Smashing Security podcast #412: Signalgate sucks, and the quandary of quishing

Industry veterans, chatting about computer security and online privacy.

Graham Cluley
Graham Cluley
@

 @grahamcluley.com
 / grahamcluley

Smashing Security podcast #412: Signalgate sucks, and the quandary of quishing

QR codes are being weaponised by scammers — so maybe think twice before scanning that parking meter. And in a blunder so dumb it makes autocorrect look smart, the White House explains how it leaked war plans on Signal because an iPhone mistook a journalist for a government insider.

Plus! Don’t miss our featured interview with Josh Donelson of Material and Tony Albano of Google, about detection and response in today’s AI-driven world.

All this and more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault.

Warning: This podcast may contain nuts, adult themes, and rude language.

0:00
0:00 0:00
0:00
Show full transcript
TranscriptThis transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Carole Theriault

Is it better or worse than having a Facebook group?

Unknown

I would argue yes, it is better than having a Facebook group. See, are you giving them awards, Crow? Are you saying, well done for not using Facebook for this? Smashing Security, episode 412, SignalGate sucks and the quandary of quishing. With Carole Theriault and Graham Cluley. Hello, hello, and welcome to Smashing Security episode 412. My name's Graham Cluley.

Carole Theriault

And I'm Carole Theriault.

Graham Cluley

Carole, what have we got coming up on the show this week?

Carole Theriault

Before we kick off, let's thank this week's wonderful sponsors, 1Password, Vanta, and Material.security. It's their support that helps us give you this show for free. Now coming up on today's show, Graham, what do you got?

Graham Cluley

I'm going to be describing how you can get sucked into a Signal chat.

Carole Theriault

Okay, and I'm talking about the rise of the quiche. Plus, we have a featured interview. I had the pleasure of speaking with Josh Donelson of Material Security and Tony Albano of Google about detection and response in today's AI-driven world. All this and much more coming up on this episode of Smashing Security.

Graham Cluley

Now, chums, chums, and specifically you, Carole, do iPhones suck. No? I think they do, actually. I think in many ways they do. There's all kinds of features built into iPhones that no one asked for, myriad of things that they really should do better than they actually do. Considering the iPhone has been around for almost 20 years, you'd expect it to work a bit better. I mean, for instance, autocorrect, right?

Carole Theriault

Mm-hmm.

Graham Cluley

It's a ducking nuisance. Even after years telling it I want to swear, when I type in 4 little letters, it still inserts an amphibious bread addict instead. One of those web-footed creatures quacking around.

Carole Theriault

I hate to sound like a broken record, Graham, but you sound like a broken record complaining. What would you prefer to use?

Graham Cluley

I just think they should fix autocorrect. So if I tell it, no, that isn't what I meant. If I type F-U-C-K, I expect it to write that particular word, not D-U-C-K.

Carole Theriault

I think you can save that word to your dictionary and then it won't recorrect it for you. Oh, you've got a solution for everything. Well, I'll tell you another thing. Because they use the same port.

Graham Cluley

Because they use the same port, whereas they used to have different ports. I like to listen to podcasts at night on my earphones. And I'd like my phone to charge as well. Why doesn't it do it? Why is it my keyboard cursor, right? You know, the little cursor which appears when you sort of hold down with your finger. Why does it require the precision of a neurosurgeon to find exactly the right point on the screen to get it to edit your words? Also, some people say that iPhones suck in other ways as well. The White House, they say that iPhones suck.

Carole Theriault

Do they?

Graham Cluley

Yes, they—

Carole Theriault

The entirety of the White House, no one has a phone number.

Graham Cluley

Well, I don't know about the entirety. I don't know if they've gone and asked the chefs and people who mow the lawn and things like that. But I'm saying the people in charge, the press spokespeople, they have said that phone numbers can be unwittingly sucked into an iPhone, meaning that you can accidentally add a journalist to a top-secret Signal chat.

Carole Theriault

Ah.

Graham Cluley

Yes, we're going to talk about Signalgate.

Carole Theriault

Yes, this is not new, Graham.

Graham Cluley

No, it happened a couple of weeks ago. In fact, some of our listeners contacted us a couple of weeks ago and said, are you going to talk about SignalGate in this week's episode? And I had to say, well, unfortunately, we recorded our podcast that week just before the news broke of SignalGate. And then we didn't talk about it the following week, which was last week, because, well, why would we? It wasn't news anymore. But now is the time to talk about SignalGate again, because there is what appears to be a brand new revelation that I think is of interest.

Carole Theriault

Okay, I'm all ears.

Graham Cluley

So let's first of all recap for anyone who is lucky enough not to have already heard about SignalGate— maybe the news of the world stock markets being decimated by tariffs have pushed it out of your brain, I don't know— but anyway, SignalGate, what happened? Well, nothing too serious. It's just Donald Trump's national security adviser, Mike Waltz, accidentally invited the editor-in-chief of The Atlantic into a Signal group chat, where senior officials were casually discussing airstrikes on Houthi insurgents in Yemen. So this Signal chat had people in it like Vice President J.D. Vance, the Defense Secretary Pete Hegseth, Secretary of State Marco Rubio, the CIA's director, the director of national intelligence, Tulsi Gabbard, Homeland Security advisor Stephen Miller, and others as well. Lots of bigwigs.

Carole Theriault

Lots of bigwigs and perhaps a fly in the ointment in the form of a journalist.

Graham Cluley

Yes, someone who probably shouldn't have been there if they were going to use that chat not to describe their plans for what to do later that evening, whether they were going to the pizza place or something like that, but instead casually discussing planned airstrikes hours before those airstrikes happened, complete with emojis of fist bumps and all sorts like that.

Carole Theriault

It's funny because Signal is known as a very secure messaging app. I think it's built that reputation over the last few years. But it does also require one to be careful about who is in a group, doesn't it?

Graham Cluley

Yes, you need to be competent, right? Well— You and I use Signal all the time, don't we?

