
A man hacks his employer to prove its security sucks, Telegram provides a helping hand to the Eternity Project malware, and what the heck do mental health apps think they’re up to?
All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Dr Jessica Barker.
Plus don’t miss our featured interview with Rumble’s Chris Kirsch.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Hello, hello, and welcome to Smashing Security episode 275. My name's Graham Cluley.
Went horse riding in the Abu Dhabi desert, and that inspired me to come home and start horse riding lessons, which I haven't had for decades. But it's great fun.
Now, coming up on today's show, Graham, what do you got?
Did you warn something dreadful was going to happen, then discover to your horror that you'd been thrown into a Chinese jail for seven years? Had that ever happened to you?
I have to ask myself all the time, what might have happened yesterday that I've had wiped? In a sort of Men in Black scenario from my brain.
And he discovered what he believed were some problems with the security, the computer security at his company.
And he wanted to bring them to the attention of senior members of the firm.
Will you stop distracting us from what we really want to focus on with all your, 'Oh, there's a security problem.'"
Not that that's ever happened at any companies we've ever worked at, Carole. Something which we've warned about, and maybe people aren't that interested in dealing with.
And you think, well, I'm gonna go to the very top. I'm gonna usurp my boss. I'm gonna waltz around him. I'm gonna go straight to the chiefs. I'm gonna explain the problem to them.
They're gonna reward me with riches. They're gonna be so grateful that I've brought this to their attention.
And maybe my boss will get the boot 'cause he isn't taking this problem seriously. But you feel strongly about it.
And then I would print with the metadata of the email that I sent and keep a copy of said email just in case they erased the whole server or my emails from the server saying, "And no, you never did tell us." And then in case they break into your home and burn your printed copy, you have it tattooed on your left buttock.
Well, we've talked about tattooing stuff.
You can imagine the scene, the flip charts, the PowerPoint slides, the rolled-up sleeves, the expectance of backslaps, congratulations, the opening of champagne, instant pay rises all round.
We're going to fix the problem. 'You are a hero. You saved the company.' That's what they're imagining.
Even half that is just, "Thanks, we'll look into it," is the best one should be able to hope for, or in my experience anyway.
Maybe they had been lax in the security. They had maybe introduced problems or not dealt with issues. And here was this whistleblower kicking up a stink, making them look bad.
And of course, the boss as well, he's been sort of undermined by Han Bing going to the big bosses.
Something happened to him which was even worse than death. He had his office relocated.
He thought, no one likes me at this company anymore, I'm undervalued.
Often late and early, and there was absenteeism. So he wasn't quite as enthusiastic as he used to be.
In fact, they didn't just delete the data, they wiped it. They overwrote it multiple times with garbage to try to prevent the data from being recovered.
And it cost them tens of thousands of dollars to restore the data and get things back up and running again. But they think there were much more costs than that.
And so the company initiated an investigation and they thought, well, who could possibly have accessed this root account and used these admin privileges to access this database?
And they were, of course, Han Bing, Gary Google, Peter Pornhub, Arthur Alta Vista, and Dudley Dogpile.
And four of them said, sure, no problem. Go ahead. Forensically examine as much as you like. The Han Bing. He went, oh, whoa, whoa, whoa. What? No, hang on.
He said, I've got some private data on my laptop, and if anyone wants my password, it has to be the police. I'm not going to help you.
You know, I can enter my password myself, and I'll be present while you're doing any checks, but I'm not going to hand this over.
Well, it turns out the company's investigators, they already knew they weren't actually interested in anything on the laptops.
They say that it was quite likely that whoever had made the unauthorized access wouldn't actually have left any traces or any breadcrumbs on their own PCs.
They only wanted to see how each suspect would react. And 4 of them had no problems, and the 5th was like, "Whoa, whoa, whoa.
Why would you want to do that?" So Peter Pornhub, he got away with it. Yeah. So the investigators meanwhile had cross-referenced server logs, MAC addresses, IP addresses.
They looked at CCTV footage, times when things were accessed.
And on one of the server logs they had, a computer with that name had connected to their server.
It's finally gone to court, and he has been sentenced to 7 years in prison and told to pay compensation of $30,000, or the equivalent of, to his former employer as well.
All because he wanted security fixed. And for some reason, and what is this reason?
