ConversingLabs Podcast

40 Episodes
Subscribe

By: ReversingLabs

ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, incident response and software assurance. Hosted by Paul Roberts, Cyber Content Lead at ReversingLabs, ConversingLabs digs into cutting edge topics that are most pressing in the world of cybersecurity.

Going Back to Basics to Thwart Attacks
#4
Last Thursday at 1:55 PM

In this episode of ConversingLabs, host Paul Roberts interviews Chuck McWhirter, principal solutions architect at ReversingLabs, about the importance of sticking to basics when it comes to thwarting attacks from adversaries. Chuck recounts his experiences in both the public and private sectors, including his efforts in securing the 2002 Olympics – back when the Security Operations Center (SOC) had not yet evolved. The details of Chuck’s journey shed light on how enterprise security teams can better handle the cyber threats stemming from nation-state adversaries. By minimizing cybersecurity tool sprawl and alert fatigue, as well as assessing situational risk, Chuck argues that...


AppSec Girl Power
#3
04/10/2025

In this episode, host Carolynn van Arsdale interviews Tanya Janca (aka SheHacksPurple), a world-renowned application security (AppSec) leader, author, speaker and educator. In addition to having multiple bestselling books, such as ‘Alice and Bob Learn Secure Coding,’ Janca is the founder of We Hack Purple and leads education and community for Semgrep. In their conversation, they discuss how Janca’s career embodies AppSec Girl Power: Beginning from her start as a software developer, up to her current success as a prominent thought leader in AppSec and secure coding philosophy.

Subscribe to Tanya's newsletter here, and if you're an App...


Cybersecurity's Double-Edged Sword
#2
03/26/2025

In this episode of ConversingLabs, host Paul Roberts chats with Malcolm Harkins, Chief Security and Trust Officer at HiddenLayer, about cybersecurity’s double-edged sword: artificial intelligence (AI). Harkins will discuss what HiddenLayer has discovered in regards to AI-based threats to software supply chains, including research about DeepSeek R1. The two will also identify which enterprise security tools lack the means to spot these developing threats. Finally, they’ll consider whether or not AI itself can be a part of the solution in out-pacing threat actors’ utilization of these risks.


The Evolution of Threat Intel
#1
03/17/2025

In this episode of ConversingLabs, host Paul Roberts chats with Jason Valenti, director of product at ReversingLabs, about the evolution of threat intelligence and the growing role it’s playing in cyber defense. A former IT specialist at the FBI and director of product management at the firm CrowdStrike, Jason will touch on his journey prior to his RL career and his work to promote the use of threat intelligence in both the public and private sectors. Jason will also talk about the epidemic of sophisticated cybercriminal and nation state hacking campaigns and how enterprise security teams can leverage th...


Hackers Hacking Hackers
#2
10/01/2024

In this episode, host Paul Roberts chats with Security Researcher Sam Curry about his own experience being hacked via the Internet of Things and how it led to a shocking discovery regarding modem security. More broadly, the conversation touches on how APIs can leave consumers vulnerable, the increasing popularity of IoT attacks, and how to mitigate such risks.

Check out Sam's blog post about his modem getting hacked here: https://samcurry.net/hacking-millions-of-modems

Learn more about Sam and Ian Carroll's research on airport security here: https://ian.sh/tsa


The Past, Present & Future of SBOMs
#1
09/10/2024

In this episode, host Paul Roberts chats with Beau Woods, Founder & CEO of Stratigos Security, about the history of the software bill of materials (SBOM) – from its beginnings, to its modern-day use, to efforts underway to adapt it for the future. SBOMs have exploded in popularity within the past two years, and are oftentimes considered synonymous with software supply chain security. However, SBOMs are not a new tool, and while they’re important – they certainly aren’t the end-all-be-all for mitigating modern threats to software supply chains. Woods will explain in this conversation how SBOMs have taken center stage in 2024...


