Resilient Cyber Newsletter #77
- Chris Hughes from Resilient Cyber <resilientcyber@substack.com>
- Hidden Recipient <hidden@emailshot.io>
Resilient Cyber Newsletter #77SEC Drops SolarWinds Lawsuit, [un]prompted AI Security Conference, Cloudflare’s Take on Security Slowdowns, “IDEsaster” & Cybersecurity = National SecurityWelcome!Welcome to issue #77 of the Resilient Cyber Newsletter. This is our final issue of 2025, as we wrap up a crazy year in the world of cybersecurity. This week we cover topics such as the SEC dropping their lawsuit against SolarWinds and CISO Tim Brown, critiques of the U.S. decision to sell advanced chips to China, Cloudflare sharing insights on how their internal security impeded their ability to recover from an incident and a letter from a Congressman emphasizing the need for securing the open source ecosystem. All of this and more, so I hope you enjoy the resources/discussions and have a Merry Christmas and Happy Holidays with loved ones - from my family to yours. Interested in sponsoring an issue of Resilient Cyber? This includes reaching over 40,000 subscribers, ranging from Developers, Engineers, Architects, CISO’s/Security Leaders and Business Executives Reach out below! Cyber Leadership & Market DynamicsThe U.S. Can’t Get Xi Hooked on NVIDIA ChipsRelinquishing the U.S. lead in frontier AI models while actively supporting China's military and economic advancement. That's the case Dmitri Alperovitch makes in this recent WSJ piece when it comes to exporting H200 chips to China. What CISO’s Should Know About the SolarWinds Lawsuit DismissalWe recently saw the SEC dismiss their lawsuit against SolarWinds and its CISO Tim Brown, after a long drawn out process. This piece from CSO Online argues the event may be a turning point for not only CISOs and the cyber community when it comes to cyber accountability, but also regulators and boards as well. While the article says many CISOs and security leaders may be taking a sigh of relief, it doesn’t mark the end of concerns around accountability for security leaders and should still be considered a shared responsibility across the organization, including CISOs. Speaking of Tim Brown and the community, Chenxi Wang and Joe Sullivan sat down with Tim to dive into the news, pointing out all Tim had to deal with during the ordeal, not only professionally, but personally as well, due to the stress and toll it took on him. [un]prompted - The AI Security Practitioner ConferenceReally excited to share I'll be on the review board for CfP's to this one of a kind event. It's an AI security practitioner-focused conference on March 3rd/4th in Salesforce Tower SF. The talk tracks and speaker lineup thus far looks truly outstanding.
Cloudflare’s Post-Mortem - Security Impeded Recovery?In mid November, Cloudfare experienced an incident that impacted their ability to delivery network traffic for over two hours. It happened again three weeks later in early December, which impacted their ability to serve traffic to almost 30% of the applications behind their network. They recently published a new blog they called “Code Orange: Fail Small”, where they discuss their goals of making their network and services more resilient. In the blog, they discuss how their efforts to protect customers from the vulnerability in the open source framework React initiated the incident due to configuration changes and software updates. In the same blog, they also discuss how their security measures actually slowed down their ability to respond to the situation:
This is a really interesting read that demonstrates how having a high assurance and secure environment can lead to complexities in dependencies and slow down an organizations ability to move fast when things start to face disruptions. Are we in an Identity Crisis?Speaking of Identity and IAM Security, my friend Cole Grolmus had a great discussion with SailPoint CEO Mark McClain which peeled back how SailPoint is looking at the modern identity security landscape, why traditional approaches no longer can keep up with the scale, complexity and speed of the modern enterprise. Losing Deals to the Status Quo While we may hear headlines about rapid growth from $0-$1B in the age of AI, the reality is the buying journey in most enterprise environments is incredibly complex and challenging. This includes a lot of potential paths where deals can wither on the vine, chase an elusive consensus, run into internal politics and more. My friend Ross Haleliuk shared this great reminder from Gartner of just how chaotic the purchasing process can look. AI2025 Resilient Cyber AI Security RewindAs promised, I've compiled a recap of most of the interviews, deep dives and analysis I've done as part of Resilient Cyber in 2025, and what a year it's been. AI, LLMs and Agents have continued to impact everything from venture capital, startups, Identity, SecOps and more.