Some reason he chose to sort of, well, I'll show them, I'll prove that it's a big problem, and did this to try and get their attention.
But also, if he felt, as you said, Carole, if he felt disgruntled, if he felt pushed to one side and he'd been ignored.
And maybe there was other stuff, you know, maybe there was a pattern of these. And so he just thought he'd stick it to them, I guess.
And he obviously thought he was cleverer than all of them and he'd get away with it.
So just to make sure they don't get disgruntled so this doesn't happen to you. Enjoy.
So as long as you follow all of the—
But they include findings that this malware as a service is also being sold via Telegram.
This particular family of malware, the Eternity Project, includes stealers, miners, ransomware, and DDoS bots.
And this Telegram channel that the researchers at Cyble have found apparently has about 500 subscribers. So not a huge amount, but substantial enough.
And interestingly, it employs a bot that allows the purchaser to compile the code themselves.
So they can take it off the shelf, they can just buy the malware as is, or they can have the support of this Telegram bot that enables them to customize it too.
So we've got script kiddies who are getting a little bit of support to customize their malware to be just exactly how they want it.
And then you would go through Tor to a special website and buy certain bits and bobs and create your malware, that type of thing? Or is it all free? Or—
As I understand it.
And that's the worry, of course, is that these sort of services give the tools to absolutely anyone with a criminal bent, so that they can begin to exploit it and make potentially a large amount of money.
They seem to have this kind of statement, as you say, that, you know, hey, this is just happening on Telegram, but we're not responsible for it.
So there's a lot of this going on on Telegram, and some of these groups have thousands and thousands of people participating on them, sharing information, including sometimes journalists.
You know, there's journalists who are subscribed to Telegram channels where they find out what the latest ransomware attacks are going to be.
Not just this, selling malware, but being used for cryptocurrency scams, job recruitment scams that I think we've spoken about before on Smashing Security, sharing of nudes, you know, unauthorised, without people's permission.
And BlackBerry recently released a report about remote access Trojan being sold really, really cheaply, $20.
And that was also using a Telegram channel, kind of a support with nearly 3,000 subscribers. So this seems to be growing more and more as a problem.
So you can imagine a lot of people out there might be tempted to use a remote access Trojan to snoop on a, you know, maybe a potential partner or an ex-partner.
All kinds of ghastliness there, isn't it? This, this malware you're talking about, though, the Eternity Project malware, it's a bit of a stupid name, isn't it? Eternity Project.
But it's just, I just think sometimes they're a little bit full of themselves and maybe they need a little bit more sense of humour. It just sounds pretentious.
There's inflation, divisive politics, misinformation, you know, poisoned earth, Will Smith losing his cool, Depp versus Heard. I mean, all these dramas.
Okay.
All these dramas, all these dramas have no doubt played a very significant part in making us feel either depressed or lonely or anxious or annoyed or frustrated.
All the things that maybe a therapist could help us unpack.
And the irony was that therapists weren't allowed to see their patients because remember lockdown? So online video, text, and phone sessions slowly normalized.
And those of us that didn't have a therapist pre-pandemic found ourselves suddenly in need. We were all out of luck, right? Therapists were booked solid, taking no new patients.
You can't find a therapist, you've gone through the phone book, you know, you've looked around neighborhood, everyone's saying, sorry, totally booked. What do you do?
Are you talking about an AI therapist?
So these online app services, for example. Is there any name actually that comes up when you think about it?
I'm a big pod listener, so there's two that come up in my head immediately of these kinds of online services that have been touted recently.
So you go to Talkspace website and it says, feeling better starts 'With a single message.' That's their strapline at the moment on their homepage.
And they say, 'Look, we need to do a brief assessment.' So basically answer a few questions about your preferences, pick a provider, we'll give you a selected, we'll give you a list of recommendations.
You go ahead and pick which one sounds good for you and just start your therapy and begin the journey towards a happier you.
So Talkspace and BetterHelp are both known to have done a very huge advertising campaign during the pandemic because people, there was basically a mental health crisis.
And they can step in and be helpful.
So BetterHelp have the, on their homepage, it's you deserve to be happy, and answer a few questions to find a therapist who fits your needs and preferences. So same idea.
