Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Evan Kirstel. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Evan Kirstel or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

What Happens When Critical Infrastructure Is One Click From Disaster

13:44
 
Share
 

Manage episode 522733904 series 3499431
Content provided by Evan Kirstel. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Evan Kirstel or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Interested in being a guest? Email us at [email protected]

What if you could see the internet the way attackers do—before the headlines, before the breach, before the phish hits your inbox? We sit down with Aidan Holland, senior security researcher at Censys, to unpack how daily global scans reveal the live shape of the web: assets you didn’t know you own, services you thought were private, and the malicious infrastructure gearing up for its next move.
Aidan explains how distributed scanning nodes in eight regions capture real banners, certificates, and configuration details, then stitch that telemetry into a searchable index. We dig into two high-value outcomes: attack surface management that links stray assets back to your org through DNS and certs, and threat hunting that tracks bulletproof hosting, brand impersonation, and the flood of fake captcha kits. You’ll hear why internal inventories miss internet-facing systems—rotating IPs, scattered cloud accounts, mergers—and how external vantage points and AI assistants help teams query in plain English, triage vulnerabilities, and fix what matters first.
The stories are gripping and practical: wastewater controls left on the open web, shipboard networks forwarding every port over Starlink, and navigation systems exposed to anyone who could find them. We also talk about the quiet shift back to on-prem and the renewed pressure to patch Exchange-class systems on a tight cadence. Looking ahead, Aiden shares how IPv6 changes the game—no brute force, smarter traversal—and why faster, more diverse scanning is key to catching ephemeral threats.
If you care about cybersecurity, visibility, and measurable risk reduction, this conversation gives you tools and perspective you can use today. Subscribe, share with a teammate who wrangles shadow IT, and leave a review with the biggest “unknown asset” you’ve uncovered lately.

Support the show

More at https://linktr.ee/EvanKirstel

  continue reading

Chapters

1. Setting The Mission: Internet Visibility (00:00:00)

2. What Census Scans And Why It Matters (00:00:21)

3. Shadow IT And Attack Surface Management (00:01:11)

4. Threat Hunting: Impersonation And Bulletproof Hosts (00:02:30)

5. Global Scanning Architecture And Data Enrichment (00:03:06)

6. Why Internal Tools Miss External Assets (00:04:25)

7. On-Prem Comeback And Patch Pressure (00:05:32)

8. AI Assistants For Queries And Triage (00:06:27)

9. SMB Access And Responsible CVE Handling (00:07:47)

10. Wild Finds: ICS, Ships, And Starlink (00:08:36)

11. Shadow IT’s Cost And Control Problem (00:10:36)

12. What’s Next: IPv6 And Faster Scans (00:12:32)

13. Closing Thanks And Sign-Off (00:13:24)

572 episodes

Artwork
iconShare
 
Manage episode 522733904 series 3499431
Content provided by Evan Kirstel. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Evan Kirstel or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Interested in being a guest? Email us at [email protected]

What if you could see the internet the way attackers do—before the headlines, before the breach, before the phish hits your inbox? We sit down with Aidan Holland, senior security researcher at Censys, to unpack how daily global scans reveal the live shape of the web: assets you didn’t know you own, services you thought were private, and the malicious infrastructure gearing up for its next move.
Aidan explains how distributed scanning nodes in eight regions capture real banners, certificates, and configuration details, then stitch that telemetry into a searchable index. We dig into two high-value outcomes: attack surface management that links stray assets back to your org through DNS and certs, and threat hunting that tracks bulletproof hosting, brand impersonation, and the flood of fake captcha kits. You’ll hear why internal inventories miss internet-facing systems—rotating IPs, scattered cloud accounts, mergers—and how external vantage points and AI assistants help teams query in plain English, triage vulnerabilities, and fix what matters first.
The stories are gripping and practical: wastewater controls left on the open web, shipboard networks forwarding every port over Starlink, and navigation systems exposed to anyone who could find them. We also talk about the quiet shift back to on-prem and the renewed pressure to patch Exchange-class systems on a tight cadence. Looking ahead, Aiden shares how IPv6 changes the game—no brute force, smarter traversal—and why faster, more diverse scanning is key to catching ephemeral threats.
If you care about cybersecurity, visibility, and measurable risk reduction, this conversation gives you tools and perspective you can use today. Subscribe, share with a teammate who wrangles shadow IT, and leave a review with the biggest “unknown asset” you’ve uncovered lately.

Support the show

More at https://linktr.ee/EvanKirstel

  continue reading

Chapters

1. Setting The Mission: Internet Visibility (00:00:00)

2. What Census Scans And Why It Matters (00:00:21)

3. Shadow IT And Attack Surface Management (00:01:11)

4. Threat Hunting: Impersonation And Bulletproof Hosts (00:02:30)

5. Global Scanning Architecture And Data Enrichment (00:03:06)

6. Why Internal Tools Miss External Assets (00:04:25)

7. On-Prem Comeback And Patch Pressure (00:05:32)

8. AI Assistants For Queries And Triage (00:06:27)

9. SMB Access And Responsible CVE Handling (00:07:47)

10. Wild Finds: ICS, Ships, And Starlink (00:08:36)

11. Shadow IT’s Cost And Control Problem (00:10:36)

12. What’s Next: IPv6 And Faster Scans (00:12:32)

13. Closing Thanks And Sign-Off (00:13:24)

572 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play