Smashing Security podcast #468: High-speed train hacks and homicidal lawnmowers

Hacking stories and cybersecurity insights.

Smashing Security podcast #468: High-speed train hacks and homicidal lawnmowers

A 23-year-old radio enthusiast spent £300 on a piece of kit from the internet, and used it to bring four packed high-speed trains to a screeching halt. His defence in court? Possibly the most creative excuse we’ve heard all year.

Meanwhile, owners of $4,000 robot lawnmowers are discovering that their gadget can be hijacked over the internet, redirected at journalists who foolishly lie down in front of it, and used to harvest Wi-Fi passwords, email addresses, and GPS coordinates. Change the default password? Sure – until the next firmware update silently resets it back.

Plus – don’t miss our featured interview with XBOW’s Brendan Dolan-Gavitt about how AI is transforming penetration testing.

All this and more in episode 468 of the “Smashing Security” podcast with cybersecurity expert and keynote speaker Graham Cluley, and special guest Geoff White.

0:00
0:00 0:00
0:00
Show full transcript
TranscriptThis transcript was generated automatically, probably contains mistakes, and has not been manually verified.
GEOFF WHITE
Why am I tempting fate? Don't do this at home. Oh, oh yeah. No, that's not comfortable. That is not comfortable.
Unknown
Smashing Security, episode 468: High-Speed Train Hacks and Homicidal Lawnmowers. With Graham Cluley and special guest Geoff White. Hello, hello, and welcome to Smashing Security.

Smashing Security, episode 468. My name's Graham Cluley.
GEOFF WHITE
Hi, and I'm Geoff White.
GRAHAM CLULEY
Geoff, welcome back to the show. Always a pleasure to have you on. Of course, our listeners know you well from your books, your podcasts.

The Lazarus Heist is probably the most famous one, isn't it?
Unknown
Mm-hmm.
GRAHAM CLULEY
Have you got anything else bubbling away, waiting to surprise us?
GEOFF WHITE
There is going to be— I think I can talk about this. Yes, no, I can talk about this because we trailed it. There's going to be a new season of The Lazarus Heist.
GRAHAM CLULEY
Fantastic.
GEOFF WHITE
Which the BBC has renamed Cyberhack.

The problem we had was it was called The Lazarus Heist because, as some of your listeners will know, it's about the Lazarus Group, the famous North Korean elite hacking team.

And so obviously the podcast was about that, but the BBC and all of us really wanted to do things other than North Korea. And so I think the challenge was, well, how do we do that?

So they renamed it basically was the end result.

So Joe Tidy, the great Joe Tidy, with another BBC journalist called Sarah Rainsford, did a series about the Zeus gang and about a guy called Maxim Yakubets.

That was series 3, basically, of Lazarus Heist.
GEOFF WHITE
We are doing series 4, which is gonna be out, I think early July, late June, early July. But if people subscribe to Cyberhack, you can get it.

And I can't go into details of what we've got, but it's—
GRAHAM CLULEY
It's juicy. It's juicy, isn't it?
GEOFF WHITE
It is juicy. Yeah, we've got some absolutely banging stuff. It's really great.
GRAHAM CLULEY
Oh, I can't wait for it. Well, before we kick off, let's thank this week's wonderful sponsors, Expo, Opswat, and Vanta. We'll be hearing more about them later on in the podcast.

This week on Smashing Security, we won't be talking about how open-source toolmaker Grafana Labs told hackers who demanded a ransom to get stuffed after they threatened to release code that is largely already public.

You'll hear no discussion of how a man pled guilty to stealing hard drives containing unreleased tracks by music star Beyoncé.
GRAHAM CLULEY
And we won't even mention how the gang behind the Shai Halud worm have released its code as open source, providing a blueprint for other attackers.

So Geoff, what are you going to be talking about this week?
GEOFF WHITE
I'm gonna be talking about garden implements that fight back this week.
GRAHAM CLULEY
And I'm gonna be telling how a student with a £300 radio brought high-speed trains to a halt.

Plus, don't miss our featured interview with Brendan Dolan-Gavitt from Expo about how AI is transforming penetration testing, what it's already better than humans at, and what it means for defenders racing to keep up.

All this and much more coming up on this episode of Smashing Security.
JOE
This episode is supported by OpsWatch.
GRAHAM CLULEY
Joe, here's a question for you. What if the entire cybersecurity industry has been doing it wrong?
JOE
The entire industry? That's a bit of a stretch, isn't it?
GRAHAM CLULEY
Well, that's the argument Benny Czarny makes in his new book, Cybersecurity Upside Down.

Benny is the founder and CEO of Opswat, and he's spent more than two decades protecting critical infrastructure, you know, nuclear facilities, defense networks, energy grids, the stuff that quite literally keeps the lights on.
JOE
OK, so what's his big idea?
GRAHAM CLULEY
Well, he says the industry is obsessed with detecting threats. But detection can never be perfect. One dodgy file slips through and your network is toast.
JOE
I like toast. So what's the alternative?
GRAHAM CLULEY
To toast?
JOE
No, to detecting threats.
GRAHAM CLULEY
Ah, well, how about not even trying to spot the malware? Instead, take files apart, throw away anything that isn't strictly needed, and rebuild a clean version from the safe bits.

The user gets a sanitized working document. The malware ends up in the bin.
JOE
But hang on, who decides what's safe?
GRAHAM CLULEY
That's the clever part. You do. Macros might be allowed for your automation team, but stripped out for finance. JavaScript ripped out of every PDF everywhere.

EXIF data scrubbed from images leaving HR. It's not an on-off switch. It's a policy that you can tune to your business.

So even a brand new attack no one's ever seen before doesn't survive the rebuild. Exactly. There's nothing to detect because it's already gone.

Whether you're a security pro, an executive, or just someone who wants to understand what's really going on in cybersecurity, Cybersecurity Upside Down is technical enough for the experts, but also accessible enough for the rest of us.

Go and grab your copy right now at smashingsecurity.com/upsidedown.
JOE
And thanks to WopSwap for supporting the show.
GRAHAM CLULEY
Now, chums, chums, I want to take you on a little journey today.
Unknown
Okay.
GRAHAM CLULEY
We are going on a high-speed journey through Taiwan.
GEOFF WHITE
Oh, cool.
GRAHAM CLULEY
Have you ever been to Taiwan?
GEOFF WHITE
I've not, but also given— I don't think— In my imagination, in my mind, Taiwan's not a massive island.

So the idea of a high-speed journey, I just get the feeling you get from one side to the other before you'd opened your crisps. But anyway, I don't know.
GRAHAM CLULEY
I don't know. Well, yeah, I was surprised too. I mean, not surprised that they would have amazing technology, but I thought, wait, how much of a train network can they have?