But they then make a big deal about tapping into the largest network of licensed professional board-certified providers.
It's a private thing. If I go to a therapist with an uncontrollable embarrassing tic, for example, I don't want people around me to know about it.
Graham, for example, would just mock me every time he sees me.
This is a site devoted to assessing products, services that are online connected, and they give them a privacy rating.
Sometimes that's a good privacy rating, and sometimes it's a poo-poo rating.
And just last week they released their findings on a slew of mental health apps. And it's not scary at all if you don't care a jot about privacy.
Okay, so I'm gonna— so you know how I said I knew about Talkspace and BetterHelp? So I had those already listed before I went and read all the stuff that they'd done.
And both of them are listed as two of the six worst offenders on Mozilla's list.
So I'm going to list out, this is Carole's Cliff Notes, if you want, of Mozilla's Privacy Not Included's Cliff Notes on Talkspace.
And you can obviously, all the links are in the show notes, so you can go read to your heart's content.
But Talkspace says they collect a lot of personal information on users, including name, email address, phone number, gender, relationship status, employer, geolocation information, transcripts, and more.
And they say they can use this personal information for marketing, tailored advertising, and research purposes.
Now, there are no promises in the small print not to sell non-medical information. So they are HIPAA compliant, they say, right?
So they're not gonna sell the medical stuff, but the non-medical stuff, unless you live in California or in the European or UK regions, you have GDPR protecting you, your information may be used.
So you're not only paying then for the therapy, they're also going to take your data, or at least they have the option of taking your data and selling it to someone else for money as well.
Because your subscription isn't enough for them.
Consent, right? And how many people just click without looking?
They've turned to this solution, and maybe they're not in the right frame of mind to be.
Oh great, that'll be $400, please.
So they're basically saying that idea that you and your therapist are all alone, no one's listening, may not be all it is.
And then Talkspace say in their privacy policy, if you do want us to share your personal data or feel uncomfortable with the way we use your information in order to deliver our services, please do not use our services.
And Mozilla's Privacy Not Included say we think that's pretty good advice.
Seriously, I'm going to recommend that all listeners and you too bookmark that page because you sometimes think, oh, we need to buy a new something smart for the home, you can just go look and see if they've already reviewed it.
And if not, you can actually give it to them and recommend that they go review it for you. So it's a very cool site. So again, link in the show notes. Do check it out, guys.
It's really good. BetterHelp wasn't much better. They say they collect, use, and store communications between users and counselors on their platform.
They also collect a whole lot of personal information from responses on their intake questionnaire, things like are you feeling depressed or anxious, or are you struggling to maintain relationships, to things like name, age, email address, and phone number.
And Mozilla say as well that they can use this data they collect on you for personalization, product offerings relevant to your individual interests, and targeted ads.
So if you had an embarrassing problem, say you were a shoe fetishist or a foot fetishist, right, what would your ads be like?
Maybe you're thinking, well, it's just hard to get hold of new material.
Wow. It's right—
No, you're not feeling good, you may be feeling a bit paranoid, you're in this session, you're talking about your deepest hurts and sensitivities, and then you see words that you have used being—
And where, what is it? It's a horrendous thing, isn't it?
But when they start charging you and they're also mining you for information or exploiting it in some fashion, then that really feels quite underhand because how are you going to spot that unless you read the terms and conditions and all the privacy policies, which we know—
They track, share, and capitalize on users' most intimate personal thoughts, feelings like moods, mental state, biometric data.
Turns out researching mental health apps is not good for your mental health, as it reveals how negligent and craven these companies can be with our most intimate personal information, unquote.
That's scathing, right?
And yeah, it's— you sort of think as well, I'm obviously naive, but you would think, okay, it's a company making a mental health app.
They're making all these statements about how they want people to be happier and healthier.
So to then know that behind the scenes they made that decision to actually at least open the door on misusing data in that way just feels so sad, doesn't it?
And what's really gross about it is they— I have seen many ads from these two particular companies talk about how much cheaper it is to use these services rather than going to a therapist in their office or having a one-on-one with a therapist that you find on your own.
And the other problem is Silicon Valley investors are pouring hundreds of millions of dollars into these apps.
Insurance companies get to collect extra data on the people they insure. Data brokers are enriching their databases with even more sensitive data.
