Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
Phillip Wylie Show - Be Fearless Online: In Browser Malicious File Detection Part 2

Be Fearless Online: In Browser Malicious File Detection Part 2

02/13/24 • 34 min

Phillip Wylie Show

About the Guest:

Dakshitaa Babu is a Software Engineer at SquareX, where she is engaged in data engineering and analytics.

She is also the pen behind the engineering blogs written on SquareX's infrastructure and security research. After completing her Bachelor's degree at the National University of Singapore, Dakshitaa joined SquareX, marking her foray into the cybersecurity industry. While new to the field, her enthusiasm for discovering and understanding new concepts has quickly established her as a committed contributor to the evolving sector. Her interests are in Browser Security and consumer education.

Episode Summary:

In this captivating episode of The Phillip Wylie Show, cybersecurity enthusiasts witnessed a deep dive into the cutting-edge realm of in-browser malicious file detection with Dakshitaa Babu. Dakshitaa, showcasing her prowess in the industry, illustrates sophisticated features of her company's flagship cybersecurity product designed to enhance online safety.

Dakshitaa demonstrates the product's ability to detect malicious macros within files, emphasizing the significance of privacy in their detection methods which occur directly within the browser environment. Focusing primarily on Gmail due to its widespread use, she articulates how the product can reveal hidden dangers within office documents and macros. The episode highlights not only the detection of conventional threats but also uncovers tactics like file renaming, VBA purging, and old file format analysis to pinpoint potentially harmful activity.

The conversation shifts towards the efficiency and privacy advantages of in-browser detection. Dakshitaa explains how this approach offers immediate and private threat recognition compared to traditional methods. She confidently positions her company's product as a vital layer of defense, complementing existing antivirus solutions and empowering users with immediate insights into file safety before downloads occur.

Key Takeaways:

In-browser malicious file detection technology offers advanced privacy and fast analysis by scanning files directly within the email client.

Dakshitaa demoed the tech's proficiency in detecting renamed files, large file components, and outdated file formats—all indicative of potential malware.

The product integrates seamlessly with Gmail, providing users with immediate warnings and detailed insights into file contents without downloads.

Unique detection methods allow for identifying suspicious activities such as VBA purging, which can bypass some antivirus solutions.

The browser extension is free and compatible with all chromium-based browsers, encouraging user adoption for an added layer of cybersecurity.

Notable Quotes:

"We are going deeper than what surface level checks do in Gmail, for instance." -Dakshitaa Babu

"We have no idea why you're still using it in 2024." -Dakshitaa Babu

"We are trying to create a product that has never been there before that is truly important for every user." -Dakshitaa Babu

"We can't always take our own sweet time to scan through every single file thoroughly before letting the user use it." -Dakshitaa Babu

"We want to make sure that before you give the file a chance to even penetrate to your local device or to your network... we want to be there first and give you a first line of defense." -Dakshitaa Babu

Resources:

Get your free Chrome plugin: ⁠⁠⁠http://sqrx.io/pw_x⁠⁠⁠

⁠⁠⁠https://www.linkedin.com/company/getsquarex/⁠⁠⁠

⁠⁠⁠https://twitter.com/getsquarex⁠⁠⁠

⁠⁠⁠https://www.instagram.com/getsquarex/

plus icon
bookmark

About the Guest:

Dakshitaa Babu is a Software Engineer at SquareX, where she is engaged in data engineering and analytics.

She is also the pen behind the engineering blogs written on SquareX's infrastructure and security research. After completing her Bachelor's degree at the National University of Singapore, Dakshitaa joined SquareX, marking her foray into the cybersecurity industry. While new to the field, her enthusiasm for discovering and understanding new concepts has quickly established her as a committed contributor to the evolving sector. Her interests are in Browser Security and consumer education.

Episode Summary:

In this captivating episode of The Phillip Wylie Show, cybersecurity enthusiasts witnessed a deep dive into the cutting-edge realm of in-browser malicious file detection with Dakshitaa Babu. Dakshitaa, showcasing her prowess in the industry, illustrates sophisticated features of her company's flagship cybersecurity product designed to enhance online safety.