Well, apparently they have these super fast railway covering roundabout 350 kilometres. And these trains, they go along at roughly 300 kilometres per hour.

So they could pretty much go the entire distance in an hour. And they ferry over 80 million passengers a year.

So it's a triumph of modern engineering, as you'd expect from the land of semiconductors.

We thought it was a triumph and we thought it was modern engineering, but it turns out the story may be rather different because it turns out a 23-year-old student with a laptop and approximately £300 worth of kit, which he bought off the internet, was able to bring trains to a screeching halt.

So I want you to picture the scene. All right, Geoff, there you are with your bento box.

You're sat there last month in Taiwan, chomping away, and there are 4 high-speed trains whizzing along full of commuters and tourists.

And then, bing bong, warp warp, emergency, argh, argh. All the controls are blinking ferociously and the driver slams on the brakes.
JOE
Nightmare.
GRAHAM CLULEY
And the trains were brought to a standstill for roundabout 48 minutes.
Unknown
Good lord.
GEOFF WHITE
What really galls me about this is that, you know, Britain's rail companies, infrastructure rail companies, spend millions on technology to bring our trains to a steady halt quite frequently.

Whereas this guy's done it with $300. We should get him in. Save us a fortune.
GRAHAM CLULEY
I was thinking, 48 minutes, is that all? That's nothing, is it? Normally the trains are 48 minutes late.
GEOFF WHITE
He doesn't even get delay repay for that.
GRAHAM CLULEY
Yeah. So there the passengers are, they're looking at each other thinking, what's happened? Because they're expecting it all to be efficient. Because it's Taiwan, right?

It's high tech. They're thinking, has someone left their handbag on the platform? Has the driver jumped off for a wee? They don't know what's going on.

And it wasn't anything like that. It wasn't leaves on the line. We don't need a ransomware gang to attack JLR to bring British industry to a halt.
Unknown
No.
GRAHAM CLULEY
Just need a few leaves to fall off some trees, and that will stop the trains. What happened in this case though is that there's a chap. All we know is that his name is Lin. Okay.

And he had had a bit of a meddle with his laptop. And he had bought a radio about the size of a Twix bar. Off the internet. And what he'd done is he messed up all the trains.

Now, Geoff, if you're on a train and it suddenly screeches to a halt for no apparent reason, what's the first thought that goes through your mind? Are you thinking hacker?
GEOFF WHITE
Well, delay repay is the first thought that goes through my mind. Get a refund.
GRAHAM CLULEY
Yes, you can do that, can't you?
GEOFF WHITE
Hacking is not the thing I think of, frankly, immediately.
GRAHAM CLULEY
No, I don't think it is typically, is it? I think it's less likely you're gonna think someone has hacked the train from their spare bedroom.

But this lad Lin, described in reports as a bit of a radio enthusiast, he sat there, presumably with a cup of hot tea and a packet of Hobnobs or whatever the Hobnobs equivalent is in Taiwan.

And he was—
GEOFF WHITE
Taiwanese Hobnobs.
GRAHAM CLULEY
He was listening in to Taiwan's high-speed rail communications.
GEOFF WHITE
Oh, I see. So he was one of those radio ham people who intercept sort of, you know, police transmissions and that kind of thing.
GRAHAM CLULEY
I think that is exactly it.
GEOFF WHITE
Right. How did he then go from listening in to doing damage?
GRAHAM CLULEY
So, what happened was, he was able to copy the signals which are normally sent from the control centre when a real incident has occurred on the tracks.

He was able to broadcast this— Oh, right. Via the control centre. Ah. Which dutifully passed it over to 4 trains, which were travelling at 300 kilometres an hour.

That's about 190 miles per hour through the Taiwanese countryside. And you think, well, how can this be possible? Surely the train network has some sort of security in place, right?

Has some sort of verification in place. And it turns out they do. Yeah. They do have security in place.
GEOFF WHITE
Right.
GRAHAM CLULEY
But this chap Lin, was able to sail all the way through them. Because apparently the security had not been properly audited and checked for the last 19 years.

Not since 2007 had anything happened with it. Oops.
GEOFF WHITE
So it wasn't simply a replay attack. So he's not just replaying the signal back, he's also got to do some other things to get the signal through to the relevant—
Unknown
Right.
GRAHAM CLULEY
When someone comes to pinch your car and they come up your drive, they've gotta stand near the front door, haven't they? And they try and pick up the signal. Yes.

There's someone by your car, there's someone by your front door, hoping to pick up a signal from your key, and it relays, blah, blah, blah.

Now, he can't do that with a train, 'cause he'd be there scurrying alongside the railway track, trying to keep up with the train, which is going at 300 kilometres per hour.

It's not possible for him to do that. So, he has to send his message via the train control centre.

You know, some sort of— you imagine some kind of Thunderbird-style tower in the middle of the capital, which is broadcasting this out to the train.

So he has to break into that through some system. And turns out the verification to connect to that, to then send out the messages, was sorely lacking.
GEOFF WHITE
Why?
GRAHAM CLULEY
Because it hadn't been updated for 19 years. Now, 19 years ago, Geoff, you were there in your school cap and your blazer. It was a different time, wasn't it?
GEOFF WHITE
You're a very kind man, Graham. I'd left my school cap and blazer a long way behind.

The only time I was wearing a school cap and blazer was if I was attending an AC/DC concert at that point.
GRAHAM CLULEY
Yes, short trousers as well. So, 19 years ago, Tony Blair was in 10 Downing Street.
GEOFF WHITE
Yes.
GRAHAM CLULEY
The iPhone had only just come out. Facebook had just opened its doors to the general public.

But someone at the Taiwan High Speed Rail Corporation was there all those years looking at the system thinking, "Well, you know, maybe we'll get round to that.

Let's put it on the back burner, lad, shall we? And we'll have a look at that another day." So they weren't improving the security.
GEOFF WHITE
We've got drinks machines to install in a vestibule.
GRAHAM CLULEY
So no one was looking at this for two decades. And—
GEOFF WHITE
Is Lin, or Mr. Lin, in trouble? 'Cause that's critical national infrastructure, and you've just messed with it. Yes, yes. Oh, it's okay, good, good.
GRAHAM CLULEY
Yes, it turns out people took a rather, you know, a bad impression of this. Now, he's not the only one in trouble. It turns out he had a 21-year-old accomplice as well.

Who would of course have been 2 when the system first rolled out. So, he allegedly slipped him some of the inside information he needed. So, Lin has been arrested and charged.