For your security program to be effective, you need an inventory of all your devices so you can make critical decisions fast.
Well, Rumble was made by the creator of Metasploit, which explains why it finds many devices that other solutions miss, including orphaned machines running outdated operating systems.
Quickly find systems affected by the latest security news. Just think of Log4j, SolarWinds, and Kaspersky.
It can even tell you which machines are missing endpoint protection from your local network all the way to the cloud.
Sign up for a free trial and build your asset inventory in minutes. Get your trial at rumble.run. That's rumble.run. And thanks to Rumble for supporting the show.
This rapid shift in online work created security gaps that bad actors use to full.
And most importantly, companies need to emphasize the reduction of risk of a data breach if a user's credentials are stolen. This is why you need to check out GoodAccess.
This is a global company based in the Czech Republic with a proven 10-year track record.
They are a bunch of security enthusiasts dedicated to delivering anytime, anywhere secure remote access for small and medium-sized businesses worldwide.
And this begins with a free GoodAccess starter product for unlimited usage by up to 100 employees. Yes, you heard right, 100 employees. Learn more at smashingsecurity.com/goodaccess.
And big thank yous to GoodAccess for sponsoring the show.
Kolide is perfect for organizations that care deeply about compliance and security, but don't want to get there by locking down devices to the point where they become unusable.
So instead of frustrating your employees, Kolide educates them about security and device management while directing them to fix important problems.
Sign up today by visiting smashingsecurity.com/kolide that's smashingsecurity.com/kolide.
Enter your email when prompted, and you will receive a free Kolide goodie bag after your trial activates.
You can try Kolide with all of its features on an unlimited number of devices for free, no credit card required. Try it out at smashingsecurity.com/kolide.
That's smashingsecurity.com/kolide. K-O-L-I-D-E, and thanks to Kolide for supporting the show.
And welcome back, and you join us at our favorite part of the show, the part of the show that we call Pick of the Week.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish. Doesn't have to be security-related necessarily.
I was about to say, Carole, for our younger listeners and co-hosts, I will tell you this was the worst commercial nuclear accident in US history, where a nuclear reactor began to go a little bit— rather boiled over.
Things went a little bit bad and radioactive material was leaked out into the atmosphere and went into a nearby town. It was the Americans' version basically of Chernobyl.
Thankfully not quite as bad, but pretty darn bad. Happened in 1979.
And the accident occurred just 10 days after a movie called The China Syndrome, which you may have seen with Jack Lemmon and Jane Fonda. I think Michael Douglas was in it as well.
That came out just 10 days earlier. You've never seen The China Syndrome? Well, it's basically the story of what happened at Three Mile Island, and it came out a week before.
Four-part documentary all about what occurred and how catastrophe was— well, at least a larger catastrophe was averted and the impact on the town as well.
So very cheery all round. I find it very interesting.
And I've had to say, no, Mum and Dad, I've not. It's on my list. So finally got to watching it at the weekend and watched it all over the weekend. Wow.
It's basically about a group of dysfunctional MI5 agents. So, an office of agents in MI5 who have failed or been sidelined for one reason or another.
And so, they've been put in this unit that is called Slough House.
And I think the line is something like, you know, they're so far from the actual work in MI5 that they might as well be in Slough.
And it stars Gary Oldman, who's amazing, obviously, Jack Lowden, and Olivia Cooke.
It's a great mix, I think quite rare, in that it is very dramatic and tense, and there's some moments without ruining it, but there's some moments, there's a sort of a theme of the series that every time these moments are on screen, I feel really sick to my stomach, really anxious, but balanced with absolute hilarity and really dark humor and some absolute laugh-out-loud moments.
And there are some inaccuracies. He uses this one sentence, you'll know what I'm talking about. They're in a cafe and there is buzzword after buzzword.
None of it makes sense if you know at all anything about hacking, and that will blow your mind. And that really did make us laugh.
But so watch for that, but also watch because it is very gripping, very funny, and it really subverts some stereotypes. Plus, there is a season 2 coming.
Is that why they've called the TV show Slow Horses?
They're, you know, I was part of a slow horse for my first horse riding lesson in a couple of decades. That horse didn't move very fast. Good pivot, good pivot.
That is the same as these agents, basically.
And she knows I'm a podaholic, and she curates a few good therapy ones for me to check out. And this one called Therapy Uncensored is one that gets my vote.
Co-hosted by Sue Marriott and Ann Kelly, and they describe it as a candid, unscripted conversation rooted in attachment and relational science.
So Graham, I imagine you're as interested in my pick of the week as I was into yours.
So this is my cup of coffee, my cup of java. If you wanted to learn how to better deal with conflict or improve your compassion, Graham, or whether you want to have a—
Or maybe, you know, on a more serious note, you maybe have had, you know, suffered some trauma or a loved one has, or maybe you have a kid or student that's acting out and you need to figure out a way to calm them and refocus them without aggravating the situation.
So basically, whatever your drama, they seem to have something thought-provoking to say about it. I've probably listened to maybe 10 or 12 of the episodes.
There's probably 170 there. And I found all of them super interesting, right?
And they get guests, they call themselves neuro nerds, and they get guests who specialize on specific areas of certain behaviors and how to deal with them or overcome them.
I just like it. It just has a real feel of intelligence and usefulness.
Plus, you don't have to give anyone any sensitive information to listen to the podcast, which is a super big bonus. So this is Therapy Uncensored.
Find it wherever you get your podcast. You can also listen on the website. And that is my pick of the week for Mental Health Month.
So a treat today.
We have Chris Kirsch, the CEO of Rumble.run, a company he co-founded with Metasploit creator HD Moore to help companies get visibility into everything connected to the network.
Welcome back to Smashing Security, Chris.
So it sounds to me pretty straightforward. Is there a problem? Am I missing something? SPEAKER_03.
Yeah, so you think that asset inventory is a solved problem, but most companies still use a spreadsheet or at best some home-baked solution.
And even when they use a professional solution, often that's called a CMDB, stands for Configuration Management Database, essentially like a database of all the assets on your network.
Those solutions typically still miss about 10% to 40% of devices on the network.
But the root cause is usually that there are unmanaged assets that are no longer managed through drift, through reorgs in the company. Nobody is responsible for them anymore.
Or they've always been unmanaged because there were just some employee putting out a rogue router on the network or a rogue machine.
Or assets that have become unmanaged over time, right?
Then you've got what I call digital archaeology, where the people who originally set up the network are no longer there. Nobody knows that certain subnets exist.
You might not have credentials for all of the machines on there.
And it gets even worse with operational technology and IoT because those are typically completely off the radar of the IT team.
And it's like, I would say I know, and I was like, of course I know where that is. And then it would take me 3 days to find it.
Well, there's solutions out there to help you figure all this out. Why are they having trouble discovering these devices? SPEAKER_03.
Most of the other solutions take very much an IT mindset to the problem.
And they're saying, well, if there is a device on the network, then surely I have the ability to log onto it or to install software on it.
So they either deploy agents or they use something called an authenticated scan, which is basically connecting to the device, logging in with username and password, and then interrogating the device on what it is.
And so vulnerability scanners, for example, are a good case for that, where they try to log onto every device, and they do a reasonable job. But there are two things.
Number one, if they can't authenticate to a device because it's unmanaged, or maybe it's like a Polycom phone, or it's a—
So those kind of things they really struggle with. And things like vulnerability scanners don't collect the right information for asset inventory.
Something might be an IP camera or something, and they will only tell you, oh, it's Linux 2.6.18, something very generic that actually doesn't help you very much in figuring out what something is.
So one good example for that is we did a project with a luxury retailer. The kind of stuff that you and I maybe want to buy but can't afford.
And so they had a global retail network, different brands and so on, very fragmented because they'd acquired a lot of different fashion houses over the years.
And so we did a bake-off against a major IT service management vendor.
And when they were scanning, especially for their Asian operations, which had a lot of lack of visibility— M&A, different fiefdoms, IT fiefdoms, you know— we found 2.5 times as many devices on that network.
And the reason for that was that they just didn't have a lot of the credentials. And they were also missing network segments.
There were some network segments they didn't even know they had, so they weren't scanning them.
In a nutshell, the reason our solution is that good is really thanks to my co-founder. His name is H.D. Moore and he's the creator of Metasploit.
Metasploit is an open source network penetration testing tool.
