <copyright>(c) 2022 ReversingLabs Inc.</copyright>
    <podcast:guid>51458d1b-7f58-5f4c-8af3-8b0e01d3d8fe</podcast:guid>
    <podcast:locked owner="content@reversinglabs.com">no</podcast:locked>
    <language>en</language>
    <pubDate>Thu, 12 Feb 2026 08:30:17 -0500</pubDate>
    <lastBuildDate>Thu, 12 Feb 2026 08:31:11 -0500</lastBuildDate>
    <link>https://www.reversinglabs.com/conversinglabs</link>
    <image>
      <url>https://img.transistorcdn.com/f5pudySYuC2kM5cBmHD1pAYslgWaYRaKqNYs07Qoj60/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yZjRj/YmRmZDIzNTBmYzJi/OWIxMjIyYmU2ZGZh/MGI4Yi5wbmc.jpg</url>
      <title>ConversingLabs Podcast</title>
      <link>https://www.reversinglabs.com/conversinglabs</link>
    </image>
    <itunes:category text="Technology"/>
    <itunes:category text="News">
      <itunes:category text="Tech News"/>
    </itunes:category>
    <itunes:type>episodic</itunes:type>
    <itunes:author>ReversingLabs</itunes:author>
    <itunes:image href="https://img.transistorcdn.com/f5pudySYuC2kM5cBmHD1pAYslgWaYRaKqNYs07Qoj60/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yZjRj/YmRmZDIzNTBmYzJi/OWIxMjIyYmU2ZGZh/MGI4Yi5wbmc.jpg"/>
    <itunes:summary>ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, and software supply chain security. Hosted by Paul Roberts, director of editorial and content at ReversingLabs, ConversingLabs digs into cutting edge topics that are most pressing in the world of cybersecurity.   </itunes:summary>
    <itunes:subtitle>ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, and software supply chain security.</itunes:subtitle>
    <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
    <itunes:owner>
      <itunes:name>ReversingLabs Inc.</itunes:name>
      <itunes:email>content@reversinglabs.com</itunes:email>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>Predictions For Software Supply Chain Security In 2026</title>
      <itunes:season>9</itunes:season>
      <podcast:season>9</podcast:season>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Predictions For Software Supply Chain Security In 2026</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f35cf734-c948-4896-bd85-618d044f8432</guid>
      <link>https://www.reversinglabs.com/conversinglabs/predictions-for-software-supply-chain-security-in-2026</link>
      <description>
        <![CDATA[<p>In this episode of ConversingLabs Podcast, host Paul Roberts interviews ReversingLabs Chief Trust Officer Saša Zdjelar about the recent Notebook++ hack and what he thinks software supply chain security will look like in 2026. The two will also discuss the findings of RL’s fourth annual report on the subject, which offers six predictions for how threats will evolve, as well as how security teams will respond. Also, Saša will share his take that the technology industry needs to move away from a “move fast and break things” mindset in order to best secure software supply chains.</p><p>Read Saša's commentary for Cyber Scoop here: <a href="https://cyberscoop.com/move-fast-break-things-cybersecurity-supply-chain-security-op-ed/">https://cyberscoop.com/move-fast-break-things-cybersecurity-supply-chain-security-op-ed/</a> <br>Read the 2026 Software Supply Chain Security Report here: <a href="https://www.reversinglabs.com/sscs-report">https://www.reversinglabs.com/sscs-report</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of ConversingLabs Podcast, host Paul Roberts interviews ReversingLabs Chief Trust Officer Saša Zdjelar about the recent Notebook++ hack and what he thinks software supply chain security will look like in 2026. The two will also discuss the findings of RL’s fourth annual report on the subject, which offers six predictions for how threats will evolve, as well as how security teams will respond. Also, Saša will share his take that the technology industry needs to move away from a “move fast and break things” mindset in order to best secure software supply chains.</p><p>Read Saša's commentary for Cyber Scoop here: <a href="https://cyberscoop.com/move-fast-break-things-cybersecurity-supply-chain-security-op-ed/">https://cyberscoop.com/move-fast-break-things-cybersecurity-supply-chain-security-op-ed/</a> <br>Read the 2026 Software Supply Chain Security Report here: <a href="https://www.reversinglabs.com/sscs-report">https://www.reversinglabs.com/sscs-report</a></p>]]>
      </content:encoded>
      <pubDate>Thu, 12 Feb 2026 08:30:00 -0500</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/73c0d6e7/c2895802.mp3" length="35462496" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/2qbotqddaM5hxqa_TC92eMQcxHgCLIaemJR23ZQXrlg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wZjBj/MzVhNDEyM2I2OTYw/ZWQ4Njg5YzZjNjll/ZWY2NC5wbmc.jpg"/>
      <itunes:duration>2213</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of ConversingLabs Podcast, host Paul Roberts interviews ReversingLabs Chief Trust Officer Saša Zdjelar about the recent Notebook++ hack and what he thinks software supply chain security will look like in 2026. The two will also discuss the findings of RL’s fourth annual report on the subject, which offers six predictions for how threats will evolve, as well as how security teams will respond. Also, Saša will share his take that the technology industry needs to move away from a “move fast and break things” mindset in order to best secure software supply chains.</p><p>Read Saša's commentary for Cyber Scoop here: <a href="https://cyberscoop.com/move-fast-break-things-cybersecurity-supply-chain-security-op-ed/">https://cyberscoop.com/move-fast-break-things-cybersecurity-supply-chain-security-op-ed/</a> <br>Read the 2026 Software Supply Chain Security Report here: <a href="https://www.reversinglabs.com/sscs-report">https://www.reversinglabs.com/sscs-report</a></p>]]>
      </itunes:summary>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/73c0d6e7/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Can Frameworks Stop Supply Chain Attacks?</title>
      <itunes:season>8</itunes:season>
      <podcast:season>8</podcast:season>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>Can Frameworks Stop Supply Chain Attacks?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">66241bca-bcb7-4514-8ba8-1af9587aa943</guid>
      <link>https://www.reversinglabs.com/conversinglabs/can-frameworks-stop-supply-chain-attacks</link>
      <description>
        <![CDATA[<p>In this episode of ConversingLabs Podcast, host Carolynn van Arsdale welcomes North Carolina State University <a href="https://lauriew.github.io/">Professor Laurie Williams</a> and Ph.D. student <a href="https://sivanahamer.github.io/">Sivana Hamer</a> to discuss their team’s research on the effectiveness of software supply chain security (SSCS) frameworks. Their study, “Closing the Chain,” (<a href="https://arxiv.org/pdf/2503.12192">PDF</a>) found that software products would still be vulnerable to attacks like SolarWinds, Log4j and XZ Utils – even if they fully enforced 10 well-known SSCS frameworks published by government, industry, academia and open source.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of ConversingLabs Podcast, host Carolynn van Arsdale welcomes North Carolina State University <a href="https://lauriew.github.io/">Professor Laurie Williams</a> and Ph.D. student <a href="https://sivanahamer.github.io/">Sivana Hamer</a> to discuss their team’s research on the effectiveness of software supply chain security (SSCS) frameworks. Their study, “Closing the Chain,” (<a href="https://arxiv.org/pdf/2503.12192">PDF</a>) found that software products would still be vulnerable to attacks like SolarWinds, Log4j and XZ Utils – even if they fully enforced 10 well-known SSCS frameworks published by government, industry, academia and open source.</p>]]>
      </content:encoded>
      <pubDate>Thu, 04 Dec 2025 08:00:00 -0500</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/d1352648/f1ac70be.mp3" length="42007224" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/uezWtgexNCx2L2BPmMJfzM9xoUiueOUkDBiAX1ao8W0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kNjc3/N2ExMDhmZTM1ODY4/MTdmM2MyNGZiZGNl/ODZhMC5wbmc.jpg"/>
      <itunes:duration>2621</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of ConversingLabs Podcast, host Carolynn van Arsdale welcomes North Carolina State University <a href="https://lauriew.github.io/">Professor Laurie Williams</a> and Ph.D. student <a href="https://sivanahamer.github.io/">Sivana Hamer</a> to discuss their team’s research on the effectiveness of software supply chain security (SSCS) frameworks. Their study, “Closing the Chain,” (<a href="https://arxiv.org/pdf/2503.12192">PDF</a>) found that software products would still be vulnerable to attacks like SolarWinds, Log4j and XZ Utils – even if they fully enforced 10 well-known SSCS frameworks published by government, industry, academia and open source.</p>]]>
      </itunes:summary>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d1352648/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>The State of Vulnerability Management</title>
      <itunes:season>8</itunes:season>
      <podcast:season>8</podcast:season>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:title>The State of Vulnerability Management</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">353d6f33-f9c0-4cbe-8047-cc16da051c03</guid>
      <link>https://www.reversinglabs.com/conversinglabs/the-state-of-vulnerability-management</link>
      <description>
        <![CDATA[<p>In this episode of ConversingLabs, host Paul Roberts interviews Casey John Ellis, founder of Bugcrowd, about the state of vulnerability management and bug bounties in 2025. Casey shares his insights on current changes impacting both the threat landscape and the cybersecurity industry, such as matters at the federal level and increased AI usage. Looking at the future, Casey also mentions how important it is to welcome the next generation into cybersecurity.  </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of ConversingLabs, host Paul Roberts interviews Casey John Ellis, founder of Bugcrowd, about the state of vulnerability management and bug bounties in 2025. Casey shares his insights on current changes impacting both the threat landscape and the cybersecurity industry, such as matters at the federal level and increased AI usage. Looking at the future, Casey also mentions how important it is to welcome the next generation into cybersecurity.  </p>]]>
      </content:encoded>
      <pubDate>Wed, 05 Nov 2025 08:00:00 -0500</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/549db35b/38dbff69.mp3" length="50640191" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/dO4kmfsx35MTVNX5Acz4Ba4Dlq1k1lwvFROhDk2CoGc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xNDUz/ODExYzRjYWM4NjIy/Mjg2NGE5NzMyZjFj/YmVlZS5wbmc.jpg"/>
      <itunes:duration>3162</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of ConversingLabs, host Paul Roberts interviews Casey John Ellis, founder of Bugcrowd, about the state of vulnerability management and bug bounties in 2025. Casey shares his insights on current changes impacting both the threat landscape and the cybersecurity industry, such as matters at the federal level and increased AI usage. Looking at the future, Casey also mentions how important it is to welcome the next generation into cybersecurity.  </p>]]>
      </itunes:summary>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/549db35b/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Who Will Maintain Open Source’s Future?</title>
      <itunes:season>8</itunes:season>
      <podcast:season>8</podcast:season>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>Who Will Maintain Open Source’s Future?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0facf8fa-eaf9-44f7-9c2a-8bf9142420c3</guid>
      <link>https://www.reversinglabs.com/conversinglabs/who-will-maintain-open-sources-future</link>
      <description>
        <![CDATA[<p>In this episode of ConversingLabs, host Paul Roberts interviews Abigail Cabunoc Mayes, who is responsible for Open Source Maintainer Programs at GitHub – the world’s leading development platform – about the uncertainty of open source’s future. This uncertainty is caused by a steady decline in Gen Z maintainers, which presents a major software supply chain security risk. Abigail will explain how in order to welcome and retain young maintainers, the OSS community must understand the perspectives of Gen Z, and ensure their needs are met. She will also walk through actions that the community can immediately take to address this growing uncertainty.</p><p>Read Abigail's blog post on the topic here: <a href="https://github.blog/open-source/maintainers/who-will-maintain-the-future-rethinking-open-source-leadership-for-a-new-generation/">https://github.blog/open-source/maintainers/who-will-maintain-the-future-rethinking-open-source-leadership-for-a-new-generation/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of ConversingLabs, host Paul Roberts interviews Abigail Cabunoc Mayes, who is responsible for Open Source Maintainer Programs at GitHub – the world’s leading development platform – about the uncertainty of open source’s future. This uncertainty is caused by a steady decline in Gen Z maintainers, which presents a major software supply chain security risk. Abigail will explain how in order to welcome and retain young maintainers, the OSS community must understand the perspectives of Gen Z, and ensure their needs are met. She will also walk through actions that the community can immediately take to address this growing uncertainty.</p><p>Read Abigail's blog post on the topic here: <a href="https://github.blog/open-source/maintainers/who-will-maintain-the-future-rethinking-open-source-leadership-for-a-new-generation/">https://github.blog/open-source/maintainers/who-will-maintain-the-future-rethinking-open-source-leadership-for-a-new-generation/</a></p>]]>
      </content:encoded>
      <pubDate>Tue, 14 Oct 2025 08:00:00 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/56de7fd3/55291121.mp3" length="23213914" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/GwgfA5BNWL3SlkZEZ-76hCr9X05LqQ2qQcMH6I030nw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zMWY2/NmYwY2NhY2U1MDg5/ZjU3N2M2YzE2YjI1/M2U0Zi5wbmc.jpg"/>
      <itunes:duration>1447</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of ConversingLabs, host Paul Roberts interviews Abigail Cabunoc Mayes, who is responsible for Open Source Maintainer Programs at GitHub – the world’s leading development platform – about the uncertainty of open source’s future. This uncertainty is caused by a steady decline in Gen Z maintainers, which presents a major software supply chain security risk. Abigail will explain how in order to welcome and retain young maintainers, the OSS community must understand the perspectives of Gen Z, and ensure their needs are met. She will also walk through actions that the community can immediately take to address this growing uncertainty.</p><p>Read Abigail's blog post on the topic here: <a href="https://github.blog/open-source/maintainers/who-will-maintain-the-future-rethinking-open-source-leadership-for-a-new-generation/">https://github.blog/open-source/maintainers/who-will-maintain-the-future-rethinking-open-source-leadership-for-a-new-generation/</a></p>]]>
      </itunes:summary>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/56de7fd3/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Security Badging Open-Source Projects</title>
      <itunes:season>8</itunes:season>
      <podcast:season>8</podcast:season>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>Security Badging Open-Source Projects</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">cf757661-eea2-47ff-aeff-b43fb96b4d41</guid>
      <link>https://www.reversinglabs.com/conversinglabs/security-badging-open-source-projects</link>
      <description>
        <![CDATA[<p>In this episode of ConversingLabs, host Carolynn van Arsdale interviews Kadi McKean, Community Manager at ReversingLabs, to discuss a new initiative aimed at securing the open source software supply chain: <a href="https://www.reversinglabs.com/blog/safe-and-trusted-why-the-spectra-assure-community-badge-belongs-on-your-open-source-project">the Spectra Assure Community Badge</a>. As a result of threat actors continuing to target open source software (OSS) platforms like PyPI and npm, it’s become increasingly difficult for developers to avoid malicious packages. Kadi explains how this new, free badging system can help the community quickly identify which open source projects meet the most rigorous security standards. If you're a maintainer and want to work with Kadi, email community@reversinglabs.com. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of ConversingLabs, host Carolynn van Arsdale interviews Kadi McKean, Community Manager at ReversingLabs, to discuss a new initiative aimed at securing the open source software supply chain: <a href="https://www.reversinglabs.com/blog/safe-and-trusted-why-the-spectra-assure-community-badge-belongs-on-your-open-source-project">the Spectra Assure Community Badge</a>. As a result of threat actors continuing to target open source software (OSS) platforms like PyPI and npm, it’s become increasingly difficult for developers to avoid malicious packages. Kadi explains how this new, free badging system can help the community quickly identify which open source projects meet the most rigorous security standards. If you're a maintainer and want to work with Kadi, email community@reversinglabs.com. </p>]]>
      </content:encoded>
      <pubDate>Thu, 21 Aug 2025 08:00:00 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/cf1a632d/959c2688.mp3" length="31443412" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Dct39G7QNEiP-7UJCxfNWRlZe9TaEHYjBaD0M3yYMkQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jZTcy/MmUxNTFhNzYwMTY3/MjNiMDAzNzA4OTJm/YmVmMy5wbmc.jpg"/>
      <itunes:duration>1964</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of ConversingLabs, host Carolynn van Arsdale interviews Kadi McKean, Community Manager at ReversingLabs, to discuss a new initiative aimed at securing the open source software supply chain: <a href="https://www.reversinglabs.com/blog/safe-and-trusted-why-the-spectra-assure-community-badge-belongs-on-your-open-source-project">the Spectra Assure Community Badge</a>. As a result of threat actors continuing to target open source software (OSS) platforms like PyPI and npm, it’s become increasingly difficult for developers to avoid malicious packages. Kadi explains how this new, free badging system can help the community quickly identify which open source projects meet the most rigorous security standards. If you're a maintainer and want to work with Kadi, email community@reversinglabs.com. </p>]]>
      </itunes:summary>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/cf1a632d/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Aviation Has A Software Problem</title>