How did we get to where we are in AI?As things continue to evolve at what feels like a crazy pace, it’s helpful to reflect back on how we got here. This was a really great talk from Jeff Dean, Chief Scientist of Google DeepMind A Security Engineer’s Guide to the A2A ProtocolAs we continue to see the rapid interest and adoption of Agentic AI, we have seen the rise of protocols to support agentic architectures. Among those is the Agent-to-Agent (A2A) protocol, originally from Google. This piece from Kurt Boberg is a great primer for security engineers to understand A2A and covers core concepts such as:
This is a great short read on the core aspects and security considerations of A2A. AI SOC Solutions MarketThe SOC market has arguably been one of the hottest and most discussed cyber categories when it comes to leveraging AI. That said it is a noisy market, due to the sheer number of firms pursuing AI SOC solutions and players in the space. This piece from Qevlar AI (which is itself a AI SOC vendor) covers the evolution of the market and key questions to ask when looking to choose an AI solution for your SOC. They point out that there are now more than 70 standalone AI SOC platforms today. This includes everything from the largest industry players down to many startups and founders looking to disrupt the space, many of whom boast significant venture capital backing too. The shift from assistance to agencyRecently Anthropic made headlines when they laid out the details of the first AI-driven autonomous cyber espionage campaign. While the details are debated, the implications aren’t. Rob T. Lee of SANS Institute penned an excellent piece recently discussing the details of the incident, as well as a recent House Homeland of Security Subcomittee testimony. Among those are the fact that attackers are advancing through the spectrum of autonomy with Agentic AI faster than defenders, information asymmetry where attackers often know more than defenders about their own environments, and the fact that attackers can be “wrong” without it being as consequential. AI IDE’s and “IDEsaster”💥We know AI-driven development has fundamentally changed the modern SDLC. Widespread adoption of AI IDE's and Agentic coding tools is rampant, with many citing productivity gains. We've also seen a ton of vulnerabilities highlighted in the AI IDE's, as well as risks in MCP, configurations and novel attack vectors. Anthropic Releases Open Source Tool to Automate Behavioral EvalsAnthropic recently announced that they were releasing an open source agentic framework dubbed “Bloom” which can generate behavioral evaluations of frontier AI models. They stated it can be used to separate baseline models from intentionally misaligned models and as an example of the tools value, they released benchmark results for four alignment behaviors across 16 different models. This builds on another recent release named “Petri”, which is an open source tool that lets researchers automatically explore AI model behavior profiles through diverse multi-turn conversations with simulated users and tools. Agentic AI Already Hinting At Cyber’s Pending Identity CrisisIAM has already been a longstanding challenge in cyber, accounting for a large portion of annual incidents and attack vectors. Now, the industry is collectively feeling that the rise of Agentic AI is going to exacerbate the already problematic space. This piece from CSO Online discusses those challenges, such as the fact that:
This is a topic I have discussed in prior articles myself, such as “The State of Non-Human Identity (NHI) Security”. AppSecCybersecurity = National SecurityWe continue to see the brittle open source ecosystem be targeted by nation state actors. Open source powers everything from consumer goods to critical infrastructure. This is a point Tony Turner and I made in our book “Software Transparency” and the problem has only continued to grow. Endor Labs Brings Malware Detection Into AI Coding Workflows with Cursor HooksWe all know AI coding assistants have changed the software development landscape drastically in the past 12-18 months. This includes autonomously selecting open source dependencies, executing commands and potentially introducing risks developers may not be watching closely, or even concerned about. That’s why it is cool to see teams such as Endor Labs working with leading AI coding platforms such as Cursor. Endor recently announced they integrate with Cursor’s new hooks system which helps inspect dependencies for malware while the AI coding agent is attempting to install them, which prevents malware from ever making its way to the developers endpoint. Development endpoints have become a common attack vector and target for malicious actors as part of the broader supply chain an can lead to cascading impacts if attackers can move laterally from the device, or contribute backdoors or malicious code to codebases as well. Cursor launched “Hooks for Security and Platform Teams”, which provides capabilities focused on areas such as:
NPM Packages with 56,000 Downloads Caught Stealing WhatsApp MessagesThe team at Koi Security continues to identify widespread malicious packages and extensions in the ecosystem. The latest example is a npm package that is a WhatsApp Web API library, that has over 56,000 downloads and functional code. It’s been available for 6 months and they’ve determined it is a sophisticated malware that steals WhatsApp credentials, intercepting messages, harvesting contacts and even installing backdoors. Resilient Cyber is free today. But if you enjoyed this post, you can tell Resilient Cyber that their writing is valuable by pledging a future subscription. You won't be charged unless they enable payments. |
Similar newsletters
There are other similar shared emails that you might be interested in:












