Transcript
A (0:02)
You're listening to the Cyberwire Network, powered by N2K.
B (0:10)
One of the malware that we identified in our report that we have mentioned. This guy is actually running on the machine. It's collecting all the information of the machine and then sending it to the LLM saying that, hey, you know, I'm running in this environment now give me the code to actually bypass all these things or, you know, do that stuff. Now this thing is dynamically being coming from the LLM or this code is being dynamically generated. It's coming. It's not part of the actual binary. So the actual footprint the attacker has to use in this case is very, very small. You just put a very small binary on that that has plain English inside it, and then it will connect to the LLM and do the rest of the job. So it will definitely increase some complications. But, but I do feel that then we will have the same technology, so we will be able to operate at the same machine speed and then counter.
A (1:05)
Hello, and welcome to another episode of Data Security Decoded. I'm your host, Caleb Tolan, and if this is your first time joining us, welcome to the show. Make sure you hit that subscribe button so you're notified when new episodes go live. And if you're already a subscriber, thanks for coming back. We encourage you to, as Dr. Seuss would say, rate the show and leave a comment below. Love that rhyme, but in all seriousness, this really helps us reach more listeners like you who are eager to learn more about reducing risk across their business. Now, today I'm joined by Amit Malik, a cyber researcher from Rubrik zero Labs. His team released a report about chameleon malware that hides in the OS and ghost penguins stealing your data via protocols. You aren't even watching Rubrik Zero Labs use LLMs to catch these ghosts. But here's the real question. In a world of AI driven attacks, is your data resilient or are you just building a faster getaway car for the bad guys? Let's get you your answers. Amit, welcome to the podcast. It's so great to have you on Data Security Decoded. I'm really excited for this conversation. But before we dive into the meat of it all, I have to ask you something that I ask every guest, and that is, what is something that is not related to cyber that you're obsessed with? Lately, for me, it's been Pokemon cards. When I was a kid, I did a little bit of collecting of that, and recently a friend got me back into the world of trading Card games and specifically Pokemon. And I've started my own little collection and it's really cool to see how the art has evolved over the years and see the culture that's built up around, around this trading card game. And it's been really cool to be a part of. So what is something that is non cyber related that you're obsessed with?
B (2:35)