Carole Theriault

I don't think we talk about things that are as important as maybe those in the heads of government, but—

Graham Cluley

You're not suggesting that our podcast recording plans are less important than airstrikes, are you? Anyway, they were being watched. They were being watched by Jeffrey Goldberg, a Trump-sceptic journalist, shall we say. Someone who's not beloved in the current White House. Editor of The Atlantic, he was present during this chat group during the build-up to the assault and its aftermath. And he has now shared some details of what he saw that I think we can pretty comfortably assume was highly classified military material.

Carole Theriault

So what, he can share it now because the strike has happened? Is that what you mean?

Graham Cluley

Well, initially he didn't share it. But then, of course, he was accused of lying and told, well, there was nothing sensitive discussed during the chat. And so he said, well, if you think this wasn't sensitive, why don't I share it? Hegseth, for instance, was saying, Godspeed to our warriors. 12:15 Eastern time, F-18s are going to launch first strike package. 13:45, trigger-based F-18 first strike window starts. Target terrorist is at his known location, so should be on time. They're talking about drones, they're talking about F-18s launching, they're talking about when the first bombs will definitely drop in capital letters. All kinds of information about the missile launches.

Carole Theriault

Yeah, I'm not an investigative journalist, and this is why, because if I had overheard that kind of stuff, I would be like, hang up, get me outta here.

Graham Cluley

Log out, log out.

Carole Theriault

Get out, get out, get out, back away. I'd be like Linda Hamilton in Terminator 2 when she sees Arnold Schwarzenegger for the first time.

Graham Cluley

Oh! So when contacted by the press, the White House went into emergency damage control. I guess they went into full Brown alert.

Carole Theriault

They just said, "No, he didn't." Yeah, pretty much.

Graham Cluley

They argued, "Are these really technically war plans that were discussed in the Signal chat?" So apparently the actual times that US military pilots were due to take off and put themselves in harm's way, that wasn't classified, that wasn't a war plan. They hinted that Jeffrey Goldberg, the journalist, must have somehow got himself onto the chat. How did he break in? Has he committed some kind of offense? And they claimed that nothing illegal had happened at all. No classified information had been shared. They were completely within their rights to use Signal in this way. Now, we are not interested in the politics on this podcast today. What we are interested in is the cybers. And at first, it sounded like this was carelessness. The wrong person had been added to a chat group. Now, I would argue that should have been impossible. If they'd been using their own secure messaging system, there would've been guardrails already in place to ensure only authorized personnel could access the chat. You couldn't add any Thom, Dick, or Harry to an internal messaging system, right?

Carole Theriault

Yeah, I'm just playing devil's advocate in my head. I'm just thinking an internal messaging system, maintaining that with their very light-on-the-ground staff that they have, as far as I read.

Graham Cluley

I'm not suggesting Barron Trump knocks it up, you know, as a classroom project. You've got the resources of the entire NSA. You've got all these people who you've fired from CISA in the last few weeks.

Carole Theriault

Yeah, consultant positions.

Graham Cluley

They might be looking for a bit of work, right? There's plenty of people. Plus you've got the genius that is Elon Musk, haven't you? He's a wizard. He's able to run umpteen companies all at the same time and do apparently other remarkable things. Couldn't one of those knock one out? Anyway, the point is, the expertise is there, the resources and the money is there. They could have a secure system which only allows approved people to join a chat. But they were using Signal. Now, there may be good reasons why they were using Signal. There may also be bad reasons they were using Signal. But as good as Signal is, and we use it, right, you and I, it's something used by millions of other people around the world. Is it really, though, what politicians and government officials should be using? When exchanging sensitive information, especially when Snapchat and Club Penguin are available. I mean, why not use one of those instead?

Carole Theriault

Okay. Is it better, in your opinion, is it better or worse than using email, an email client?

Graham Cluley

Oh, it's definitely better than just using regular email. Yeah, regular email isn't encrypted at all.

Carole Theriault

Is it better or worse than having a Facebook group? You know? Well, yeah, I would argue, yes, it is better than having a Facebook group. Facebook group. See, are you giving them awards, Carole? No, I'm not. I'm just a little bit uncomfortable. Journalism is a very important thing. I'm a very big fan of journalists. It's just, it's a complicated thing. Part of me wishes that he'd said, do you know I'm here, everybody? Hello? Shut up. But that's not how it works, right? You don't get a story that way.

Graham Cluley

So I think the question of using Signal is debatable as to whether that was really very sensible.

Carole Theriault

But better than Facebook group.

Graham Cluley

Better than Facebook, better than email, yes. But also, what are they using Signal on? Is that on a secure device? Is it a consumer smartphone that may have vulnerabilities, may have zero days? How are the chat participants connecting to the internet to connect to their Signal chat? Apparently, some of these people who were on this call were in Russia, for instance. Do we trust that they necessarily had a secure connection and weren't being snooped upon? So a couple of days after the revelation from The Atlantic, headlines, they weren't going away. It was a bit of a problem. So Mike Waltz went on Fox News and he said that it was his fault. Either he accidentally added Goldberg to the chat or there was, quote, some other explanation. But there was no other explanation. He invited Goldberg to the group. But now there are reports which suggest in a way that monumental goof of him adding a journalist to the group. So there's been a forensic review, they say, by the White House IT team.

Carole Theriault

Run by an independent group that—

Graham Cluley

Who knows? Probably run by some 21-year-old these days. But anyway, they have found that Waltz's phone had saved Goldberg's number back in October last year. Now, of course, that was before they were in power, before the presidential election. And apparently, Goldberg, the journalist, had emailed the Trump campaign because Donald Trump had said something. Said something insensitive.

Carole Theriault

No.

Graham Cluley

I know, it's not in his character to do that. But apparently he had said something which had caused some offence. Something about wounded soldiers. And the journalist contacted the Trump campaign to ask some questions. And Trump's campaign spokesperson, Brian Hughes, copy and pasted Goldberg's message, including Goldberg's email signature, which had his contact details, and sent it to Michael Waltz. So that he could be briefed about the upcoming story. Now, it seems that at the point Waltz's iPhone— and this, by the way, must have been a move that will really delight Apple's PR team— Waltz's iPhone merged Goldberg's number into the contact card for Trump's campaign spokesman, Brian Hughes. So, Brian sent a message to Mike, and Brian's message, which he sent to Mike, was a copy and paste of the message from the journalist, Geoff.