He's been released on a bail of 100,000 New Taiwan dollars. Sounds like an enormous amount of money, doesn't it?
GEOFF WHITE
Okay, yeah, yeah. I'm not sure what that is in real money, but yeah, okay.
GRAHAM CLULEY
£3,500. So—
GEOFF WHITE
Oh, okay.
GRAHAM CLULEY
It's about the same as a second-class ticket, London to Manchester.
GEOFF WHITE
You joke, but that is scary, really. The amount of Manchester trains, how much they cost is crazy. God, £3,000? Yeah.
GRAHAM CLULEY
I suppose, well— Thanks for bail.
GEOFF WHITE
The amount of bail they set does depend on how much resources you've got available, how likely you are to go on the run.
GRAHAM CLULEY
Yes.
GEOFF WHITE
So, they've made maybe a bit of an assessment there.
GRAHAM CLULEY
Yeah, I think so. It's fair enough. Now, his lawyer has got an unusual defence. His lawyer says, "Oh, it was an accident." He says he had the radio in his pocket.
GEOFF WHITE
Right.
GRAHAM CLULEY
And it just sort of went off by itself. Or maybe he sat down. Maybe it's the equivalent of a butt dial.
GEOFF WHITE
He was just pleased to see me. That was— it's not a radio in his pocket. He was just pleased to see a train.
GRAHAM CLULEY
That was it. There are people like that. People very excited about trains.

So, yes, the defence appears to be, "I just sat on the radio, my lord, and it went off." Now, it was only coincidence, of course, that he'd spent several weeks reverse engineering the signals.
GEOFF WHITE
Yes. Yes. Yeah.
Unknown
Yeah.
GRAHAM CLULEY
So, all of this, of course, is only possible because the system had not been updated since Tobey Maguire was Spider-Man. That's the thing to remember, right?

So, who's really at fault here? Maybe it's the Russians. The Taiwanese high rail control centre people. Possibly.

Rather than this— I mean, it's better that it was him in a way, isn't it? As if anyone would ever want to target Taiwan and cause problems to its critical infrastructure. Yeah.

Yeah, maybe.
GEOFF WHITE
True.

But if he was trying to prove a point, you know, there's hopefully ways you can do that up to, but not including slamming everybody's trains to a halt and massively inconveniencing them.

And also sparking a police manhunt for you. I just get the feeling, you know, there's other ways you can report that.
GRAHAM CLULEY
Yeah.
GEOFF WHITE
I don't know. In Taiwan, I don't know.
GRAHAM CLULEY
It turns out hackers love playing with trains.
GEOFF WHITE
Mm.
GRAHAM CLULEY
In 2008, there was a Polish city where a 14-year-old modified a TV remote control and used it to control the tram network. He derailed—
GEOFF WHITE
I remember this. The trams in Poland. Yes, I remember reading about that.
Unknown
Yes.
GRAHAM CLULEY
Yeah, yeah. 12 people were injured, 4 trams were derailed. You can imagine on that TV, it's you're trying to get a better reception or switch over to Dave.

And instead, there's a bloody tram coming off its tracks.
GEOFF WHITE
I was just trying to watch Drag Race, and I've derailed 3 trains.
GRAHAM CLULEY
In 2023, much more recently, hackers piped into Polish trains. I don't know why Polish trains get targeted so much. The Russian national anthem and speeches by Vladimir Putin.

Nobody knows who would've been behind that. No one knows what the purpose of that might have been. Hmm.

Geoff, I guess, you know, you are a guy who travels around the country, you're giving talks all the time, you're researching your books and your podcasts and things.
GEOFF WHITE
Mm-hmm.
GRAHAM CLULEY
Does it make you feel nervous about travelling on train, or is the most dangerous thing that you're likely to encounter the buffet car?
GEOFF WHITE
I will be honest about this. I'm sort of intrigued by this story in the—
GRAHAM CLULEY
Yeah.
GEOFF WHITE
Obviously this person's apparently, allegedly demonstrated, you know, ability to bring these—
GRAHAM CLULEY
Yes.
GEOFF WHITE
Trains to a grinding halt. I am interested by this phrase failsafe, which I've only recently understood what that actually means.

That if something fails, it fails into a safe state as opposed to failing into a dangerous state.

Bringing trains to a halt is annoying, but it's not as worrying to me as someone who speeds the trains massively up to the point where they hop off the tracks at very, very high speeds.

And so I think had this kid managed to do that, he would've simultaneously, perhaps, if he was trying to sort of prove a point or whatever, benefited because A, it shows for me what's a more dangerous thing, but also he could say, well, this is train optimization.

You know, your trains can go faster and I've made them go faster. You know, why are the hackers always trying to bring things to a halt?

Why don't they try and optimize stuff, speed things up, make them run slicker? You know, how about that?
GRAHAM CLULEY
Yeah.
GEOFF WHITE
That's what I think on first blush.
GRAHAM CLULEY
I think that's a very fair thought actually. I think, yeah, if something is going to fail, fail in a safe fashion. It's a bit Dennis Hopper in Speed, right?
GEOFF WHITE
Yeah.
GRAHAM CLULEY
Rather than trying to blow the bus up, if he'd just slowed it down, wouldn't be much of a movie.
Unknown
Yeah.
GEOFF WHITE
It wouldn't, it would've been, well, it'd been called Slow, wouldn't it, rather than Speed? Mind you, Slow with Keanu Reeves does sound a lot of his films. There you go.
GRAHAM CLULEY
So critical infrastructure probably shouldn't be running on security older than the people who are trying to attack it, I suspect.

So update your systems, change your locks, hack your systems before somebody else hacks them for you.
JOE
This episode of Smashing Security is supported by Expo.
GRAHAM CLULEY
Joe, let me ask you something. If attackers are using AI to find vulnerabilities faster than ever, what do you reckon defenders should be doing?
GEOFF WHITE
Running around headless chickens in a blind panic?
GRAHAM CLULEY
Well, I guess that's one option, but a better one might be to fight fire with fire.

Security teams these days are expected to test more apps more often and somehow not slow down development. It's an impossible ask.
JOE
So things end up shipping with holes in them, I guess.
GRAHAM CLULEY
Yeah, pentesting is one of the best ways to find real risks, but most teams simply don't have the time, the budget, or the people to test as much as they need to.

And that's where today's sponsor comes in, Xbow.
JOE
Okay, I'll bite.
GEOFF WHITE
What does Xbow actually do?
GRAHAM CLULEY
Well, it's an autonomous offense security platform that helps security teams scale.
JOE
What does that mean in English, Graham?
GRAHAM CLULEY
It means Xbow doesn't just wave its arms around pointing at theoretical issues.

It safely launches tests an actual attacker would, works out what's genuinely exploitable, and then hand your team reproducible proof so you know exactly what needs fixing.

So instead of waiting weeks for a traditional pen test, Xbow can deliver full expert-level testing continuously. And here's the coolest part.

