FromNoise2Signal

Mehul Revankar

A cybersecurity podcast. Cyber conversations with more signal, less Noise. Noise 2 Signal is the antidote to the cybersecurity echo chamber: unfiltered conversations with the people who actually built the field — no buzzword bingo, no vendor pitches.

Episodes

  1. 6D AGO

    EP 5. Past, Present & Future of CISA KEV w/ Patrick Garrity

    In this episode, Mehul sits down with vulnerability management influencer Patrick Garrity to unpack the rapidly shifting landscape of vulnerability exploitation. Patrick discusses how his unique data visualizations put CISA KEV on the map, but reveals the hidden limitations of the federal catalog today. He breaks down the recent geopolitical and funding crises paralyzing NIST’s NVD, highlighting how the private sector and projects like CISA's Vulnrichment are stepping up to fill the data void. The conversation also explores how MFA pushed threat actors toward network edge exploitation, the alarming reality of shrinking zero-day timelines, and why "exploitable by AI" might soon become the ultimate threat metric. Finally, they cover the looming impact of frontier AI models on mass bug discovery and how incoming European regulations will force companies to disclose active exploits within 24 hours. In this episode, Patrick shares: [00:01:48] How his unique data visualizations ultimately put CISA KEV on the map. [00:02:37] His journey from sales engineering at Duo to becoming a vulnerability data storyteller. [00:06:24] The early struggles of trying to contribute real-world exploit evidence to CISA KEV. [00:08:38] What the pre-CISA KEV era looked like, including scraping Twitter feeds for intel. [00:10:09] How SOC teams literally used a journalist's tweets as their primary exploitation feed. [00:11:48] Why the federal CISA KEV catalog only tracks ~1,500 exploits. [00:15:09] Why ENISA KEV's tiny catalog of 15 matters more than the label. [00:14:12] When VulnCheck’s CEO decided to give away their valuable commercial KEV data. [00:16:42] The death of Flash, IE, and Word macro exploits—and the rise of edge attacks. [00:18:25] An analysis of the Progress MOVEit attacks and the rise of "smash-and-grab" extortion. [00:23:24] Getting mocked for joining VM in 2022 because the industry thought it was "solved." [00:27:56] The funding crises that brought global CVE enrichment at NIST NVD to a halt. [00:34:05] The night the CVE program almost lost its funding entirely. [00:36:05] How 32K unenriched vulns were reclassified as "not scheduled" to clear their backlog. [00:41:40] The terrifying metric showing 26% of exploited vulns see action before a patch exists. [00:43:10] The rapid evolution of AI-generated bug reports from "slop" to legitimate. [00:48:02] Why "exploitable by AI" might replace CVSS and CISA KEV as the ultimate metric. [00:50:58] How Anthropic's Glasswing successfully found 300 real vulns in Firefox. [00:53:12] The possibility of attackers stealing proprietary source code specifically to feed into AI. [00:53:31] Why AI tools shipping without security in mind will become the next leakage problem. [00:54:38] War stories from the ProxyLogon exploits and the FBI's unprecedented interventions. [00:56:30] The time CrushFTP got mad at VulnCheck just for assigning a CVE ID to a vuln.

    1 hr

Ratings & Reviews

5
out of 5
2 Ratings

About

A cybersecurity podcast. Cyber conversations with more signal, less Noise. Noise 2 Signal is the antidote to the cybersecurity echo chamber: unfiltered conversations with the people who actually built the field — no buzzword bingo, no vendor pitches.