Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
CovertSwarm - The Podcast - Episode 32 - Inside the Breach: The Vulnerabilities Within Your Perimeter

Episode 32 - Inside the Breach: The Vulnerabilities Within Your Perimeter

11/19/24 • 40 min

CovertSwarm - The Podcast

In this episode hosted by Hacker Valley, Ron Eddings sits down with CovertSwarm's US team members Dahvid Schloss, Hive Leader, and Ilan Fehler, US Sales Lead, to uncover the hidden vulnerabilities most organizations overlook.

While many focus on fortifying their outermost defenses, Dahvid and Ilan reveal why testing the entire brand is crucial to identifying vulnerabilities in the inner layers and building cyber-maturity within your organization. They'll dive into how adversaries exploit social, physical, and digital vectors to gain access and how CovertSwarm's approach emulates real-world cyber threats acting as real APTs against our clients.

Hosted by Hacker Valley.

Thanks for listening!
Visit our website www.covertswarm.com, or follow us on LinkedIn.

plus icon
bookmark

In this episode hosted by Hacker Valley, Ron Eddings sits down with CovertSwarm's US team members Dahvid Schloss, Hive Leader, and Ilan Fehler, US Sales Lead, to uncover the hidden vulnerabilities most organizations overlook.

While many focus on fortifying their outermost defenses, Dahvid and Ilan reveal why testing the entire brand is crucial to identifying vulnerabilities in the inner layers and building cyber-maturity within your organization. They'll dive into how adversaries exploit social, physical, and digital vectors to gain access and how CovertSwarm's approach emulates real-world cyber threats acting as real APTs against our clients.

Hosted by Hacker Valley.

Thanks for listening!
Visit our website www.covertswarm.com, or follow us on LinkedIn.

Previous Episode

undefined - Episode 31 - Insights From A Former State-Sponsored Hacker

Episode 31 - Insights From A Former State-Sponsored Hacker

In this episode, explore the most significant cyber threats impacting businesses today. From emerging risks to the persistent attack vectors that continue to catch companies off-guard, we’ll cover it all in a dynamic and insightful discussion.

Join our host, Will Morrish, as he chats with Dahvid Schloss, Swarm Leader and former State-Sponsored Hacker, to unpack these critical topics and provide actionable insights on navigating the evolving cybersecurity landscape.

Thanks for listening!
Visit our website www.covertswarm.com, or follow us on LinkedIn.

Next Episode

undefined - Episode 33 - The AI Impersonation with Ron Eddings

Episode 33 - The AI Impersonation with Ron Eddings

In this second episode hosted by Hacker Valley, Ron Eddings sits down with CovertSwarm’s Academy Hive Leader, Iain Jackson, for an eye-opening, innovative, and unsettling episode.

This time, Ron’s voice is cloned live on air. Using cutting-edge AI impersonation tools, Iain demonstrates how attackers can weaponize synthetic voices to breach organizational defenses, this time by cloning our host's voice. They’ll dissect the mechanics behind this tactic and reveal why phishing got much more personal.

While many still fixate on stopping email-based scams, Iain will expose the vulnerabilities in voice-based verification systems. From bypassing phone-based security protocols to exploiting human trust in familiarity, this conversation is a wake-up call.

They’ll also explore the role of a psychological phenomenon named the uncanny valley, where slight imperfections in synthetic voices or behaviors can trigger a gut feeling that something isn’t right. Trusting this instinct could be the key to spotting and stopping scammers before they succeed.

Tune in to discover how CovertSwarm’s relentless testing methodology mirrors techniques used by your worst cyber nightmares and why it’s essential to pressure-test every layer of your defenses against threats that blur the line between the digital and the social.

Hosted by Hacker Valley.

Thanks for listening!
Visit our website www.covertswarm.com, or follow us on LinkedIn.

Episode Comments

Generate a badge

Get a badge for your website that links back to this episode

Select type & size
Open dropdown icon
share badge image

<a href="https://goodpods.com/podcasts/covertswarm-the-podcast-483111/episode-32-inside-the-breach-the-vulnerabilities-within-your-perimeter-78571127"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to episode 32 - inside the breach: the vulnerabilities within your perimeter on goodpods" style="width: 225px" /> </a>

Copy