Easy Prey

著者: Chris Parker
  • サマリー

  • Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss. Our goal is to educate and equip you, so you learn how to spot the warning signs of trouble, take quick action, and lower the risk of becoming a victim.
    続きを読む 一部表示

あらすじ・解説

Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss. Our goal is to educate and equip you, so you learn how to spot the warning signs of trouble, take quick action, and lower the risk of becoming a victim.
エピソード
  • Safe AI Implementation
    2025/04/23
    Red models associated with AI technologies highlight real-world vulnerabilities and the importance of proactive security measures. It is vital to educate users about how to explore the challenges and keep AI systems secure. Today’s guest is Dr. Aditya Sood. Dr. Sood is the VP of Security Engineering and AI Strategy at Aryaka and is a security practitioner, researcher, and consultant with more than 16 years of experience. He obtained his PhD in computer science from Michigan State University and has authored several papers for various magazines and journals. In this conversation, he will shed light on AI-driven threats, supply chain risks, and practical ways organizations can stay protected in an ever-changing environment. Get ready to learn how the latest innovations and evolving attack surfaces affect everyone from large companies to everyday users, and why a proactive mindset is key to staying ahead. Show Notes: [01:02] Dr. Sood has been working in the security industry for the last 17 years. He has a PhD from Michigan State University. Prior to Aryaka, he was a Senior Director of Threat Research and Security Strategy for the Office of the CTO at F5.[02:57] We discuss how security issues with AI are on the rise because of the recent popularity and increased use of AI.[04:18] The large amounts of data are convoluting how things are understood, the complexity is rising, and the threat model is changing.[05:14] We talk about the different AI attacks that are being encountered and how AI can be used to defend against these attacks.[06:00] Pre-trained models can contain vulnerabilities.[07:01] AI drift or model or concept drift is when data in the training sets is not updated. The data can be used in a different way. AI hallucinations also can create false output.[08:46] Dr. Sood explains several types of attacks that malicious actors are using.[10:07] Prompt injections are also a risk.[12:13] We learn about the injection mapping strategy.[13:54] We discuss the possibilities of using AI as a tool to bypass its own guardrails.[15:18] It's an arms race using AI to attack Ai and using AI to secure AI.[16:01] We discuss AI workload analysis. This helps to understand the way AI processes. This helps see the authorization boundary and the security controls that need to be enforced.[17:48] Being aware of the shadow AI running in the background.[19:38] Challenges around corporations having the right security people in place to understand and fight vulnerabilities.[20:55] There is risk with the data going to the cloud through the LLM interface.[21:47] Dr. Sood breaks down the concept of shadow AI.[23:50] There are also risks for consumers using AI.[29:39] The concept of Black Box AI models and bias being built into the particular AI.[33:45] The issue of the ground set of truth and how the models are trained.[37:09] It's a balancing act when thinking about the ground set of truth for data.[39:08] Dr. Sood shares an example from when he was researching for his book.[39:51] Using the push and pretend technique to trick AI into bypassing guardrails.[42:51] We talk about the dangers of using APIs that aren't secure.[43:58] The importance of understanding the entire AI ecosystem. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web PageFacebook Pagewhatismyipaddress.comEasy Prey on InstagramEasy Prey on TwitterEasy Prey on LinkedInEasy Prey on YouTubeEasy Prey on PinterestAditya K SoodAditya K Sood - LinkedInAditya K Sood - XAryaka COMBATING CYBERATTACKS TARGETING THE AI ECOSYSTEM: Assessing Threats, Risks, and Vulnerabilities Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks
    続きを読む 一部表示
    47 分
  • The Art of Espionage
    2025/04/16

    What makes someone betray their country? It’s rarely just about money. In this episode, you’ll hear from a retired CIA officer who spent 25 years recruiting foreign spies by tapping into something deeper than greed. Jim Lawler shares real stories from his career in human intelligence, where persuasion was built on empathy, trust, and understanding what truly drives people.

    From failed pitches to high-stakes successes, he explains the psychology behind espionage, how personal stress becomes a powerful leverage point, and why most people who commit treason believe they’ve been betrayed first.

    Whether you’re curious about spycraft or just want a better grasp of human behavior, this conversation pulls back the curtain on how people can be influenced to cross the line.

