
A new version of the LockBit ransomware offers a bug bounty, women uninstall period-tracking apps in fear of how their data might be used against them, and Microsoft’s facial recognition tech no longer wants to know how you’re feeling.
All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Thom Langford from The Host Unknown podcast.
Plus don’t miss our featured interview with Bitwarden founder and CTO Kyle Spearrin.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
You would jump off a cliff and say, let me test this for you to see if it works or not, and you'd go splat at the bottom of the cliff.
Smashing Security, Episode 281: Debug Ransomware and Win a Million Dollars, Period Tracking Apps, and AI Gets Emotional with Carole Theriault and Graham Cluley.
Hello, hello, and welcome to Smashing Security, episode 281. My name's Graham Cluley.
Now, coming up on today's show, Graham, what do you got?
All this and much more coming up on this episode of Smashing Security.
I would— I thought if there was a new version of macOS which came out 20 minutes before recording your podcast, you were the sort of— How can I put this politely?
Complete blithering idiot who would click apply updates?
Delayed us by about 45 minutes.
I think maybe some other people should beta test them before me.
And obviously in the workplace as well, people are staggering the rollout of patches and security updates to make sure they don't conflict with anything.
You know, they can be a problem, can't they, security updates?
Because they may introduce some sort of clash or a new vulnerability, or you may be thinking, well, I have to install this to protect against a vulnerability.
Oh my goodness, what am I going to do? Is it going to be worse installing the patch, or is that going to introduce a vulnerability, or is that going to fix a vulnerability?
Dither, dither, dither.
So just rock on because it's better to have them than not.
We need those people. But no way would I do it.
Gravity didn't exist before the apple fell on his head. Yeah. You would be the sort of person who would be to test gravity.
You would jump off a cliff and say, "Let me test this for you to see if it works or not." And you'd go splat at the bottom of the cliff.
And then he showed us in the VHS where he does, 'cause he does go off a few buildings, doesn't he? He flies off. Yeah. Anyway, so, you know, he was 7 though, so. You know?
I'm talking about an update to a notorious piece of ransomware. LockBit, of course. LockBit has been at the heart of some 40% of all known ransomware attacks last month.
Well, Bleeping Computer reports that there are some interesting new developments in LockBit aside from all the, you know, the core stuff of encrypting your data and exfiltrating your data and demanding the money from you.
So one of the new things is that the LockBit gang is now running a bug bounty program.
And now the criminals are running bug bounties saying, if you find a bug in our software, in our ransomware, please let us know.
And you can earn anywhere from $1,000 up to $1 million.
So in the announcement, the LockBit gang are saying that they are inviting all security researchers, ethical and unethical hackers on the planet to participate.
So they want to know about bugs which are basically costing them money or bugs which are meaning maybe they're less efficient and they've clearly got the funds. They're claiming.
So in theory, someone could find a vulnerability or a weakness in their encryption algorithm, maybe a way to get back the data without paying the gang. And you've then got a choice.
Do you tell that to the good guys or do you tell it to the bad guys? And now the bad guys are saying, well, tell us and we'll pay you for it.
Because normally we're saying, well, you know, you should really tell the software vendor about the bugs so that they can fix them.
But when the software is written by bad guys, maybe—
They may think, well, you're basically in league with them, aren't you? You are part of their enterprise if you're assisting them making their software, quote, better.
If you could somehow convince them that there is a vulnerability which isn't really as bad as they thought, or if you say, look, I've looked at your code and I found a way to improve it.
If you apply this patch to your ransomware and in fact, the patch means that any funds people pay go into your bitcoin wallet rather than theirs, and you can then—
You could just lock up their data and ask for payment for it, and then return the payments to the people that have paid up in the first place going, "Don't do that again." So they're not just interested in bugs and vulnerabilities in their ransomware, they're also looking for brilliant ideas on improving their operations.
And they're saying, they will give out exactly $1 million, no more and no less, for doxing their affiliate program boss.
So LockBit, like other ransomware operations, is ransomware as a service.
You basically, if you're a criminal, you work as an affiliate of theirs and they have this chap who's sort of running the affiliate program, right?
They don't want his true identity to become public knowledge.
And so they're saying, if you've worked out who our bad guy is, and they say whether you're an FBI agent or a very clever hacker who's found out how to do this, let us know his name and we will give you $1 million in bitcoin for that information.