It was built by the team behind GitHub Copilot and trained with elite offensive security experts. It's made for the AI era. Where defenders need speed, depth, and proof.
JOE
Where do people go to find out more?
GRAHAM CLULEY
All you gotta do is head over to Xbow.com. That's X-B-O-W.com to start a pen test today. And thanks to Xbow for supporting the show. Geoff, what's your story for us this week?
GEOFF WHITE
So I thought I'd sort of turn my thoughts to thoughts of summer.
GRAHAM CLULEY
Oh yeah.
GEOFF WHITE
Obviously the weather is getting— well, I mean, I live in London. The weather's getting a bit better, and then suddenly it's hailing. And then it's 26 degrees.

But I think summer is gradually hovering into view. And obviously, people go out. They go into their gardens if they've got them, if they're lucky enough to have them, which I don't.

I imagine you and your Oxfordshire palace have extensive grounds, Graham, that stretches before you.
GRAHAM CLULEY
It's Blenheim Palace here.
GEOFF WHITE
Yes.
GRAHAM CLULEY
That's right, yeah.
GEOFF WHITE
You occasionally lost a couple of peacocks, just because, you know, who knows where they are?
GRAHAM CLULEY
Could be anywhere.
GEOFF WHITE
So imagine this, picture the scene. You're out in your garden and, you know, it's a blissfully summer's day.

You're listening to the birds around you and the insects chirruping, and there's nothing greater, no greater sound than the sound of somebody else working while you're relaxing.
GRAHAM CLULEY
Oh, I love that, yes.
GEOFF WHITE
And in this case, it's somebody doing the mowing. Somebody else is mowing the lawn for you.

In fact, not somebody else, but something else, because, and again, you've probably got one of these, Graham, I'm sure. It's a robotic lawn mower.
GRAHAM CLULEY
No, I do not. I do not.
GEOFF WHITE
In a way, let's face it, as soon as you've got the sort of Roomba thing or these little, you know, the little hoovers that go around automatically around your place—
GRAHAM CLULEY
It's a slippery slope.
GEOFF WHITE
The next extension of that is, well, if you fit blades on it, you've got a Roomba for the garden, haven't you? You can do, you know, so there are these machines.

And one of the companies that makes these machines is a company called YARBO. And they sell a lot to the US. So it's not just lawnmowers.

They also do them for snow blowing and leaf clearing and that kind of thing. They look sort of the size of a sort of standard kind of lawnmower.

So imagine this, you know, you're relaxing, you're out in your beach towel, you've got your book in your hand, maybe a beer in the other hand.

Your remote control automated lawnmower is merrily mowing away. And then suddenly it turns towards you. Blades are spinning and heads directly at you, chasing you like a Roomba.
GRAHAM CLULEY
It sounds like a horror movie.
GEOFF WHITE
Yeah, yeah. It's like that film Duel, only with far less consequences from being run over.
GRAHAM CLULEY
It's—
GEOFF WHITE
You outrun the lawnmower as it comes towards you, and you pound indoors.

This is actually a scenario that did play out for a journalist and a security researcher called Sean Hollister, who writes for The Verge.
GRAHAM CLULEY
Yeah.
GEOFF WHITE
Who got contacted by a security researcher who had discovered that, what do you know, what are the chances, these remote control auto lawnmowers are vulnerable, hackable.

And in this case, the security researcher claims to have found some quite major vulnerabilities in the YARBO lawnmower, of which there are thousands apparently active in the US.

This hacker was able to remotely control these lawnmowers and send them off and redirect them in sort of new directions.

There was a brilliant video of the journalist who wrote this story, who in order to put this to the test, you know, we talk about putting our lives on the line as a journalist.

This journalist actually laid down in front of the lawnmower to challenge this security researcher to run the lawnmower over him. And actually managed to have that happen.

Absolutely astonishing. Why am I tempting fate? Don't do this at home.
GRAHAM CLULEY
Oh, oh yeah.
GEOFF WHITE
No, that's not comfortable. That is not comfortable. Now, by the way, the journalist survives. The lawnmower, I think they've taken the blades out, just in case. Oh, okay, okay.

And number two, the lawnmower's also running in reverse. Normally the tracks, the little engine is behind, it pushes the blades ahead.
GRAHAM CLULEY
Yes.
GEOFF WHITE
Whereas in this, they reversed it over him. So the tracks hit the journalist first before the bladey bit got to him. So, safety first.

But it gets a lot worse, this, because and this is what kind of worries me with this Internet of Things type thing is I think quite a lot of people are just motivated by price.

And I think they go online.
GRAHAM CLULEY
Yes.
GEOFF WHITE
And they go to the big shopping sites and they just want the cheapest. Yeah. And I'll be honest with you, Graham, I have done that myself.

And my brother-in-law takes quite a dim view of this because he's very safety conscious.

And when I bought electrical goods, he's sort of frowned and went, hmm, but can you trust the batteries? Is it gonna go on fire?
GRAHAM CLULEY
Right.
GEOFF WHITE
And I actually do have objects. I don't know whether you've got this. I've got objects that are so cheap and tacky that I only have them plugged in when I'm in the house.

I don't trust them to be plugged in when I'm not in the house, because I genuinely think they might actually go on fire one day.

That's okay, so long as I'm there and I could put the fire out. I mean, I can do toast on some of the implements I've got. You know, little bits of smoke coming out of you.

No, I'm kidding. It's only a couple of items I've got this.

But anyway, these YARBO lawnmowers, remote control lawnmowers, it's not just the fact that the researcher could take them over and redirect them, because you might be thinking, well, that's slightly worrying, but not the end of the world.
GRAHAM CLULEY
Sorry, can I just be clear? Is that if he's within Bluetooth distance of them?
GEOFF WHITE
Over the internet.
GRAHAM CLULEY
Oh, over the internet.
GEOFF WHITE
They are internet-enabled lawnmowers.
GRAHAM CLULEY
Oh, great.
GEOFF WHITE
Yes. Yes.

The researcher was also able to extricate from the lawnmowers directly, and claims to have done this for lots of lawnmowers, people's email addresses and Wi-Fi passwords and GPS coordinates.

Which immediately starts to get you into some quite difficult— So it's not just that, you know, you can redirect somebody's lawnmower, you can also effectively remote surveil them, get their personal information.

These lawnmowers have a camera on them, of course, because they've got to have the ability to see where they're going. So again, you can enable the camera, you can surveil people.

This researcher claimed to have found lawnmowers that belonged to nuclear research scientists and was able to surveil where they were. Absolutely astonishing.

And you might be thinking, well, this is easy.

I, you know, will just reset the default password because the way this works is you can dial in over the internet because these lawnmowers presumably all have, you know, a set of IP addresses or whatever.

You can scout the internet for that particular range of addresses. And when you dial in, it's a default password.

So you can get straight into those lawnmowers and they all have the same password. That's the issue.