Is Cybersecurity Ready for the SolarWinds Prosecution?
#5
05/22/2024

In this episode, host Paul Roberts chats with Tarah Wheeler, CEO of Red Queen Dynamics, about her recent Council on Foreign Relations piece regarding what the U.S. SEC’s prosecution of SolarWinds and new disclosure rules mean for the cybersecurity industry at-large. Wheeler believes that these new moves from the Commission emphasize the concept of “materiality” in cyber - graduating the industry to a level of enterprise risk it has never experienced before.



Chinese APT Group Exploits SOHO Routers
#4
04/03/2024

In this episode of the ConversingLabs podcast, host Paul Roberts chats with Daniel Adamitis, a Principal Information Security Engineer at Lumen Technologies’ Black Lotus Labs. They discuss his team’s discovery of an impossible-to-kill botnet packed with end-of-life SOHO routers, which is being used by a Chinese nation-state backed APT group as a covert data transfer network. The group, known as Volt Typhoon, is also well known for targeting U.S. critical infrastructure. 


Securing Medical Devices with SBOMs
#3
03/27/2024

In this episode, host Paul Roberts chats with Kevin Fu, an Electrical & Computer Engineering Professor at Northeastern University, about the new federal standards for the cybersecurity of medical devices, which includes the submission of software bills of materials (SBOMs) to the FDA. The two will discuss the new mandates for medical device manufacturers, as well as key takeaways for how these organizations can improve their software supply chain security programs. 


The LockBit Takedown: What We Know
#2
03/15/2024

In this episode, host Paul Roberts chats with Ali Khan, Field CISO at ReversingLabs, about the recent takedown of the LockBit ransomware group, which is considered to be one of the most prolific cybercrime groups globally.


The State of Software Supply Chain Security 2024
#1
02/28/2024

In this episode, host Paul Roberts chats with Karlo Zanki, a Reverse Engineer at ReversingLabs, about the state of software supply chain security in 2024. The two will review key findings on the software supply chain threat landscape in 2023, as well as what security and development teams can expect from malicious actors in 2024. Zanki will also highlight several of the major software supply chain security incidents discovered by RL threat researchers in the past year.


The State of Open Source Software Security
#5
10/05/2023

In this episode, host Paul Roberts chats with Mikaël Barbero, Head of Security at the Eclipse Foundation, about the state of open source software security. Eclipse has been around for more than two decades and has for a long time prioritized the mitigation of threats to open source projects. In their conversation, Mikaël chats with Paul about where Eclipse stands today, what current threats are being posed to open source repositories, as well as how nation-states and international organizations are working to combat these threats.  


Apple Devices as a Growing Attack Vector
#4
09/27/2023

In this episode, host Paul Roberts chats with Devin Byrd, Director of Threat Intelligence at Kandji on the sidelines of the 2023 Black Hat USA conference. In their conversation, Byrd discusses how Kandji has grown into a major security provider for macOS users, and how the attack vector for macOS and iOS users has increased in recent years. He explains that only dealing with adware and junkware on these devices was a thing of the past, but now, macOS devices are being targeted with malicious back doors and even software supply chain attacks. 


The Art of Security Chaos Engineering
#3
09/20/2023

In this episode, host Paul Roberts chats with Kelly Shortridge, a Senior Principal at Fastly, on the sidelines of the 2023 Black Hat USA Conference. In their conversation, they discuss her new book, Security Chaos Engineering: Sustaining Resilience in Software and Systems, as well as her Black Hat talk, “Fast, Ever-Evolving Defenders: The Resilience Revolution.”  


Modern Risks to the Internet of Things and Software Supply Chains
#2
09/13/2023

In this episode of ConversingLabs, host Paul Roberts chats with Thomas Pace, the CEO & co-founder of the firmware security firm NetRise. Thomas and Paul talk about the shifting ground of threats and attacks as the Internet of Things grows and works its way into homes, businesses and industries - including critical infrastructure. They also talk about the growing specter of software supply chain threats and attacks. 


Lemons & Liability: What it Means for Software Applications
#1
09/06/2023

In this episode, host Paul Roberts chats with Daniel Woods, a Cybersecurity Lecturer at The University of Edinburgh on the sidelines of the 2023 Black Hat USA conference about his briefing: “Lemons and Liability: Cyber Warranties as an Experiment in Software Regulation.” 