So they're actually saying to law enforcement, hey, if you think you're on the trail of us, we'll give you a million dollars. Thanks for the heads up.
And then we'll go and hide in Monte Carlo or wherever.
And the day after that, it's going to be worth $750,000 and so on. It's not the most stable of currencies at the moment.
So if you were to run, for instance, an award-winning cybersecurity podcast and you regularly infringed the copyright of another cybersecurity podcast, maybe by using their jingles or something like that, yes, and you received an email from them, I would suggest, Thom, that you be very, very careful about opening the attachments.
And that's across the US. It's now down to individual states to decide. And that's broadly speaking, that's now made up upon party lines.
So, you know, red versus blue parties and whichever states are run by which. The actual ethics, morals behind all of that is not what I'm going to be looking into in this point.
That's for an entirely different show.
What I want to look at is actually the impact that something, and I don't want to say something as innocuous as this because it's far from it, but something that feels very unrelated to technology can actually have some big technology impacts.
So there's a couple of layers here.
So firstly, it's about, you know, we in InfoSec and also the privacy professionals have been saying for years that privacy is a vital component of security.
Security and privacy are two different things. You can be secure but not private. The two need to go hand in hand, and it's important.
You know, we talk about mass surveillance and things like that, and many people who support surveillance— and ostensibly I do in a sort of benign environment— but the argument is, if you've done nothing wrong, you've got nothing to hide, which sounds great until what's defined as wrong changes, which is what's happened here, right?
So the law has changed in this instance. So enter, with the advent of smartphones and digital watches and the health tech environments, there's many period tracking apps.
Apps that are just used not just for convenience sake, women wanting to know when their period is likely to come on, but it's also very useful for medical conditions, when's the best time to fall pregnant, and generally allow women to be more informed about their health.
And the data is put into these apps and lots of insights and data mining and blah, blah, blah. But that data is very often sold or passed on or requested by medical organizations.
The key thing here now is a lot of women in the US and actually globally as well in support of the environment that they've seen themselves faced with, are boycotting these apps, primarily because this data could be used to determine if a woman falls pregnant and then within the following 9 months is suddenly not pregnant.
And there could be a multitude of reasons for that.
But that data, it has been made clear, can be used for legal proceedings against that woman in case that laws in those particular states have been broken.
So this link here is fascinating.
And I think it really drives home the drum that many privacy advocates have been banging for a very long time, which is we have to protect our data.
Now, I know as a 51-year-old balding short fat cis white man who's had two kids.
This has got very little to do with me personally, but I think that the fact that such a change in a law could alter how we interpret or how we accept our data to be used and how actually we should become far more conscious about where our data goes.
I've been fairly open with this stuff. Yeah, I'll accept those cookies. Yeah, you can take my data. I've got nothing to hide, because I'm in a privileged position.
This really highlights the fact that the environment in which we live in can change at any moment and will actually put any one of us at risk.
So there's a link in the show notes to just one of these stories. There's plenty of stories out there. You just have to Google them.
But folks, really think hard who you're giving your data to, which devices you're using, which companies you are giving your data to, and what is their standard?
What is their approach to how they're going to manage your data?
So you can put in different devices or apps, 'cause they do all the legwork for you by reading all the terms and looking at all the features and reading the website.
I've been reading on Vice recently, they've been tracking some of the response to this, and they've been investigating some of the tech companies who run, for instance, period tracking apps.
And they found the number one period tracker on the App Store is handing over data to police, no warrant required.
But we have these built-in mechanisms to help us navigate the emotional tone of a speaker, right?
Even if you don't speak a language, I suspect you can get the emotional tone because the tone goes beyond the language barrier.
If you closed your eyes and thought of the Swedish Chef, who's not even speaking any Swedish at all, or any language at all, but on the Muppets, you would know whether he was having fun or whether he was freaking out just by his tone.
So if it's visual, it'd be facial expressions, or if it was audio, it'd be speed of speech, tone of voice, word choice.
You'd gather all this data to automatically detect an emotional state.
And they're doing this because they say the science of emotion is far from settled. Like, duh. So Microsoft announced this change in a blog post last week.
And while they kind of buried this news at the bottom, like they had 5 points they were making, this was number 5.
So this was Natasha Crampton, a Microsoft Chief Responsible AI Officer, who wrote the post. She says, quote, finally, right? Number 5. Finally.