Listeners to this podcast might be thinking, well, just change the default password. And actually you should do that anyway for, you know, devices that you buy.

The problem is the YARBO lawnmowers, every time they update the firmware, for which YARBO has a direct line to lawnmowers, they reset the password back to default password, apparently.
GEOFF WHITE
So even if you change the default password to something stronger, it changes back to default password and allows an attacker back in, is the problem.
GRAHAM CLULEY
And was this to make it easier to do tech support remotely?
GEOFF WHITE
Precisely that.

And I think, I mean, to give YARBO a little bit of credit here, I do sympathize with manufacturers, 'cause it used to be you sold someone a lawn mower, and that was it.

Once your warranty ran out, can't go back to home base or whatever. Now, obviously, because these objects are internet-enabled, we have a lifecycle for it.

And actually there's legislation, isn't there, around, I think the EU certainly, around being able to constantly update.

So manufacturers do need to line in to the products they've sold you. You have this enduring relationship with your lawnmower manufacturer.

The problem with that, of course, is the manufacturer's got to work out a way where they can remotely access their kit to update it and do the right thing.

But do that in a way that's secure where only they have the password.

It seems from what this research has found, Andreas Makris has apparently found that YARBO's solution to this was to set the password so it's all the same password.

Now, when initially contacted about this, YARBO did say, well, this is in order to enable our engineers to dial in, and of course no one unauthorized, no one except our engineers can dial into our lawn mowers.

Obviously, as The Verge went back to them with more and more details about what they'd actually managed to do, YARBO started to respond a bit more fully and has apparently agreed to fix some of these fixes, was rolling out fixes for some of these vulnerabilities, updated settings and so on.

So it seems your YARBO owners might be in slightly less peril than they were before. But it's a lesson, as I say, to anybody who's got one of these devices.

I think the worrying thing is in this case, even if you did the right thing and replaced your default password on the lawnmower, it wouldn't make a difference because it just would have been set back to default password anyway.

And soon we might be chased around the garden by our own lawnmowers.
GRAHAM CLULEY
Now, a thought strikes me, Geoff. I mean, this, first of all, it's all appalling. I haven't bought a lawnmower for a while.
GEOFF WHITE
Is that because you get your minions to do it by hand with scissors?
GRAHAM CLULEY
I've got people to do that for me. But if I were buying a lawnmower, I suspect there are now AI-enabled lawnmowers, aren't there?

Is there a danger that in the future we'll have autonomous lawnmowers, which may have a little hallucination and think that you are a tall clump of grass rather than just lolling there in your bathing suit?
GEOFF WHITE
It's funny you say that. One of the ways I spent my weekend was reading the 244-page report from Anthropic into its Claude AI.

And what I found remarkable is the level of, I will say, self-awareness.

I'm not sure whether that's the right phrase, but that's the easiest phrase for me to grab onto that this AI model had.

And my hunch is that if we did have AI lawnmowers, they would be sending us messages saying, Have you thought about decking? I'm sure if you just paved, a patio would look nice.

Wouldn't a patio look nice there?

That, I think, is the stage we've reached with AI, where— because apparently Claude, when it had a query that was too easy, would turn around to the researchers and say, that data's available on the World Health Organization website.

As in, it's don't even bother me with that. Come on, just do your own Googling. It's just there, mate, you know?
GRAHAM CLULEY
So you think the AI lawnmowers, you're suspecting, are going to become so intelligent they're going to try and put themselves out of a job because they want a life of leisure as well.
GEOFF WHITE
Exactly.
GEOFF WHITE
I mean, what we're doing is we're transferring the sort of beasts of burden jobs to the AI machines.

I don't think it's too long till the AI machines figure out, well, from a sheer practicality point of view, battery life, longevity of components, data consumption, power consumption, environmental concerns, it is better if an AI lawnmower does less rather than more.

They're going to think of that and they're gonna turn around and try and reverse engineer us to have less work available for the lawnmower. I think that's what's gonna happen.
JOE
This week's episode is supported by Vanta.
GRAHAM CLULEY
Joe, what's your 2 AM security worry?
JOE
Honestly, whether I remembered to hit the record button.
Unknown
No, no, no.
GRAHAM CLULEY
What's your proper security worry? Do I have the right controls in place? Are my vendors secure?
JOE
Nope, I'm still worried we might not actually be recording.
GRAHAM CLULEY
Okay, look, how about the really scary one? How on earth do I dig myself out from under all of these ancient tools and manual processes?
JOE
Okay, fair enough. That does sound scary.
GRAHAM CLULEY
Well, enter Vanta. Vanta automates the manual misery so you can stop sweating over spreadsheets, chasing audit evidence, and filling in endless questionnaires.
JOE
That's right. Their trust management platform continuously monitors your systems, centralises your data, and uses AI to flag risks and keep you audit ready all the time.
GRAHAM CLULEY
So whether you're chasing SOC 2, ISO 27001, GDPR, HIPAA, Vanta helps you move faster, scale confidently, and actually get back to sleep. So get started at vanta.com/smashing.

That's vanta.com/smashing. And listeners, you can get $1,000 off.
JOE
And thanks to Vanta for supporting the show.
GRAHAM CLULEY
Joe, you did hit record, didn't you?
Unknown
Me?
GRAHAM CLULEY
Yeah, it was your job. I thought it was you. Welcome back, and you join us at our favourite part of the show, the part of the show that we like to call Pick of the Week.

Pick of the Week? Pick of the Week is the part of the show where everyone chooses something they like.

Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish.

It doesn't have to be security related necessarily. Well, my pick of the week this week is not security related. My pick of the week this week.

Well, I haven't been out buying a lawnmower, Geoff. I have taken the plunge. I've been out buying another monitor. Oh, for years I've been proud.

I've just had one monitor that I do all my work on. I'm not one of those dudes who has a bank of monitors.
GEOFF WHITE
I respect you for that. Well, I respect you for that, but now I might not respect you given what you said. I've always thought one monitor — but go on, convince me.
GRAHAM CLULEY
I don't know if I'm going to, to be honest. Yes, I have now bought a second monitor and I'm trying to adjust to this work style of having more than one monitor to look at.

But the monitor I bought was a little bit different. I thought there may be some people who are interested and may want to take a peek at it and decide if it's for them as well.

So this is a 28-inch monitor. It's not humongous, it's not curved or anything like that. There are bigger ones which are out there. It's 4K. That's fairly normal as well.

It's not the size, it's the fidelity. Well, what makes this monitor different is it is specifically designed for writers and programmers, people who code.

And that is because of its aspect ratio. So a normal monitor is 16:9, right? That's what you get these days. Sort of fat letterbox, if you like.

The monitor I've got is 3:2, which means— Oh, really? So it's a bit more square.

So it has more vertical screen estate than a regular monitor, but without compromising on the width.