Dakshitaa demonstrates the product's ability to detect malicious macros within files, emphasizing the significance of privacy in their detection methods which occur directly within the browser environment. Focusing primarily on Gmail due to its widespread use, she articulates how the product can reveal hidden dangers within office documents and macros. The episode highlights not only the detection of conventional threats but also uncovers tactics like file renaming, VBA purging, and old file format analysis to pinpoint potentially harmful activity.

The conversation shifts towards the efficiency and privacy advantages of in-browser detection. Dakshitaa explains how this approach offers immediate and private threat recognition compared to traditional methods. She confidently positions her company's product as a vital layer of defense, complementing existing antivirus solutions and empowering users with immediate insights into file safety before downloads occur.

Key Takeaways:

In-browser malicious file detection technology offers advanced privacy and fast analysis by scanning files directly within the email client.

Dakshitaa demoed the tech's proficiency in detecting renamed files, large file components, and outdated file formats—all indicative of potential malware.

The product integrates seamlessly with Gmail, providing users with immediate warnings and detailed insights into file contents without downloads.

Unique detection methods allow for identifying suspicious activities such as VBA purging, which can bypass some antivirus solutions.

The browser extension is free and compatible with all chromium-based browsers, encouraging user adoption for an added layer of cybersecurity.

Notable Quotes:

"We are going deeper than what surface level checks do in Gmail, for instance." -Dakshitaa Babu

"We have no idea why you're still using it in 2024." -Dakshitaa Babu

"We are trying to create a product that has never been there before that is truly important for every user." -Dakshitaa Babu

"We can't always take our own sweet time to scan through every single file thoroughly before letting the user use it." -Dakshitaa Babu

"We want to make sure that before you give the file a chance to even penetrate to your local device or to your network... we want to be there first and give you a first line of defense." -Dakshitaa Babu

Resources:

Get your free Chrome plugin: ⁠⁠⁠http://sqrx.io/pw_x⁠⁠⁠

⁠⁠⁠https://www.linkedin.com/company/getsquarex/⁠⁠⁠

⁠⁠⁠https://twitter.com/getsquarex⁠⁠⁠

⁠⁠⁠https://www.instagram.com/getsquarex/

Previous Episode

undefined - Michael Jenks: Lessons from a Former DoD Professional

Michael Jenks: Lessons from a Former DoD Professional

About the Guest:

Michael Jenks, commonly referred to as "Jenks," is an esteemed figure with an extensive background in the Department of Defense (DoD). With a penchant for cybersecurity and a wealth of experience in cyber warfare, Jenks offers a valuable skill set that has been honed in high-stakes environments where precision and accuracy are paramount. Having started his journey in computer science, he quickly developed a fascination with digital code and its impact. Transitioning from dial-up ISPs to L-3 Communications, where he gained clearance for classified work, Jenks eventually founded his own defense contracting company specializing in offensive and defensive cyber operations.

Episode Summary:

In this riveting episode of the Phillip Wylie Show, host Phillip examines the intersection of cybersecurity and defense backgrounds through his conversation with Michael Jenks from Interpris. The dynamic dialogue delves into how professionals from critical sectors, such as the Department of Defense, bring innovative solutions and meaningful perspectives to the cybersecurity industry.

Jenks shares his 'origin story,' which follows a trajectory starting from gaming and IRC administration, leading to a computer science degree and an impressive tenure at various defense-related roles. His story highlights a critical insight: that the best cybersecurity defenses are often forged in the crucible of real-world operations where the cost of failure is immense.

Central to the conversation, Jenks unravels the methodology behind Interpris—a platform designed to contextualize and elevate existing cybersecurity tools through continuous threat exposure management. Leveraging a thorough understanding of threat profiles, Interpris aims to help organizations prioritize potential risks based on industry, operations, and data sensitivity. The platform's philosophy is clear—fortify defenses by optimizing tools that organizations already possess, using informed strategies and continuous monitoring to proactively counter advanced cyber threats.

Key Takeaways:

Cyber professionals with DoD experience bring invaluable expertise to cybersecurity solutions.

Interpris focuses on improving an organization's security posture by providing context and strengthening existing tools.

Assume breach approach and implementing best practices are essential for a robust security posture.

Insider threats are as significant as external threat actors, making holistic security measures necessary.