      <itunes:season>8</itunes:season>
      <podcast:season>8</podcast:season>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>Aviation Has A Software Problem</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2e6e961c-aba2-4fc9-a7a9-3fbe3ce41cab</guid>
      <link>https://www.reversinglabs.com/conversinglabs/aviation-has-a-software-problem-conversinglabs-podcast</link>
      <description>
        <![CDATA[<p>In this episode of ConversingLabs, host Paul Roberts interviews Jiwon Ma, Senior Policy Analyst at the Foundation for Defense of Democracies (FDD), about her recent report that addresses the urgent cybersecurity challenges facing the aviation industry. The report, "<a href="https://www.fdd.org/wp-content/uploads/2025/04/fdd-csc2.0-turbulence-ahead-navigating-the-challenges-of-aviation-cybersecurity.pdf">Turbulence Ahead: Navigating the Challenges of Aviation Cybersecurity</a>" (PDF), analyzes a number of factors that are putting U.S. aviation infrastructure at increasing cyber risk, including how weaknesses in the software supply chain pose serious risks to the industry.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of ConversingLabs, host Paul Roberts interviews Jiwon Ma, Senior Policy Analyst at the Foundation for Defense of Democracies (FDD), about her recent report that addresses the urgent cybersecurity challenges facing the aviation industry. The report, "<a href="https://www.fdd.org/wp-content/uploads/2025/04/fdd-csc2.0-turbulence-ahead-navigating-the-challenges-of-aviation-cybersecurity.pdf">Turbulence Ahead: Navigating the Challenges of Aviation Cybersecurity</a>" (PDF), analyzes a number of factors that are putting U.S. aviation infrastructure at increasing cyber risk, including how weaknesses in the software supply chain pose serious risks to the industry.</p>]]>
      </content:encoded>
      <pubDate>Thu, 10 Jul 2025 08:00:00 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/d956949f/66791d9c.mp3" length="40891116" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/7q-6WxvdEon41g4lGQTyqRHFM458fTSrhnWg7t1MQVU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jZWJj/YTVlOTcxMWM4ZWMx/NGEyYzM2M2ZiNDlk/NWQ0NS5wbmc.jpg"/>
      <itunes:duration>2552</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of ConversingLabs, host Paul Roberts interviews Jiwon Ma, Senior Policy Analyst at the Foundation for Defense of Democracies (FDD), about her recent report that addresses the urgent cybersecurity challenges facing the aviation industry. The report, "<a href="https://www.fdd.org/wp-content/uploads/2025/04/fdd-csc2.0-turbulence-ahead-navigating-the-challenges-of-aviation-cybersecurity.pdf">Turbulence Ahead: Navigating the Challenges of Aviation Cybersecurity</a>" (PDF), analyzes a number of factors that are putting U.S. aviation infrastructure at increasing cyber risk, including how weaknesses in the software supply chain pose serious risks to the industry.</p>]]>
      </itunes:summary>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d956949f/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>The Threat of Package Hallucinations</title>
      <itunes:season>8</itunes:season>
      <podcast:season>8</podcast:season>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>The Threat of Package Hallucinations</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">14931203-18ab-4274-89dd-2a25e67788b3</guid>
      <link>https://www.reversinglabs.com/conversinglabs/the-threat-of-package-hallucinations-conversinglabs-podcast</link>
      <description>
        <![CDATA[<p>In this episode of ConversingLabs, host Paul Roberts interviews Major Joe Spracklen, a PhD student at the University of Texas at San Antonio, who recently published a paper with his peers regarding the threat posed to software supply chains caused by code-generating Large Language Models (LLMs). The paper, “We Have a Package for You! A Comprehensive Analysis of Package Hallucinations by Code Generating LLMs” (<a href="https://arxiv.org/pdf/2406.10279">PDF</a>), discusses how the rise of these LLMs can create package hallucinations that arise from fact-conflicting errors – representing a novel form of package confusion attack.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of ConversingLabs, host Paul Roberts interviews Major Joe Spracklen, a PhD student at the University of Texas at San Antonio, who recently published a paper with his peers regarding the threat posed to software supply chains caused by code-generating Large Language Models (LLMs). The paper, “We Have a Package for You! A Comprehensive Analysis of Package Hallucinations by Code Generating LLMs” (<a href="https://arxiv.org/pdf/2406.10279">PDF</a>), discusses how the rise of these LLMs can create package hallucinations that arise from fact-conflicting errors – representing a novel form of package confusion attack.</p>]]>
      </content:encoded>
      <pubDate>Tue, 01 Jul 2025 07:30:00 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/e3b8bb83/4a62842f.mp3" length="41743765" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ZzjYr2iiPPONsEO9h6GXl7ZLFGBs3vwAvtkRNns70Is/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lNjky/ZGEzYzRmZDIxMzg5/ZmI2NDNiZmFlY2M1/NzZlYi5wbmc.jpg"/>
      <itunes:duration>2606</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of ConversingLabs, host Paul Roberts interviews Major Joe Spracklen, a PhD student at the University of Texas at San Antonio, who recently published a paper with his peers regarding the threat posed to software supply chains caused by code-generating Large Language Models (LLMs). The paper, “We Have a Package for You! A Comprehensive Analysis of Package Hallucinations by Code Generating LLMs” (<a href="https://arxiv.org/pdf/2406.10279">PDF</a>), discusses how the rise of these LLMs can create package hallucinations that arise from fact-conflicting errors – representing a novel form of package confusion attack.</p>]]>
      </itunes:summary>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e3b8bb83/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Going Back to Basics to Thwart Attacks</title>
      <itunes:season>8</itunes:season>
      <podcast:season>8</podcast:season>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>Going Back to Basics to Thwart Attacks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4c655bb9-88db-417c-8f9d-fce04b50dba1</guid>
      <link>https://www.reversinglabs.com/conversinglabs/going-back-to-basics-to-thwart-attacks</link>
      <description>
        <![CDATA[<p>In this episode of ConversingLabs, host Paul Roberts interviews Chuck McWhirter, principal solutions architect at ReversingLabs, about the importance of sticking to basics when it comes to thwarting attacks from adversaries. Chuck recounts his experiences in both the public and private sectors, including his efforts in securing the 2002 Olympics – back when the Security Operations Center (SOC) had not yet evolved. The details of Chuck’s journey shed light on how enterprise security teams can better handle the cyber threats stemming from nation-state adversaries. By minimizing cybersecurity tool sprawl and alert fatigue, as well as assessing situational risk, Chuck argues that security teams stand a better chance against attackers.  </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of ConversingLabs, host Paul Roberts interviews Chuck McWhirter, principal solutions architect at ReversingLabs, about the importance of sticking to basics when it comes to thwarting attacks from adversaries. Chuck recounts his experiences in both the public and private sectors, including his efforts in securing the 2002 Olympics – back when the Security Operations Center (SOC) had not yet evolved. The details of Chuck’s journey shed light on how enterprise security teams can better handle the cyber threats stemming from nation-state adversaries. By minimizing cybersecurity tool sprawl and alert fatigue, as well as assessing situational risk, Chuck argues that security teams stand a better chance against attackers.  </p>]]>
      </content:encoded>
      <pubDate>Thu, 08 May 2025 09:55:00 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/289ba98e/f3eabe14.mp3" length="34251454" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/kLXvHr-K3AAaEXi8HtHH87kHRQmpaHQ-Iu_Rq07pBwY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yMjIy/OGU2MDZjZjgzOWRi/ODdjYzQzOTU0Mzkx/NWIzZC5wbmc.jpg"/>
      <itunes:duration>2137</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of ConversingLabs, host Paul Roberts interviews Chuck McWhirter, principal solutions architect at ReversingLabs, about the importance of sticking to basics when it comes to thwarting attacks from adversaries. Chuck recounts his experiences in both the public and private sectors, including his efforts in securing the 2002 Olympics – back when the Security Operations Center (SOC) had not yet evolved. The details of Chuck’s journey shed light on how enterprise security teams can better handle the cyber threats stemming from nation-state adversaries. By minimizing cybersecurity tool sprawl and alert fatigue, as well as assessing situational risk, Chuck argues that security teams stand a better chance against attackers.  </p>]]>
      </itunes:summary>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/289ba98e/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>AppSec Girl Power</title>
      <itunes:season>8</itunes:season>
      <podcast:season>8</podcast:season>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>AppSec Girl Power</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c5324b50-b8e5-4e26-b8db-ca22e014f615</guid>
      <link>https://www.reversinglabs.com/conversinglabs/appsec-girl-power</link>
      <description>
        <![CDATA[<p>In this episode, host Carolynn van Arsdale interviews Tanya Janca (aka <a href="https://shehackspurple.ca/">SheHacksPurple</a>), a world-renowned application security (AppSec) leader, author, speaker and educator. In addition to having multiple bestselling books, such as <a href="https://www.amazon.com/Alice-Bob-Learn-Secure-Coding/dp/1394171706">‘Alice and Bob Learn Secure Coding,’</a> Janca is the founder of We Hack Purple and leads education and community for Semgrep. In their conversation, they discuss how Janca’s career embodies <em>AppSec Girl Power</em>: Beginning from her start as a software developer, up to her current success as a prominent thought leader in AppSec and secure coding philosophy. </p><p>Subscribe to <a href="https://newsletter.shehackspurple.ca/">Tanya's newsletter here</a>, and if you're an AppSec professional, <a href="https://semgrep.dev/blog/2025/maturing-your-application-security-program-survey/">take her survey here</a>. </p><p>Find Tanya on social media:</p><ul><li><a href="https://bsky.app/profile/shehackspurple.bsky.social">https://bsky.app/profile/shehackspurple.bsky.social</a> </li><li><a href="https://twitter.com/shehackspurple">https://twitter.com/shehackspurple</a></li><li><a href="https://www.linkedin.com/in/tanya-janca">https://www.linkedin.com/in/tanya-janca</a></li><li><a href="https://infosec.exchange/@SheHacksPurple">https://infosec.exchange/@SheHacksPurple</a></li><li><a href="https://www.tiktok.com/@shehackspurple">https://www.tiktok.com/@shehackspurple</a></li><li><a href="https://www.youtube.com/shehackspurple">https://www.youtube.com/shehackspurple</a>  </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, host Carolynn van Arsdale interviews Tanya Janca (aka <a href="https://shehackspurple.ca/">SheHacksPurple</a>), a world-renowned application security (AppSec) leader, author, speaker and educator. In addition to having multiple bestselling books, such as <a href="https://www.amazon.com/Alice-Bob-Learn-Secure-Coding/dp/1394171706">‘Alice and Bob Learn Secure Coding,’</a> Janca is the founder of We Hack Purple and leads education and community for Semgrep. In their conversation, they discuss how Janca’s career embodies <em>AppSec Girl Power</em>: Beginning from her start as a software developer, up to her current success as a prominent thought leader in AppSec and secure coding philosophy. </p><p>Subscribe to <a href="https://newsletter.shehackspurple.ca/">Tanya's newsletter here</a>, and if you're an AppSec professional, <a href="https://semgrep.dev/blog/2025/maturing-your-application-security-program-survey/">take her survey here</a>. </p><p>Find Tanya on social media:</p><ul><li><a href="https://bsky.app/profile/shehackspurple.bsky.social">https://bsky.app/profile/shehackspurple.bsky.social</a> </li><li><a href="https://twitter.com/shehackspurple">https://twitter.com/shehackspurple</a></li><li><a href="https://www.linkedin.com/in/tanya-janca">https://www.linkedin.com/in/tanya-janca</a></li><li><a href="https://infosec.exchange/@SheHacksPurple">https://infosec.exchange/@SheHacksPurple</a></li><li><a href="https://www.tiktok.com/@shehackspurple">https://www.tiktok.com/@shehackspurple</a></li><li><a href="https://www.youtube.com/shehackspurple">https://www.youtube.com/shehackspurple</a>  </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 10 Apr 2025 08:00:00 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/594c7e16/1e66832c.mp3" length="49005772" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Mbpz0Zc6L6EIhZNL0TLtJpYrvT8PgB0WNKbINDEhZ7E/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xZWJm/ZGRhOGI4ZTNmZjRi/OThhNWUwMjNjZmQ4/MDdhNi5wbmc.jpg"/>
      <itunes:duration>3060</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, host Carolynn van Arsdale interviews Tanya Janca (aka <a href="https://shehackspurple.ca/">SheHacksPurple</a>), a world-renowned application security (AppSec) leader, author, speaker and educator. In addition to having multiple bestselling books, such as <a href="https://www.amazon.com/Alice-Bob-Learn-Secure-Coding/dp/1394171706">‘Alice and Bob Learn Secure Coding,’</a> Janca is the founder of We Hack Purple and leads education and community for Semgrep. In their conversation, they discuss how Janca’s career embodies <em>AppSec Girl Power</em>: Beginning from her start as a software developer, up to her current success as a prominent thought leader in AppSec and secure coding philosophy. </p><p>Subscribe to <a href="https://newsletter.shehackspurple.ca/">Tanya's newsletter here</a>, and if you're an AppSec professional, <a href="https://semgrep.dev/blog/2025/maturing-your-application-security-program-survey/">take her survey here</a>. </p><p>Find Tanya on social media:</p><ul><li><a href="https://bsky.app/profile/shehackspurple.bsky.social">https://bsky.app/profile/shehackspurple.bsky.social</a> </li><li><a href="https://twitter.com/shehackspurple">https://twitter.com/shehackspurple</a></li><li><a href="https://www.linkedin.com/in/tanya-janca">https://www.linkedin.com/in/tanya-janca</a></li><li><a href="https://infosec.exchange/@SheHacksPurple">https://infosec.exchange/@SheHacksPurple</a></li><li><a href="https://www.tiktok.com/@shehackspurple">https://www.tiktok.com/@shehackspurple</a></li><li><a href="https://www.youtube.com/shehackspurple">https://www.youtube.com/shehackspurple</a>  </li></ul>]]>
      </itunes:summary>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/594c7e16/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Cybersecurity's Double-Edged Sword</title>
      <itunes:season>8</itunes:season>
      <podcast:season>8</podcast:season>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Cybersecurity's Double-Edged Sword</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d8daf4d9-47db-4298-a66d-88a20ca0ed30</guid>
      <link>https://www.reversinglabs.com/conversinglabs/cybersecuritys-double-edged-sword</link>
      <description>
        <![CDATA[<p>In this episode of ConversingLabs, host Paul Roberts chats with Malcolm Harkins, Chief Security and Trust Officer at HiddenLayer, about cybersecurity’s double-edged sword: artificial intelligence (AI). Harkins will discuss what HiddenLayer has discovered in regards to AI-based threats to software supply chains, including research about DeepSeek R1. The two will also identify which enterprise security tools lack the means to spot these developing threats. Finally, they’ll consider whether or not AI itself can be a part of the solution in out-pacing threat actors’ utilization of these risks.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of ConversingLabs, host Paul Roberts chats with Malcolm Harkins, Chief Security and Trust Officer at HiddenLayer, about cybersecurity’s double-edged sword: artificial intelligence (AI). Harkins will discuss what HiddenLayer has discovered in regards to AI-based threats to software supply chains, including research about DeepSeek R1. The two will also identify which enterprise security tools lack the means to spot these developing threats. Finally, they’ll consider whether or not AI itself can be a part of the solution in out-pacing threat actors’ utilization of these risks.</p>]]>
      </content:encoded>
      <pubDate>Wed, 26 Mar 2025 09:42:40 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/5c2d9301/83b97f83.mp3" length="58209549" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/6gl4KK7jEm-GvUHUfpYtC4lya_n8nCpdTREVKp6whls/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ZDNi/Mzk2ZjFiOGFlYWFk/NGM1YmEwZDE2MDNi/YmU1Zi5qcGc.jpg"/>
      <itunes:duration>3635</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of ConversingLabs, host Paul Roberts chats with Malcolm Harkins, Chief Security and Trust Officer at HiddenLayer, about cybersecurity’s double-edged sword: artificial intelligence (AI). Harkins will discuss what HiddenLayer has discovered in regards to AI-based threats to software supply chains, including research about DeepSeek R1. The two will also identify which enterprise security tools lack the means to spot these developing threats. Finally, they’ll consider whether or not AI itself can be a part of the solution in out-pacing threat actors’ utilization of these risks.</p>]]>
      </itunes:summary>
      <itunes:keywords>AI, cybersecurity, appsec</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/5c2d9301/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>The Evolution of Threat Intel</title>
      <itunes:season>8</itunes:season>
      <podcast:season>8</podcast:season>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>The Evolution of Threat Intel</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">021b6bbd-d185-483b-99e5-d3d6d2a22d6e</guid>
      <link>https://www.reversinglabs.com/conversinglabs/the-evolution-of-threat-intel</link>
      <description>