Carole Theriault

In short, an error that happens to everybody that uses a phone, right? Probably you'd want to double-check in this instance, I imagine.

Graham Cluley

But the thing you have to be careful about is if your phone says, oh, I think I've seen a new phone number for them in the context of the message you receive. Do you want me to update their contact details? Don't just blindly say yes.

Carole Theriault

Well, you know what happened to me the other day on Signal as well? So I responded to someone. I didn't remember who, right? Answered something and then put the phone down. It was still in my hand, but I was answering a question of someone who was talking to me in real life. IRL, I know. And somehow I obviously must have pressed the microphone button. And so whatever I said to the other person got sent over to this third party. And when I noticed, I was so mortified because I didn't know what I'd said. I didn't even want to re-listen because you know what I'm like, right? You know what I'm like. I'm like, delete, delete, delete. Which is what I did. And hopefully the person is never going to bring it up if they listened to it and it was inappropriate. I don't even know. But all I'm saying is that happened just by sending a message and then responding to something, my hand slipping on the screen, it not being locked. And there you go, right? A third party gets a message not intended for them.

Graham Cluley

So would a goof like that have happened if you'd been using a secure device and hadn't been using Signal? If you hadn't been using an iPhone, if you'd had a special phone which didn't have that, press a button here and we'll start transcribing everything that it hears into a message which we will send to somebody.

Carole Theriault

Yeah. But you remember the days of trying to do your work with an extremely locked-down device?

Graham Cluley

Yes.

Carole Theriault

And yes, we were never head of state. Okay, I understand that.

Graham Cluley

But, you know, you could have one device for one thing and one device for the top secret conversations.

Carole Theriault

Yeah. Carry around 8 of them, you know. Private conversations with my wife.

Graham Cluley

You've got people who can carry phones around for you. So, by the time of the airstrikes, Brian Hughes, he was by now the spokesperson for the National Security Council, right? And so he was invited to the Signal chat, but the invite went to Jeffrey Goldberg at The Atlantic instead. Now, there is a US Department of Defense watchdog which has opened an investigation into its own boss, Secretary of Defense Pete Hegseth, because they're thinking, well, why are you using Signal to discuss government business?

Carole Theriault

Yeah, my impression of the headlines was that was a big no-no.

Graham Cluley

I think it should be. That's how I feel about it. Because there seem to be so many politicians— and it's not just a problem in the United States, it's also been a problem in the UK as well— politicians who are using consumer messaging apps to chat to each other. And then when there's an inquiry later as to, well, what happened during, I don't know, the pandemic, for instance, or what happened during this particular controversial political situation, what you find is they say, oh, well, I've lost all my WhatsApps now, or I've lost my phone, I can't access them. And so there's no record. But surely there should always be an audit trail of what is being communicated at the highest level, obviously held securely. So if later you want to find out what people were saying to each other, you do have that record. And I think that's why so many politicians are using the likes of Signal.

Carole Theriault

It's off the record.

Graham Cluley

It's off the record.

Carole Theriault

It's off the record, except this— if you invite a journalist from The Atlantic, mm, difficult.

Graham Cluley

Well, the good news is, thank goodness for this as well, there are absolutely no governments around the world who are pushing Signal and other end-to-end messaging platforms to incorporate any kind of backdoor through which conversa— Oh, hang on a moment, they are, aren't they? Yeah, because they do want to spy upon people's conversations in these end-to-end messaging platforms. It's funny how sometimes they really are against these systems and encryption, apart from when they really would like them to work as they wish. And the latest of all is that National Security Advisor Michael Waltz is now being accused of using Gmail for work-related communications as well. So again, really seems like a big no-no to me. So everyone be careful. Make sure you're using the right apps and the right messaging systems for appropriate communications. And also be very, very careful if your iPhone tries to get you to suck up someone else's details and add them to an existing contact. Carole, what's your story for us this week?

Carole Theriault

Okay, so you know how some people love specific words, maybe because the way it feels in the mouth when you say them, or how they sound? Do you have any of those kind of words that you love more than others?

Graham Cluley

A word that I love more than others?

Carole Theriault

I love the word somnolent. Oh! Because it just comes off the— you know, it just sounds good. It's nice to say. It's pretty. It's an unusual word, you don't hear it very often. When you do, you're like, "Ah." There's petrichor, isn't there?

Graham Cluley

Which is the smell of grass after there's been a gentle rainfall, I believe. That's lovely.

Carole Theriault

The word is not very lovely to say. Oh, all right. Toboggan. Do you like the word toboggan? I just thought you had some good words. I like erasure.

Graham Cluley

Oiseau. That's a French word. That's a very pretty word. Oiseau. There you go. I like that one. Oh dear.

Carole Theriault

I actually even prefer quish. It's almost as fun to say as squish.

Graham Cluley

Yes.

Carole Theriault

Now, what is quishing? And we know in this little neck of the woods, but it's a coined industry term for a scammy phish, one that involves a QR code. And if you read about scams with QR codes, typically I'm seeing stuff related to parking meter scams. Is that true for you as well? That seems to be the biggest news around QR codes that I can see.

Graham Cluley

Yes, parking tickets and things. Yes, it's a place where you can just stick up a bogus QR code and obviously people want to pay, they're desperate to pay in a quick fashion. And so they will just scan it and enter their payment information.

Carole Theriault

You know, and I can understand how that happens because, you know, every single borough in England seems to use their own payment system. Right? So it's not if it brought you to a website that looked like Staffordshire's payment system for the council's parking lots, you would know what to look for.

Graham Cluley

Yeah.

Carole Theriault

But we also see QR codes in restaurants to help people order and pay and provide feedback.

Graham Cluley

Yes.