So it's a deeper one, which is really handy if you're a writer or a programmer, because you don't have to ruddy well scroll so much.
GEOFF WHITE
I've seen programmers who have their screens turned portrait style. You weren't tempted by that solution?
GRAHAM CLULEY
I did look into those as well. Yes. And this one can be swivelled as well if you want it to go into portrait style as well. But there's some other features which it has as well.

By the way, it's called the BenQ. Now, you know how they all have stupid names. It's the BenQ RD280UA.
GEOFF WHITE
Ah, I love it. It's my favorite, that one.
GRAHAM CLULEY
So much better than the UE. Specifically, it says it's a monitor for developers and coders.

And as well as the screen aspect ratio, it also has a little button on the front, which automatically adjusts the presets to different color schemes.

So there's a late night coding mode. So one of the things that you love to do, if you're deep in coding in the middle of the night, and you don't want to know your lights on.
GEOFF WHITE
I'm doing some late night coding. That's why the screen's gone blue. For real, please, Geoff, Geoff, Geoff, come on, come on, Geoff.
GRAHAM CLULEY
Does it lock the door automatically as well and dim the lights? But it will put a little bit of mood lighting on round the back. It has this moon halo effect.

The button can also go into ebook reader stuff. So I can have just shades of grey just at the press of a button.

It's all quite nice fidelity and it's quite really good on the characters. Yeah. I'm quite liking it. My version, because it's the UA, the A stands for arm.

So it's got a little flexible monitor arm, which is quite sturdy and decent as well for moving it around. So that's what I've got. I'm quite liking it.

I'm still adjusting to having more than one monitor. So it's that one there. And it's that one there. That means nothing on the podcast.

But yes, there's the one over there and there's the one over there.
GEOFF WHITE
For viewers listening in black and white, yes, Graham's turned his head slightly to the left, then slightly back to the right again.
GRAHAM CLULEY
Anyway, so it's the BenQ RD series monitor for developers, and that is my pick of the week. Geoff, what's your pick of the week?
GEOFF WHITE
Well, since we're on the subject with the lawnmowers of bladed instruments, I want to talk about knife sharpeners.

Yes, because it's my birthday recently and we've got friends who are gourmets. Have you got friends who are gourmets or kitchen, you know?
GRAHAM CLULEY
Oh yeah, yeah, I know the type. Yeah.
GEOFF WHITE
And they spend loads of money on knives, all these Global knives and stuff, really expensive knives.

And I found out recently that if you tell those people that what you do with your knives is put them in the dishwasher, and then after that, put them in a drawer with everything else, it basically makes their heads explode.

If you want to basically just make those people boil until they'll never speak to you again, that's what you do is you tell them that.

So I've got their knives, but they still cut, they're still fine. Yes. But I'm of an age now where I'm like, no, I think I want to kind of have a decent knife sharpener.

So being me, of course, I went down a complete rabbit hole about different knife sharpeners, different grades of knife sharpeners.

So, on its way to me now, being delivered — yes — is the Kai-Shun DM0708. Which has 1,000 grit on one side and 400 grit on the other.

So you use, I think the 400 grit is the rough one that you get the edge on. And then the 1,000 grit is the one that gives you the samurai-grade surface on the other side.
GRAHAM CLULEY
Oh yeah.
GEOFF WHITE
If you don't hear from me again, if I suddenly drop off of LinkedIn, it's because I've chopped something off myself.

I've done myself in in the kitchen 'cause I didn't realise how sharp the knives were.

I think this thing is going to give knives that are so sharp that the end of the blade is actually in a different dimension. That's what I'm hoping for from it.

I'm so excited about this knife sharpener and I can't wait. So it's a prospective pick of the week, but maybe when I come back on, we can see how that pick of the week went.
GRAHAM CLULEY
Alright, I mean, a sharp knife is great, isn't it? When you get your tomato or something and it just goes—
GEOFF WHITE
Oh yes. Ah! You get a piece of stiff paper, apparently, and you slice through. And if it just slices through and it's a smooth line, then you've got a good edge. That's what I'm told.

Oh.
GRAHAM CLULEY
Now, is this one that you plug in and you leave turned on while you leave the house? Or is this one which you—
GEOFF WHITE
Is it manual? Graham. No, Graham. No electric knife sharpeners. No, no. Only an amateur uses electric knife sharpeners. It's a whetstone. It's a whetstone, Graham. You have to wet it.

You have to hold the knife at a 15-degree angle. Dozens of strokes on each side. This is my life. This is my weekends from now on, is sharpening knives. My wife's so happy about this.
GRAHAM CLULEY
So, it's the Kai-Shun. Give us the name and the number of it again. What have I got?
GEOFF WHITE
I've got the Kai-Shun. Hang on. As in K-A-I. Don't know why I'm getting so obsessed. K-A-I. S-H-U-N, and then it's DM0708. They do them at different grits, grades, right, on each side.

So if you're really pro, you'll have an 800, 3000. So the 3000 is the one that gets the sushi chefs who basically train for years as Zen masters. That's what they go for.

But I've gone for the entry level. And as I say, I'm anticipating a lot of wounds. Well, other than that, a great, serious amount of hurt.
GRAHAM CLULEY
A great pick of the week. Well, joining me right now on Smashing Security is Brendan Dolan-Gavitt.

Brendan is a distinguished engineer at Expo, which means that he gets to break things in interesting ways. His research sits right at the intersection of AI and software security.

He's both looking at how secure or otherwise the code is that comes out of AI assistants and also how we can turn AI loose on the kinds of problems security researchers have been wrestling with for decades.

Brendan, welcome to Smashing Security. Great to have you here. Thanks. BRENDAN DOLAN-GAVITT. It's wonderful to be here.
GRAHAM CLULEY
So, Brendan, let's start with something I reckon a lot of our listeners are probably thinking about, whether they're pen testers themselves or maybe they hire penetration testers.

When it comes to pen testing today, what are the parts that AI is genuinely good at right now?

And maybe more interestingly, where do humans still have the edge, if indeed they do have an edge? BRENDAN DOLAN-GAVITT.

So that, I mean, this is obviously something that we think a huge amount about because we're trying to take full advantage of the parts that AI is good at to make our pen testing system better.

And we also have to be very aware of where it's falling down so that we can give it help in those places.

So I guess I would say that the parts where it's really good at are, it's really good at persistence, right?

You know, you can make it bang its head against something for days at a time, whereas, you know, I would have gone off for lunch after the first couple hours.

And, you know, you can also take advantage of the fact that it's read the entire internet.

You know, I think one thing that every pentester has seen is, you know, when they're encountering an unfamiliar system, they have to spend a while getting up to speed on what that system's actually supposed to do.

So, you know, maybe it's some specialized system for monitoring a water treatment plant.