And so when you think about it, a penetration tester is dropped onto a network, either from the outside looking in or on the inside, and trying to figure out what's on the network.
And then once they figure out, okay, there's active machines here and there, then they need to fingerprint those machines and figure out what they are before they attack them.
Because if you don't know what it is, you can't attack it, right? And then Metasploit goes further. It exploits machines. There's post-exploitation, all of that stuff.
But HD basically had the idea of applying the early phases of a pen test, the network scanning and the fingerprinting, to IT asset inventory.
So he says, like, using something really cool and applying it to the most boring thing on the planet, you know.
And yeah, so by using that approach compared to the IT-focused approach of logging onto machines, you find all the orphaned and rogue devices and all the weird stuff on your network.
And that's not just the case for IT, but it's also the case for OT, so operational technology, IoT, manufacturing, hospitals, all of that stuff.
You're giving me visibility, or are you giving me tools to try and go and look at them as well? SPEAKER_03. Yeah, so typically, what you do depends on who you are.
We have different types of users using that data, and it's really quite interesting. So 4 different types of users.
The first one is the enterprise security team, so they use it for situational awareness.
They want to know — most of them scan internally trying to figure out what do I actually have behind the firewall?
Some of them also take an external perspective looking in and saying what is actually exposed outside from the internet that attackers might be able to see from the outside.
And then once they have that situational awareness, they can use Rumble in many cases for what I call rapid response, for breaking security news.
You know, they listen to Smashing Security and they hear about things like Log4j and SolarWinds and "hey, we shouldn't use Kaspersky anymore" and all of those things.
So how would you find those things on the network? And so with Rumble, we really do things differently because we decouple the scan from the assessment.
We scan your network and we collect a bunch of stuff, and then at the moment when you actually need to know a specific thing, then you can say, show me all of the things that are X, right?
So for Log4j, we might find you all of the applications that include Log4j.
SolarWinds boxes we can fingerprint through certain attributes, and we can even fingerprint Windows devices that are running Kaspersky without authentication over the network.
So it goes a lot deeper than most people expect for an unauthenticated scan. So that's the enterprise security team, right?
But then we have the second user group is incident response, and in incident response, really, there are a few other use cases. So people use it both proactively and reactively.
So proactive would be something like threat hunting.
You know that there are a lot of devices getting attacked — let's say Schneider Electric had some power supplies that had a security issue, so you try to find all of these devices so that you can patch and update them, right?
Or to see if they were already compromised, for example.
And the reactive side would be something like you're getting an alert on a certain IP address, but you don't know what's behind that IP address.
So is it my domain controller, is it an IP camera and so on, is it maybe an access badge door controller kind of thing? So Rumble gives you that context.
You can, for example, give it an IP address and it gives you that, and then you can also say, show me all other things that look like that, so you can go hunting, right?
Exactly, and so you can either use Rumble directly or you can import it into your Splunk environment and use it there. Now we have the blue team covered, right? Now the red team.
So the penetration testers love it because it really helps them with their reconnaissance phase.
It provides you a lot more depth than some of the other open-source tools, and it provides you a very good user interface to pivot into information.
So you can look, for example, for — we have something called an outlier index where you can filter for devices that are weird and different from the other ones.
You can look for devices that are not on the Active Directory because they're probably not patched, right?
And we can even find you devices that are multi-homed, so that have two network cards and that allow you to jump from one network segment into the other as a pivot point.
We can do that even when we only scan one of the interfaces because a lot of the devices are leaking their secondary interfaces.
And so those folks typically have a CMDB or are looking to get a CMDB, but they're really having trouble getting the right data into it, getting clean data, getting comprehensive data.
Yes, they can pull Rumble data into ServiceNow. That's a very common one. Jira Service Management is one that's up and coming.
And that enables them to, number one, have a fuller view of what they actually have on the network.
They can look for operating systems and devices that are end of life, that are no longer patchable, and so on.
And so you think that given our history, we would only sell into security. But actually, our largest deal was with a telco provider that purely uses it for that use case.
And so we cover all of the industries, really across the board from anything from brick-and-mortar retail to cloud hosting providers.
What do you say to that, Chris?
And most people don't really believe that you can do that with an unauthenticated scan until you try it out.