Carole Theriault

And we've seen them in mobile payment service Apple Pay and Google Pay have also embraced QR codes for quick and secure transactions. A report from Juniper Research shows that the value of QR code payments is projected to exceed $2.7 trillion by 2025. That's this year.

Graham Cluley

What?

Carole Theriault

$2.7 trillion.

Graham Cluley

Trillion.

Carole Theriault

And this surge in QR code-based transactions indicates a shift in consumer preferences towards contactless payment methods. We just don't want to touch buttons anymore. We're done with that. We're done with the touch, touch.

Graham Cluley

How often in a week would you say that you scan a QR code, Carole?

Carole Theriault

Rarely.

Graham Cluley

Yes, me too.

Carole Theriault

Very rarely, because I'm petrified of everything internet-related. I don't even know why I do this show anymore. I try to avoid them. But it's even bigger than that, Graham, because even companies Starbucks, right? They've integrated QR codes into their loyalty program so consumers can make payments and then earn rewards through their mobile app by scanning codes at the point of sale. So you get one of those cups and then you can scan it right there.

Graham Cluley

Ah, actually, I have encountered that. Mm-hmm. Because I've got a particular bank account, and one of the perks it gives me is it gives me the option of getting a free sausage roll each week.

Carole Theriault

What, at Greggs?

Graham Cluley

Yes, at Greggs. And all I have to do is flash a QR code at them.

Carole Theriault

Do you ever run into David Cameron? He's in your neck of the woods. He loves the Greggs. He loves the Greggs. Nike uses QR codes in their retail stores so customers can scan codes on in-store displays to learn more about products, see reviews, yada, yada, yada.

Graham Cluley

Okay. Yeah. All right. Okay.

Carole Theriault

Heinz. Heinz has QR codes on its ketchup bottles directing users to websites with recipe ideas featuring ketchup.

Graham Cluley

Hang on. There are recipe ideas featuring ketchup?

Carole Theriault

Yes.

Graham Cluley

Recipes? Surely.

Carole Theriault

So I went and looked. I went and looked because I was what? What is it going to be? Meatloaf? What's it going to be? A hot dog? Throw some ketchup onto the recipe? So one of the recipes touted itself this: scallops are always wow, so make them more often. An easy recipe with great flavors of honey, garlic, and featuring Heinz tomato ketchup infused sauce.

Graham Cluley

You don't put ketchup on scallops.

Carole Theriault

I agree, because they're entirely too expensive.

Graham Cluley

Can you imagine?

Carole Theriault

In short, people seem to love the QR codes and companies love them because it gives them more information about you, the user, the consumer, gives them more power, more flexibility, and ultimately all that leads to more moolah. That's the game plan. And guess what? Because everybody loves them, the bad guys are jumping on the bandwagon.

Graham Cluley

Yep.

Carole Theriault

So according to a recent deep dive in Fast Company, quishing attacks— I'm sorry, I love the word. I've got to say it.

Graham Cluley

I can't stand it.

Carole Theriault

Quishing attacks surged almost tenfold in the last three years. And they're becoming more prevalent in email phishing attacks. So just last week, Microsoft warned of several phishing campaigns that are leveraging tax-related themes to deploy malware and steal credentials. Now, Graham, what do you think is the big problem with QR codes and quishing?

Graham Cluley

I think a big problem is that—

Carole Theriault

Is the name.

Graham Cluley

Well, yes, it's the name of the bloody things. But the second big problem with these QR codes is that you don't know at the point of scanning where you're going to be taken. It's not you can look at the URL and think, oh, that sounds a bit dodgy, or why have they misspelt that? So you just scan the thing and it'd be your mobile phone normally, which maybe doesn't have the room to show you the entire URL, or it's in too small a font for you to be able to read, takes you to some webpage and you just assume it's legitimate.

Carole Theriault

Yeah. Well, it seems according to this Fast Company report that most security systems, while they can detect malicious links email security system, for instance, they have trouble analyzing images or QR code content. So this allows scammers to evade detection and deliver malicious payloads directly to their potential victims.

Graham Cluley

I can well believe that security software, which is designed to check out links, may not yet have evolved enough to examine QR code. I may be wrong. I mean, there's plenty of security vendors who sponsor this podcast. Maybe they handle QR codes wonderfully.

Carole Theriault

Apparently in the first half of 2024, 12% of all email phishes contained a QR code. Actually, if we look at the four different techniques that criminals seem to use to exploit QR codes, so as you mentioned earlier, one is obscurity attacks. So this is like traditional phishing links, which can be visually inspected, but you can't see where you're going in a QR code. So that's one of the big techniques that they love to take advantage of. The other one is hijacking switch accounts. So this is where they would put, like the parking meter thing, they would put a new QR code over another one to try and get you to redirect you to a fraudulent webpage.

Graham Cluley

Right.

Unknown

Yes.

Carole Theriault

But this is interesting, privacy invasion attacks. So this is where phishing exploits the misuse of shared or leaked QR codes to gain unauthorized access to personal accounts or services. Now, for example, to drive this point home, a woman in China accidentally shared her restaurant ordering code online while sharing food photos on social media. Strangers used it to place orders worth 430,000 yuan, or $60,000, directly charging her account.

Graham Cluley

That is a lot of ketchup.

Carole Theriault

Yeah, it's a lot of scallops. The other one is brushing scam. So this is where unsolicited packages are sent to your address, often using a box from Amazon containing unexpected items. And these packages may include a QR code inside the box or as part of the letter documentation. And when scanned, the QR code redirects you to a malicious website designed to steal your personal information. So you could go there and go, I never ordered this, da da da da da. Yeah, and get your information that way. Now, other than being very wary of QR codes, it's not clear to me that much can be done from a consumer side, right? Apparently some QR code scanner apps provide a preview of the URL before you open, so you can use these apps to check the destination of the QR code to ensure it matches the expected website.

Graham Cluley

Yes, but. Well, yeah, because my phone does that, right? It does display a little preview, but of course it's only able to show you so much. And also you could have a URL redirect service. So it may not be the first site which you go to. The first site you go to may be something like TinyURL or Bitly or something like that. And then who knows where you're going to end up?