        <![CDATA[<p>In this episode of ConversingLabs, host Paul Roberts chats with Jason Valenti, director of product at ReversingLabs, about the evolution of threat intelligence and the growing role it’s playing in cyber defense. A former IT specialist at the FBI and director of product management at the firm CrowdStrike, Jason will touch on his journey prior to his RL career and his work to promote the use of threat intelligence in both the public and private sectors. Jason will also talk about the epidemic of sophisticated cybercriminal and nation state hacking campaigns and how enterprise security teams can leverage threat intel to contextualize- and push back against these pressing threats.</p><p>You can find <a href="https://www.linkedin.com/in/jason-valenti-9293a4267/">Jason on LinkedIn here</a>. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of ConversingLabs, host Paul Roberts chats with Jason Valenti, director of product at ReversingLabs, about the evolution of threat intelligence and the growing role it’s playing in cyber defense. A former IT specialist at the FBI and director of product management at the firm CrowdStrike, Jason will touch on his journey prior to his RL career and his work to promote the use of threat intelligence in both the public and private sectors. Jason will also talk about the epidemic of sophisticated cybercriminal and nation state hacking campaigns and how enterprise security teams can leverage threat intel to contextualize- and push back against these pressing threats.</p><p>You can find <a href="https://www.linkedin.com/in/jason-valenti-9293a4267/">Jason on LinkedIn here</a>. </p>]]>
      </content:encoded>
      <pubDate>Mon, 17 Mar 2025 14:37:37 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/966f13c9/49a16924.mp3" length="39002953" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/pGrhSE6v7afGG90__m30bul4lBefjNwOX1g5IJjuy6c/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iZWUz/OGNjMWY4NTFjNTUx/NmQ1ZjFkYWZmMWQ4/YTVlNS5qcGc.jpg"/>
      <itunes:duration>2434</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of ConversingLabs, host Paul Roberts chats with Jason Valenti, director of product at ReversingLabs, about the evolution of threat intelligence and the growing role it’s playing in cyber defense. A former IT specialist at the FBI and director of product management at the firm CrowdStrike, Jason will touch on his journey prior to his RL career and his work to promote the use of threat intelligence in both the public and private sectors. Jason will also talk about the epidemic of sophisticated cybercriminal and nation state hacking campaigns and how enterprise security teams can leverage threat intel to contextualize- and push back against these pressing threats.</p><p>You can find <a href="https://www.linkedin.com/in/jason-valenti-9293a4267/">Jason on LinkedIn here</a>. </p>]]>
      </itunes:summary>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/966f13c9/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Hackers Hacking Hackers</title>
      <itunes:season>7</itunes:season>
      <podcast:season>7</podcast:season>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Hackers Hacking Hackers</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">891fbda0-b613-406a-a6b3-5d359b2220f9</guid>
      <link>https://www.reversinglabs.com/conversinglabs/hackers-hacking-hackers</link>
      <description>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Security Researcher Sam Curry about his own experience being hacked via the Internet of Things and how it led to a shocking discovery regarding modem security. More broadly, the conversation touches on how APIs can leave consumers vulnerable, the increasing popularity of IoT attacks, and how to mitigate such risks. </p><p>Check out Sam's blog post about his modem getting hacked here: <a href="https://samcurry.net/hacking-millions-of-modems">https://samcurry.net/hacking-millions-of-modems</a></p><p>Learn more about Sam and Ian Carroll's research on airport security here: <a href="https://ian.sh/tsa">https://ian.sh/tsa</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Security Researcher Sam Curry about his own experience being hacked via the Internet of Things and how it led to a shocking discovery regarding modem security. More broadly, the conversation touches on how APIs can leave consumers vulnerable, the increasing popularity of IoT attacks, and how to mitigate such risks. </p><p>Check out Sam's blog post about his modem getting hacked here: <a href="https://samcurry.net/hacking-millions-of-modems">https://samcurry.net/hacking-millions-of-modems</a></p><p>Learn more about Sam and Ian Carroll's research on airport security here: <a href="https://ian.sh/tsa">https://ian.sh/tsa</a></p>]]>
      </content:encoded>
      <pubDate>Tue, 01 Oct 2024 08:00:00 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/8e0bdecb/35d73514.mp3" length="37589483" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/UQLnfKLZurjO8jfDqId2EgUeg1O2ioKpiwdWFAcMCKU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85MzRm/MGUwNjAzNDVhZDFk/YjMxYzA2ZDI1MjUw/NWM4Ny5qcGc.jpg"/>
      <itunes:duration>2346</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Security Researcher Sam Curry about his own experience being hacked via the Internet of Things and how it led to a shocking discovery regarding modem security. More broadly, the conversation touches on how APIs can leave consumers vulnerable, the increasing popularity of IoT attacks, and how to mitigate such risks. </p><p>Check out Sam's blog post about his modem getting hacked here: <a href="https://samcurry.net/hacking-millions-of-modems">https://samcurry.net/hacking-millions-of-modems</a></p><p>Learn more about Sam and Ian Carroll's research on airport security here: <a href="https://ian.sh/tsa">https://ian.sh/tsa</a></p>]]>
      </itunes:summary>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/8e0bdecb/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>The Past, Present &amp; Future of SBOMs</title>
      <itunes:season>7</itunes:season>
      <podcast:season>7</podcast:season>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>The Past, Present &amp; Future of SBOMs</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">829b5f1c-c5e8-4092-8b46-16e98db2284e</guid>
      <link>https://www.reversinglabs.com/conversinglabs/past-present-future-of-sboms</link>
      <description>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Beau Woods, Founder &amp; CEO of Stratigos Security, about the history of the software bill of materials (SBOM) – from its beginnings, to its modern-day use, to efforts underway to adapt it for the future. SBOMs have exploded in popularity within the past two years, and are oftentimes considered synonymous with software supply chain security. However, SBOMs are not a new tool, and while they’re important – they certainly aren’t the end-all-be-all for mitigating modern threats to software supply chains. Woods will explain in this conversation how SBOMs have taken center stage in 2024, and how they will continue to impact the future of cybersecurity.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Beau Woods, Founder &amp; CEO of Stratigos Security, about the history of the software bill of materials (SBOM) – from its beginnings, to its modern-day use, to efforts underway to adapt it for the future. SBOMs have exploded in popularity within the past two years, and are oftentimes considered synonymous with software supply chain security. However, SBOMs are not a new tool, and while they’re important – they certainly aren’t the end-all-be-all for mitigating modern threats to software supply chains. Woods will explain in this conversation how SBOMs have taken center stage in 2024, and how they will continue to impact the future of cybersecurity.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Sep 2024 06:00:00 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/087b9d06/d185e630.mp3" length="32673600" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/-JjZqbebIy7_w8CIepQ8gsL7eDoKfIN0thNqXS-8T08/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kN2Q1/MjFlZGU1NTRkNDg1/ZWFkNTFiMGMzOGNh/OTQ3ZC5qcGc.jpg"/>
      <itunes:duration>2039</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Beau Woods, Founder &amp; CEO of Stratigos Security, about the history of the software bill of materials (SBOM) – from its beginnings, to its modern-day use, to efforts underway to adapt it for the future. SBOMs have exploded in popularity within the past two years, and are oftentimes considered synonymous with software supply chain security. However, SBOMs are not a new tool, and while they’re important – they certainly aren’t the end-all-be-all for mitigating modern threats to software supply chains. Woods will explain in this conversation how SBOMs have taken center stage in 2024, and how they will continue to impact the future of cybersecurity.</p>]]>
      </itunes:summary>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/087b9d06/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Is Cybersecurity Ready for the SolarWinds Prosecution?</title>
      <itunes:season>6</itunes:season>
      <podcast:season>6</podcast:season>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Is Cybersecurity Ready for the SolarWinds Prosecution?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">76e03f7b-943c-47b3-ac7f-458add267235</guid>
      <link>https://www.reversinglabs.com/conversinglabs/is-cybersecurity-ready-for-the-solarwinds-prosecution</link>
      <description>
        <![CDATA[<p>In this episode, host Paul Roberts chats with <a href="https://www.linkedin.com/in/tarah/">Tarah Wheeler</a>, CEO of Red Queen Dynamics, about her recent <a href="https://www.cfr.org/blog/never-mind-buzz-heres-consequences-no-one-cybersecurity-ready-solarwinds-prosecution">Council on Foreign Relations piece</a> regarding what the U.S. SEC’s prosecution of SolarWinds and new disclosure rules mean for the cybersecurity industry at-large. Wheeler believes that these new moves from the Commission emphasize the concept of “materiality” in cyber - graduating the industry to a level of enterprise risk it has never experienced before.</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, host Paul Roberts chats with <a href="https://www.linkedin.com/in/tarah/">Tarah Wheeler</a>, CEO of Red Queen Dynamics, about her recent <a href="https://www.cfr.org/blog/never-mind-buzz-heres-consequences-no-one-cybersecurity-ready-solarwinds-prosecution">Council on Foreign Relations piece</a> regarding what the U.S. SEC’s prosecution of SolarWinds and new disclosure rules mean for the cybersecurity industry at-large. Wheeler believes that these new moves from the Commission emphasize the concept of “materiality” in cyber - graduating the industry to a level of enterprise risk it has never experienced before.</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Wed, 22 May 2024 08:00:00 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/27ba1e17/55cd536e.mp3" length="25991902" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/KYW2Q88hhK75VoJ7lG982a8XLr5kg4p-lQEZyxP0vFs/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iNGNi/NWQ0ZDJmZmZhYjg1/Mzc0OTZlOGEzOTdi/ZWJiMS5qcGc.jpg"/>
      <itunes:duration>1621</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, host Paul Roberts chats with <a href="https://www.linkedin.com/in/tarah/">Tarah Wheeler</a>, CEO of Red Queen Dynamics, about her recent <a href="https://www.cfr.org/blog/never-mind-buzz-heres-consequences-no-one-cybersecurity-ready-solarwinds-prosecution">Council on Foreign Relations piece</a> regarding what the U.S. SEC’s prosecution of SolarWinds and new disclosure rules mean for the cybersecurity industry at-large. Wheeler believes that these new moves from the Commission emphasize the concept of “materiality” in cyber - graduating the industry to a level of enterprise risk it has never experienced before.</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/27ba1e17/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Chinese APT Group Exploits SOHO Routers</title>
      <itunes:season>6</itunes:season>
      <podcast:season>6</podcast:season>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>Chinese APT Group Exploits SOHO Routers</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d49b3bb8-8fde-40ca-a044-61fd605d7156</guid>
      <link>https://www.reversinglabs.com/conversinglabs/chinese-apt-group-exploits-soho-routers</link>
      <description>
        <![CDATA[<p>In this episode of the ConversingLabs podcast, host Paul Roberts chats with Daniel Adamitis, a Principal Information Security Engineer at Lumen Technologies’ Black Lotus Labs. They discuss his team’s discovery of an impossible-to-kill botnet packed with end-of-life SOHO routers, which is being used by a Chinese nation-state backed APT group as a covert data transfer network. The group, known as Volt Typhoon, is also well known for targeting U.S. critical infrastructure. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of the ConversingLabs podcast, host Paul Roberts chats with Daniel Adamitis, a Principal Information Security Engineer at Lumen Technologies’ Black Lotus Labs. They discuss his team’s discovery of an impossible-to-kill botnet packed with end-of-life SOHO routers, which is being used by a Chinese nation-state backed APT group as a covert data transfer network. The group, known as Volt Typhoon, is also well known for targeting U.S. critical infrastructure. </p>]]>
      </content:encoded>
      <pubDate>Wed, 03 Apr 2024 09:00:00 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/7e9b9e4a/ff4dda48.mp3" length="21917699" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/5SMmukYaMVZ4MAnK1xD0GvGGTvsJcqfnOKeV1fTwh6U/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE4Mjc1MTMv/MTcxMjA2NDUzNC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1366</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of the ConversingLabs podcast, host Paul Roberts chats with Daniel Adamitis, a Principal Information Security Engineer at Lumen Technologies’ Black Lotus Labs. They discuss his team’s discovery of an impossible-to-kill botnet packed with end-of-life SOHO routers, which is being used by a Chinese nation-state backed APT group as a covert data transfer network. The group, known as Volt Typhoon, is also well known for targeting U.S. critical infrastructure. </p>]]>
      </itunes:summary>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/7e9b9e4a/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Securing Medical Devices with SBOMs</title>
      <itunes:season>6</itunes:season>
      <podcast:season>6</podcast:season>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>Securing Medical Devices with SBOMs</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4596f709-51d6-4afb-bbe6-ea0620b7c2ca</guid>
      <link>https://www.reversinglabs.com/conversinglabs/securing-medical-devices-with-sboms</link>
      <description>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Kevin Fu, an Electrical &amp; Computer Engineering Professor at Northeastern University, about the new federal standards for the cybersecurity of medical devices, which includes the submission of software bills of materials (SBOMs) to the FDA. The two will discuss the new mandates for medical device manufacturers, as well as key takeaways for how these organizations can improve their software supply chain security programs. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Kevin Fu, an Electrical &amp; Computer Engineering Professor at Northeastern University, about the new federal standards for the cybersecurity of medical devices, which includes the submission of software bills of materials (SBOMs) to the FDA. The two will discuss the new mandates for medical device manufacturers, as well as key takeaways for how these organizations can improve their software supply chain security programs. </p>]]>
      </content:encoded>
      <pubDate>Wed, 27 Mar 2024 08:00:00 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/a0710d85/5a72af80.mp3" length="31612160" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/_OBagUTkEaIvoSzSkGvVIiikF5Ekps6KSLoA7jdY8Uk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE4MTMwMDAv/MTcxMTQ4MzcxOC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1972</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Kevin Fu, an Electrical &amp; Computer Engineering Professor at Northeastern University, about the new federal standards for the cybersecurity of medical devices, which includes the submission of software bills of materials (SBOMs) to the FDA. The two will discuss the new mandates for medical device manufacturers, as well as key takeaways for how these organizations can improve their software supply chain security programs. </p>]]>
      </itunes:summary>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/a0710d85/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>The LockBit Takedown: What We Know</title>
      <itunes:season>6</itunes:season>
      <podcast:season>6</podcast:season>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>The LockBit Takedown: What We Know</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d534adec-437f-4994-af04-dc1a226e44df</guid>
      <link>https://reversinglabs.com/conversinglabs/The-LockBit-Takedown-What-We-Know</link>
      <description>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Ali Khan, Field CISO at ReversingLabs, about the recent takedown of the LockBit ransomware group, which is considered to be one of the most prolific cybercrime groups globally.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Ali Khan, Field CISO at ReversingLabs, about the recent takedown of the LockBit ransomware group, which is considered to be one of the most prolific cybercrime groups globally.</p>]]>
      </content:encoded>
      <pubDate>Fri, 15 Mar 2024 08:00:00 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/a2baf874/3b73fcef.mp3" length="19071212" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/witdh9FOayYTCbK3_qvaRI3NfafXt6TMe-xB1a9Mqfk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE3OTAyNzEv/MTcxMDQ0MDUzMC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1190</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Ali Khan, Field CISO at ReversingLabs, about the recent takedown of the LockBit ransomware group, which is considered to be one of the most prolific cybercrime groups globally.</p>]]>
      </itunes:summary>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/a2baf874/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>The State of Software Supply Chain Security 2024</title>
      <itunes:season>6</itunes:season>
      <podcast:season>6</podcast:season>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>The State of Software Supply Chain Security 2024</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f72b47ff-8052-4c87-8597-5992d3a02537</guid>
      <link>https://www.reversinglabs.com/conversinglabs/the-state-of-software-supply-chain-security-2024</link>
