The Truth About Cybersecurity
This talk provides a critical perspective on the cybersecurity industry, focusing on the prevalence of vendor misinformation and the limitations of common security certifications. The speaker argues that many security products are ineffective, relying on detection and response rather than true prevention, and highlights the risks of kernel-level access for security software. The presentation emphasizes the importance of fundamental network monitoring, such as analyzing netflow and traffic patterns, over reliance on proprietary vendor solutions.
Why Your Security Vendor Is Probably Selling You Snake Oil
TLDR: Most enterprise security vendors prioritize detection and response over actual prevention, leaving your infrastructure vulnerable to basic exploitation. By relying on kernel-level drivers and proprietary black-box solutions, these tools often create more attack surface than they protect. Pentesters should stop trusting vendor dashboards and start auditing the actual network traffic, specifically focusing on misconfigured MX records and unmonitored lateral movement.
Security research often gets lost in the weeds of zero-day hunting, but sometimes the most dangerous vulnerabilities are the ones sitting in plain sight, disguised as "security solutions." We spend our careers obsessing over complex exploit chains, yet we frequently ignore the massive, gaping holes left by the very tools we install to close them. The reality is that the cybersecurity market is flooded with products that prioritize marketing over efficacy. These vendors are not selling you a secure perimeter; they are selling you a false sense of security that crumbles the moment a real adversary touches your network.
The Kernel-Level Trap
One of the most egregious trends in the industry is the push for kernel-level access. Vendors claim that their agents need to run as kernel-mode drivers to provide "deep visibility" or "real-time protection." In practice, this is a massive security anti-pattern. When you install a security agent that operates at Ring 0, you are essentially giving a third-party vendor the keys to your entire operating system. If that vendor has a vulnerability in their driver, or if their update server is compromised, you have just handed an attacker the easiest path to persistence and privilege escalation imaginable.
We have seen this play out repeatedly. Security software is a high-value target because it is trusted by the OS and has the highest level of system access. By installing these agents, you are not just adding a layer of defense; you are adding a massive, complex, and often poorly audited attack vector. If a product claims it needs kernel-level access to function, you should be asking why it cannot achieve its goals through user-mode APIs or standard system hooks.
Auditing the Basics: MX Records and Netflow
While everyone is busy chasing EDR alerts, the fundamentals of network hygiene are being ignored. A common oversight I see during red team engagements is the failure to properly configure email infrastructure. Attackers do not need a sophisticated exploit to bypass your security stack if they can simply spoof your domain or intercept your traffic.
If you are not monitoring your MX records and validating your SPF, DKIM, and DMARC settings, you are leaving the door wide open for T1566-phishing attacks. These are not theoretical risks. They are the primary entry point for the ransomware campaigns that are currently crippling organizations.
Furthermore, stop relying on vendor-provided "threat intelligence" feeds that tell you what to look for. Start looking at your raw data. Use tools like Shodan to see what your external-facing infrastructure looks like to an attacker. If you are not analyzing your own netflow data to identify anomalous lateral movement, you are blind to the most common post-exploitation techniques. Attackers are not using magic; they are using standard protocols like SMB and RDP to move through your network. If you are not watching those flows, you are not doing security.
The Myth of the "Three Million Jobs"
We need to address the elephant in the room: the industry-wide obsession with certifications. You do not need a wall of acronyms to be an effective researcher or pentester. In fact, many of the most talented people I know in this field have zero formal security certifications. They have something much more valuable: a deep, fundamental understanding of how systems actually work.
When you focus on passing multiple-choice exams, you are learning how to take a test, not how to think like an attacker. The industry pushes these certifications because they are a revenue stream, not because they produce better security outcomes. If you want to break into this field, or if you want to level up your skills, stop studying for the next certification and start building. Set up a lab. Break things. Learn how to use Nmap to map a network, learn how to read a packet capture, and learn how to write a script that automates a repetitive task.
Taking Back Control
The current state of enterprise security is broken because we have outsourced our critical thinking to vendors who have a financial incentive to keep us in a state of perpetual, expensive, and ineffective "response." We are paying for the privilege of being breached.
If you are a pentester, your job is to expose these failures. Do not just run a vulnerability scanner and hand over a report. Dig into the configurations. Challenge the assumptions of the security tools you are testing against. If a client tells you they are "secure" because they have a specific vendor's agent installed, prove them wrong. Show them how that agent fails to detect basic lateral movement or how it can be bypassed entirely by using standard, non-malicious system tools.
We need to move away from the "us vs. them" mentality that vendors use to sell their products. There is no "us" and "them" in security; there is only the reality of the network and the people who know how to navigate it. If you want to be better at this, stop looking for the next shiny tool and start mastering the protocols that have been around for decades. The attackers are not changing their tactics because they are not being forced to. They are winning because we are making it too easy for them.
Vulnerability Classes
Tools Used
Target Technologies
OWASP Categories
Up Next From This Conference
Similar Talks

Exploiting Shadow Data in AI Models and Embeddings

The Dark Side of Bug Bounty