Creating the Standard for Supply Chain Risk
#9
06/21/2023

In this episode, host Paul Roberts chats with Robert Martin of MITRE and Cassie Crossley of Schneider Electric about their session at this year’s RSA Conference. They explained how MITRE’s System of Trust can serve as a standard for software supply chain risk. The two also chatted with Paul about the greater issues facing software supply chains today, such as standardization and transparency. 


How Do You Trust Open Source Software?
#8
06/14/2023

In this episode, host Paul Roberts chats with Naveen Srinivasan, an OpenSSF Scorecard Maintainer, about his talk at this year’s RSA Conference on how to better trust open source software. In their conversation, Naveen explains how the OpenSSF Scorecard tool can help developers understand the security posture of open source dependencies.


The State of Application Security
#7
06/01/2023

In this episode, we interview Chris Romeo, CEO of Kerr Ventures and long-time application security (app sec) practitioner on the sidelines of the 2023 RSA Conference. He gives a rundown on the state of app sec and comments on other software threats posed to organizations today. 


Red Teaming the Indian Government
#6
05/23/2023

In this episode of ConversingLabs, host Paul Roberts chats with John Jackson, a security researcher, about the work he and research group Sakura Samurai did in looking at exposed secrets and other threats on Indian government websites. 


SBOM skeptics and talks about the importance of software supply chain transparency
#5
05/10/2023

In this special Café edition of ConversingLabs, host Paul Roberts interviews Joshua Corman, the Vice President of Cyber Safety Strategy at Claroty and the Founder of I Am The Cavalry on the sidelines of the RSA Conference 2023 in San Francisco. Josh speaks with Paul about his RSAC track session, The Opposite of Transparency, which takes on skepticism of software bill of materials (SBOMs) and makes an argument for greater transparency around software supply chain risk. 


Malware & Software Supply Chain Security
#4
04/27/2023

In this special edition episode of ConversingLabs, host Paul Roberts interviews ReversingLabs Director of Product Management, Charlie Jones, on the sidelines of the 2023 RSA Conference in San Francisco. Charlie speaks with Paul about his RSAC track session: The Rise of Malware Within the Software Supply Chain.


Contextualizing the National Cybersecurity Strategy
#3
04/26/2023

In this episode, host Paul Roberts chats with Devin Lynch, Director of Supply Chain and Technology Security for the Office of the National Cyber Director, about the National Cybersecurity Strategy released by the White House last month. They discuss the motivations behind this policy move, what its impact will be in the short and long term, as well as what else the federal government plans to prioritize in this area. Lynch also details upcoming plans the federal government has to better secure open source software as a part of the greater effort to secure software supply chains.  


The Future of Bug Bounties
#2
04/19/2023

In this episode, host Paul Roberts chats with Katie Mousourris, CEO and Founder of Luta Security. Mousourris has a robust background in creating and running bug bounty programs as well as professional hacking. In their conversation, she discusses the evolution of professional hacking and how important bug bounty programs have become to the cybersecurity field. She also highlights the problems these programs have faced as well as how they can help identify risks in other spaces like software supply chains. Finally, Mousourris paints a picture of what the future holds for bug bounties and the place of professional hackers.<...


The Road to Software Supply Chain Security Compliance
#1
03/29/2023

In this episode, host Paul Roberts chats with Steve Lasker, a former Azure Program Manager with over 20 years of experience at Microsoft. Lasker touched on his industry experience to explain how the effort to secure software has evolved into what it is today. He then explained how government standards for software supply chain security globally will benefit the industry, and will cause a great shift in the market. He points out that the software providers who meet the greatest possible compliance in this area will succeed, given the concern that companies now hold over software supply chain attacks, as...