      <description>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Karlo Zanki, a Reverse Engineer at ReversingLabs, about the <a href="https://www.reversinglabs.com/sscs-report">state of software supply chain security in 2024</a>. The two will review key findings on the software supply chain threat landscape in 2023, as well as what security and development teams can expect from malicious actors in 2024. Zanki will also highlight several of the major software supply chain security incidents discovered by RL threat researchers in the past year.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Karlo Zanki, a Reverse Engineer at ReversingLabs, about the <a href="https://www.reversinglabs.com/sscs-report">state of software supply chain security in 2024</a>. The two will review key findings on the software supply chain threat landscape in 2023, as well as what security and development teams can expect from malicious actors in 2024. Zanki will also highlight several of the major software supply chain security incidents discovered by RL threat researchers in the past year.</p>]]>
      </content:encoded>
      <pubDate>Wed, 28 Feb 2024 12:30:00 -0500</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/51c12d97/1bd4fe11.mp3" length="25364969" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ME5FM9yTvrO1tVvhpAryvAPOMJoSCyxbGWeN8YaYwGc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE3NDAzMjAv/MTcwOTA2NTQyNS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1581</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Karlo Zanki, a Reverse Engineer at ReversingLabs, about the <a href="https://www.reversinglabs.com/sscs-report">state of software supply chain security in 2024</a>. The two will review key findings on the software supply chain threat landscape in 2023, as well as what security and development teams can expect from malicious actors in 2024. Zanki will also highlight several of the major software supply chain security incidents discovered by RL threat researchers in the past year.</p>]]>
      </itunes:summary>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/51c12d97/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>The State of Open Source Software Security</title>
      <itunes:season>5</itunes:season>
      <podcast:season>5</podcast:season>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>The State of Open Source Software Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">766cae25-6c04-4b87-9247-d342233c7f22</guid>
      <link>https://www.reversinglabs.com/conversinglabs/the-state-of-open-source-software-security</link>
      <description>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Mikaël Barbero, Head of Security at the Eclipse Foundation, about the state of open source software security. Eclipse has been around for more than two decades and has for a long time prioritized the mitigation of threats to open source projects. In their conversation, Mikaël chats with Paul about where Eclipse stands today, what current threats are being posed to open source repositories, as well as how nation-states and international organizations are working to combat these threats.  </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Mikaël Barbero, Head of Security at the Eclipse Foundation, about the state of open source software security. Eclipse has been around for more than two decades and has for a long time prioritized the mitigation of threats to open source projects. In their conversation, Mikaël chats with Paul about where Eclipse stands today, what current threats are being posed to open source repositories, as well as how nation-states and international organizations are working to combat these threats.  </p>]]>
      </content:encoded>
      <pubDate>Thu, 05 Oct 2023 15:49:49 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/612cc2cc/c4049473.mp3" length="26901381" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/PnuhZ5EnIInswzEW5HB_h8sqbOVSxSwXFdCZsoYdgdk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE1MzQ5NDIv/MTY5NjUyNjE5NS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1676</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Mikaël Barbero, Head of Security at the Eclipse Foundation, about the state of open source software security. Eclipse has been around for more than two decades and has for a long time prioritized the mitigation of threats to open source projects. In their conversation, Mikaël chats with Paul about where Eclipse stands today, what current threats are being posed to open source repositories, as well as how nation-states and international organizations are working to combat these threats.  </p>]]>
      </itunes:summary>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/612cc2cc/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Apple Devices as a Growing Attack Vector </title>
      <itunes:season>5</itunes:season>
      <podcast:season>5</podcast:season>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>Apple Devices as a Growing Attack Vector </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">653e1af3-0015-4d93-b365-328572ea44e8</guid>
      <link>https://www.reversinglabs.com/conversinglabs/devin-byrd-kandji</link>
      <description>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Devin Byrd, Director of Threat Intelligence at Kandji on the sidelines of the 2023 Black Hat USA conference. In their conversation, Byrd discusses how Kandji has grown into a major security provider for macOS users, and how the attack vector for macOS and iOS users has increased in recent years. He explains that only dealing with adware and junkware on these devices was a thing of the past, but now, macOS devices are being targeted with malicious back doors and even software supply chain attacks. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Devin Byrd, Director of Threat Intelligence at Kandji on the sidelines of the 2023 Black Hat USA conference. In their conversation, Byrd discusses how Kandji has grown into a major security provider for macOS users, and how the attack vector for macOS and iOS users has increased in recent years. He explains that only dealing with adware and junkware on these devices was a thing of the past, but now, macOS devices are being targeted with malicious back doors and even software supply chain attacks. </p>]]>
      </content:encoded>
      <pubDate>Wed, 27 Sep 2023 10:01:21 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/c7f1ec5d/7266e553.mp3" length="7333086" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/yCiNVrPilp3XYHIqG2WX2LiagU6a1fpozwGJvomudp0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE1MjM3NDQv/MTY5NTgyMzE0My1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>453</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Devin Byrd, Director of Threat Intelligence at Kandji on the sidelines of the 2023 Black Hat USA conference. In their conversation, Byrd discusses how Kandji has grown into a major security provider for macOS users, and how the attack vector for macOS and iOS users has increased in recent years. He explains that only dealing with adware and junkware on these devices was a thing of the past, but now, macOS devices are being targeted with malicious back doors and even software supply chain attacks. </p>]]>
      </itunes:summary>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c7f1ec5d/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>The Art of Security Chaos Engineering</title>
      <itunes:season>5</itunes:season>
      <podcast:season>5</podcast:season>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>The Art of Security Chaos Engineering</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e04aa5e0-8917-4e06-9bda-f4c15a0f16e7</guid>
      <link>https://www.reversinglabs.com/conversinglabs/the-art-of-security-chaos-engineering-conversinglabs-by-reversinglabs</link>
      <description>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Kelly Shortridge, a Senior Principal at Fastly, on the sidelines of the 2023 Black Hat USA Conference. In their conversation, they discuss her new book, Security Chaos Engineering: Sustaining Resilience in Software and Systems, as well as her Black Hat talk, “Fast, Ever-Evolving Defenders: The Resilience Revolution.”  </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Kelly Shortridge, a Senior Principal at Fastly, on the sidelines of the 2023 Black Hat USA Conference. In their conversation, they discuss her new book, Security Chaos Engineering: Sustaining Resilience in Software and Systems, as well as her Black Hat talk, “Fast, Ever-Evolving Defenders: The Resilience Revolution.”  </p>]]>
      </content:encoded>
      <pubDate>Wed, 20 Sep 2023 14:45:45 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/70427a44/f38be4a6.mp3" length="11955260" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/y9ObZRQk3gsDMYFBzJshEgi9te1bnzHKllVu9jo2Ygs/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE1MTI4MzMv/MTY5NTIyMDQ1Ny1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>742</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Kelly Shortridge, a Senior Principal at Fastly, on the sidelines of the 2023 Black Hat USA Conference. In their conversation, they discuss her new book, Security Chaos Engineering: Sustaining Resilience in Software and Systems, as well as her Black Hat talk, “Fast, Ever-Evolving Defenders: The Resilience Revolution.”  </p>]]>
      </itunes:summary>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/70427a44/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Modern Risks to the Internet of Things and Software Supply Chains</title>
      <itunes:season>5</itunes:season>
      <podcast:season>5</podcast:season>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Modern Risks to the Internet of Things and Software Supply Chains</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3c3299f5-61e7-4bdb-bf04-ba4670340073</guid>
      <link>https://www.reversinglabs.com/conversinglabs/modern-risks-to-the-internet-of-things-and-software-supply-chains-conversinglabs</link>
      <description>
        <![CDATA[<p>In this episode of ConversingLabs, host Paul Roberts chats with Thomas Pace, the CEO &amp; co-founder of the firmware security firm NetRise. Thomas and Paul talk about the shifting ground of threats and attacks as the Internet of Things grows and works its way into homes, businesses and industries - including critical infrastructure. They also talk about the growing specter of software supply chain threats and attacks. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of ConversingLabs, host Paul Roberts chats with Thomas Pace, the CEO &amp; co-founder of the firmware security firm NetRise. Thomas and Paul talk about the shifting ground of threats and attacks as the Internet of Things grows and works its way into homes, businesses and industries - including critical infrastructure. They also talk about the growing specter of software supply chain threats and attacks. </p>]]>
      </content:encoded>
      <pubDate>Wed, 13 Sep 2023 11:29:40 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/fb06d75a/946f5b93.mp3" length="18214837" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/zTJM5IMCJmc6P65rqHKNzZ37VhdldzPpSDNpeetgcrk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE1MDI5MDkv/MTY5NDYxNjcwMS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1133</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of ConversingLabs, host Paul Roberts chats with Thomas Pace, the CEO &amp; co-founder of the firmware security firm NetRise. Thomas and Paul talk about the shifting ground of threats and attacks as the Internet of Things grows and works its way into homes, businesses and industries - including critical infrastructure. They also talk about the growing specter of software supply chain threats and attacks. </p>]]>
      </itunes:summary>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/fb06d75a/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Lemons &amp; Liability: What it Means for Software Applications</title>
      <itunes:season>5</itunes:season>
      <podcast:season>5</podcast:season>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Lemons &amp; Liability: What it Means for Software Applications</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5d1c478c-fdac-4a16-ab37-682ac3acfd3c</guid>
      <link>https://www.reversinglabs.com/conversinglabs/lemons-liability-what-it-means-for-software-applications-conversinglabs-by-reversinglabs</link>
      <description>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Daniel Woods, a Cybersecurity Lecturer at The University of Edinburgh on the sidelines of the 2023 Black Hat USA conference about his briefing: “Lemons and Liability: Cyber Warranties as an Experiment in Software Regulation.” </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Daniel Woods, a Cybersecurity Lecturer at The University of Edinburgh on the sidelines of the 2023 Black Hat USA conference about his briefing: “Lemons and Liability: Cyber Warranties as an Experiment in Software Regulation.” </p>]]>
      </content:encoded>
      <pubDate>Wed, 06 Sep 2023 10:16:54 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/1e4886fb/ebeb943d.mp3" length="12012579" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/SPvo4S5retO3Fy5qGjfvC5EvRzroL6hAOxUBD0soXAk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE0OTA3NDkv/MTY5Mzk0MjExNi1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>746</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Daniel Woods, a Cybersecurity Lecturer at The University of Edinburgh on the sidelines of the 2023 Black Hat USA conference about his briefing: “Lemons and Liability: Cyber Warranties as an Experiment in Software Regulation.” </p>]]>
      </itunes:summary>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/1e4886fb/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Creating the Standard for Supply Chain Risk</title>
      <itunes:season>4</itunes:season>
      <podcast:season>4</podcast:season>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:title>Creating the Standard for Supply Chain Risk</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1728118e-56eb-4e28-8b79-a037f2ebc189</guid>
      <link>https://www.reversinglabs.com/conversinglabs/creating-the-standard-for-supply-chain-risk</link>
      <description>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Robert Martin of MITRE and Cassie Crossley of Schneider Electric about their session at this year’s RSA Conference. They explained how MITRE’s System of Trust can serve as a standard for software supply chain risk. The two also chatted with Paul about the greater issues facing software supply chains today, such as standardization and transparency. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Robert Martin of MITRE and Cassie Crossley of Schneider Electric about their session at this year’s RSA Conference. They explained how MITRE’s System of Trust can serve as a standard for software supply chain risk. The two also chatted with Paul about the greater issues facing software supply chains today, such as standardization and transparency. </p>]]>
      </content:encoded>
      <pubDate>Wed, 21 Jun 2023 12:59:00 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/7a8c0b3c/fd158303.mp3" length="21962227" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/2IbY9qK0ktyUNKmxD6dRSQlHuP4Lh_ETO4QS83bann4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEzOTE0Nzgv/MTY4NzM1NjYyNC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1367</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Robert Martin of MITRE and Cassie Crossley of Schneider Electric about their session at this year’s RSA Conference. They explained how MITRE’s System of Trust can serve as a standard for software supply chain risk. The two also chatted with Paul about the greater issues facing software supply chains today, such as standardization and transparency. </p>]]>
      </itunes:summary>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/7a8c0b3c/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>How Do You Trust Open Source Software?</title>
      <itunes:season>4</itunes:season>
      <podcast:season>4</podcast:season>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>How Do You Trust Open Source Software?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">32c7adbd-0ffe-49aa-971b-823422ab9563</guid>
      <link>https://www.reversinglabs.com/conversinglabs/how-do-you-trust-open-source-software</link>
      <description>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Naveen Srinivasan, an OpenSSF Scorecard Maintainer, about his talk at this year’s RSA Conference on how to better trust open source software. In their conversation, Naveen explains how the OpenSSF Scorecard tool can help developers understand the security posture of open source dependencies.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Naveen Srinivasan, an OpenSSF Scorecard Maintainer, about his talk at this year’s RSA Conference on how to better trust open source software. In their conversation, Naveen explains how the OpenSSF Scorecard tool can help developers understand the security posture of open source dependencies.</p>]]>
      </content:encoded>
      <pubDate>Wed, 14 Jun 2023 12:55:23 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/3218ddef/f23b209a.mp3" length="15119830" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/6NdYDJfyHyKwovuyihWXAXvIQZPFZpZ-rLQ-uZz_nNU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEzODM4NDcv/MTY4Njc1Njk2Ni1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>940</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Naveen Srinivasan, an OpenSSF Scorecard Maintainer, about his talk at this year’s RSA Conference on how to better trust open source software. In their conversation, Naveen explains how the OpenSSF Scorecard tool can help developers understand the security posture of open source dependencies.</p>]]>
      </itunes:summary>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3218ddef/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>The State of Application Security</title>
      <itunes:season>4</itunes:season>
      <podcast:season>4</podcast:season>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>The State of Application Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">36808c4e-6b46-49a0-aa6a-185fbb45dff2</guid>
      <link>https://www.reversinglabs.com/conversinglabs/the-state-of-appsec</link>
      <description>
        <![CDATA[<p>In this episode, we interview Chris Romeo, CEO of Kerr Ventures and long-time application security (app sec) practitioner on the sidelines of the 2023 RSA Conference. He gives a rundown on the state of app sec and comments on other software threats posed to organizations today. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, we interview Chris Romeo, CEO of Kerr Ventures and long-time application security (app sec) practitioner on the sidelines of the 2023 RSA Conference. He gives a rundown on the state of app sec and comments on other software threats posed to organizations today. </p>]]>
      </content:encoded>
