Skip to player
Skip to main content
Search
Connect
Watch fullscreen
Like
Bookmark
Share
More
Add to Playlist
Report
F5 Breach Raises New Chinese Security Concerns
Bloomberg
Follow
16 hours ago
Category
🗞
News
Transcript
Display full video transcript
00:00
I'm interested as to what your read is on this situation. How fierce is the threat coming from
00:06
state-related activists and hackers? It's actually incredibly fierce and it's because there's a very
00:13
strong motivation to do these kinds of attacks and what you'll see is that this particular group
00:18
who is you know part of we think Silk Typhoon or maybe a separate group we've been seeing this type
00:24
of activity classified under something called brick storm and it sounds terrifying because it
00:28
is terrifying and that's why the cybersecurity agency in the United States put out an emergency
00:34
directive just this Wednesday because 48 out of the you know fortune 50 are using F5 a vast number
00:43
of the federal government are using F5 we suspect that there's thousands of devices being deployed
00:48
and you know really because the source code is now out there and in the hands of the Chinese that
00:55
means that a nation-state attacker is now looking for vulnerabilities in this source code and has
01:02
information they never should have had about undisclosed vulnerabilities that F5 was already
01:07
investigating and because the attacker was there for more than a year studying F5 it's actually quite
01:15
terrifying all the capability they could have. How have they gone unnoticed for so long? Well one of the
01:22
biggest reasons is because if the attacker comes in over remote management devices and protocols using
01:29
zero days it's very hard to find the initial vector of how they originally got into that network and you
01:35
know simply if they got in more than a year ago the chances are high that there's not even logs that hold
01:43
that type of log retention for over a year that's let's start there that's how we don't know when they
01:48
actually got in in the first place. The second part of that problem is most of these network devices
01:55
don't have like a sort of you know detection and response that we can actually see there's no EDR
02:02
in these network devices so we can't actually see this malicious activity we don't necessarily see this
02:08
telemetry as they're conducting this lateral movement. I mean theoretically we should and at some point
02:14
F5 did but that was as late as August of this year and they were directed for national security concerns
02:21
to keep it quiet until they could release this information in their SEC filing. Jaya you are making
02:29
it clear to our audience how critical this is but when we all go home and sit around our dinner tables I
02:35
don't feel like this is becoming the top of conversation that perhaps it should be given the strength of the
02:39
concerns and anxieties you make clear. What is it that ends up affecting the consumer or more writ large
02:45
in this circumstance? The fact of the matter is especially from a consumer perspective we don't
02:50
always feel like paying for cyber security. We think it should be built in rather than bolted on from a
02:55
consumer perspective. Enterprises are more used to this notion that you know it's like a never done thing
03:01
that we continuously need to improve that it's a rinse and repeat like action but we still expect more and
03:08
better from cyber security vendors from people who are comfortable in this space but frankly if you
03:14
are really successful with your software and hardware you should expect that nation states will target
03:20
you for some side of supply chain compromise. It's almost inevitable it's because of that very success
03:27
that your reputation and your network and information systems are critically at risk. And particularly in the
03:32
world of AI where the ever more sophisticated attacks are happening and writ large at such pace. Jaya this is
03:38
where your company comes in and I'm so interested in Aisle and what you're currently building because
03:42
you're saying it's the first AI native cyber reasoning system. Can you talk us through exactly how it works
03:47
differently from others? Yes. So we are Aisle which means that everything we do starts from an AI first
03:54
principle and one of the most tenacious problems we have in cyber security is this ability to both find
04:01
the right set of vulnerabilities and then remediate them quickly. So what we do at Aisle is exactly that. We have an analyzer
04:09
that actually looks to find those vulnerabilities that truly matter and not just small low-level bugs and we've proven
04:15
that with you know several very famous programs that you have online open source programs we found incredibly
04:23
critical zero days. We've reported them responsibly to the maintainers of these open source projects and they have
04:30
fixed them and what we've really been trying to do is make sure that we are not just showing hey this stuff is
04:37
broken but allowing customers to actually be able to remediate those incredibly quickly at superhuman speed and that
04:45
has to be how we work because you can bet your bottom dollar that the attackers are using AI. Now we need to make sure that the
04:52
defenders are too and this is something that really we haven't been doing in this way for so long and this
04:58
kind of static basis that we've had is no longer suitable for the types of threats that we face.