The emergence of AI in both offensive and defensive cybersecurity tools is rapidly changing the landscape.

Notable Quotes:

"I mean, man, if you have it, background, a clearance, man, there are just a ton of jobs." -Michael Jenks

"From just the digital realm. Gamer growing up. Cut my teeth on hacking back in the day." -Michael Jenks

"You already have enough tools, right. It's really just that optimized configuration, that prioritization, that customization." -Michael Jenks

"It's my job to defend this environment. I have no idea where we're protected, where we're not." -Michael Jenks

"What we're doing is weaving together all of these products, from EDR, from network sensing, to firewall, to your ESM." Michael Jenks

Resources:

https://www.linkedin.com/in/michaeljenks/

https://www.linkedin.com/company/interpres-security/

https://twitter.com/InterpresSec

https://interpressecurity.com/

Next Episode

undefined - Andy Liverman Anderson: Scaling Cybersecurity Functions with AI

Andy Liverman Anderson: Scaling Cybersecurity Functions with AI

About the Guest:

Andy Liverman Anderson is a seasoned professional with a diverse background spanning real estate, Wall Street, and cybersecurity. With nearly a decade dedicated to the field of cybersecurity, Andy brings a wealth of experience and knowledge to the industry. As a history major, he leverages his unique perspective to analyze the intricacies of cybersecurity's geopolitical landscape. Notably, Andy has been pivotal in the development of moving target defense strategies and has pioneered the use of machine learning to estimate cyber risk in the insurance domain. Currently, he serves as a VP of Sales at Uno AI, a company at the forefront of incorporating AI into cybersecurity efforts.

Episode Summary:

This episode of The Phillip Wylie Show delves into the rapidly evolving landscape of cybersecurity, focusing on the integration of automation and AI technologies. Host Phillip Wylie is joined by Andy Liverman Anderson from Uno AI to explore the ways these advancements are transforming the industry. Fascinated by the seismic shift caused by AI tools like Chat GPT, they discuss the implications for cybersecurity professionals, who like superheroes, each have their own origin story.

The conversation begins by highlighting the role of automation in cybersecurity, referencing Jeff Foley's mass reconnaissance script, and moves on to unpack Andy's journey from real estate and Wall Street into the complex world of cybersecurity. The second summary paragraph touches on the significant role AI plays in vulnerability management, acting as a force multiplier for security practitioners, and the potential for Uno AI's copilots to scale and enhance the capabilities of cybersecurity teams. As the episode unfolds, it becomes clear that the integration of AI into cybersecurity is not just a possibility, it's a reality unfolding before us.

Key Takeaways:

Automation and AI are revolutionizing cybersecurity, taking over repetitive and tedious tasks to free up professionals for more complex work.

Andy Liverman Anderson's history in both traditional tech and cybersecurity provides a unique perspective on the use of AI in cybersecurity.

Cyber insurance and understanding post-attack scenarios are critical components in managing cyber risk effectively.

Uno AI's cyber AI copilot assists security professionals by streamlining the process of vulnerability management and producing actionable insights.

As AI democratizes technology, it may lower barriers to entry in cybersecurity and generate better, more creative jobs.

Notable Quotes:

"It's the land of broken toys. You get to look at all these different things."

"Every organization should have cyber insurance. I'm not selling insurance anymore, but I think you're crazy as an organization, even a very small business, it's surprisingly inexpensive."

"What AI is going to do because the very narrow skills that you had are no longer so scarce."

"A bot never gets tired, is always happy to answer them, and as long as they're providing accurate answers."

"When you've seen sort of a democratization of core technologies, that's just the explosive impact it's had across the world."

Resources:

https://www.linkedin.com/in/andyandersoncyber/

https://www.linkedin.com/company/unoai/

https://uno.ai/

Episode Comments

Generate a badge

Get a badge for your website that links back to this episode

Select type & size
Open dropdown icon
share badge image

<a href="https://goodpods.com/podcasts/phillip-wylie-show-259013/be-fearless-online-in-browser-malicious-file-detection-part-2-44852416"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to be fearless online: in browser malicious file detection part 2 on goodpods" style="width: 225px" /> </a>

Copy