      <pubDate>Thu, 01 Jun 2023 09:02:10 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/8536da17/bb685c59.mp3" length="17692893" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/dOzR4BDo4EMX9O0tQQimX8UGRk6fGPWszYwzW2_GFnw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEzNjI4OTYv/MTY4NTU1NTU2MC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1101</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, we interview Chris Romeo, CEO of Kerr Ventures and long-time application security (app sec) practitioner on the sidelines of the 2023 RSA Conference. He gives a rundown on the state of app sec and comments on other software threats posed to organizations today. </p>]]>
      </itunes:summary>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/8536da17/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Red Teaming the Indian Government</title>
      <itunes:season>4</itunes:season>
      <podcast:season>4</podcast:season>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>Red Teaming the Indian Government</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">cd5f249d-938b-4fe7-91e7-491310b6aa89</guid>
      <link>https://www.reversinglabs.com/conversinglabs/red-teaming-the-indian-government</link>
      <description>
        <![CDATA[<p>In this episode of ConversingLabs, host Paul Roberts chats with John Jackson, a security researcher, about the work he and research group Sakura Samurai did in looking at exposed secrets and other threats on Indian government websites. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of ConversingLabs, host Paul Roberts chats with John Jackson, a security researcher, about the work he and research group Sakura Samurai did in looking at exposed secrets and other threats on Indian government websites. </p>]]>
      </content:encoded>
      <pubDate>Tue, 23 May 2023 09:24:54 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/2dfcc8d2/892edf30.mp3" length="41020522" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/f7FBlc1S4OM6jx4qDxvB3hu866cjiZk63Z-gonc3HlY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEzNDMwMTUv/MTY4NDQxNzYwMC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2560</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of ConversingLabs, host Paul Roberts chats with John Jackson, a security researcher, about the work he and research group Sakura Samurai did in looking at exposed secrets and other threats on Indian government websites. </p>]]>
      </itunes:summary>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2dfcc8d2/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>SBOM skeptics and talks about the importance of software supply chain transparency</title>
      <itunes:season>4</itunes:season>
      <podcast:season>4</podcast:season>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>SBOM skeptics and talks about the importance of software supply chain transparency</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c300ca84-929c-4c58-acb3-dd16500b82e3</guid>
      <link>https://www.reversinglabs.com/conversinglabs/cafe-rsaconference-sbom-corman</link>
      <description>
        <![CDATA[<p>In this special Café edition of ConversingLabs, host Paul Roberts interviews Joshua Corman, the Vice President of Cyber Safety Strategy at Claroty and the Founder of I Am The Cavalry on the sidelines of the RSA Conference 2023 in San Francisco. Josh speaks with Paul about his RSAC track session, The Opposite of Transparency, which takes on skepticism of software bill of materials (SBOMs) and makes an argument for greater transparency around software supply chain risk. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this special Café edition of ConversingLabs, host Paul Roberts interviews Joshua Corman, the Vice President of Cyber Safety Strategy at Claroty and the Founder of I Am The Cavalry on the sidelines of the RSA Conference 2023 in San Francisco. Josh speaks with Paul about his RSAC track session, The Opposite of Transparency, which takes on skepticism of software bill of materials (SBOMs) and makes an argument for greater transparency around software supply chain risk. </p>]]>
      </content:encoded>
      <pubDate>Wed, 10 May 2023 16:41:06 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/ad488db8/ebf82af8.mp3" length="21451906" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/YEiJgpCbVp3E83bv8DoGCr3EJo7Ee9SbPkVQVw4HnCg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEzMjgyMTUv/MTY4MzY2MjU1OS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1335</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this special Café edition of ConversingLabs, host Paul Roberts interviews Joshua Corman, the Vice President of Cyber Safety Strategy at Claroty and the Founder of I Am The Cavalry on the sidelines of the RSA Conference 2023 in San Francisco. Josh speaks with Paul about his RSAC track session, The Opposite of Transparency, which takes on skepticism of software bill of materials (SBOMs) and makes an argument for greater transparency around software supply chain risk. </p>]]>
      </itunes:summary>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ad488db8/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Malware &amp; Software Supply Chain Security</title>
      <itunes:season>4</itunes:season>
      <podcast:season>4</podcast:season>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>Malware &amp; Software Supply Chain Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5ed399c4-75ea-4e46-b7dc-fada0e9ffc23</guid>
      <link>https://share.transistor.fm/s/e8b0eaa7</link>
      <description>
        <![CDATA[<p>In this special edition episode of ConversingLabs, host Paul Roberts interviews ReversingLabs Director of Product Management, Charlie Jones, on the sidelines of the 2023 RSA Conference in San Francisco. Charlie speaks with Paul about his RSAC track session: The Rise of Malware Within the Software Supply Chain.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this special edition episode of ConversingLabs, host Paul Roberts interviews ReversingLabs Director of Product Management, Charlie Jones, on the sidelines of the 2023 RSA Conference in San Francisco. Charlie speaks with Paul about his RSAC track session: The Rise of Malware Within the Software Supply Chain.</p>]]>
      </content:encoded>
      <pubDate>Thu, 27 Apr 2023 08:00:00 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/e8b0eaa7/6fed3509.mp3" length="16283587" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/yTx7CmpbyvE6Inx34y45pojvo77Y86_ce8EgDFTQzYE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEzMDYzMTMv/MTY4MjUzNTI1MS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1016</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this special edition episode of ConversingLabs, host Paul Roberts interviews ReversingLabs Director of Product Management, Charlie Jones, on the sidelines of the 2023 RSA Conference in San Francisco. Charlie speaks with Paul about his RSAC track session: The Rise of Malware Within the Software Supply Chain.</p>]]>
      </itunes:summary>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e8b0eaa7/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Contextualizing the National Cybersecurity Strategy</title>
      <itunes:season>4</itunes:season>
      <podcast:season>4</podcast:season>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>Contextualizing the National Cybersecurity Strategy</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9a67ce41-1778-4926-b024-e2a6ea81d01a</guid>
      <link>https://www.reversinglabs.com/conversinglabs/contextualizing-the-national-cybersecurity-strategy</link>
      <description>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Devin Lynch, Director of Supply Chain and Technology Security for the Office of the National Cyber Director, about the National Cybersecurity Strategy released by the White House last month. They discuss the motivations behind this policy move, what its impact will be in the short and long term, as well as what else the federal government plans to prioritize in this area. Lynch also details upcoming plans the federal government has to better secure open source software as a part of the greater effort to secure software supply chains.  </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Devin Lynch, Director of Supply Chain and Technology Security for the Office of the National Cyber Director, about the National Cybersecurity Strategy released by the White House last month. They discuss the motivations behind this policy move, what its impact will be in the short and long term, as well as what else the federal government plans to prioritize in this area. Lynch also details upcoming plans the federal government has to better secure open source software as a part of the greater effort to secure software supply chains.  </p>]]>
      </content:encoded>
      <pubDate>Wed, 26 Apr 2023 11:30:00 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/8a70eb48/99d7d41b.mp3" length="36343179" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/hwWmUi-3FHMX7YYmGghdo59IcA24jyOmnez28GdL8oE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEzMDYxOTIv/MTY4MjQzMzgzNC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2266</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Devin Lynch, Director of Supply Chain and Technology Security for the Office of the National Cyber Director, about the National Cybersecurity Strategy released by the White House last month. They discuss the motivations behind this policy move, what its impact will be in the short and long term, as well as what else the federal government plans to prioritize in this area. Lynch also details upcoming plans the federal government has to better secure open source software as a part of the greater effort to secure software supply chains.  </p>]]>
      </itunes:summary>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/8a70eb48/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>The Future of Bug Bounties</title>
      <itunes:season>4</itunes:season>
      <podcast:season>4</podcast:season>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>The Future of Bug Bounties</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">28cad164-3329-462d-baac-d1202f6e934c</guid>
      <link>https://www.reversinglabs.com/conversinglabs/the-future-of-bug-bounties</link>
      <description>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Katie Mousourris, CEO and Founder of Luta Security. Mousourris has a robust background in creating and running bug bounty programs as well as professional hacking. In their conversation, she discusses the evolution of professional hacking and how important bug bounty programs have become to the cybersecurity field. She also highlights the problems these programs have faced as well as how they can help identify risks in other spaces like software supply chains. Finally, Mousourris paints a picture of what the future holds for bug bounties and the place of professional hackers.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Katie Mousourris, CEO and Founder of Luta Security. Mousourris has a robust background in creating and running bug bounty programs as well as professional hacking. In their conversation, she discusses the evolution of professional hacking and how important bug bounty programs have become to the cybersecurity field. She also highlights the problems these programs have faced as well as how they can help identify risks in other spaces like software supply chains. Finally, Mousourris paints a picture of what the future holds for bug bounties and the place of professional hackers.</p>]]>
      </content:encoded>
      <pubDate>Wed, 19 Apr 2023 12:00:00 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/5e5ba688/6cacfbe7.mp3" length="33057178" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/RDRBRE98XBtGUsGmJ3yaWYQKrWINpeOKuqjkKpCLjEU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEyOTYyNDEv/MTY4MTkxNTA5Mi1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2062</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Katie Mousourris, CEO and Founder of Luta Security. Mousourris has a robust background in creating and running bug bounty programs as well as professional hacking. In their conversation, she discusses the evolution of professional hacking and how important bug bounty programs have become to the cybersecurity field. She also highlights the problems these programs have faced as well as how they can help identify risks in other spaces like software supply chains. Finally, Mousourris paints a picture of what the future holds for bug bounties and the place of professional hackers.</p>]]>
      </itunes:summary>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/5e5ba688/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>The Road to Software Supply Chain Security Compliance</title>
      <itunes:season>4</itunes:season>
      <podcast:season>4</podcast:season>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>The Road to Software Supply Chain Security Compliance</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9e1bf165-3eb1-4a7f-b8bf-59377dfac220</guid>
      <link>https://www.reversinglabs.com/conversinglabs/conversinglabs-season-4-episode-1</link>
      <description>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Steve Lasker, a former Azure Program Manager with over 20 years of experience at Microsoft. Lasker touched on his industry experience to explain how the effort to secure software has evolved into what it is today. He then explained how government standards for software supply chain security globally will benefit the industry, and will cause a great shift in the market. He points out that the software providers who meet the greatest possible compliance in this area will succeed, given the concern that companies now hold over software supply chain attacks, as well as being held liable for them. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Steve Lasker, a former Azure Program Manager with over 20 years of experience at Microsoft. Lasker touched on his industry experience to explain how the effort to secure software has evolved into what it is today. He then explained how government standards for software supply chain security globally will benefit the industry, and will cause a great shift in the market. He points out that the software providers who meet the greatest possible compliance in this area will succeed, given the concern that companies now hold over software supply chain attacks, as well as being held liable for them. </p>]]>
      </content:encoded>
      <pubDate>Wed, 29 Mar 2023 12:05:23 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/db144680/59042949.mp3" length="34824972" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/6nJ-4JtNbM51fbXGXcHO8y3KOdQgmrrRzOy4kwZhQ5U/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEyNTcyNzQv/MTY3OTQzMDM4NS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2146</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, host Paul Roberts chats with Steve Lasker, a former Azure Program Manager with over 20 years of experience at Microsoft. Lasker touched on his industry experience to explain how the effort to secure software has evolved into what it is today. He then explained how government standards for software supply chain security globally will benefit the industry, and will cause a great shift in the market. He points out that the software providers who meet the greatest possible compliance in this area will succeed, given the concern that companies now hold over software supply chain attacks, as well as being held liable for them. </p>]]>
      </itunes:summary>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/db144680/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>The Silent Epidemic of Business Email Compromise (BEC) Attacks</title>
      <itunes:season>3</itunes:season>
      <podcast:season>3</podcast:season>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>The Silent Epidemic of Business Email Compromise (BEC) Attacks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2ab659aa-5e38-45b4-8a48-1ea2a3d924b7</guid>
      <link>https://www.reversinglabs.com/conversinglabs/s3ep5/silent-epidemic-business-email-compromise-attacks</link>
      <description>
        <![CDATA[<p>Online fraud is among the most pernicious and devastating forms of cybercrime- measured by the financial and psychological toll it takes on victims. Phony tech support, online romance and business email compromise scams drain billions from our economy annually and take a huge toll on families, businesses and communities. And yet, it is often overlooked by cybersecurity experts and the larger information security industry. Scams, which frequently hinge on human frailty rather than the manipulation of software, are deemed unworthy of the attention of cybersecurity experts. Victim blaming is rife. But that dismissive attitude misses the point of these attacks and their impact. </p><p>In this episode of ConversingLabs, we’re going to go deep on scams with <a href="https://twitter.com/iHeartMalware">Ronnie Tokazowski</a>. Ronnie is a Principal Threat Advisor at the firm Cofense and widely recognized as “That BEC guy” - an expert in Business Email Compromise scams. Ronnie also hosts a YouTube channel, <a href="https://www.youtube.com/c/RonnieRants">RonnieRants</a>, where he explores some of the issues related to cybercrime, online scams and more. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Online fraud is among the most pernicious and devastating forms of cybercrime- measured by the financial and psychological toll it takes on victims. Phony tech support, online romance and business email compromise scams drain billions from our economy annually and take a huge toll on families, businesses and communities. And yet, it is often overlooked by cybersecurity experts and the larger information security industry. Scams, which frequently hinge on human frailty rather than the manipulation of software, are deemed unworthy of the attention of cybersecurity experts. Victim blaming is rife. But that dismissive attitude misses the point of these attacks and their impact. </p><p>In this episode of ConversingLabs, we’re going to go deep on scams with <a href="https://twitter.com/iHeartMalware">Ronnie Tokazowski</a>. Ronnie is a Principal Threat Advisor at the firm Cofense and widely recognized as “That BEC guy” - an expert in Business Email Compromise scams. Ronnie also hosts a YouTube channel, <a href="https://www.youtube.com/c/RonnieRants">RonnieRants</a>, where he explores some of the issues related to cybercrime, online scams and more. </p>]]>
      </content:encoded>
      <pubDate>Mon, 02 Jan 2023 16:30:00 -0500</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/532fc08d/47c85b0f.mp3" length="49857940" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/UXsRY4bzE_tDOCI05L-5ThKmAaxn4u64xLiXBN3TL3o/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNTA0NjAv/MTY3MjQxNzIyOC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>3111</itunes:duration>