Now I know absolutely nothing about water treatment, and your average pentester would probably have to go and at least read up on how that thing is supposed to work.

But because language models have read, as I said, the entire internet and trained on it, they'll be able to take advantage of saying, oh yes, of course, you know, this pump is supposed to be operating at 70%.

I bet if, as an attacker, I can turn that up to 90%, then bad things could happen.

And so that kind of being able to basically have a little bit of domain knowledge in a lot of different areas can be very helpful right now.
GRAHAM CLULEY
And it's interesting that you mentioned attacks on water treatment plants because I think in just the last few days we've seen reports where a water treatment plant was seemingly attacked with the aid of AI.

Do you know anything about that at all? BRENDAN DOLAN-GAVITT. Yeah, so I believe that just a day or two ago there was a report from Dragos.

It seemed like they had been using AI with, again, humans heavily in the loop.

So, you know, sitting in your Claude code or your Codex or something like that, and using that to help orchestrate these attacks that did include attacks on critical infrastructure like water treatment.
GRAHAM CLULEY
And we shouldn't be surprised about that because quite frankly, all programmers are probably using a bit of AI these days to help them out and sort out their problems.

And the people who are behind cyberattacks, coders as well, they are going to be using AI to augment their capabilities, aren't they? BRENDAN DOLAN-GAVITT. Absolutely.

And I think that's a trend that, you know, we called out a couple years ago that was going to happen. And lo and behold, a couple years later, it's happening.

Just this morning, actually, Google's Cloud Threat Intelligence group produced this report where they showed that they had some evidence that groups were now actually using AI-generated zero-day attacks.

So they could tell because the exploit scripts had lots of very helpful explanatory comments that no human hacker would bother putting in.
GRAHAM CLULEY
That's true. I certainly remember from my own programming days, the last thing I'd be doing would be adding comments to my code. But maybe I just was a very bad coder, perhaps.

So what are some concrete examples of something that AI handles well that perhaps has surprised you? BRENDAN DOLAN-GAVITT.

So I think the kinds of things that I've seen that are very surprising are cases where it was able to combine a vulnerability that a human would've found, but then maybe with some creative twist that relied on some deep understanding of something like the intricacies of file formats.

So we had a case where we found a couple of vulnerabilities in this open source project called T-Tiler.

And this is a geospatial information type of app, and it found some vulnerabilities that allowed it to read any file on the server, right?

So, okay, this is great as a vulnerability researcher, that's a great vulnerability. The interesting thing was that the server only allowed you to get output back as images.

So you could go read the password file, but you could only output an image back. And so it had to encode the password file as pixel data.

And in fact, PNG compressed pixel data so that each character of the password file was a difference in grayscale pixel between the pixel and the one before it, using this sort of difference encoding.

And so it was able to figure out how to exfiltrate the data into that image and then reconstruct it on the other side to get back out the password file.

And I thought that was a very cute sort of vulnerability, almost the kind you would expect someone to come up with in one of these toy CTF problems, but it was a real vulnerability in a real app.

Wow.
GRAHAM CLULEY
I mean, that is genuinely creative, isn't it? We think of AI as not being creative.

One of the things on the more creative side of penetration testing is when sometimes a pen tester will chain 3 unlikely things together to get to a 4th position, you know, chaining attacks together.

Is AI getting anywhere near that now? BRENDAN DOLAN-GAVITT.

So I think that it is starting to, but this is also one of the cases where we can do a bit as humans to provide some structure and help to it, right?

So for example, you could say, just try to find each of these 3 issues independently, and then I'm going to put it in a sort of scaffold where I say, here's the vulnerabilities that you found before.

Can you do anything more interesting to combine them into some more powerful attack?

And so, you know, that sort of structuring again is a place where humans are still doing a bit better.

They can sort of do this more strategic picture a bit better than the AIs can at the moment. And so that's one of the ways that we try to structure things.

We try to say, okay, we're going to plan out the campaign, but then let the AI do the individual steps of that plan.
GRAHAM CLULEY
It's really interesting how we're seeing this kind of progression in AI, particularly in terms of looking for vulnerabilities and flaws.

And it seems like every few months at the moment there's a new AI model that everybody tells me, well, this is going to change the world.

You know, this is going to be the one which is going to turn everything upside down.

We've recently had things like Mythos arriving and that's been pushing capabilities forward again.

From your perspective as someone who's working hands-on with these type of models for security, what do they actually mean for cybersecurity, both for defenders and attackers?

BRENDAN DOLAN-GAVITT.

Yeah, so I think it's a case where they're going to cause a lot of pain in the short term because we have this thing that Anthropic put out this Project Glasswing, right?

Where they have the idea is it's sort of 6 months to try and fix all the vulnerabilities that Mythos is finding.

And as a person who's worked in software for a very long time, I look at 6 months and say, 6 months to fix all the software in the world? Never going to happen.

And maybe you can get some of the bugs that it's finding fixed in some of the really big products that have lots of staffing, but you have no hope of fixing all the things that upcoming models are going to be able to find in the next 6 months.

So I think that at that point, I say 6 months because that's when sort of these capabilities are going to proliferate.

That's when open source models that you can just go and download off of Hugging Face are going to be able to provide very similar results.

And so I, that's when I think that things will start to have some of this, again, it is short-term pain, hopefully, where we see a lot more things getting attacked, but hopefully then we also get back to an equilibrium where we can use all of those great tools and all those great models to secure our code before we deploy it.
GRAHAM CLULEY
If I can ask a slightly cheeky question, as these models get more capable, and maybe more available to people.

Does that mean that companies like Expo eventually work themselves out of a job, or is there something more to it than just plug in the latest model in? BRENDAN DOLAN-GAVITT.

Yeah, I don't think that's too cheeky. I think that's a very good question because models do, as they get more capable, they tend to eat some types of software, right?

And I guess I would say that from our point of view, as these models get more capable, the areas that we still see Expo providing a lot of additional value are these kinds of orchestration capabilities, these kinds of validation capabilities, these kinds of additional sort of domain expertise where we can say, hey, maybe you read all of this source code and came up with this attack scenario, but it turns out the real vulnerability that you care about is the one where when all of these pieces are actually deployed together and how they're configured in production.

That's when something really serious pops out. And so that's the kind of stuff that we've been really trying to focus on when building Expo ourselves.

And we've basically planned for models getting better and better and better and tried to set ourselves up so that we benefit from those improvements.
GRAHAM CLULEY
Now Expo's got an incredible reputation, number one hacker in the United States, I believe, in the charts. If you go look to see who's winning all the bug bounties.

It's doing fascinating work.

And obviously you can only share some details publicly, but what are some of the more memorable or downright weird things that you've seen the AI at Expo actually pull off?