And by the way, we then also augment that with API integrations to cloud hosting providers, with integrations with, let's say, CrowdStrike and SentinelOne, where you can figure out, are any of my endpoints missing endpoint protection, for example?
That's a huge use case, right? So if you would like to try any of that out, please go to rumble.run. There is a 21-day trial, fully featured. You can go up to 50,000 devices.
You can go wild if you want to. Just register and go. Some people start out just with their home network. It's the easiest way to do it because it's a small network.
It's somewhere where you don't need to ask others for permission. They get comfortable with that, see the quality of the scan, and then they bring it to work.
That's what we see quite often.
And if you'd started a trial at the beginning of this interview, you may already be done scanning your home network because it's really quick and easy to get started and to scan the network and then to view your devices.
And if you are not in IT or security as a job, or you just want to use this at home, we also have a free edition for up to 256 devices.
And you can do that— either use that for free at home, or even in a small business, you can use it commercially.
Able to get comprehensible information even if they're not very techie?
It's not that big. It's not that complicated. And then they figure out, like, oh, yeah, that thing. I put that in, like, 5 years ago. I didn't even remember that.
And that thing, oh, yeah, like, my daughter added that. I didn't know that was connected and so on. So it's quite eye-opening just to see what's connected.
Of course, if you want to dive in deeper and do some of the more funky stuff, that requires a little bit more technical expertise.
But we see just, you know, tech enthusiasts and private people using it as well, up to, you know, very large enterprises.
No, just head over to Rumble.run, give the product a try, and thanks a lot for having me.
You can say thanks if you want. You can say yeah. I didn't know how you wanted to cut it.
And don't forget to ensure you never miss another episode. Follow Smashing Security in your favorite podcast app, such as Apple Podcasts, Spotify, and Google Podcasts.
And for episode show notes, sponsorship information, guest list, and the entire back catalog of more than 275 episodes, check out smashingsecurity.com.
Hosts:
Graham Cluley:
Carole Theriault:
Guests:
Jessica Barker – @drjessicabarker
Chris Kirsch – @chris_kirsch
Show notes:
- Angry IT admin wipes employer’s databases, gets 7 years in prison — Bleeping Computer.
- A closer look at Eternity Malware — Cyble.
- Researchers Warn of "Eternity Project" Malware Service Being Sold via Telegram — The Hacker News.
- Dirty Deeds Done Dirt Cheap: Russian RAT Offers Backdoor Bargains — BlackBerry.
- Top Mental Health and Prayer Apps Fail Spectacularly at Privacy, Security — Mozilla Foundation.
- Talkspace privacy & security guide — Mozilla Foundation.
- BetterHelp privacy & security guide — Mozilla Foundation.
- Dramatic growth in mental-health apps has created a risky industry — The Economist.
- Meltdown Three Mile Island — Netflix.
- The China Syndrome trailer — YouTube.
- Slow Horses — Apple TV+.
- Therapist Uncensored podcast.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
- Support us on Patreon!
At Kolide, we believe the supposedly Average Person is the key to unlocking a new class of security detection, compliance, and threat remediation. So do the hundreds of organizations that send important security notifications to employees from Kolide’s Slack app.
Collectively, we know that organizations can dramatically lower the actual risks they will likely face with a structured, message-based approach. More importantly, they’ll be able to engage end-users to fix nuanced problems that can’t be automated.
Try Kolide Free for 14 Days; no credit card required.
GoodAccess – Free Business Cloud VPN for up to 100 Users.
Get a cloud VPN with strong network encryption and unprecedented online threat protection. No hardware. 100% free. Just create your team and enjoy GoodAccess forever.
Check it out now at smashingsecurity.com/goodaccess.
Rumble, made by the creator of Metasploit, finds many devices connected to your network that other solutions miss, including orphaned machines running outdated operating systems.
It can even tell you which machines are missing endpoint protection, from your local network to the cloud.
Sign up for a free trial and build your asset inventory in minutes. Get your trial at www.rumble.run
Follow the show:
Follow the show on Bluesky at @smashingsecurity.com, on the Smashing Security subreddit, or visit our website for more episodes.
Remember: Subscribe on Apple Podcasts, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!
Warning: This podcast may contain nuts, adult themes, and rude language.