      <itunes:summary>In this episode, host Paul Roberts chats with Ronnie Tokazowski, a Principal Threat Analyst at the firm Cofense and “that BEC guy” - about the scourge of business email compromise (BEC) attacks and the larger issue of online fraud which is impacting both organizations and individuals. </itunes:summary>
      <itunes:subtitle>In this episode, host Paul Roberts chats with Ronnie Tokazowski, a Principal Threat Analyst at the firm Cofense and “that BEC guy” - about the scourge of business email compromise (BEC) attacks and the larger issue of online fraud which is impacting both </itunes:subtitle>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/532fc08d/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>ZetaNile - Open Source Software Trojans</title>
      <itunes:season>3</itunes:season>
      <podcast:season>3</podcast:season>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>ZetaNile - Open Source Software Trojans</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ac89343e-90be-4ab3-92b7-183f4e43b06c</guid>
      <link>https://www.reversinglabs.com/conversinglabs/conversinglabs-season-3-episode-4</link>
      <description>
        <![CDATA[<p>In September 2022, Microsoft released a report on a group they track as ZINC (also known as Lazarus), which is a state-sponsored group out of North Korea. The report details how ZINC has been using a set of trojanized, open source software implants dubbed ZetaNile (also known as BLINDINCAN) to attack a number of organizations since June 2022.</p><p>The ReversingLabs Research Team decided to <a href="https://www.reversinglabs.com/blog/zetanile-open-source-software-trojans-from-north-korea">investigate ZINC’s use of ZetaNile, which yielded several helpful results.</a> In this conversation, host Paul Roberts chats with Joseph Edwards, a ReversingLabs Malware Researcher, about what their investigation yielded. They discuss how the malicious actors pulled off these attacks, where the malicious code resides in the open source software, and how these implants serve the criminals’ malicious goals.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In September 2022, Microsoft released a report on a group they track as ZINC (also known as Lazarus), which is a state-sponsored group out of North Korea. The report details how ZINC has been using a set of trojanized, open source software implants dubbed ZetaNile (also known as BLINDINCAN) to attack a number of organizations since June 2022.</p><p>The ReversingLabs Research Team decided to <a href="https://www.reversinglabs.com/blog/zetanile-open-source-software-trojans-from-north-korea">investigate ZINC’s use of ZetaNile, which yielded several helpful results.</a> In this conversation, host Paul Roberts chats with Joseph Edwards, a ReversingLabs Malware Researcher, about what their investigation yielded. They discuss how the malicious actors pulled off these attacks, where the malicious code resides in the open source software, and how these implants serve the criminals’ malicious goals.</p>]]>
      </content:encoded>
      <pubDate>Mon, 02 Jan 2023 16:30:00 -0500</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/28198bb5/3bb75eb5.mp3" length="21846338" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Qd_fo_fSkWey5tHZknCX0zOOoi2lPjui6ZzKMyVfruA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNTA0NTgv/MTY3MjQxNjc3MS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1361</itunes:duration>
      <itunes:summary>In this episode, host Paul Roberts chats with ReversingLabs Malware Researcher Joseph Edwards about his latest threat research on ZetaNile, which is a set of trojanized, open source software implants. </itunes:summary>
      <itunes:subtitle>In this episode, host Paul Roberts chats with ReversingLabs Malware Researcher Joseph Edwards about his latest threat research on ZetaNile, which is a set of trojanized, open source software implants. </itunes:subtitle>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/28198bb5/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Firmware Supply Chain Risks</title>
      <itunes:season>3</itunes:season>
      <podcast:season>3</podcast:season>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>Firmware Supply Chain Risks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">45da1847-6e8a-443e-bd90-04b8d771eb93</guid>
      <link>https://www.reversinglabs.com/conversinglabs/conversinglabs-season-3-episode-3</link>
      <description>
        <![CDATA[<p><a href="https://www.reversinglabs.com/blog/the-state-of-software-supply-chain-security">Supply chain attacks</a> are not limited to SaaS (software-as-a-service) applications. Specific kinds of software, such as firmware, are also at risk of suffering supply chain attacks. Firmware is typically used to control hardware devices, and sits at a lower level, connecting high-level software with an operating system. </p><p>It is important for the cybersecurity and application security industries to pay attention to this area of potential risk, and come up with mitigation strategies. That is why in this episode, <a href="https://twitter.com/matrosov">Alex Matrosov</a>, founder and CEO of Binarly.io, joined us to tell us more about the risks to firmware, and how we can better secure it from supply chain attacks.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://www.reversinglabs.com/blog/the-state-of-software-supply-chain-security">Supply chain attacks</a> are not limited to SaaS (software-as-a-service) applications. Specific kinds of software, such as firmware, are also at risk of suffering supply chain attacks. Firmware is typically used to control hardware devices, and sits at a lower level, connecting high-level software with an operating system. </p><p>It is important for the cybersecurity and application security industries to pay attention to this area of potential risk, and come up with mitigation strategies. That is why in this episode, <a href="https://twitter.com/matrosov">Alex Matrosov</a>, founder and CEO of Binarly.io, joined us to tell us more about the risks to firmware, and how we can better secure it from supply chain attacks.</p>]]>
      </content:encoded>
      <pubDate>Mon, 02 Jan 2023 16:30:00 -0500</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/be3e92f6/5f08de62.mp3" length="45806366" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/XFtMR6C8yAk6gGNd70z9J41l7fr5xhAdVUhJgiKdQQ0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNDA4Mjcv/MTY3MTQ4NTI2MS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2859</itunes:duration>
      <itunes:summary>In this episode, host Paul Roberts chats with Binarly.io CEO &amp;amp; Founder Alex Matrosov about supply chain risks via firmware.</itunes:summary>
      <itunes:subtitle>In this episode, host Paul Roberts chats with Binarly.io CEO &amp;amp; Founder Alex Matrosov about supply chain risks via firmware.</itunes:subtitle>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/be3e92f6/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>A Closer Look at the Enduring Security Framework’s Guidance</title>
      <itunes:season>3</itunes:season>
      <podcast:season>3</podcast:season>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>A Closer Look at the Enduring Security Framework’s Guidance</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5fb71a40-f38d-4233-8505-f85da3147de5</guid>
      <link>https://www.reversinglabs.com/conversinglabs/conversinglabs-season-3-episode-2</link>
      <description>
        <![CDATA[<p>The U.S. Federal Government's Enduring Security Framework (ESF) Working Panel released <a href="https://blog.reversinglabs.com/blog/the-supply-chain-security-guide-roadmap-for-a-post-solarwinds-world">a guidance on "Securing The Software Supply Chain"</a> in September, 2022. The ESF is made up of both government officials and industry practitioners, and this guidance with the intention of it being a "practical guide" for software developers. </p><p>In this episode, host Paul Roberts chats with ReversingLabs Field CISO Matt Rose about the ESF's guidance: what it entails, whether or not it serves as helpful to software developers, as well as who should be paying attention to this guidance. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The U.S. Federal Government's Enduring Security Framework (ESF) Working Panel released <a href="https://blog.reversinglabs.com/blog/the-supply-chain-security-guide-roadmap-for-a-post-solarwinds-world">a guidance on "Securing The Software Supply Chain"</a> in September, 2022. The ESF is made up of both government officials and industry practitioners, and this guidance with the intention of it being a "practical guide" for software developers. </p><p>In this episode, host Paul Roberts chats with ReversingLabs Field CISO Matt Rose about the ESF's guidance: what it entails, whether or not it serves as helpful to software developers, as well as who should be paying attention to this guidance. </p>]]>
      </content:encoded>
      <pubDate>Mon, 02 Jan 2023 16:30:00 -0500</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/748f3646/6bf66a52.mp3" length="25793383" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/xbb4YAOwoliSwLIesgzMkRbbTATob-8ihQo1y-u6Lz4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNDA4MDMv/MTY3MTQ4MzQ5OS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1607</itunes:duration>
      <itunes:summary>We chatted with ReversingLabs Field CISO Matthew Rose about the ESF’s new guidance on software supply chain security.</itunes:summary>
      <itunes:subtitle>We chatted with ReversingLabs Field CISO Matthew Rose about the ESF’s new guidance on software supply chain security.</itunes:subtitle>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/748f3646/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Don’t Sleep on SBOMs</title>
      <itunes:season>3</itunes:season>
      <podcast:season>3</podcast:season>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Don’t Sleep on SBOMs</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">78885f32-fc9a-4eb6-a092-08da1cff1b5c</guid>
      <link>https://www.reversinglabs.com/conversinglabs/dont-sleep-on-sboms</link>
      <description>
        <![CDATA[<p><a href="https://www.reversinglabs.com/blog/sbom-what-it-is-and-why-it-matters-software-supply-chain-security">Software Bills of Materials (SBOMs)</a> are a <a href="https://www.reversinglabs.com/blog/sbom-critical-but-first-step-software-supply-chain-security">helpful first step for an organization</a> looking to secure its software supply chain. SBOMs serve as an ingredients list, pointing out all of the components that make up a software product, such as open source software packages, third party software and more. <a href="https://www.reversinglabs.com/blog/timeline-of-federal-guidance-on-software-supply-chain-security">Federal guidance in the U.S.</a> now strongly recommends the use of an SBOM by both software publishers and consumers. </p><p>In this episode, host Paul Roberts chats with ReversingLabs Software Assurance Evangelist Charlie Jones on all things SBOM: what it is, how they are beneficial, who needs one, and more. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://www.reversinglabs.com/blog/sbom-what-it-is-and-why-it-matters-software-supply-chain-security">Software Bills of Materials (SBOMs)</a> are a <a href="https://www.reversinglabs.com/blog/sbom-critical-but-first-step-software-supply-chain-security">helpful first step for an organization</a> looking to secure its software supply chain. SBOMs serve as an ingredients list, pointing out all of the components that make up a software product, such as open source software packages, third party software and more. <a href="https://www.reversinglabs.com/blog/timeline-of-federal-guidance-on-software-supply-chain-security">Federal guidance in the U.S.</a> now strongly recommends the use of an SBOM by both software publishers and consumers. </p><p>In this episode, host Paul Roberts chats with ReversingLabs Software Assurance Evangelist Charlie Jones on all things SBOM: what it is, how they are beneficial, who needs one, and more. </p>]]>
      </content:encoded>
      <pubDate>Mon, 02 Jan 2023 16:30:00 -0500</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/94848704/b9c10b09.mp3" length="39873526" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/EFamiTPm_9p3tEy-Y2PTxcKeR-p8KqOtakXvZmlw5oQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNDA3OTQv/MTY3MTQ4MjUxMC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2488</itunes:duration>
      <itunes:summary>We chatted with ReversingLabs Software Assurance Evangelist Charlie Jones about all-things SBOM.</itunes:summary>
      <itunes:subtitle>We chatted with ReversingLabs Software Assurance Evangelist Charlie Jones about all-things SBOM.</itunes:subtitle>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/94848704/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Hunting Follina</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>Hunting Follina</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5b668678-14c0-4386-b2de-ca0c0386f96e</guid>
      <link>https://www.reversinglabs.com/conversinglabs/hunting-follina</link>
      <description>
        <![CDATA[<p>The exploit known as Follina resurfaced in late May 2022 as researchers discovered its use in a phishing document campaign. ReversingLabs Malware Researcher Joseph Edwards hunted for Follina exploitation samples to observe what final payloads are being delivered in-the-wild. </p><p>He joins host Paul Roberts for this episode of ConversingLabs to share his findings and key takeaways. He also shares how your organization can defend itself against the exploit.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The exploit known as Follina resurfaced in late May 2022 as researchers discovered its use in a phishing document campaign. ReversingLabs Malware Researcher Joseph Edwards hunted for Follina exploitation samples to observe what final payloads are being delivered in-the-wild. </p><p>He joins host Paul Roberts for this episode of ConversingLabs to share his findings and key takeaways. He also shares how your organization can defend itself against the exploit.</p>]]>
      </content:encoded>
      <pubDate>Mon, 03 Oct 2022 16:38:45 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/6f872182/d5c753e5.mp3" length="37265567" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/R7Frl0QrdK9BnoZPiEM7xANFvqYnLc7XYF90JQG-J6c/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEwNDc2ODYv/MTY2NDgyODkwOS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1550</itunes:duration>
      <itunes:summary>We chatted with ReversingLabs Malware Researcher Joseph Edwards about his research on the Follina Exploit.</itunes:summary>
      <itunes:subtitle>We chatted with ReversingLabs Malware Researcher Joseph Edwards about his research on the Follina Exploit.</itunes:subtitle>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6f872182/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Leveraging YARA</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>Leveraging YARA</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">56775bb5-daeb-4c4b-9db9-e9e4e84fe5f5</guid>
      <link>https://www.reversinglabs.com/conversinglabs/leveraging-yara</link>
      <description>
        <![CDATA[<p>YARA rules have been a proven tool for threat detection and hunting. Organizations who want to be mindful of today’s most serious threats, such as wiper malware and ransomware, should be leveraging this tool however they can. </p><p>For this episode of ConversingLabs, we invited ReversingLabs Malware Researcher Hrvoje Samardžić plus Roman Hüssy of Abuse.ch, who told us about his company’s platform: YARAify. These two experts will also show how organizations can deploy YARA rules to benefit their threat analysis operations. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>YARA rules have been a proven tool for threat detection and hunting. Organizations who want to be mindful of today’s most serious threats, such as wiper malware and ransomware, should be leveraging this tool however they can. </p><p>For this episode of ConversingLabs, we invited ReversingLabs Malware Researcher Hrvoje Samardžić plus Roman Hüssy of Abuse.ch, who told us about his company’s platform: YARAify. These two experts will also show how organizations can deploy YARA rules to benefit their threat analysis operations. </p>]]>
      </content:encoded>
      <pubDate>Mon, 03 Oct 2022 16:25:17 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/464e14ee/069090f5.mp3" length="75066796" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/qBhPxlgZLgwrl8aK2kFkVhuH3LBn6ylNX6MhOTR58pE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEwNDc2NDcv/MTY2NDgyNjY1MS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>3124</itunes:duration>
      <itunes:summary>We chatted with ReversingLabs Malware Researcher Hrvoje Samardžić and Roman Hüssy of Abuse.ch about YARAify, which aids threat hunting operations.</itunes:summary>
      <itunes:subtitle>We chatted with ReversingLabs Malware Researcher Hrvoje Samardžić and Roman Hüssy of Abuse.ch about YARAify, which aids threat hunting operations.</itunes:subtitle>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/464e14ee/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Lessons Learned from CI/CD Compromises</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Lessons Learned from CI/CD Compromises</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">aa9927c3-bec2-4e0c-937d-07a5c3ee4e14</guid>
      <link>https://www.reversinglabs.com/conversinglabs/lessons-learned-from-ci-cd-compromises</link>
      <description>
        <![CDATA[<p>In this special edition episode, ConversingLabs host Paul Roberts interviewed researchers Iain Smart and Viktor Gazdag of NCC Group from the showroom floor at Black Hat 2022. Paul chatted with the researchers about their Black Hat session on compromises to CI/CD pipelines, being an integral part of software supply chain security. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this special edition episode, ConversingLabs host Paul Roberts interviewed researchers Iain Smart and Viktor Gazdag of NCC Group from the showroom floor at Black Hat 2022. Paul chatted with the researchers about their Black Hat session on compromises to CI/CD pipelines, being an integral part of software supply chain security. </p>]]>
      </content:encoded>
      <pubDate>Mon, 03 Oct 2022 15:47:03 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/d210e8ee/45a25e43.mp3" length="29511741" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/2M3ghWFWyxpHqM-Sk_yHwnck3ccDVXtv-VYLGL0eHnA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEwNDc2Mjcv/MTY2NDgyNjE1NS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1227</itunes:duration>
      <itunes:summary>We chatted with researchers Iain Smart &amp;amp; Viktor Gazdag of NCC Group about their research into attacks on CI/CD pipelines.</itunes:summary>
