Transcript
A (0:00)
Foreign. And welcome to this soapbox edition of the Risky Business podcast. My name's Patrick Gray. For those of you who don't know everyone you hear in a soapbox edition of this show, paid to be here. It's a sponsored product but we get to have some really great conversations and that's what we're going to do today. So today's soapbox is brought to you by Gray Noise. And if you don't know, Gray Noise operates a global scale network of honeypots which enables them to see who, who's doing mass scanning and mass exploitation on the Internet to detect that sort of stuff very quickly and turn it into all sorts of extremely valuable threat intelligence. So the way most people use it is they can look up an IP to see if bad stuff has originated from it. So it's a good way for you to avoid toxic IPs. They can also do stuff like capture people's attacks and reverse eng using AI reverse engine. Someone's probes into oday like this is something that they've done before but normally it's a, it's an intelligence about IP kind of product. But you know, going with that theme of them discovering all sorts of really interesting stuff, the founder of gray noise, Mr. Andrew Morris joined me for this interview where we really started off talking about how they are getting a three months heads up these days when really damaging O day is about to drop. So it's a bit of a windy road in this conversation for him, for, for me when I did it and probably for you as the listener to understand exactly how that's happening. But basically there are all these towels that Gray Noise can pick up on where they can say there is going to be a Cisco ASA like bug dropped in three months that's really, really damaging. People should, should prepare for that. So yeah, really interesting conversation that I recorded from a hotel room while I was in Melbourne with Mr. Andrew Morris, the founder of Gray Noise. And we also talk a lot about IPv6 versus V4 and some of the challenges. They're just all in all a great con and interview. Please enjoy it. I will drop you in here where Andrew is talking about Gray Noises ability to sort of pre cog know that some serious vulnerability is coming. Here he is. Enjoy.
B (2:18)
So Bob Rudis, he's our chief scientist, he's you know, he's doing some research for to back up some marketing claims that we're making maybe a year or two ago, right. And some marketing claims are making hey, we're going to see early warning Signals and blah, blah, blah. And so it's like, hey, Bob, can you dig into this and really find maybe an example or two of us spotting something before it happens? Right. Bob digs into the data and he does a lot of kind of regression searches and tests against looking at spikes that happen against of probe, scan, crawl activity, basically inventory activity for specific sensors that are running specific software, and then looks to see if any noteworthy vulnerabilities come out within a certain period of time of that. And like, we knew in our hearts that it was likely that that was linked or that these two things were together stated differently. All of a sudden, everybody and their grandma wants to know about, I don't know, you name it. Fortinets, asus, routers, who cares? And then, you know, three months later, like clockwork, we hear about a really big, bad, scary zero day that's been disclosed, and that's when it becomes public. So we knew this in our hearts because we've been doing this for a handful of years. The behavior of it makes sense. But when we actually, like, dug into it, we wrote a research paper about this, the results of it are, like, kind of eerie how often it happens consistently.