ZetaNile - Open Source Software Trojans
#4
01/02/2023

In September 2022, Microsoft released a report on a group they track as ZINC (also known as Lazarus), which is a state-sponsored group out of North Korea. The report details how ZINC has been using a set of trojanized, open source software implants dubbed ZetaNile (also known as BLINDINCAN) to attack a number of organizations since June 2022.

The ReversingLabs Research Team decided to investigate ZINC’s use of ZetaNile, which yielded several helpful results. In this conversation, host Paul Roberts chats with Joseph Edwards, a ReversingLabs Malware Researcher, about what their investigation yielded. They discuss how the malicious ac...


The Silent Epidemic of Business Email Compromise (BEC) Attacks
#5
01/02/2023

Online fraud is among the most pernicious and devastating forms of cybercrime- measured by the financial and psychological toll it takes on victims. Phony tech support, online romance and business email compromise scams drain billions from our economy annually and take a huge toll on families, businesses and communities. And yet, it is often overlooked by cybersecurity experts and the larger information security industry. Scams, which frequently hinge on human frailty rather than the manipulation of software, are deemed unworthy of the attention of cybersecurity experts. Victim blaming is rife. But that dismissive attitude misses the point of these...


Firmware Supply Chain Risks
#3
01/02/2023

Supply chain attacks are not limited to SaaS (software-as-a-service) applications. Specific kinds of software, such as firmware, are also at risk of suffering supply chain attacks. Firmware is typically used to control hardware devices, and sits at a lower level, connecting high-level software with an operating system.

It is important for the cybersecurity and application security industries to pay attention to this area of potential risk, and come up with mitigation strategies. That is why in this episode, Alex Matrosov, founder and CEO of Binarly.io, joined us to tell us more about the risks to firmware...


Don’t Sleep on SBOMs
#1
01/02/2023

Software Bills of Materials (SBOMs) are a helpful first step for an organization looking to secure its software supply chain. SBOMs serve as an ingredients list, pointing out all of the components that make up a software product, such as open source software packages, third party software and more. Federal guidance in the U.S. now strongly recommends the use of an SBOM by both software publishers and consumers. 

In this episode, host Paul Roberts chats with ReversingLabs Software Assurance Evangelist Charlie Jones on all things SBOM: what it is, how they are beneficial, who needs one, a...


A Closer Look at the Enduring Security Framework’s Guidance
#2
01/02/2023

The U.S. Federal Government's Enduring Security Framework (ESF) Working Panel released a guidance on "Securing The Software Supply Chain" in September, 2022. The ESF is made up of both government officials and industry practitioners, and this guidance with the intention of it being a "practical guide" for software developers. 

In this episode, host Paul Roberts chats with ReversingLabs Field CISO Matt Rose about the ESF's guidance: what it entails, whether or not it serves as helpful to software developers, as well as who should be paying attention to this guidance. 


Hunting Follina
#7
10/03/2022

The exploit known as Follina resurfaced in late May 2022 as researchers discovered its use in a phishing document campaign. ReversingLabs Malware Researcher Joseph Edwards hunted for Follina exploitation samples to observe what final payloads are being delivered in-the-wild. 

He joins host Paul Roberts for this episode of ConversingLabs to share his findings and key takeaways. He also shares how your organization can defend itself against the exploit.


Leveraging YARA
#6
10/03/2022

YARA rules have been a proven tool for threat detection and hunting. Organizations who want to be mindful of today’s most serious threats, such as wiper malware and ransomware, should be leveraging this tool however they can. 

For this episode of ConversingLabs, we invited ReversingLabs Malware Researcher Hrvoje SamardĆŸić plus Roman HĂŒssy of Abuse.ch, who told us about his company’s platform: YARAify. These two experts will also show how organizations can deploy YARA rules to benefit their threat analysis operations. 


Lessons Learned from CI/CD Compromises
#5
10/03/2022

In this special edition episode, ConversingLabs host Paul Roberts interviewed researchers Iain Smart and Viktor Gazdag of NCC Group from the showroom floor at Black Hat 2022. Paul chatted with the researchers about their Black Hat session on compromises to CI/CD pipelines, being an integral part of software supply chain security. 