      <itunes:subtitle>We chatted with researchers Iain Smart &amp;amp; Viktor Gazdag of NCC Group about their research into attacks on CI/CD pipelines.</itunes:subtitle>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d210e8ee/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Déjà Vu: Uncovering Stolen Algorithms in Commercial Products</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>Déjà Vu: Uncovering Stolen Algorithms in Commercial Products</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">412160d5-4d7f-488e-a7d7-1564afba3ab0</guid>
      <link>https://www.reversinglabs.com/conversinglabs/uncovering-stolen-algorithms-in-commercial-products</link>
      <description>
        <![CDATA[<p>A systemic issue impacting the cybersecurity community is the theft and unauthorized use of algorithms by corporate entities. This is an issue that Patrick Wardle, Founder of the Objective-See Foundation, has brought to the forefront as a speaker at this year’s Black Hat USA Conference. </p><p>His talk at Black Hat presented the techniques to spot unauthorized use, and he referenced these techniques in real-world examples. We chatted with Wardle about this systemic problem at large, and how the industry should move forward to minimize this issue. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>A systemic issue impacting the cybersecurity community is the theft and unauthorized use of algorithms by corporate entities. This is an issue that Patrick Wardle, Founder of the Objective-See Foundation, has brought to the forefront as a speaker at this year’s Black Hat USA Conference. </p><p>His talk at Black Hat presented the techniques to spot unauthorized use, and he referenced these techniques in real-world examples. We chatted with Wardle about this systemic problem at large, and how the industry should move forward to minimize this issue. </p>]]>
      </content:encoded>
      <pubDate>Mon, 03 Oct 2022 15:38:57 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/5d9c365b/7a004e9e.mp3" length="56225944" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/m9KY2_2WugW5vFnb0EKnQ_NS8NJzyQUWgFBYOlvkC7c/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEwNDc2MTQv/MTY2NDgyNTc5OS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2339</itunes:duration>
      <itunes:summary>We chatted with Black Hat Speaker Patrick Wardle who joined us to talk about unauthorized algorithm use.</itunes:summary>
      <itunes:subtitle>We chatted with Black Hat Speaker Patrick Wardle who joined us to talk about unauthorized algorithm use.</itunes:subtitle>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/5d9c365b/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Not All Developers Can Be Security Jedis</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>Not All Developers Can Be Security Jedis</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">85b9ba26-347d-4756-91f4-e667b8f487ac</guid>
      <link>https://www.reversinglabs.com/conversinglabs/not-all-developers-can-be-security-jedis</link>
      <description>
        <![CDATA[<p>At this year’s Black Hat Conference in Las Vegas, software supply chain security was top of mind for the InfoSec community. One of the biggest obstacles to improving the security of organizations and critical infrastructure is the poor state of software security. Alas: training developers to produce secure code is expensive, and time intensive. Or is it? </p><p>At this year’s conference, Adam Shostack, President of Shostack &amp; Associates, described a new approach to scale secure development training and educate a developer workforce, keeping time and financial restraints in mind. We chatted with him one-on-one to learn his insights in this special edition episode.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>At this year’s Black Hat Conference in Las Vegas, software supply chain security was top of mind for the InfoSec community. One of the biggest obstacles to improving the security of organizations and critical infrastructure is the poor state of software security. Alas: training developers to produce secure code is expensive, and time intensive. Or is it? </p><p>At this year’s conference, Adam Shostack, President of Shostack &amp; Associates, described a new approach to scale secure development training and educate a developer workforce, keeping time and financial restraints in mind. We chatted with him one-on-one to learn his insights in this special edition episode.</p>]]>
      </content:encoded>
      <pubDate>Mon, 03 Oct 2022 15:27:28 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/20d4addc/34230496.mp3" length="62372916" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/HMwON1bbB_kGv8gH7wJ9304055bRZ5fe7G4LfP0EAA4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEwMzQ3NzAv/MTY2Mzg2MjM1Ni1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2596</itunes:duration>
      <itunes:summary>We chatted with Black Hat Speaker Adam Shostack about the need for better developer training.</itunes:summary>
      <itunes:subtitle>We chatted with Black Hat Speaker Adam Shostack about the need for better developer training.</itunes:subtitle>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/20d4addc/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>IconBurst - The Newest Software Supply Chain Attack</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>IconBurst - The Newest Software Supply Chain Attack</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">60d0a4fa-b801-4698-8689-8d6fdc006d96</guid>
      <link>https://www.reversinglabs.com/conversinglabs/iconburst-the-newest-software-supply-chain-attack</link>
      <description>
        <![CDATA[<p>ReversingLabs recently discovered a software supply chain attack known as IconBurst. This incident is a widespread campaign, consisting of the installation of malicious NPM modules that are harvesting sensitive data from forms embedded in mobile applications and websites. </p><p>Karlo Zanki, a Reverse Engineer at ReversingLabs, was the first to discover the attack. We invited him to join us for the second episode of ConversingLabs Season 2 to discuss his findings. </p><p>Learn more about IconBurst here: <a href="https://blog.reversinglabs.com/blog/iconburst-npm-software-supply-chain-attack-grabs-data-from-apps-websites">https://blog.reversinglabs.com/blog/iconburst-npm-software-supply-chain-attack-grabs-data-from-apps-websites</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ReversingLabs recently discovered a software supply chain attack known as IconBurst. This incident is a widespread campaign, consisting of the installation of malicious NPM modules that are harvesting sensitive data from forms embedded in mobile applications and websites. </p><p>Karlo Zanki, a Reverse Engineer at ReversingLabs, was the first to discover the attack. We invited him to join us for the second episode of ConversingLabs Season 2 to discuss his findings. </p><p>Learn more about IconBurst here: <a href="https://blog.reversinglabs.com/blog/iconburst-npm-software-supply-chain-attack-grabs-data-from-apps-websites">https://blog.reversinglabs.com/blog/iconburst-npm-software-supply-chain-attack-grabs-data-from-apps-websites</a></p>]]>
      </content:encoded>
      <pubDate>Mon, 03 Oct 2022 15:10:00 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/4e25eb08/22c2e70b.mp3" length="52963855" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/BTTL7N3T4O0ON7ohE3UniUqcdxq0ZID9cf8PgRonKEY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEwMzQ3NjYv/MTY2Mzg2MjIzNS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2203</itunes:duration>
      <itunes:summary>We chatted with ReversingLabs Reverse Engineer Karlo Zanki about how he discovered IconBurst, a software supply chain attack.</itunes:summary>
      <itunes:subtitle>We chatted with ReversingLabs Reverse Engineer Karlo Zanki about how he discovered IconBurst, a software supply chain attack.</itunes:subtitle>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/4e25eb08/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Smash and Grab - AstraLocker Breach</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Smash and Grab - AstraLocker Breach</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">29d2ac6f-a7c9-4d35-8494-94164774284f</guid>
      <link>https://www.reversinglabs.com/conversinglabs/smash-and-grab-astralocker-breach</link>
      <description>
        <![CDATA[<p>AstraLocker is a fork of the Babuk ransomware family. Babuk is a past Ransomware-as-a-Service (RaaS) threat group, selling ransomware tools to affiliate cybercriminals. AstraLocker 2.0 was first seen in March 2022, but new research has surfaced about its capabilities. </p><p>ReversingLabs Malware Researcher Joseph Edwards joined us for the first episode of ConversingLabs Season 2 to share his findings on AstraLocker. He also shared what organizations need to know to stay vigilant of this active cyber threat. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>AstraLocker is a fork of the Babuk ransomware family. Babuk is a past Ransomware-as-a-Service (RaaS) threat group, selling ransomware tools to affiliate cybercriminals. AstraLocker 2.0 was first seen in March 2022, but new research has surfaced about its capabilities. </p><p>ReversingLabs Malware Researcher Joseph Edwards joined us for the first episode of ConversingLabs Season 2 to share his findings on AstraLocker. He also shared what organizations need to know to stay vigilant of this active cyber threat. </p>]]>
      </content:encoded>
      <pubDate>Mon, 03 Oct 2022 15:06:19 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/34bfb330/96cc9c84.mp3" length="33106479" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/rfASSpVBPrSGrTUdNxJEm6CdyT4ZZ8SMjbdPxnoRS2Y/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEwMzQ3NjMv/MTY2Mzg2MTk3MC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1376</itunes:duration>
      <itunes:summary>We chatted with ReversingLabs Malware Researcher Joseph Edwards about his research on AstraLocker 2.0.</itunes:summary>
      <itunes:subtitle>We chatted with ReversingLabs Malware Researcher Joseph Edwards about his research on AstraLocker 2.0.</itunes:subtitle>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/34bfb330/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Bryson Bort of Scythe.io talks Colonial Pipeline: Lessons Learned</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>Bryson Bort of Scythe.io talks Colonial Pipeline: Lessons Learned</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e9b5faa9-2d18-4a41-aa8f-f8b1d9c127b4</guid>
      <link>https://www.reversinglabs.com/conversinglabs/bryson_bort_colonial_pipeline</link>
      <description>
        <![CDATA[<p>Bryson Bort of Scythe.io spoke with host Paul Roberts about the May 2021 Colonial Pipeline hack that caused a fuel shortage on America's southeastern coast. Bort tackles the question: “What the hell happened?” He mentions that the incident truly was a “watershed moment” for the industry, since this ransomware attack directly impacted the lives of everyday Americans. </p><p>But the bigger picture on Colonial also includes years of ignored warnings about the possibility of just such an attack. Now that the attack has happened, however, Bort worries that the cybersecurity industry is stuck in their echochamber trying to understand it, rather than conversing with other key players to get a better picture of this incident. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Bryson Bort of Scythe.io spoke with host Paul Roberts about the May 2021 Colonial Pipeline hack that caused a fuel shortage on America's southeastern coast. Bort tackles the question: “What the hell happened?” He mentions that the incident truly was a “watershed moment” for the industry, since this ransomware attack directly impacted the lives of everyday Americans. </p><p>But the bigger picture on Colonial also includes years of ignored warnings about the possibility of just such an attack. Now that the attack has happened, however, Bort worries that the cybersecurity industry is stuck in their echochamber trying to understand it, rather than conversing with other key players to get a better picture of this incident. </p>]]>
      </content:encoded>
      <pubDate>Thu, 08 Sep 2022 10:27:43 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/0b317109/71bb7ddb.mp3" length="43271636" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/GzECAHJ2cW1baGirykD_cgkrBKnzIZHPZ5A2HVP5qCk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEwMTE2Nzkv/MTY2MjY0MzUxNy1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1802</itunes:duration>
      <itunes:summary>ConversingLabs podcast host Paul Roberts checked in with Bryson Bort of Scythe.io during the 2022 RSA conference to talk about his panel discussion on the Colonial Pipeline incident. They discuss the lessons learned, including the need for closer scrutiny of critical infrastructure and the limits of voluntary, industry-driven standards for cybersecurity.</itunes:summary>
      <itunes:subtitle>ConversingLabs podcast host Paul Roberts checked in with Bryson Bort of Scythe.io during the 2022 RSA conference to talk about his panel discussion on the Colonial Pipeline incident. They discuss the lessons learned, including the need for closer scrutiny</itunes:subtitle>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/0b317109/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Steve Lipner of SAFECODE on Supply Chain Security - Is It Even Possible?</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>Steve Lipner of SAFECODE on Supply Chain Security - Is It Even Possible?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">02a89e2c-24fc-47a8-bb0e-a9c6b7b79329</guid>
      <link>https://www.reversinglabs.com/conversinglabs/steve_lipner_safecode_software_supply_chain_security</link>
      <description>
        <![CDATA[<p>In this conversation, Steve Lipner of SAFECODE explains what secure software is, and recounts his own experiences on Microsoft’s Software Security Development Lifecycle Team as the point of the spear in Microsoft’s Trustworthy Computing Initiative. Lipner stresses that secure software must come from within (so to speak). Outside consultants may be able to promote best practices, but they will never be able to grasp what needs fixing. That’s why an organization’s developers need to be trained and motivated to write secure code, which means seeing mistakes as they write code and throughout the entire development process. </p><p><br></p><p>Lipner also talks about the Biden Administration’s <a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/">Executive Order (EO) on Improving the Nation’s Cybersecurity</a>, released in May 2021. Lipner believes that the impact of the EO is still a work in progress. He’s particularly a “fan” of Section 4 of the EO, which lists the requirements for a robust software security program. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this conversation, Steve Lipner of SAFECODE explains what secure software is, and recounts his own experiences on Microsoft’s Software Security Development Lifecycle Team as the point of the spear in Microsoft’s Trustworthy Computing Initiative. Lipner stresses that secure software must come from within (so to speak). Outside consultants may be able to promote best practices, but they will never be able to grasp what needs fixing. That’s why an organization’s developers need to be trained and motivated to write secure code, which means seeing mistakes as they write code and throughout the entire development process. </p><p><br></p><p>Lipner also talks about the Biden Administration’s <a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/">Executive Order (EO) on Improving the Nation’s Cybersecurity</a>, released in May 2021. Lipner believes that the impact of the EO is still a work in progress. He’s particularly a “fan” of Section 4 of the EO, which lists the requirements for a robust software security program. </p>]]>
      </content:encoded>
      <pubDate>Thu, 08 Sep 2022 10:11:06 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/06d28c41/a82e97bc.mp3" length="40280534" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/8pFfiUcPKeb1ErNzwLNaCsWRwKQ0R6Hjh69cEnkpG6w/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEwMTE2NzQv/MTY2MjY0MzQ3Mi1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1677</itunes:duration>
      <itunes:summary>ConversingLabs host Paul Roberts chatted with Steve Lipner of SAFECODE as a part of our ConversingLabs Cafe series of chats at the 2022 RSA Conference. In this conversation, Lipner explains what secure software is, and recounts his own experiences on Microsoft’s Software Security Development Lifecycle Team as the point of the spear in Microsoft’s Trustworthy Computing Initiative.</itunes:summary>
      <itunes:subtitle>ConversingLabs host Paul Roberts chatted with Steve Lipner of SAFECODE as a part of our ConversingLabs Cafe series of chats at the 2022 RSA Conference. In this conversation, Lipner explains what secure software is, and recounts his own experiences on Micr</itunes:subtitle>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/06d28c41/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Robert Martin of MITRE on Supply Chain System of Trust</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>Robert Martin of MITRE on Supply Chain System of Trust</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">336f00ed-cda3-4815-80bd-b4bb08e454c5</guid>
      <link>https://www.reversinglabs.com/conversinglabs/robert_martin_mitre_software_supply_chain_system_of_trust</link>
      <description>
        <![CDATA[<p>In this conversation, Robert Martin of MITRE talks about how the software supply chain is highly complicated, due to an increasing number of things in society becoming cyber-enabled. He and MITRE created the System of Trust (SoT) so that organizations can consider the most important aspects of the software supply chain, giving a more holistic context into the chain’s subsets. The SoT’s goal is to promote transparency, allowing developers to see all of the players in the supply chain. </p><p><br></p><p>Martin explained how software is not written neatly end to end, but rather is built with drivers, dependencies, and frameworks that give the supply chain depth and magnitude. If software practitioners are not given visibility into this complicated picture, they will miss the software supply chain risks that pose a threat to their organizations. He stresses that Software Bills of Materials (SBOMs) should be included in this effort, but that practitioners should refer to the SoT in order to best utilize an SBOM, giving them the best chance of mitigating software supply chain risks. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this conversation, Robert Martin of MITRE talks about how the software supply chain is highly complicated, due to an increasing number of things in society becoming cyber-enabled. He and MITRE created the System of Trust (SoT) so that organizations can consider the most important aspects of the software supply chain, giving a more holistic context into the chain’s subsets. The SoT’s goal is to promote transparency, allowing developers to see all of the players in the supply chain. </p><p><br></p><p>Martin explained how software is not written neatly end to end, but rather is built with drivers, dependencies, and frameworks that give the supply chain depth and magnitude. If software practitioners are not given visibility into this complicated picture, they will miss the software supply chain risks that pose a threat to their organizations. He stresses that Software Bills of Materials (SBOMs) should be included in this effort, but that practitioners should refer to the SoT in order to best utilize an SBOM, giving them the best chance of mitigating software supply chain risks. </p>]]>