05:04
Just going to Aisle and who its core customer is feels that it's everyone but all these cyber companies are
05:10
becoming ever more platforms and want to own your entire ecosystem of cyber. So where do you fit in Jai?
05:17
Well we start where everything is being built so if you're right now I feel like every customer
05:24
that we look at is really I mean it's remarkable but we have changed into a planet that operates on
05:31
software so everything that we actually look at is a company that's using software so if they build
05:36
software if they're having someone else build software for them for their manufacturing process for
05:40
their supply chain you know for those kinds of potential customers and design partners that's
05:46
where we come in and we try to make sure that those supply chain vulnerabilities that could impact others
05:52
downstream as well as their own vulnerabilities that we give them critical knowledge to know what is it
05:58
that's really broken that you need to focus on and how can we get you to a place where you have zero
06:04
vulnerabilities coming in most of these companies also have rather terrifying backlogs of vulnerabilities
06:11
that they have not fixed millions in the backlog and I'm telling you as a CISO of three different
06:16
publicly listed companies I've had these experiences myself of these tenacious hard to fix
06:22
vulnerabilities and I wished for this solution which is why we now built it
Be the first to comment
Add your comment
Recommended
1:58
|
Up next
Warner Bros. Looks For Help Blocking the Ellisons
Bloomberg
7 hours ago
3:52
US-China Tech Race Faces New Strains
Bloomberg
15 hours ago
4:05
Expanding US Rare Earths Supply Chain
Bloomberg
15 hours ago
1:57
Apple Turns to Vapor Chamber to Cool iPad Pro
Bloomberg
8 hours ago
5:22
Markets React to Trump Policy Shifts
Bloomberg
14 hours ago
3:49
Investors Watch as US, China Tensions Renew
Bloomberg
15 hours ago
5:19
China Ahead in Space Defense, Says True Anomaly CEO
Bloomberg
15 hours ago
5:27
Tech Sector Impacted by Birthright Citizenship Ruling
Bloomberg
17 hours ago
6:03
Microsoft Unveils Agentic Security Capabilities
Bloomberg
14 hours ago
4:28
Convincing Enterprise to Invest in AI
Bloomberg
15 hours ago
4:48
Government Shutdown's Impact on Crypto
Bloomberg
15 hours ago
5:29
Government Shutdown Doesn't Matter: Grenadilla's Rathbun
Bloomberg
14 hours ago
6:30
Tech Stocks Rally Ahead of Big Earnings Week
Bloomberg
9 hours ago
6:24
Tech Industry 'Optimistic' About Trade Talks
Bloomberg
16 hours ago
5:27
San Francisco Mayor Says City Wants AI Here
Bloomberg
14 hours ago
2:34
EA Agrees to Private Investor Sale at $55 Billion
Bloomberg
14 hours ago
5:52
US to Pull Back on AI Chip Restrictions
Bloomberg
16 hours ago
6:01
Growth of Circular Financing
Bloomberg
14 hours ago
12:39
Anduril's Luckey: Must Get Off the Chinese Supply Chain
Bloomberg
15 hours ago
3:50
Managing Supply Chain Changes Amid Trade Uncertainty
Bloomberg
16 hours ago
6:14
AI Infrastructure Buildout Continues
Bloomberg
15 hours ago
5:34
Weighing the Risk of Circular AI Investment
Bloomberg
15 hours ago
4:25
AI Infrastructure Startup Modal Labs Raises $80 Million
Bloomberg
14 hours ago
5:18
Investing in Defense Tech
Bloomberg
16 hours ago
5:26
Investors Embracing Risk Even as Uncertainty Lingers
Bloomberg
16 hours ago
Be the first to comment