Déjà Vu: Uncovering Stolen Algorithms in Commercial Products
#4
10/03/2022

A systemic issue impacting the cybersecurity community is the theft and unauthorized use of algorithms by corporate entities. This is an issue that Patrick Wardle, Founder of the Objective-See Foundation, has brought to the forefront as a speaker at this year’s Black Hat USA Conference. 

His talk at Black Hat presented the techniques to spot unauthorized use, and he referenced these techniques in real-world examples. We chatted with Wardle about this systemic problem at large, and how the industry should move forward to minimize this issue. 


Not All Developers Can Be Security Jedis
#3
10/03/2022

At this year’s Black Hat Conference in Las Vegas, software supply chain security was top of mind for the InfoSec community. One of the biggest obstacles to improving the security of organizations and critical infrastructure is the poor state of software security. Alas: training developers to produce secure code is expensive, and time intensive. Or is it? 

At this year’s conference, Adam Shostack, President of Shostack & Associates, described a new approach to scale secure development training and educate a developer workforce, keeping time and financial restraints in mind. We chatted with him one-on-one to learn his i...


IconBurst - The Newest Software Supply Chain Attack
#2
10/03/2022

ReversingLabs recently discovered a software supply chain attack known as IconBurst. This incident is a widespread campaign, consisting of the installation of malicious NPM modules that are harvesting sensitive data from forms embedded in mobile applications and websites. 

Karlo Zanki, a Reverse Engineer at ReversingLabs, was the first to discover the attack. We invited him to join us for the second episode of ConversingLabs Season 2 to discuss his findings. 

Learn more about IconBurst here: https://blog.reversinglabs.com/blog/iconburst-npm-software-supply-chain-attack-grabs-data-from-apps-websites


Smash and Grab - AstraLocker Breach
#1
10/03/2022

AstraLocker is a fork of the Babuk ransomware family. Babuk is a past Ransomware-as-a-Service (RaaS) threat group, selling ransomware tools to affiliate cybercriminals. AstraLocker 2.0 was first seen in March 2022, but new research has surfaced about its capabilities. 

ReversingLabs Malware Researcher Joseph Edwards joined us for the first episode of ConversingLabs Season 2 to share his findings on AstraLocker. He also shared what organizations need to know to stay vigilant of this active cyber threat. 


Bryson Bort of Scythe.io talks Colonial Pipeline: Lessons Learned
#8
09/08/2022

Bryson Bort of Scythe.io spoke with host Paul Roberts about the May 2021 Colonial Pipeline hack that caused a fuel shortage on America's southeastern coast. Bort tackles the question: “What the hell happened?” He mentions that the incident truly was a “watershed moment” for the industry, since this ransomware attack directly impacted the lives of everyday Americans. 

But the bigger picture on Colonial also includes years of ignored warnings about the possibility of just such an attack. Now that the attack has happened, however, Bort worries that the cybersecurity industry is stuck in their echochamber trying to understan...


Steve Lipner of SAFECODE on Supply Chain Security - Is It Even Possible?
#7
09/08/2022

In this conversation, Steve Lipner of SAFECODE explains what secure software is, and recounts his own experiences on Microsoft’s Software Security Development Lifecycle Team as the point of the spear in Microsoft’s Trustworthy Computing Initiative. Lipner stresses that secure software must come from within (so to speak). Outside consultants may be able to promote best practices, but they will never be able to grasp what needs fixing. That’s why an organization’s developers need to be trained and motivated to write secure code, which means seeing mistakes as they write code and throughout the entire development process...


Robert Martin of MITRE on Supply Chain System of Trust
#6
09/08/2022

In this conversation, Robert Martin of MITRE talks about how the software supply chain is highly complicated, due to an increasing number of things in society becoming cyber-enabled. He and MITRE created the System of Trust (SoT) so that organizations can consider the most important aspects of the software supply chain, giving a more holistic context into the chain’s subsets. The SoT’s goal is to promote transparency, allowing developers to see all of the players in the supply chain. 


Martin explained how software is not written neatly end to end, but rather is bu...