WavePod Logo

wavePod

← Back to Cyber Security Headlines
Podcast cover

Week in Review: Senators’ CSRB bid, Deepfakes dodge detection, Microsoft-CrowdStrike collaboration

Cyber Security Headlines

Published: Fri Jun 06 2025

Link to This week’s Cyber Security Headlines - Week in Review is hosted by with guest , chief business security officer, Thanks to our show sponsor, Conveyor Let me guess, another security questionnaire just landed in your inbox. Which means all...

Summary

Cyber Security Headlines: Week in Review Summary

Hosted by CISO Series | Release Date: June 6, 2025


Introduction and Overview

In this episode of Cyber Security Headlines, host Rich and returning guest Rusty Waldron, Chief Business Security Officer at ADP, delve into the most pressing cybersecurity stories of the week. The discussion encompasses a range of topics from advanced deepfake evasion techniques to significant collaborations between major cybersecurity firms. Rusty brings his expertise to analyze each story, providing insightful perspectives on the evolving cybersecurity landscape.


1. Replay Attacks Bypass Deepfake Detection

Timestamp: [00:38] - [05:38]

Overview: The episode begins with a discussion on a groundbreaking paper from Resemble AI and European academic researchers. The study introduces a novel method termed a "replay attack" that successfully evades existing audio deepfake detectors. This technique involves generating synthetic speech, playing it through speakers in a real environment, and then rerecording it amidst genuine background noise. The process effectively removes key artifacts that detection models typically rely on, making synthetic audio harder to identify.

Notable Quotes:

  • Rusty Waldron remarks on the creativity in both threat actors and researchers, saying, “AI has had so much hype over the last several years... ultimately what are those governing controls? Because trust, right, becomes so important...” ([03:33])

Discussion Highlights:

  • Creativity of Threat Actors: Rusty emphasizes the relentless ingenuity of cyber adversaries and the importance of staying ahead through innovative defense mechanisms.

  • Future of AI in Cybersecurity: Reflecting on AI advancements, Rusty draws parallels to AI AIs communicating in their own language, pondering future implications for cybersecurity controls and trust.

  • Teachable Moment: Rusty advocates using such advancements as learning opportunities for security teams to better understand and counteract sophisticated attack vectors.


2. Fire Panel Security Flaws in OT Systems

Timestamp: [05:38] - [08:29]

Overview: The conversation shifts to an advisory issued by the Cybersecurity and Infrastructure Security Agency (CISA) regarding vulnerabilities in Consilium Safety's CS5000 fire panels. Two critical flaws are highlighted:

  1. Default Account Exploit: An old default account allows for device takeover unless manually changed via SSH, a step often neglected by users.
  2. Hard-Coded VNC Password: A predefined password on the VNC server poses a significant security risk.

Consilium Safety has acknowledged these flaws but recommends upgrading to newer product lines instead of issuing immediate mitigations.

Notable Quotes:

  • Rusty laments, “This is one of those going back to basics... I really feel like this is one of the reasons I love this I feel like... We're all going to really get back to probably over the next six to 18 months...” ([06:40])

Discussion Highlights:

  • IoT Security Hygiene: Rusty underscores the persistent challenge of securing IoT devices, emphasizing the need for fundamental security practices such as changing default credentials and enforcing robust access controls.

  • Industry Reflection: He reflects on the longstanding issues within IoT security, noting, “Really? We're still talking about IoT... but it's a thing, right?”

  • Long-Term Solutions: The dialogue points toward a return to basic security measures as a crucial step in mitigating vulnerabilities in operational technology (OT) systems.


3. Senators’ Bid to Reinstate the Cyber Review Board (CSRB)

Timestamp: [08:29] - [12:44]

Overview: Senators have requested the reinstatement of the Cyber Review Board (CSRB) to investigate the Salt Typhoon cyber compromise. The CSRB, comprised of 20 board members, was dismissed shortly after the previous administration took office. The senators argue that its removal hampers comprehensive understanding and accountability regarding the cyberattack's impact.

Notable Quotes:

  • Rusty states, “Cybersecurity is such a big, complex problem... it really does take the capability, the funding and even the prioritization of a government agency like the CSRB...” ([10:08])

Discussion Highlights:

  • Importance of CSRB: Rusty highlights the critical role that government bodies like the CSRB play in formulating strategies and understanding large-scale cyber threats.