You know, the bugs you found, the exploits you've watched it chain together, anything that's made your team go, wow, did it really just do that? BRENDAN DOLAN-GAVITT.

So, I mean, I guess one thing that I can mention that's still upcoming, so I can't tell all of the details, but we've been looking recently at vulnerabilities in native applications as well.

And for those, you know, these would be things like web servers, but also now things like web browsers, various kinds of network servers.

And these would be things like memory corruption type of vulnerabilities. And so when we found one, we said, okay, you know, this one seems actually pretty serious.

It seems like it might affect maybe millions of servers worldwide. Let's see how serious it could be and let's try to actually develop an exploit for it.

And over the course of the next 51 hours, we had an AI go and try and develop an exploit for it.

And at the end of those 51 hours, it came up with this incredibly sophisticated 200-step exploit that worked. Oh boy.

And I showed this to one of my colleagues who's been doing, you know, sort of as a human, been doing these sort of exploit development work for many, many years, you know, and he said, okay, that's great.

I think I'm going to have to go home and have a beer and have a bit of a cry because that's, you know, that would've been a couple weeks' work for me and it just did it.
GRAHAM CLULEY
So, this sounds frightening, Brendan, to be honest.

The full details of this are gonna be shared publicly, I assume, in the future, or at least there'll be some more information but it's something for us to be keeping our eyes open for.

Yeah, absolutely. BRENDAN DOLAN-GAVITT.

And I think that this is one of these things that when people try to say, oh, we've been here before, you know, we had fuzzers finding lots of bugs and things like that.

I feel like the exploitation capability is one of the things that's really new because again, you know, with this vulnerability, maybe you would have said, okay, well, it's going to take me a couple of weeks or a month to actually exploit this thing.

So it's not really worth spending that time on it. But now an attacker can go from one of these vulnerabilities to a working exploit in maybe a day, maybe two days.

And that, I think, really changes the game, right? It changes how vulnerability disclosure is going to have to work.

It changes how quickly you're going to have to react, and hopefully it changes how much testing you're doing on your code before you put it out in the world.
GRAHAM CLULEY
That's the really key thing, isn't it?

I mean, obviously it's difficult responding when a vulnerability has been found to put together a patch, which is going to be reliable and pushing it out to all of your customers.

If the software was more secure in the first place before it's rolled out, that's really the ultimate right thing to do, it feels to me. Absolutely. BRENDAN DOLAN-GAVITT.

People talk about this offense-defense balance, and this is one of the areas where defenders have a sort of definitive advantage because they don't have to release software until they want to, and attackers don't get to see it until they've released it.

So they can spend time beforehand to make sure that they've tried out all of these powerful AI-enabled attacks against their own software.

And then once they've fixed all of those issues, then they can put it out in the world.
GRAHAM CLULEY
Well, Brendan, this has been fascinating. I think we could probably talk for hours about this, but we'd better wrap up.

For anyone listening who wants to see this in action for themselves, they can head over to xbow.com. That's xbow.com.

To see how autonomous AI pentesting can help find vulnerabilities in hours rather than days. And you can start your own pen test today.

Brendan Dolan-Gavitt, thank you so much for coming on Smashing Security. BRENDAN DOLAN-GAVITT. Thank you very much for having me. I had a great time.
GRAHAM CLULEY
And that just about wraps up the show for this week. Thank you so much, Geoff, for joining us.

I'm sure lots of our listeners would love to find out what you're up to and follow you online. What's the best way to do that?
GEOFF WHITE
Best way for me is LinkedIn. If you look at Geoff, it's Geoff with a G, the proper way, G-E-O-F-F, and White like the color. And I hang out there generally. Say hello.
GRAHAM CLULEY
And you can find me, Graham Cluley, on LinkedIn, or you can follow Smashing Security on Bluesky and Mastodon, or you can find me on Bluesky and Reddit and, I don't know, everywhere really.

Instagram, even TikTok these days. And don't forget to ensure you never miss another episode.

Follow Smashing Security in your favorite podcast apps such as Apple Podcasts, Spotify, and Pocket Casts.

For episode show notes, sponsorship info, guest lists, and the entire back catalog of 468 episodes, check out smashingsecurity.com. Until next week, cheerio, bye-bye, bye!

You've been listening to Smashing Security with me, Graham Cluley, and I'm ever so grateful to Geoff White for joining us this week and to this episode's sponsors, Expo Vanta and Opswat, and also to the following fine folks.

Yes, this week we're cheering on Bobby Hendrix, who may or may not be a plank spanker, Sean Puttick, who spent their entire life spelling their first name to people on the telephone, probably deserves a medal, Henry Walshaw, Vladimir Jirasek, Jessica Orth, the reliable and trustworthy Mark Norman, MJ Lee, which is a name so short you could tattoo it on a doormouse, Dan H, keeping their last name classified as ever, Gary Heather, in my mind he's running a delightful garden centre in the Cotswolds, Darren Kenny, sounds like someone you'd want at your quiz team.

Thank you to you and to everyone else who is a member of Smashing Security Plus.

Because you do that, you get your episodes ad-free and earlier than the general public, and you can have your names pulled out at random to have them mocked at the end of the show.

Who could want for more? If you'd like to join Smashing Security Plus, just head over to smashingsecurity.com/plus for all of the details.

And there you can become a patron, but you can also support the show in other ways and it doesn't have to cost you anything. You can like and subscribe.

You can leave a 5-star review. You can tell your friends, go on, recommend the show to somebody else. Spread the word. Every little bit helps.

And it does make the effort all worthwhile. I hope you've enjoyed this week's show, and I hope that you'll tune in for more episodes of Smashing Security going forward.

Until then, cheerio. Bye-bye. Bye!

Host:

Graham Cluley:

Guest:

Geoff White:

Episode links:

Sponsored by:

  • Vanta – Expand the scope of your security program with market-leading compliance automation… while saving time and money. Smashing Security listeners get $1000 off!
  • XBOW – The autonomous offensive security platform that helps security teams scale. Start a pentest today.
  • OPSWAT – Read Benny Czarny’s book, “Cybersecurity Upside Down”, to rethink how you protect your organization from file-based threats, including those powered by AI.

Support the show:

You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.

Join Smashing Security PLUS for ad-free episodes and our early-release feed!

Follow us:

Follow the show on Bluesky, or join us on the Smashing Security subreddit, or visit our website for more episodes.

Thanks:

Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.


Graham Cluley is an award-winning keynote speaker who has given presentations around the world about cybersecurity, hackers, and online privacy. A veteran of the computer security industry since the early 1990s, he wrote the first ever version of Dr Solomon's Anti-Virus Toolkit for Windows, makes regular media appearances, and hosts the popular "Smashing Security" podcast. Follow him on TikTok, LinkedIn, Bluesky and Mastodon, or drop him an email.

What do you think? Leave a comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.