
2.5K
Downloads
54
Episodes
Stay ahead of the latest cybersecurity trends with Cyberside Chats! Listen to our weekly podcast every Tuesday at 6:30 a.m. ET, and join us live once a month for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity professional or an executive looking to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you stay informed and proactively prepare for today’s top cybersecurity threats, AI-driven attack and defense strategies, and more!
Join us monthly for an interactive Cyberside Chats: Live! Our next session will be announced soon.
Episodes

Tuesday Dec 30, 2025
Amazon's Warning: The New Reality of Initial Access
Tuesday Dec 30, 2025
Tuesday Dec 30, 2025
Amazon released two security disclosures in the same week — and together, they reveal how modern attackers are getting inside organizations without breaking in.
One case involved a North Korean IT worker who entered Amazon’s environment through a third-party contractor and was detected through subtle behavioral anomalies rather than malware. The other detailed a years-long Russian state-sponsored campaign that shifted away from exploits and instead abused misconfigured edge devices and trusted infrastructure to steal and replay credentials.
Together, these incidents show how nation-state attackers are increasingly blending into human and technical systems that organizations already trust — forcing defenders to rethink how initial access really happens going into 2026.
Key Takeaways
1. Treat hiring and contractors as part of your attack surface.
Nation-state actors are deliberately targeting IT and technical roles. Contractor onboarding, identity verification, and access scoping should be handled with the same rigor as privileged account provisioning.
2. Secure and monitor network edge devices as identity infrastructure
Misconfigured edge devices have become a primary initial access vector. Inventory them, assign ownership, restrict management access, and monitor them like authentication systems — not just networking gear.
3. Enforce strong MFA everywhere credentials matter
If credentials can be used without MFA, assume they will be abused. Require MFA on VPNs, edge device management interfaces, cloud consoles, SaaS admin portals, and internal administrative access.
4. Harden endpoints and validate how access actually occurs
Endpoint security still matters. Harden devices and look for signs of remote control, unusual latency, or access paths that don’t match how work is normally done.
5. Shift detection from “malicious” to “out of place”
The most effective attacks often look legitimate. Focus detection on behavioral mismatches — access that technically succeeds but doesn’t align with role, geography, timing, or expected workflow.
Resources:
1. Amazon Threat Intelligence Identifies Russian Cyber Threat Group Targeting Western Critical Infrastructure
2. Amazon Caught North Korean IT Worker by Tracing Keystroke Data
3. North Korean Infiltrator Caught Working in Amazon IT Department Thanks to Keystroke Lag
4. Confessions of a Laptop Farmer: How an American Helped North Korea’s Remote Worker Scheme
5. Hiring security checklist
https://www.lmgsecurity.com/resources/hiring-security-checklist/

No comments yet. Be the first to say something!