Carole Theriault

Exactly. Well, actually, there is something you can do. Actually, there is something I think you can do. It's using a trusted password manager. Because the trusted password manager will not fill in the details of your account if it does not recognize the site. You know, the QR code magically transported you to. So a bit like you were talking about last week with Troy Hunt's case.

Graham Cluley

Yes.

Carole Theriault

I think you mentioned that his password manager did not put in the details and then he did it manually. Is that right?

Graham Cluley

That's absolutely correct. But of course, if this is, for instance, the parking situation where you've gone somewhere to park you may not have an account with that particular site. It may be that you are gonna register an account with them, 'cause you've never gone there to park before. And so—

Unknown

Yeah.

Graham Cluley

You might just be entering your details manually, painful as that is.

Carole Theriault

So this may just be the dawn of the rise of the quish. Graham, I'm sorry.

Graham Cluley

I really dislike that word.

Carole Theriault

Carole Theriault. So consider yourself forewarned. My advice is just don't use them unless you absolutely have to, 'cause I have encountered some instances where you absolutely have no way out of it, and then keep those peepholes of yours open and try and spot any dodginess. But, you know, if you go to a restaurant and they say, "Oh, just pay your bill with the QR code," you can say, "No, I am gonna pay the normal way, thank you very much." You can obviously have some security software running on your phone to examine the URLs you are going to, which can tell you if it's a known malicious URL, for instance.

Graham Cluley

Sometimes these sites may have been set up just in the last few weeks, so they may not yet be on a database or they may not have fallen into the hands of cybersecurity researchers, in which case you could get a security solution which looks at the domain you're being taken to and it could say, hang on, this is a brand new domain. This is one which wasn't live a month ago and therefore could display a warning at that point and say you are going to a brand new website. So if you thought you were going to something established, that is a great indicator that you're going somewhere malicious instead.

Carole Theriault

Okay. Can I throw a bit of water on that fire?

Graham Cluley

You can.

Carole Theriault

I know of many companies, particularly in our tech industry, that create these microsites, right, for particular marketing campaigns or giveaways or information, you know, research. It did in the last week or so and could be legitimate.

Graham Cluley

Yes, but if they were subdomains, so if they were example.companyname.com, then company.com still is a well-established domain.

Carole Theriault

You remember the days though.

Graham Cluley

I know the crazy things that marketing departments do. I'm not saying it's a 100% solution. I'm just saying it's an additional layer of security you could put in place.

Carole Theriault

Do you know what? I agree with you 100%. Yes. Let's end there.

Graham Cluley

Finish everything there. That's, that'd be the final message of Smashing Security.

Carole Theriault

Google Workspace and Microsoft 365 are critical to business, but they're also a headache for security teams. Constant phishing alerts, endless manual remediation of misconfigurations, and a flood of user reports about suspicious emails. Teams are stuck between two bad options: letting things slip or becoming the department of no.

Graham Cluley

Instead of hoping you catch every single attack, Material.security protects your most sensitive data, even if an account is compromised. So when attackers inevitably get in, they still can't touch the stuff that matters without additional verification. It's like having a tireless security analyst who handles the routines and frees your team to focus on real threats. And for cloud workspaces, Material.security has your back. Misconfigurations, shadow IT, ransomware, constant policy changes, Material not only monitors everything continuously, it fixes the simple stuff automatically.

Carole Theriault

So if you're ready to stop drowning in alerts and start getting ahead of threats, check out material.security. That's material.security.

Graham Cluley

Now, Carole, according to Vanta's latest State of Trust report, cybersecurity is the number one concern for UK businesses. And of course, Vanta can help you with that.

Carole Theriault

Whether you're a startup growing fast or already established, Vanta can help you get ISO 27001 certified and more without any of the headaches.

Graham Cluley

You see, Vanta allows your company to centralize security workflows, complete questionnaires up to 5 times faster, and proactively manage vendor risk to help your team not only get compliant but stay compliant.

Carole Theriault

So stop stressing over cybersecurity and start focusing on growing your business in 2025. Check out Vanta and let them handle the tough stuff. Head to vanta.com/smashing to learn more. That's vanta, V-A-N-T-A, .com/smashing. And thanks to Vanta for sponsoring Smashing Security. Do your end users always, and I mean always without exception, work on company-owned devices and IT-approved apps? I didn't think so. So my next question is, how do you keep your company's data safe when it's sitting on all those unmanaged apps and devices?

Graham Cluley

Well, 1Password Extended Access Management helps you secure every sign-in for every app on every device because it solves the problems traditional IAM and MDM can't touch.

Carole Theriault

1Password Extended Access Management is the first security solution that brings all these unmanaged devices, apps, and identities under your control. It ensures that every user credential is strong and protected, every device is known and healthy, and every app is visible.

Graham Cluley

So secure every app, device, and identity, even the unmanaged ones. Go to 1password.com/smashing. That is 1password.com/smashing. And welcome back. Can you join us at our favorite part of the show, the part of the show that we like to call Pick of the Week?

Carole Theriault

Pick of the

Graham Cluley

Pick of the Week is the part of the show where everyone chooses something they like. Could be a funny story, a book they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish. It doesn't have to be security-related necessarily.

Carole Theriault

Week. Pick of the Week. Better not be.

Graham Cluley

Well, my Pick of the Week this week is not security-related, and it's also, I'm afraid, not a Pick of the Week. I know we've been really positive this episode, but I'm gonna have to present you with a Nitpick of the Week.

Carole Theriault

Oh, quelle surprise.

Graham Cluley

As regular listeners may know, I'm rather fond of the game of chess.

Carole Theriault

Yes.

Graham Cluley

And so I got very excited when a new TV programme was announced called Chess Masters: The Endgame, coming to BBC.

Carole Theriault

Yes.

Graham Cluley

Presented by Sue Perkins.

Carole Theriault

We always say the lovely Sue Perkins.

Graham Cluley

The lovely— sorry, presented by the lovely Sue Perkins.

Carole Theriault

Thank you.

Graham Cluley

This programme tries to do two things. It tries to entertain chess novices and people who don't know how to play chess. It also tries to entertain people who do know how to play chess and are enthusiastic about chess.

Carole Theriault

A bit like us on our show.

Graham Cluley

Right.

Carole Theriault

With technology.

Graham Cluley

Unlike us, however, it completely fails at both. Because it is truly terrible television.

Carole Theriault

Oh no!

Graham Cluley

Have you seen any of this?

Carole Theriault

No!

Graham Cluley

It's awful.

Carole Theriault

This is not on my hot watch list, sorry.

Graham Cluley

Well, you see, it was on my list because it said chess in the title, so I thought it'd be fun. But it's like they've taken Traitors, which is a fun TV programme, if you've ever seen Traitors.

Carole Theriault

I have, I have, yeah.

Graham Cluley

Yeah, it's quite fun.

Carole Theriault

Yeah, it's great fun.

Graham Cluley

And they've tried to sprinkle chess through it. And—

Carole Theriault

Makes chess suddenly much more exciting and fun?

Graham Cluley

They've tried to make chess more exciting. I mean, chess is very exciting, but what they've done is they've just eradicated all of the joy entirely from it. So everyone's got a nickname. Everyone's like, "Oh, I am the Destroyer, I am the Anarchist." And they're playing chess, and they are presented, these people playing this competition, as some of the best upcoming chess players in Britain. It's like, "No, they're not." I'm not that good at chess, right?

Carole Theriault

Oh, they didn't call you. That's the problem. They didn't call you to just come on the show. Is it like Robot Wars, but Chess Wars?

Graham Cluley

No, that would've been good. That would've been good. If they'd had robots playing chess, that would've been more entertaining than what this actually is. Most of these guys are worse than me. I can tell. And I'm not that great. So it's not very entertaining. I think it makes no sense at all if you can't play chess because you don't understand what's going on. It makes no sense at all if you do like chess. The analysis is just terrible, even with the lovely Sue Perkins.

Carole Theriault

Are you looking for a new job? You're looking for a new job.

Graham Cluley

Well, I just— It's okay.

Carole Theriault

You know, I'm sure they'd take you. I'm sure you'd be very good at it. Maybe you should call the lovely Sue Perkins and, you know, offer her some advice.

Graham Cluley

Back in the late 1970s and early 1980s, there used to be a programme on BBC called The Master Game, which was about chess, and it was so much better. This is 40 years ago, and it was better than what they are putting on the TV now. It was more interesting, it was more entertaining. It was presented by Bill Hartston, who was an International Master, and Jeremy James. You can find it on YouTube. Go and check that out if you want to see how chess should be done on TV. Or indeed go on YouTube where there are millions of amazing YouTube influencers now who are now playing chess. Chess apparently is a big thing now on the social media. But this television programme, utterly unentertaining, and that is why it is my Nitpick of the Week.

Carole Theriault

Wow.

Graham Cluley

I'll calm down. Carole, what's your pick of the week?

Carole Theriault

Mine is not a nitpick. Mine is a pick of the week. Now, you guys know I'm a bit of a card shark. Funny, we're both doing games this week, Graham. I play cards a lot, and I much prefer playing cards in real life. But sometimes that's not possible. Maybe it's 4 a.m., right? And you don't want to wake up your husband because he wouldn't appreciate being poked for a game of gin rummy. Exactly. Maybe you're waiting for an appointment somewhere, or maybe you're commuting. And what do you do to fill those minutes other than wasting time on the socials? So this week I'm choosing a cribbage app.

Graham Cluley

Oh, you and cribbage.

Carole Theriault

Yeah, I've had a cribbage app on the show before and I recommended one last summer and I much, much, much prefer this one. This app is called Cribbage Classic, created by Games by Post LLC. Who knows who they are? But this app seems to be a result of love of the game. Because cribbage, or crib as we call it in the know, is a card game traditionally for two players, but you can play three or four. And it involves playing and grouping cards in combinations to gain points all games. But it has several distinctive features because you have this gorgeous cribbage board, right? A set of pinholes and pins used for scorekeeping. And you have a unique scoring system. So it's just a very cool game and it's not easy to pick up. But once you get it, it's a treat of a game. And this app, Cribbage Classic, is great for beginners and pros. You can have a beginner game or a pro game.

Graham Cluley

Yes.

Carole Theriault

And there's features like a hint feature, which can tell you what to do when you're confounded. And it's not loud and brash, you know, with lots of whiz-bang. It's just a nice, quiet card game for a bit of alone time.

Graham Cluley

Can I ask some questions? Is it an app you have to pay for? Is it ad-supported? It is free.

Carole Theriault

It does tracking with non-identified with the user and there are no ads.

Graham Cluley

Oh, that's lovely.

Carole Theriault

Yeah, it's one of those things like sticky pickles, right? No ads, just solid content done with love. That's it.

Graham Cluley

Never heard of it.

Carole Theriault

So that is my pick of the week, Cribbage Classic app by Games by Post LLC. Find it in your app store or wherever you get your apps safely.

Graham Cluley

Terrific stuff. Great. Now, Carole, you've been busy this week. You've been chatting to the folks at Material.security.

Carole Theriault

Yes, Josh Donelson and Tony Albano. They both share tips on using AI safely in today's companies and startups. Listen up. So, Smashing Security listeners, we are speaking with not one, not one but two infosecurity gurus, Material.security. This is the company that offers a unified detection and response platform for Google Workspace and Microsoft 365. So we have Josh Donelson, who leads technology alliances, and we have Tony Albano, a seasoned AI ambassador with Google and Workspace security expert. Welcome both to the show, gentlemen.

Graham Cluley

Thank you.

Unknown

Great to be here. Thanks for having us.

Graham Cluley

Yeah.

Carole Theriault

Maybe you both can give us a quick bio so our listeners know a little about you and about your roles at Material.security. Maybe we can start with you, Josh. Certainly. Yeah.