    Show Notes:
    • [00:50] Jim was a CIA operations officer. His job was to recruit foreign spies for the CIA.
    • [01:21] Most of his career was about battling weapons of mass destruction. His specialty was human intelligence and recruiting foreign spies was the backbone of that.
    • [02:32] He's now a speaker and a teacher. He's also written three spy novels.
    • [03:02] MICE Framework: Money, Ideology, Coercion, and Ego.
    • [05:11] Jim shares a story from one of his first recruitment pitches. He also found out that revenge is a driving force for espionage.
    • [11:58] Polygraph tests are stress detectors.
    • [15:16] Divorce is one of the most psychologically tumultuous times in a person's life. When recruiting, Jim would become their best friend because he never once recruited a happy person.
    • [16:07] He would study the crack system like a rock climber. He was a keen listener and very curious.
    • [17:33] Empathy and patience were everything when recruiting spies.
    • [20:21] Jim talks about the metaphysics, which is like a neural link where he would put out what he would envision as an invisible link to the brain of his recruits.
    • [22:11] If something is too good to be true it is.
    • [23:45] As a recruiter, he had to manipulate, exploit, and subvert people to get them to do what he wanted them to do.
    • [27:58] Jim believes in treating people the way he would like to be treated. He was sincere with his actions.
    • [28:35] He believes in using his powers of persuasion for good.
    • [32:43] Over 90% of the people he pitched became assets.
    • [33:48] Jim explains what a cold pitch is and the objective to get the second meeting.
    • [36:58] His novels are thinly based on operations he did. A lot of his stories are based on things that he has done or things that his colleagues have done.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources:
    • Podcast Web Page
    • Facebook Page
    • whatismyipaddress.com
    • Easy Prey on Instagram
    • Easy Prey on Twitter
    • Easy Prey on LinkedIn
    • Easy Prey on YouTube
    • Easy Prey on Pinterest
    • Jim Lawler - SPYEX
    • The Traitor's Tale (The Guild Series Book 3)
    • In the Twinkling of an Eye: A Novel of Biological Terror and Espionage (The Guild Series Book 2)
    • Living Lies: A Novel of the Iranian Nuclear Weapons Program (The Guild Series Book 1)
    • Soulcatcher: James Lawler Discusses The Motivations For Espionage
    続きを読む 一部表示
    43 分
  • Understanding Ransomware and Defense Strategies
    2025/04/09
    When it comes to cybersecurity, most people think about firewalls, passwords, and antivirus software. But what about the attackers themselves? Understanding how they operate is just as important as having the right defenses in place. That’s where Paul Reid comes in. As the Vice President of Adversary Research at AttackIQ, Paul and his team work to stay one step ahead of cybercriminals by thinking like them and identifying vulnerabilities before they can be exploited. In this episode, we dive into the world of cyber threats, ransomware, and the business of hacking. Paul shares insights from his 25+ years in cybersecurity, including his experience tracking nation-state attackers, analyzing ransomware-as-a-service, and why cybercrime has become such a highly organized industry. We also talk about what businesses and individuals can do to protect themselves, from understanding threat intelligence to why testing your backups might save you from disaster. Whether you're in cybersecurity or just trying to keep your data safe, this conversation is packed with insights you won’t want to miss. Show Notes: [00:58] Paul is the VP of Adversary Research at AttackIQ. [01:30] His team wants to help their customers be more secure.[01:52] Paul has been in cybersecurity for 25 years. He began working in Novell Networks and then moved to directory services with Novell and Microsoft, Active Directory, LDAP, and more. [02:32] He also helped design classification systems and then worked for a startup. He also ran a worldwide threat hunting team. Paul has an extensive background in networks and cybersecurity. [03:49] Paul was drawn to AttackIQ because they do breach attack simulation.[04:22] His original goal was actually to be a banker. Then he went back to his original passion, computer science.[06:05] We learn Paul's story of being a victim of ransomware or a scam. A company he was working for almost fell for a money transfer scam.[09:12] If something seems off, definitely question it.[10:17] Ransomware is an economically driven cybercrime. Attackers try to get in through social engineering, brute force attack, password spraying, or whatever means possible.[11:13] Once they get in, they find whatever is of value and encrypt it or do something else to extort money from you.[12:14] Ransomware as a service (RaaS) has brought ransomware to the masses.[13:49] We discuss some ethics in these criminal organizations. Honest thieves?[16:24] Threats look a lot more real when you see that they have your information.[17:12] Paul shares a phishing scam story with just enough information to make the potential victim click on it. [18:01] There was a takedown of LockBit in 2020, but they had a resurgence. It's a decentralized ransomware as a service model that allows affiliates to keep on earning, even if the main ones go down.[20:14] Many of the affiliates are smash and grab, the nation states are a little more patient. [21:11] Attackers are branching out into other areas and increasing their attack service, targeting Linux and macOS.[22:17] The resiliency of the ransomware as a service setup and how they've distributed the risk across multiple affiliates.[23:42] There's an ever growing attack service and things are getting bigger.[25:06] AttackIQ is able to run emulations in a production environment.[26:20] Having the ability to continuously test and find new areas really makes networks more cyber resilient.[29:55] We talk about whether to pay ransoms and how to navigate these situations. [31:05] The best solution is to do due diligence, updates, patches, and separate backups from the system. [35:19] Dealing with ransomware is a no win situation. Everyone is different. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web PageFacebook Pagewhatismyipaddress.comEasy Prey on InstagramEasy Prey on TwitterEasy Prey on LinkedInEasy Prey on YouTubeEasy Prey on PinterestPaul Reid - Vice President, Adversary Research AttackIQPaul Reid on LinkedInAttackIQ Academy Understanding Ransomware Threat Actors: LockBit
    続きを読む 一部表示
    41 分

Easy Preyに寄せられたリスナーの声

カスタマーレビュー:以下のタブを選択することで、他のサイトのレビューをご覧になれます。