      </content:encoded>
      <pubDate>Thu, 08 Sep 2022 09:53:09 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/65ab3c35/2def0974.mp3" length="36303026" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/60-0g-jWjPxxD411elcWE3KfICZfmjz5z5guGILoP3I/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEwMTE2NzIv/MTY2MjY0MzQwMy1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1511</itunes:duration>
      <itunes:summary>Robert Martin of MITRE sat down with ConversingLabs host Paul Roberts on the sidelines of the RSA Conference in early June. In this conversation, he talks about how the software supply chain is highly complicated, due to an increasing number of things in society becoming cyber-enabled.</itunes:summary>
      <itunes:subtitle>Robert Martin of MITRE sat down with ConversingLabs host Paul Roberts on the sidelines of the RSA Conference in early June. In this conversation, he talks about how the software supply chain is highly complicated, due to an increasing number of things in </itunes:subtitle>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/65ab3c35/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Dependency Confusion As A Tool For Targeted NPM Hacks</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Dependency Confusion As A Tool For Targeted NPM Hacks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">89460e0c-0e43-4722-bd68-bcd05989a289</guid>
      <link>https://www.reversinglabs.com/conversinglabs/episode-05</link>
      <description>
        <![CDATA[<p>NPM dependency confusion has emerged as a potent software supply chain attack vector via platforms like npm, with malicious packages surreptitiously added to these repositories, maintained by leading firms. </p><p>In this episode, we're joined by ReversingLabs Reverse Engineer Karlo Zanki to dig into some of our recent findings that show dependency confusion attacks are being used to advance what appear to be targeted supply chain attacks. We will also talk about how development organizations can monitor for and prevent these kinds of attacks. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>NPM dependency confusion has emerged as a potent software supply chain attack vector via platforms like npm, with malicious packages surreptitiously added to these repositories, maintained by leading firms. </p><p>In this episode, we're joined by ReversingLabs Reverse Engineer Karlo Zanki to dig into some of our recent findings that show dependency confusion attacks are being used to advance what appear to be targeted supply chain attacks. We will also talk about how development organizations can monitor for and prevent these kinds of attacks. </p>]]>
      </content:encoded>
      <pubDate>Thu, 08 Sep 2022 09:45:17 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/b11ebead/f1a58a59.mp3" length="60987804" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/0EqJkGkrYiOmy09xdhzpm7EGlN_2aOIRkSlk8zaGc8Q/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEwMTE2NjQv/MTY2MjY0MzM2MS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2540</itunes:duration>
      <itunes:summary>We chatted with ReversingLabs Reverse Engineer Karlo Zanki about how NPM packages have been caught serving malware via compromised software updates.</itunes:summary>
      <itunes:subtitle>We chatted with ReversingLabs Reverse Engineer Karlo Zanki about how NPM packages have been caught serving malware via compromised software updates.</itunes:subtitle>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b11ebead/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Local Threat Intel - You're Soaking In It!</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>Local Threat Intel - You're Soaking In It!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9b43f178-4f58-465d-b538-1e605047588e</guid>
      <link>https://www.reversinglabs.com/conversinglabs/episode-04</link>
      <description>
        <![CDATA[<p>Even small organizations are sitting on top of a wealth of threat intel: their own IT environment. It’s essential for enterprises of all kinds to understand how to tap into this intelligence to better protect their operations. </p><p>In this episode, we chatted with ReversingLabs’ very own Hrvoje Samardžić and Independent Malware Hunter Luigi De Mori/JAMESWT (<a href="https://twitter.com/JAMESWT_MHT">@JAMESWT_MHT</a>) about what kinds of internal threat intelligence are the most useful, where to find it, and how to leverage this data to improve your organization’s defenses. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Even small organizations are sitting on top of a wealth of threat intel: their own IT environment. It’s essential for enterprises of all kinds to understand how to tap into this intelligence to better protect their operations. </p><p>In this episode, we chatted with ReversingLabs’ very own Hrvoje Samardžić and Independent Malware Hunter Luigi De Mori/JAMESWT (<a href="https://twitter.com/JAMESWT_MHT">@JAMESWT_MHT</a>) about what kinds of internal threat intelligence are the most useful, where to find it, and how to leverage this data to improve your organization’s defenses. </p>]]>
      </content:encoded>
      <pubDate>Thu, 08 Sep 2022 09:39:20 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/5de47004/0ce9154a.mp3" length="85754346" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/f3j_h1cGz2pBHT3OYzClIDRtA1CXDFfkPY1Mhaw7m8U/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEwMTE2NTcv/MTY2MjY0MzMwMC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>3572</itunes:duration>
      <itunes:summary>We chatted with ReversingLabs’ very own Hrvoje Samardžić and Independent Malware Hunter Luigi De Mori/JAMESWT (@JAMESWT_MHT on Twitter) about what kinds of internal threat intelligence are the most useful, where to find it, and how to leverage this data to improve your organization’s defenses.</itunes:summary>
      <itunes:subtitle>We chatted with ReversingLabs’ very own Hrvoje Samardžić and Independent Malware Hunter Luigi De Mori/JAMESWT (@JAMESWT_MHT on Twitter) about what kinds of internal threat intelligence are the most useful, where to find it, and how to leverage this data t</itunes:subtitle>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/5de47004/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Emotet Unbound: Understanding the Risk</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>Emotet Unbound: Understanding the Risk</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">acb7679a-ae81-4821-81ae-2fa2a8288f03</guid>
      <link>https://www.reversinglabs.com/conversinglabs/episode-03</link>
      <description>
        <![CDATA[<p>Emotet is one of the most prolific pieces of malware on the Internet. What started as software designed to hijack online banking sessions is now a Swiss Army Knife of ill intent, including features for botnets, spam distribution and malicious downloads. </p><p><br></p><p>Even worse, Emotet has been embraced by one of the Internet’s most dangerous groups: Conti (aka Wizard Spider), the Russia-based ransomware outfit responsible for more than 1,000 attacks worldwide. That means detecting this threat could be your best chance to stop a devastating ransomware attack in its early stages. </p><p><br></p><p>In this podcast, we dig deep on the Emotet malware with two noted experts: Dado Horvat of ReversingLabs and Dragan Damjanovic of KPMG to talk about the evolution of the threat and the latest Emotet IOCs. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Emotet is one of the most prolific pieces of malware on the Internet. What started as software designed to hijack online banking sessions is now a Swiss Army Knife of ill intent, including features for botnets, spam distribution and malicious downloads. </p><p><br></p><p>Even worse, Emotet has been embraced by one of the Internet’s most dangerous groups: Conti (aka Wizard Spider), the Russia-based ransomware outfit responsible for more than 1,000 attacks worldwide. That means detecting this threat could be your best chance to stop a devastating ransomware attack in its early stages. </p><p><br></p><p>In this podcast, we dig deep on the Emotet malware with two noted experts: Dado Horvat of ReversingLabs and Dragan Damjanovic of KPMG to talk about the evolution of the threat and the latest Emotet IOCs. </p>]]>
      </content:encoded>
      <pubDate>Thu, 08 Sep 2022 09:37:23 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/e39fb376/a3e1b424.mp3" length="85575628" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/6gs4hld0jxXVxi3d84BoPJPqAjuO-QxTwHr3j6s08Ac/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEwMTE2NTIv/MTY2MjY0MzA5MC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>3564</itunes:duration>
      <itunes:summary>In this episode of the podcast, we dig deep on the Emotet malware with two noted experts: Dado Horvat of ReversingLabs and Dragan Damjanovic of KPMG and talk about the evolution of the threat and the latest Emotet IOCs.</itunes:summary>
      <itunes:subtitle>In this episode of the podcast, we dig deep on the Emotet malware with two noted experts: Dado Horvat of ReversingLabs and Dragan Damjanovic of KPMG and talk about the evolution of the threat and the latest Emotet IOCs.</itunes:subtitle>
      <itunes:keywords>technology, cybersecurity, malware, cyber threat hunting, software development, software supply chain, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e39fb376/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Putting Conti in Context</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Putting Conti in Context</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c054ebe6-919c-4523-8b8a-31e7ed173342</guid>
      <link>https://www.reversinglabs.com/conversinglabs/episode-02</link>
      <description>
        <![CDATA[<p>The Conti ransomware group —a.k.a. Wizard Spider; a.k.a. TrickBot; a.k.a Ryuk—is one of the most prolific ransomware gangs around. It is believed to have been active, in various incarnations, since about 2016. Just in the last year, Conti is believed to be responsible for high profile attacks, including the <a href="https://www.bleepingcomputer.com/news/security/tulsa-warns-of-data-breach-after-conti-ransomware-leaks-police-citations/">city government in Tulsa, Oklahoma</a> and <a href="https://www.reuters.com/technology/irish-health-service-hit-by-ransomware-attack-vaccine-rollout-unaffected-2021-05-14/">Ireland's Health Executive</a> service in May, 2021.</p><p>Even as leading ransomware groups like REvil and Darkside have folded in recent months, Conti is getting <a href="https://www.cisa.gov/uscert/ncas/alerts/aa21-265a">renewed attention</a> from cybersecurity experts. The group, CISA warns, has been linked to more than 1,000 attacks on U.S. and international organizations while “Conti cyber threat actors remain active.”</p><p>Why? In our latest episode of the ConversingLabs Podcast, ConversingLabs host Paul Roberts sat down with <a href="https://www.linkedin.com/in/yelisey-boguslavskiy-214a02bb/">Yelisey Boguslavskiy</a>, a co-founder of the threat intelligence firm <a href="https://www.advintel.io/">AdvIntel</a>, to talk about Conti’s evolution in recent years, and why the group continues to be such a potent threat.</p><p>According to Boguslavskiy, Conti’s continued vitality reflects a long-running practice of tightly controlled and highly vertical business operations. That runs counter to the predominant “ransomware as a service” model of “quantity over quality:" farming work out to pretty much anyone interested in making a buck and counting on a small number of scores from a large base of attacks. “This is something Conti never really followed in their methodology,” Boguslavskiy said.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The Conti ransomware group —a.k.a. Wizard Spider; a.k.a. TrickBot; a.k.a Ryuk—is one of the most prolific ransomware gangs around. It is believed to have been active, in various incarnations, since about 2016. Just in the last year, Conti is believed to be responsible for high profile attacks, including the <a href="https://www.bleepingcomputer.com/news/security/tulsa-warns-of-data-breach-after-conti-ransomware-leaks-police-citations/">city government in Tulsa, Oklahoma</a> and <a href="https://www.reuters.com/technology/irish-health-service-hit-by-ransomware-attack-vaccine-rollout-unaffected-2021-05-14/">Ireland's Health Executive</a> service in May, 2021.</p><p>Even as leading ransomware groups like REvil and Darkside have folded in recent months, Conti is getting <a href="https://www.cisa.gov/uscert/ncas/alerts/aa21-265a">renewed attention</a> from cybersecurity experts. The group, CISA warns, has been linked to more than 1,000 attacks on U.S. and international organizations while “Conti cyber threat actors remain active.”</p><p>Why? In our latest episode of the ConversingLabs Podcast, ConversingLabs host Paul Roberts sat down with <a href="https://www.linkedin.com/in/yelisey-boguslavskiy-214a02bb/">Yelisey Boguslavskiy</a>, a co-founder of the threat intelligence firm <a href="https://www.advintel.io/">AdvIntel</a>, to talk about Conti’s evolution in recent years, and why the group continues to be such a potent threat.</p><p>According to Boguslavskiy, Conti’s continued vitality reflects a long-running practice of tightly controlled and highly vertical business operations. That runs counter to the predominant “ransomware as a service” model of “quantity over quality:" farming work out to pretty much anyone interested in making a buck and counting on a small number of scores from a large base of attacks. “This is something Conti never really followed in their methodology,” Boguslavskiy said.</p>]]>
      </content:encoded>
      <pubDate>Thu, 01 Sep 2022 17:41:16 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/989e0de4/c00b0cd0.mp3" length="86451916" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/y10fsRkT0Pdp0uq3qXp6NxNPXxBCVmOmS9VreNcI63o/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEwMTEyMDAv/MTY2MjY0MzU1OC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>3600</itunes:duration>
      <itunes:summary>Ransomware groups are changing up their game. To see where things are heading, look no further than the Conti group, says Yelisey Boguslavskiy, a Security Studies Expert at the firm AdvIntel. He joined ConversingLabs host Paul Roberts for this latest episode of the podcast to dig into Conti Ransomware Group’s recent activity. They also discuss what lessons Conti holds for organizations who want to defend against evolving ransomware threats.</itunes:summary>
      <itunes:subtitle>Ransomware groups are changing up their game. To see where things are heading, look no further than the Conti group, says Yelisey Boguslavskiy, a Security Studies Expert at the firm AdvIntel. He joined ConversingLabs host Paul Roberts for this latest epis</itunes:subtitle>
      <itunes:keywords>Conti, ransomware, malware, cyber security, cyberwar</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/989e0de4/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Cyberwar in Europe: Unpacking the Ukrainian Wipers</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Cyberwar in Europe: Unpacking the Ukrainian Wipers</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8485b0ed-1162-4597-989f-26a9fde494a6</guid>
      <link>https://share.transistor.fm/s/f5de33bd</link>
      <description>
        <![CDATA[<p>Even before Russian tanks began rolling across Ukraine’s borders on February 24, the cyber war on the country had begun. In the days before the kinetic war began, a string of attacks battered Ukrainian government, defense and civil society websites and networks. Among them: massive denial of service attacks and targeted malware attacks.</p><p>In this episode of ConversingLabs, host Paul Roberts speaks with Mislav Boroš, a malware analyst at ReversingLabs about HermeticWiper and IsaacWiper, two novel pieces of malware deployed against targets in Ukraine in the lead up to- and early days of Russia's invasion. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Even before Russian tanks began rolling across Ukraine’s borders on February 24, the cyber war on the country had begun. In the days before the kinetic war began, a string of attacks battered Ukrainian government, defense and civil society websites and networks. Among them: massive denial of service attacks and targeted malware attacks.</p><p>In this episode of ConversingLabs, host Paul Roberts speaks with Mislav Boroš, a malware analyst at ReversingLabs about HermeticWiper and IsaacWiper, two novel pieces of malware deployed against targets in Ukraine in the lead up to- and early days of Russia's invasion. </p>]]>
      </content:encoded>
      <pubDate>Thu, 01 Sep 2022 17:07:26 -0400</pubDate>
      <author>ReversingLabs</author>
      <enclosure url="https://media.transistor.fm/f5de33bd/e1760939.mp3" length="58809074" type="audio/mpeg"/>
      <itunes:author>ReversingLabs</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/t115-DmHY_iB0cuqu5NAKI1vFNrgDo5KHfIv6mscjsM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEwMTExNzEv/MTY2MjY0MzYxNy1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2448</itunes:duration>
      <itunes:summary>In this inaugural episode of the ConversingLabs podcast, host Paul Roberts speaks with Mislav Boroš of ReversingLabs about the emergence of two, new wiper malware families in the opening salvos of Russia's invasion of Ukraine: Hermetic Wiper and IsaacWiper. </itunes:summary>
      <itunes:subtitle>In this inaugural episode of the ConversingLabs podcast, host Paul Roberts speaks with Mislav Boroš of ReversingLabs about the emergence of two, new wiper malware families in the opening salvos of Russia's invasion of Ukraine: Hermetic Wiper and IsaacWipe</itunes:subtitle>
      <itunes:keywords>Ukraine war, malware, cybersecurity, cyber warfare, Russia, malware analysis</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f5de33bd/transcript.txt" type="text/plain"/>
    </item>
  </channel>
</rss>