Unknown

So my name is Josh Donelson. I look after technology alliances here. So all of our security ecosystem and platform partnerships. My career started as a hardware engineer, if you go back far enough, and then some time at VMware, and then a bunch of time at places like Okta. Looking after identity and cybersecurity. Been here at Material for a couple of years now and really looking forward to the conversation today.

Carole Theriault

Fantastic. What about you, Tony?

Unknown

Yeah, I've essentially been living and breathing collaboration and security my entire career across a number of different organizations. And being here at Google, wanted to take advantage of the opportunity to dive into AI and specifically how it works with the Google Workspace platform. So it's great to be able to take advantage of all the things Google has to offer.

Carole Theriault

Brilliant. Okay, so let's kick off with a topic that we can't seem to get enough of these days: AI. We know that it's a powerful tool, and we know that powerful tools can be used for good and bad. So how are you guys seeing AI show up in organizations today?

Unknown

I think we're at an incredibly interesting inflection point. AI has typically been used in order to shore up defenses across organizations. So you can look at things like automated email protection for massive amounts of spam, things of that nature. And all of that has been integrated into these products for years and years. And what we're seeing more and more of with the advent of large language models is the ability to now customize attacks, things like phishing campaigns, spam campaigns, et cetera, that are directly targeted to individuals or organizations, people are able to do that much faster, right? You're able to iterate through these different campaigns at a much higher rate. And what that means is now the tools of detection have to be able to update themselves at a much faster pace as well.

Carole Theriault

When I started in this business, I'll tell you, we used to have CDs that we'd send to customers. And we would say hundreds of new identities or viruses now identified, hundreds. And you guys are talking millions, right?

Unknown

Not just millions, maybe tens of millions. The volume of messaging is just at a superhuman scale. So we have to leverage these foundational investments in things like AI and things like automated detection in order to make sure that our services are supercharged with that security presence as well. So essentially what we're investing in is the frontline being the phalanx that any of these bad actors would have to get through. If something were to happen, that's where human detection and that human intelligence can come into play as well. So we still need to ensure that not just do we have best-in-class automated detection, automated protection across our entire platform of services. But then how do we essentially put together some disparate actions or dots? And there's a lot of tools built into Workspace that allow our administrators to be able to string together events, say, in the event of an internal issue. But I think that's where Josh's team over at Material really comes into play as well.

Carole Theriault

Yeah, I'd love to hear from you, Josh, on this.

Unknown

Yeah. The one plus one that I would add to the volume of threat conversation is that the rate of change is so much higher now than even 18, 24, 36 months ago. When one attack shows some flavor of success, it becomes super easy to then have 1,000 tiny iterations on it. The perspective here at Material is to really take a pragmatic approach to how we are using AI and really making sure we're doing what AI is really, really good at. And what we've learned is AI is not a catch-all for detection. You can't just say, here's our large language model or here's a pre-trained set of models. Please catch everything that's coming in the front door that Google doesn't already catch because the cost of a false positive is just too high. We can't block business. We can't impact the user experience or the employee experience. We can't stop folks from collaborating or the business doesn't move forward. What we're thinking about here at Material are things like AI is phenomenal at large-scale pattern matching, right? Have I ever seen anything this before? Can I rapidly bring that metadata from a bunch of different platforms and put it right in front of a security analyst so that that human can much more quickly decide, real threat, false threat, triaging all of those messages. If you think of the flow of a normal security analyst day, the vast majority of these things are caught by Google native platform services, 99.99%, I think, at one of the reports I read recently. But the really novel ones maybe get through, or maybe there's one that's very specific to my business or one of my executives. If it gets reported, it needs to be triaged. But if my security team has 37 other newsletters that they signed up for but they don't want to see anymore getting in the analyst's way, that becomes a problem that really has nothing to do with the type of threat itself, just an operations problem. So at Material, we can take AI and say, those 3 are obviously newsletters, look at them later. This one is obviously a threat, we're going to block it right away until you can get to it. And for these two in the middle, we think they're worth your eyeballs right now. And that triage effort is really, really powerful in terms of operationalizing what are typically smaller teams. If you're a large Fortune 500, you may have the capacity to write 1,000 detection rules in your own platform. But most of us need a little bit of help. And that's a really, really pragmatic way to apply AI that doesn't take the human hand off the wheel, if you will.

Graham Cluley

Right.

Carole Theriault

OK, but what about when you have an insider threat, right, where an employee or a trusted business partner or whatever plays the double agent?

Unknown

When we talk about that insider risk, usually what we're also concerned about is not just something like an email communication, but it may be the oversharing of content. Right? So if there are sensitive documents, sensitive pieces of material that may be stored in the platform, how do we ensure that that user isn't able to overshare that material externally, whatever the case may be, right? So this is another area where Google has invested in a lot of foundational AI that now we allow organizations to actually train their own models. Maybe it's a patent, maybe it is, if you're in biotech research, maybe it's some sort of a genome or a protein or whatever the case may be where those traditional DLP engines fall flat. Well, now by leveraging AI, we're able to train our own models based on the material that our organization considers sensitive, right? So if we take the case of patents, if, let's say, we have 100 different patents that are just sitting out there, now we can point our detection engine at that and say, okay, I want you to train your model based on all of the patents that we've filed. And now, because it works directly with our sensitivity system, now we can say this particular document is considered confidential, this one is eyes only, and then that flows through to say what can be shared externally and what cannot.

Carole Theriault

Yeah, yeah.