We recognize that for AI systems to be trustworthy, they need to be appropriate solutions to the problems they're designed to solve.
As part of our work to align our Azure Face service to the requirements of Responsible AI standard, which they've written, we are also retiring capabilities that infer emotional states and identity attributes such as gender, age, smile, facial hair, hair, and makeup.
Because basically I'm sure they were shit at it. That's what I'm assuming.
So Microsoft are kind of pulling away from it saying there's basically a lack of scientific consensus on the definition of emotions, very similar to last week, and the challenges on how these inferences generalize across use cases, regions, demographics.
So basically, we don't really know what we're doing is what they're saying. And they're pulling away from it. They're kind of going, we've played with this.
It turns out we're going to get in hot water. We're pulling back.
If you can target someone emotionally, we all know that we're more likely to be engaged and therefore more likely to pay attention to that service or buy that product or whatever.
So NBC News writes that many companies, and they had a few listed, so I just wanted to, and I went around Googling, I got into a rabbit hole of who uses emotional AI and why.
Can you think of any reasons why anyone would want to use it before I list any? Okay, I'll kick off a few and then—
And they claim to provide live analysis of the emotions of the caller because you're obviously not listening, right?
On customer service lines so that employees in call center can alter their behavior accordingly. So imagine I call up, right? And I'm labeled super pissed off, super pissed off.
And it just turns out I've got a cold. Right? And they couldn't read me properly.
You know, it's all very discrete in the sense that it's very specific in what it does.
I guess what this is doing is it's actually going to allow you to interact with an AI in a way that will respond to how you are behaving and talking and presenting and respond back in an appropriate manner.
So Brazil's Yellow Line of São Paulo Metro deployed AdMobilize emotion AI analytics technology to optimize their subway interactive ads. Ads according to people's emotions.
So you walk by feeling a little bit pissed off because someone with BO's armpit was in your face the whole ride, and they then show you a happy clappy ad to try and make you happy and therefore engage you.
So basically, if a user displayed sad emotions that was interpreted by the AI, the API would suggest a fun travel destination.
Like imagine your partner's just died and you go on going, I need to go to, and they're like, Disneyland for couples and loved ones.
There is tracking emotions of students during classroom video calls so that teachers can measure performance, interest, and engagements, or rather their bosses could do it.
See, that's my worry. It's not that teachers can do it. It's so that the principal can measure the teacher's job and how good they are.
So right now, this feels extraordinarily artificial and forced and not natural in the slightest because that's not how we expect advertising hoardings to behave or for our school to be able to say, oh, your child looked disengaged.
No, his dog just died this morning. So it feels very unnatural.
But I imagine in 10 to 15 years' time, this is going to be rolled out in a way that is much more invisible and yet more effective. So at the moment, I think it's horrible.
So there have been studies from the University of Maryland that found that emotional AI is manipulative and discriminatory.
So it would read, one AI would read Black subjects as angrier than white subjects. And even Microsoft's AI read Black subjects as betraying more contempt.
A raving Nazi is quite a happy one because they're dancing.
But Sandra Watcher, she's an associate professor and senior research fellow at University of Oxford, and she's saying there's no proven basis in science to what they're doing.
At absolute worst, this is pseudoscience. And she says, quote, even if we were to find evidence the AI is reliably able to infer emotion that alone would still not justify its use.
Our thoughts and emotions are the most intimate parts of our personality and are protected by human rights, such as the right to privacy.
Let's not pave the road for it, because I don't like the idea that a camera can look at me and decide how I feel.
Or, you know, they don't want to know.
You don't have to go, "How are you?" to people you don't care about asking. But if you care and you want understand that, you can ask them.
Anyway, I agree with Sandra Wachter and emotional AI. Interesting but scary stuff.
Snyk makes it easy for teams to find, prioritize, and fix security vulnerabilities in code, dependencies, containers, and infrastructure as code.
Supported by industry-leading application and security intelligence, Snyk puts security expertise in any developer's toolkit.
Get started right now with a free forever account at snyk.co/smashing. That's Snyk, which is S-N-Y-K,.co/smashing. And thanks to Snyk for supporting the show.
Bitwarden makes it easy to stay secure and for businesses to share logins with team members and departments.
Bitwarden is transparent and secure, using end-to-end and zero-knowledge encryption with source code that can be scrutinized.
