PodcastsNyhederAutonomous IT

Autonomous IT

Automox
Autonomous IT
Seneste episode

220 episoder

  • Autonomous IT

    Patch [FIX] Tuesday – [AI Hits the Hat Trick], Ep. 32

    12.05.2026 | 34 min.
    The May 2026 Microsoft Patch Tuesday release looks quiet on the surface – no actively exploited zero-days, no public disclosures at release, and a CVE count below the four-month average. Don't let that fool you.
    In this episode, Jason Kikta and Landon Miles break down everything that happened between April and May patch cycles, including Apple's macOS Tahoe 26.5 release with 79 CVEs, the Dirty Frag Linux kernel privilege escalation chain, and two pre-authenticated network remote code execution vulnerabilities in Windows core services that belong at the top of your patch list.
    They also dig into one of the month's most significant trends: AI-assisted vulnerability research showing up by name in Microsoft, Apple, and Linux acknowledgments in the same patch cycle – including Anthropic researchers credited on a critical Windows graphics component RCE. Ten AI-attributed vulnerability discoveries shipped fixes across all three major operating systems this month.
    What's covered:
    CVE-2026-41089: Windows NetLogon RCE (CVSS 9.8) and CVE-2026-41096: Windows DNS Client RCE (CVSS 9.8)
    CVE-2026-40402: Hyper-V guest-to-host escalation (CVSS 9.3)
    macOS Tahoe 26.5: Wi-Fi kernel RCE, nine kernel CVEs, 20 WebKit vulnerabilities
    Dirty Frag Linux privilege escalation chain and the Copy Fail connection
    AI-credited discoveries from Anthropic, calif.io, Theori, and NIST's Center for AI Standards and Innovation

    - Patch Tuesday Blog
    - DirtyFrag Blog
    - What "Mythos Ready" Means
  • Autonomous IT

    Patch [FIX] Tuesday – [Emergency Episode: DirtyFrag Exploit Before Patch], Ep. 31

    08.05.2026 | 10 min.
    Breaking from the normal Patch Tuesday cadence for an emergency drop. On May 7, security researcher Hyunwoo Kim published a working proof-of-concept for DirtyFrag - a Linux kernel local privilege escalation chain that gets unprivileged users to root on every major distribution. The embargo was broken by a third party before distribution backports were ready, so the exploit is public and the patch is not.
    CTO Jason Kikta and Landon Miles walk through what makes DirtyFrag different from the Copy Fail mitigation many teams already deployed (spoiler: the CopyFail mitigation does NOT cover this), why AWS is calling it a class rather than a single CVE, and the five kernel modules you need to block right now: esp4, esp6, ipcomp4, ipcomp6, and rxrpc.
    In this episode:
    Why the embargo break matters and what changed on May 7
    How DirtyFrag chains CVE-2026-43284 and CVE-2026-43500 to defeat both Ubuntu's namespace policy and the absence of rxrpc.ko on other distros
    Why this is the third generation of a bug class (DirtyPipe → Copy Fail → DirtyFrag) and what that means for what comes next
    The Automox Worklet that mitigates both arms across your Linux fleet, and what it deliberately does not do
    Tested affected platforms: Ubuntu 24.04, RHEL 10.1, AlmaLinux 10, CentOS Stream 10, openSUSE Tumbleweed, Fedora 44
    Back to the regular Patch Tuesday schedule next week.
    Links:
    Full blog post and mitigation guidance 
    Automox Worklet (in-console for customers): 
    Worklet source on GitHub
    Hyunwoo Kim's PoC and write-up
    AWS Security Bulletin 2026-027
    CVE-2026-31431 (Copy Fail, parent issue)
  • Autonomous IT

    Autonomous IT, Live! The Math of Modern Attacks, E07

    28.04.2026 | 33 min.
    In this episode of Autonomous IT, Live!, we break down the widening gap between exploitation speed and remediation reality. Disclosed vulnerabilities keep climbing, exploitation windows keep shrinking, and IT and security teams are expected to absorb more risk without more resources. The traditional playbook — manual patching, fragmented workflows, scheduled cycles — was built for a slower world that no longer exists.
    What you'll learn:
    Why threat actors consistently outpace defender response times
    Where manual patching and fragmented processes break down, even for mature teams
    How rising vulnerability volume and shrinking exploitation timelines are reshaping risk
    Why working harder isn't the answer — and what actually needs to change
    Who should listen: IT and security leaders responsible for vulnerability management, infrastructure teams running distributed or SaaS-heavy environments, and anyone focused on shrinking exposure windows and accelerating response.
    The gap between attacker speed and defender capability isn't closing on its own. This conversation is about what it takes to close it.
    This live show originally aired April 22, 2026.
  • Autonomous IT

    Secure IT – Claude Mythos: AI Vulnerability Hype vs. Evidence, E23

    23.04.2026 | 7 min.
    Claude Mythos dominated the AI security conversation for two weeks straight, from the Cloud Security Alliance's strategy briefing to sharp public skepticism to yesterday's Bloomberg report that unauthorized users on Discord have been accessing Mythos since its limited launch. Host Jason Kikta cuts through the noise to separate the contested vendor claims from the established trend.

    In this episode:
    Why the Mythos debate misses the point, and the independently verified AI security milestones that predate it (XBOW topping HackerOne, DARPA's AI Cyber Challenge, Google Big Sleep, Claude Opus 4.6's 500+ high-severity findings)
    A careful look at the numbers behind Anthropic's system card, including the Firefox exploit rate dropping from 72.4% to 4.4% once pre-discovered bugs are removed
    The CSA's top CISO recommendations that hold regardless of which Mythos claims you believe: patching, segmentation, egress filtering, MFA, defense in depth
    Three concrete actions to take this week, including the governance conversation most security leaders are overdue to have with the business
    Good security starts with good IT. The trend is stable. The claims are contested. Anchor your planning accordingly.

    Links and sources:
    CSA briefing
    Project Glasswing
    Mythos technical writeup
    Ottenheimer system card teardown
    Tom's Hardware on the 198 manual reviews: 
    Bloomberg on the Discord leak
  • Autonomous IT

    Patch [FIX] Tuesday – April 2026 [Double Feature: SQL Another Day + XSS Never Dies], E30

    14.04.2026 | 8 min.
    This month's Patch Tuesday drops a SQL Server elevation of privilege that hands attackers sysadmin access and an actively exploited SharePoint XSS flaw that requires no authentication. 
    SQL injection in the database engine. Cross-site scripting. In 2026...? 
    Ryan and Mat break down how these attacks work, what to watch for, and why these "classic" vulnerability classes refuse to stay dead.                
    Also covered: 80 Edge and Chromium fixes released this month, and a recurring reminder about Secure Boot certificates you can't afford to ignore this year.
Flere Nyheder podcasts
Om Autonomous IT
Go from monotonous to autonomous IT operations with this series. Hosts from Automox, the IT automation platform for modern organizations, will cover the latest IT trends; Patch Tuesday remediations; ways to save time with Worklets (pre-built scripts); reduce risk; slash complexity; and automate OS, third-party, and configuration updates on all your Windows, macOS, and Linux endpoints. Automate confidence everywhere with Automox.
Podcast-websted

Lyt til Autonomous IT, Børsen Morgenbriefing og mange andre podcasts fra hele verden med radio.dk-appen

Hent den gratis radio.dk-app

  • Bogmærke stationer og podcasts
  • Stream via Wi-Fi eller Bluetooth
  • Understøtter Carplay & Android Auto
  • Mange andre app-funktioner