Unknown

Yeah, we've had customers tell us that getting to a point where they have a rational labels taxonomy can be a challenge, right? There are a number of different APIs inside of the Workspace ecosystem that you'd have to look at. The training of some of those models to really use the label taxonomy to its fullest can take some time. Got a number of customers that have come to us and said, we know we have to fix this, but job one is figuring out what we have. And that's really hard because again, there's not extra people just sitting around looking for things to do. So this operations model of pulling together all the incredible signal and the power of the native tools, the DLP rules based on labels, we've empowered the Material Platform to sort of help with that. There's a bunch of AI behind the scenes that helps additional sensitive data discovery, and we're able to write back labels into Google Workspace to accelerate some of that work. But at the core, it's giving the operations folks some help to make sure that they're able to take the most advantage of what Google has built. So that's the operation side. I do want to take just a couple of seconds and talk about sort of AI specifically detecting things like ransomware, insider threat. And if you think about what we're addressing here, right, it's a business that has centered their operations inside of Google Workspace, right? That's where the business runs from. I've got strategy documents. Tony talked about patents. The amount of collaboration and back and forth before you submit a patent is through the roof. If no one's ever done that, it's a wild project to take on. But all those drafts, they're going to end up in email. And all those external partners, you're collaborating with a law firm, you're collaborating probably with outside expertise, you're collaborating with somebody that's going to help you package and file that and deal with the government. Those are all external people. So if you think about what insider threat or account takeover looks like, it looks like a change in your communication pattern.

Carole Theriault

Right. Interesting.

Unknown

It's like, well, I didn't, I've never talked to that person before, but I'm sending them a patent document. That doesn't make sense. Detecting that is really hard because sending an external email is valid. Having a forwarding rule in my inbox is valid. Having that sensitive data in my inbox is valid. The combination of all of those things is what signals something like insider threat. And so because of where Material is connected, we can apply some of our backend AI, by the way, to the previous point, also humans. To some of these detections and raise them directly to a security operations professional. And so it's really an unlock for Workspace in a lot of ways, which is like, go forth, right? Go forth and prosper because the platform is going to catch the vast majority of it. And this sort of novel— here's, here's that same theme again, right? This novel or this unique or this change in previous behavior, Material is going to be able to get because we're connected directly into the inbox. It's just a really, really wonderful partnership.

Graham Cluley

Wow.

Carole Theriault

Okay. We're fast running out of time. But before, before we wrap up, I'd love to know your thoughts on the smaller firms, because a lot of firms, a lot of security outfits out there focus on the big fish, the big organizations. What are your views on that market segment? Because it seems to me if nobody focuses seriously on these groups, like the startups that are working with AI at the frontier, they could be ducks sitting in a pond of infosecurity risk.

Unknown

The bottom line is a number of what we might term small and medium businesses are actually the hypergrowth businesses that are going to be the Fortune 2500 in 3 years. They are experiencing massive employee growth. They are certainly trying to operate in multiple regions, or maybe they've got a product that is the next viral thing. And so they're getting hit on all sides with requests for collaboration and partnership. These are the ones that have all the same kinds of business risk as a larger entity, but none of the team. And so this idea of being able to, one, aggregate signals into, into a single place, whether you sort of orbit your SOC around the endpoint or if you orbit your SOC around the network or in our case, you know, we're sort of wanting you to orbit the SOC around Workspace because that's where business flows. But you have to pick one. And then you want to think of your toolset as a thing that can help you establish baselines. What do I have? What's being used for? Who's using it? Are they allowed to? And what are some of the access models correlating against what's normal and what's not normal? Point is, something like Material can help with that aggregation and operations acceleration from a Workspace perspective, it's part of what we were designed to do and why we're such great partners. SPEAKER_02. Hear, hear. You know, when you look at it from an executive standpoint, it's the question of where do we invest? You know, my advice to some of those small businesses would be to, number one, understand what you have, what are you trying to protect? What does that data look like? And work hand in hand with executive leadership to understand exactly where that growth is supposed to be taking place. So that we can better understand the tools we have in our tool belt and deploy them in an effective manner. The last thing that we want to do as security experts is impede the growth of an organization, impede the collaboration that is required to partner with other organizations because nobody grows in a silo, right? So we need to ensure that we have that baseline understanding, we establish it, deploy it, and then we can look at optimizing and ensuring that we are leveraging whatever tools we have available to provide that defense in depth and the defense at scale that we need to do in order to be successful.

Carole Theriault

Brilliant. Smashing Security listeners, Material.security has a glut of information about detection and response in today's AI-driven world. Check it out for free at material.security. That is material.security. Josh Donelson of Material.security and Tony Albano of Google, thank you so much for sharing your expertise with us. SPEAKER_03. Absolutely. SPEAKER_02. Thank you for having me.

Graham Cluley

Terrific stuff. And that just about wraps up the show for this week. You can find Smashing Security on BlueSky, unlike Twitter, which wouldn't let us have a And don't forget to ensure you never miss another episode. Follow Smashing Security in your favorite podcast app, such as Apple Podcasts, Spotify, and Pocket Casts.

Carole Theriault

And huge, huge thank you to our episode sponsors, 1Password, Vanta, and Material.security. And of course, to our wonderful Patreon community. It's their support that helps us give you this show for free. For episode show notes, sponsorship info, guest list, and the entire back catalog of more than 411 episodes. Check out SmashingSecurity.com.

Graham Cluley

Until next time, cheerio. Bye-bye.

Carole Theriault

Bye.

Carole Theriault

Excellent stuff.

Hosts:

Graham Cluley:

Carole Theriault:

Episode links:

Sponsored by:

  • Material – Email security that covers the full threat landscape – stopping new flavors of phishing and pretexting attacks in their tracks, while also protecting accounts and data from exploit or exposure.
  • Vanta – Expand the scope of your security program with market-leading compliance automation… while saving time and money. Smashing Security listeners get $1000 off!
  • 1Password Extended Access Management – Secure every sign-in for every app on every device.

Support the show:

You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.

Become a Patreon supporter for ad-free episodes and our early-release feed!

Follow us:

Follow the show on Bluesky, or join us on the Smashing Security subreddit, or visit our website for more episodes.

Thanks:

Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.


Graham Cluley is an award-winning keynote speaker who has given presentations around the world about cybersecurity, hackers, and online privacy. A veteran of the computer security industry since the early 1990s, he wrote the first ever version of Dr Solomon's Anti-Virus Toolkit for Windows, makes regular media appearances, and hosts the popular "Smashing Security" podcast. Follow him on TikTok, LinkedIn, Bluesky and Mastodon, or drop him an email.

What do you think? Leave a comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.