Now you can go to bitwarden.com/smashing and try it for free across devices as an individual user, or you can start a free trial of a Teams Enterprise plan.
And the thing I like about this, a good password manager is robust and cost-effective as it can radically improve your chances of staying safe online, all without requiring super high-tech expertise.
Go to bitwarden.com/smashing. Start your free password manager trial today.
Kolide is perfect for organizations that care deeply about compliance and security, but don't want to get there by locking down devices to the point where they become unusable.
So instead of frustrating your employees, Kolide educates them about security and device management while directing them to fix important problems.
Sign up today by visiting smashingsecurity.com/kolide. That's smashingsecurity.com/kolide.
Enter your email when prompted, and you will receive a free Kolide goodie bag after your trial activates.
You can try Kolide with all of its features on an unlimited number of devices for free, no credit card required. Try it out at smashingsecurity.com/kolide.
That's smashingsecurity.com/kolide. And thanks to Kolide for supporting the show. And welcome back.
Can you join us for our favorite part of the show, the part of the show that we like to call Pick of the Week.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish. Doesn't have to be security-related necessarily.
And up there, right at the top of all of the greatest video games of all time, is of course Alley Cat. Have either of you played Alley Cat?
Alley Cat is a game where you are a cat and you want to make a bit of romance with a lovely lady cat who lives in an apartment complex.
And so you have to sort of avoid dogs and jump into windows.
It's a great fun game, as listeners will be able to find out, because you can play it on an emulator, which I will link to at the Internet Archive.
You can play the old MS-DOS version of Alley Cat, even if you don't have MS-DOS.
Now, why am I talking about Alley Cat other than it is one of the great games of all time is that there was a new imagination of Alley Cat, which came out for Windows, released a few years ago for free, which I will also let— I can't believe— Thom, I thought you were old.
You must have played Alley Cat.
You can also check out Alley Cat, the Re-Meow Edition for Microsoft Windows. I haven't tried that one, but I'm sure it's jolly good as well, written by true fans of Alley Cat.
And that is why it is my pick of the week.
You may have heard, or if you're on Reddit or Twitter or any of these internet browsery things, of the Remarkable E-Ink Notepad. It's in version 2 now. Version 2 came out last year.
I think it was around about March or so last year. It was great for distraction-free writing, note-taking, drawing.
There's different sorts of types of pencils it can next to your computer so you can synchronise notes and all that sort of thing. And I did not fall in love with it.
I actually sold it.
Well, Alex, see, you can have a play with mine.
But I kept on reading that it was getting that it had massively improved. So I took the dive into it again and had it delivered a couple of weeks ago now. And I love it.
Really, really good. Far more responsive, much more intuitive. And you can, you know—
So you're not going to get a little pop-up of an email, you know, coming in or a tweet or whatever.
It's literally a notepad and it comes with different types of, you know, virtual stationery. So different lines, items or layouts or whatever.
You can upload PDFs or ebooks to it and read those as well if you wish.
Unless, like me, you've got the handwriting of a prison doctor. But, you know, aside from that, two-week battery, very, very slim, very thin.
And actually, frankly, I think it's come of age.
It's that great balance between I want a notebook, but I don't want to be carrying around this thing that's, you know, I want to have all of my notes all the time, and I want to be able to read a book occasionally or read an article, etc.
But I don't want to carry my iPad because that's just going to be distracting. I'm not going to actually get the thing I need doing done.
And then I go through my list. I'm an 80/20 normally, like I get no shit done, but not everything.
It's from a company called Kirkco, came out in April this year. And here's the gist: you're on a mission.
There's a manned solar research probe that is sent to explore temporal distortions around the sun. But disaster, of course, strikes, right?
And now the crew are both disconnected from Earth, trapped in separate parts of the spacecraft, and they're facing some dire crunches if they don't get their chickens in a line.
There's super strong writing, great soundscaping, and it's a bit of an emotional ride, which is why I wanted to bring it up today too, because we talked about emotional AI.
I wouldn't say it's as good as my all-time favorite podcast of this genre called The Hyacinth Project, but this one comes close. So it's called Solar. Graham, don't even bother.
I thought they were dead. I don't understand. It'll just be, just don't, just don't. Everyone but Graham can do this.
Password management was not necessarily a new concept at this time, and I had been using those tools for quite a while.
