46 subscribers
Go offline with the Player FM app!
Discovering Router Vulnerabilities with Anomaly Detection
Manage episode 297980205 series 2808508
Ready for a riddle? What do 40 hypothetical high school students and our guest on this episode have in common? Why they can help you understand complex cyber-attack methodology, of course!
In this episode of Security Unlocked, hosts Nic Fillingham and Natalia Godyla are brought back to school by Principal Security Researcher, Jonathan Bar Or who discusses vulnerabilities in NETGEAR Firmware. During the conversation Jonathan walks through how his team recognized the vulnerabilities and worked with NETGEAR to secure the issue, and helps us understand exactly how the attack worked using an ingenious metaphor.
In This Episode You Will Learn:
- How a side-channel attack works
- Why attackers are moving away from operating systems and towards network equipment
- Why routers are an easy access point for attacks
Some Questions We Ask:
- How do you distinguish an anomaly from an attack?
- What are the differences between a side-channel attack and an authentication bypass?
- What can regular users do to protect themselves from similar attacks?
Resources:
Related:
Listen to: Afternoon Cyber Tea with Ann Johnson
Listen to: Security Unlocked: CISO Series with Bret Arsenault
Discover and follow other Microsoft podcasts at microsoft.com/podcasts
Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.
Hosted on Acast. See acast.com/privacy for more information.
63 episodes
Manage episode 297980205 series 2808508
Ready for a riddle? What do 40 hypothetical high school students and our guest on this episode have in common? Why they can help you understand complex cyber-attack methodology, of course!
In this episode of Security Unlocked, hosts Nic Fillingham and Natalia Godyla are brought back to school by Principal Security Researcher, Jonathan Bar Or who discusses vulnerabilities in NETGEAR Firmware. During the conversation Jonathan walks through how his team recognized the vulnerabilities and worked with NETGEAR to secure the issue, and helps us understand exactly how the attack worked using an ingenious metaphor.
In This Episode You Will Learn:
- How a side-channel attack works
- Why attackers are moving away from operating systems and towards network equipment
- Why routers are an easy access point for attacks
Some Questions We Ask:
- How do you distinguish an anomaly from an attack?
- What are the differences between a side-channel attack and an authentication bypass?
- What can regular users do to protect themselves from similar attacks?
Resources:
Related:
Listen to: Afternoon Cyber Tea with Ann Johnson
Listen to: Security Unlocked: CISO Series with Bret Arsenault
Discover and follow other Microsoft podcasts at microsoft.com/podcasts
Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.
Hosted on Acast. See acast.com/privacy for more information.
63 episodes
All episodes
×Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.