  • Public-Private Partnerships: He emphasizes the value of collaboration between public agencies and private sector entities, citing his involvement with the National Cybersecurity Alliance as an example.

  • Leadership and Expertise: The conversation touches on the necessity for informed leadership in cybersecurity governance to navigate and mitigate complex threats effectively.


4. Microsoft and CrowdStrike Partner to Link Hacking Group Names

Timestamp: [12:44] - [20:20]

Overview: Microsoft and CrowdStrike have announced a collaborative effort to standardize the naming conventions for threat actors. This initiative aims to map and link various aliases used by different security analysts, thereby reducing confusion and enhancing the clarity in tracking cyber threats. Other industry leaders like Google Mandiant and Palo Alto Networks' Unit 42 are also participating in this consortium.

Notable Quotes:

  • Rusty expresses enthusiasm, “I think this is actually a good step forward... My two cents.” ([18:38])

Discussion Highlights:

  • Standardization Benefits: Rusty and Rich discuss the advantages of having a unified naming system, which would streamline communication and threat tracking across the industry.

  • Flexibility vs. Consistency: While acknowledging the challenge of adopting a single naming standard, Rusty appreciates the collaborative approach to link existing names, allowing for more effective threat actor identification.

  • Private Sector Involvement: Rusty advocates for greater participation from the private sector, noting that much of the attribution work currently resides within public agencies.

  • Future Implications: The partnership is seen as a proactive measure to adapt to the fluid nature of cyber threat landscapes, where threat actors frequently evolve and rebrand.


5. UK’s 2025 Strategic Defense Review: Cyber Warfare Integration

Timestamp: [20:20] - [24:01]

Overview: The United Kingdom has unveiled its 2025 Strategic Defense Review, marking a significant acknowledgment of cyber warfare as an integral component of military operations. The review outlines the establishment of a centralized cyber electromagnetic (EM) command to coordinate cyber, AI, and electromagnetic capabilities across all domains—land, sea, air, and digital. Additionally, it introduces the "Targeting Web," an AI-driven system designed for rapid, cross-domain decision-making and attack execution, drawing lessons from the ongoing conflict in Ukraine.

Notable Quotes:

  • Rusty comments, “I think this is just the natural evolution of where we are today... It is Skynet... we're all getting back into that space.” ([22:42])

Discussion Highlights:

  • Evolution of Warfare: Rusty views the integration of cyber capabilities into military strategy as a natural progression in modern warfare, reflecting the increasing reliance on non-traditional combat arenas.

  • Global Impact: The centralized cyber command underscores the global and pervasive nature of cyber threats, necessitating coordinated defense mechanisms.

  • AI and Cyber Warfare: The introduction of AI-driven systems like the Targeting Web illustrates the growing role of artificial intelligence in enhancing the speed and efficacy of cyber operations.

  • Security Implications: Rusty raises concerns about the accessibility of cyber warfare tools, noting that smaller nations or groups could leverage these technologies, potentially escalating conflicts.


6. Conclusion and Highlights

Timestamp: [24:01] - [26:12]

Overview: As the episode wraps up, Rusty shares his enthusiasm for the deepfake bypass study, likening the current AI-driven advancements in cybersecurity to the transformative dot-com era of the late 2000s. He expresses optimism about the future of AI in enhancing cybersecurity measures and looks forward to ongoing innovations in the field.

Notable Quotes:

  • Rusty passionately states, “I love it... these three or four years is gonna be about like the dot com era of the late 2000s.” ([24:58])

Discussion Highlights:

  • Embracing Change: Rusty encourages embracing AI advancements as pivotal moments that will shape the future of cybersecurity.

  • Continuous Learning: The emphasis is on leveraging current developments to build more resilient and adaptive security frameworks.

  • Community Engagement: The episode concludes with Rusty inviting listeners to connect on LinkedIn and participate in upcoming cybersecurity events, fostering a community of informed and proactive security professionals.


Final Thoughts

This week's episode of Cyber Security Headlines offers a comprehensive overview of critical developments in the cybersecurity realm. From innovative attack evasion techniques to strategic defense initiatives and industry collaborations, Rusty Waldron provides valuable insights into the challenges and advancements shaping the future of information security. Whether addressing foundational security practices or the integration of AI in defense strategies, the episode underscores the dynamic and interconnected nature of today's cybersecurity landscape.

For more detailed discussions and daily cybersecurity updates, visit CISOseries.com.

No transcript available.