There were things that I thought I could do better or improve upon, obviously, and many were doing certain things well. There were other things they maybe weren't doing so well.
Some had complicated installs and setup procedures, and they weren't across the platforms that I wanted.
There were open-source options, but they were fragmented a bit in their implementations, so you had to try to figure out which ones were quality and which ones could you trust.
So I set off to build Kyle's password manager, if you will. And this was back in 2015, 2016 timeframe.
And I wanted to really appease the desires of someone like myself, I guess, which is a developer and an engineer, a technologist, and while also bringing in some of the aspects that I saw in other tools that made them a bit more turnkey and simple to use, you know, for the greater audience.
I saw a lot of what others were doing, and some were doing things well and some were doing things not so well in other areas.
And I thought that I could bring the best of both worlds together.
I guess it was about late 2015, early 2016 at this time, I set out to build the first iteration of what would become Bitwarden.
At the time, I was working for another company in a full-time role. So this was more of a side project, if you will, of an idea—
And I had actually never built a browser extension or a mobile app or a desktop application before in my career.
So I think, in fact, Bitwarden is still the only mobile application I've ever built before, albeit two or three times over by now.
But I've always really also enjoyed opportunities to learn new technologies to solve a specific problem that I'm working towards.
So I think I was moonlighting it for, I don't know, I guess about 7 or 8 months building these apps. I was also a new father at the time. I had my first son during this time.
Ended up launching the first iteration of Bitwarden, I guess it was in August of 2016 is when those first apps came out.
I posted it on Reddit and Hacker News and Product Hunt and other social outlets like that. To my surprise, it got really great traction right from the get-go.
I was getting great feedback right out of the gate from people.
But I guess it turns out that a lot of people viewed the problem in a very similar way, I guess, and what I had launched and how I had launched it, and it resonated with them.
Were you guys prepared for that in a way that was better than others, do you think, because you were working in password management and remote access is key?
Although there was a bit of a freeze in trying to figure out what to do in the beginning, obviously tools that facilitated the use of remote work and how people operate in a remote fashion ultimately benefited somewhat from that kind of shift in the way people are operating.
And that was certainly the case for tools like ours.
As employees are now staying home and the threat level switches from being in the office all the time to now kind of being a lot more fragmented and people connecting outside of the company network and having to access a lot more tools and things where passwords are necessary.
It worked out a bit in our favor as opposed to what problems our tools were solving.
And I think that password management has certainly become a bit more of a focus for companies and the like to add another tool of mitigation towards the threats that they see as a business.
So maybe you could tell us a little bit about Bitwarden services. So you guys have a password manager, but it's slightly different than everybody else's.
But we try to put a little bit of a spin in what we're offering that's a bit different than some of the other options that are out there.
I'm not some famous technologist on the internet with a huge Twitter following.
So I was looking for ways to— why should people trust our tool and this person that built this tool to store your sensitive data and passwords there?
And to this day, open source is how we operate as a company. All the tools that we develop and build are all done in the open and transparent about what we're doing.
So I chose open source in the beginning to ensure transparency in what we're doing.
I believe that open-source transparency really is around security products like Bitwarden is somewhat of a requirement for these kinds of solutions.
And people should have the opportunity to vet how their tools and their sensitive data is being handled by a product.
And with open source, what I didn't really foresee was the community aspect that naturally came along with being an open-source product.
With open-source development, for an application like Bitwarden, you can't help to form a community of people who are interested in what's being built.
And we get a lot of feedback from our community and we listen to our community.
Much of the fundamentals of how Bitwarden was built are based on the feedback that we get from our community.
So open source really enables us to attack the problem from a different angle that really none of the other solutions or the leaders out there around our type of product are really doing.
And it's also enabled us to develop additional features because we're open source that naturally play into what we're doing.
So we're a SaaS-hosted platform turnkey solution that you can just sign up for.
But another great aspect of our product is that you can— it's bundled up in a way that you can host it yourself if you need to.
So our product is compiled and deployed to you through platforms that allow you to host it on your own internal network and infrastructure if that's the way that you operate and you don't want to use our hosted solution.
I think it's a key, key fundamental thing, and I can't believe there are businesses out there that haven't caught on to the magic.
And that literally it can make life easier for everybody, not just for the IT folks, not just for the high levels, but for the employees as well.
And we're humans and we're creatures of habit and we don't like change. And I think Bitwarden understands that. And in a perfect world, Bitwarden's not really getting in your way.
It's not really changing how you use the internet on a daily basis. It's there to help you when you need it, and when you don't need it, we're out of the way.
And there's a battle between convenience and security in the security world all the time.
So as a security company and someone building security products, you have to really be mindful of that.
If it's not convenient, people don't want to adopt it and there's friction there, they're not going to use the tool and they're not going to do things in a secure way.
So there's always a trade-off you have to make, I feel, somewhat between security and convenience.
But with a tool like ours, it can also just be a big boost in productivity as well for people.
You know, just think about how much time you spend resetting passwords and trying to remember what your passwords were and talking to the IT admin to reset your password for this system and dealing with password changes all the time and things like that.
Once you get the hang of using our product, how it works itself into your flows that you already use, it can be a real boost in just general productivity as well for users.
You will see Bitwarden's open-source password manager. Plus, you can unite your existing systems with Bitwarden using SSO authentication, directory services, or powerful APIs.
Why not get started with a free trial of a Teams or Enterprise plan at bitwarden.com/smashing or just try it for free across devices as an individual user. Your choice.
That's bitwarden.com/smashing. Kyle, is there anything else you'd like to add before we close our chat?
You can go to our website and check out different client applications that we offer and our approach to how we build software and how we deliver that to you in the ways that we think work.
Give Bitwarden a try and see if it can make your life better.
And you can also check us out at hostunknown.tv for podcasts, films, and a whole bunch of other stuff. So yeah, check me out.
Don't forget to ensure you never miss another episode. Follow Smashing Security in your favorite podcast app, such as Apple Podcasts, Spotify, and Overcast.
For episode show notes, sponsorship info, guest lists, and the entire back catalog of more than 280 episodes, check out smashingsecurity.com.
Hosts:
Graham Cluley:
Carole Theriault:
Guests:
Show notes:
- LockBit 3.0 introduces the first ransomware bug bounty program — Bleeping Computer.
- Fake copyright infringement emails install LockBit ransomware — Bleeping Computer.
- Why US women are deleting their period tracking apps — The Guardian.
- Privacy not included — Mozilla Foundation.
- The #1 Period Tracker on the App Store Will Hand Over Data Without a Warrant — Vice.
- Microsoft is removing emotion recognition features from its facial recognition tech — NBC News.
- Top 10 Emotional AI Examples in 2022 & Reasons for Success — AI Multiple.
- Analysis of Speech Features for Emotion Detection: A Review — IEEE Xplore.
- Microsoft's framework for building AI systems responsibly — Microsoft.
- Alley Cat — Wikipedia.
- Play Alley Cat — Internet Archive.
- Alley Cat Remeow Edition — Game Jolt.
- reMarkable.
- SOLAR podcast.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
- Support us on Patreon!
A password manager is an important tool for generating and saving secure credentials for every online account. Bitwarden makes it easy to stay secure and for businesses to share logins with team members and departments. Open source with published 3rd party security audits, Bitwarden is transparent and secure, utilizing end-to-end and zero knowledge encryption with source code that can be scrutinized by all.
Learn how Bitwarden can help you do business faster and more securely at bitwarden.com/smashing and start a free business plan trial today.
At Kolide, we believe the supposedly Average Person is the key to unlocking a new class of security detection, compliance, and threat remediation. So do the hundreds of organizations that send important security notifications to employees from Kolide’s Slack app.
Collectively, we know that organizations can dramatically lower the actual risks they will likely face with a structured, message-based approach. More importantly, they’ll be able to engage end-users to fix nuanced problems that can’t be automated.
Try Kolide Free for 14 Days; no credit card required.
Snyk is a developer security platform. Integrating directly into development tools, workflows, and automation pipelines, Snyk makes it easy for teams to find, prioritize, and fix security vulnerabilities in code, dependencies, containers, and infrastructure as code. Supported by industry-leading application and security intelligence, Snyk puts security expertise in any developer’s toolkit.
Get started right now, with a free forever account, at snyk.co/smashing
Follow the show:
Follow the show on Bluesky at @smashingsecurity.com, on the Smashing Security subreddit, or visit our website for more episodes.
Remember: Subscribe on Apple Podcasts, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!
Warning: This podcast may contain nuts, adult themes, and rude language.
