427 episodes

A security podcast geared towards those looking to better understand security topics of the day. Hosted by Kurt Seifried and Josh Bressers covering a wide range of topics including IoT, application security, operational security, cloud, devops, and security news of the day. There is a special open source twist to the discussion often giving a unique perspective on any given topic.

Open Source Security Podcast Josh Bressers & Kurt Seifried

    • Technology
    • 4.7 • 37 Ratings

A security podcast geared towards those looking to better understand security topics of the day. Hosted by Kurt Seifried and Josh Bressers covering a wide range of topics including IoT, application security, operational security, cloud, devops, and security news of the day. There is a special open source twist to the discussion often giving a unique perspective on any given topic.

    Automatically exploiting CVEs with AI

    Automatically exploiting CVEs with AI

    Josh and Kurt talk about a paper describing using a LLM to automatically create exploits for CVEs. The idea is probably already happening in many spaces such as pen testing and intelligence services. We can't keep up with the number of vulnerabilities we have, there's no way we can possibly keep up with a glut of LLM generated vulnerabilities. We really need to rethink how we handle vulnerabilities.
    Show Notes OpenAI's GPT-4 can exploit real vulnerabilities by reading security advisories paper: LLM Agents can Autonomously Exploit One-day Vulnerabilities Cisco Fixes RV320/RV325 Vulnerability by Banning “curl” in User-Agent Episode 219 – Chat with Larry Cashdollar Cory Doctorow: What Kind of Bubble is AI?

    • 37 min
    Video game cheaters, also pretendo

    Video game cheaters, also pretendo

    Josh and Kurt talk about a database of game cheaters. Cheating in games has many similarities to security problems. Anti cheat rootkits are also terrible. The clever thing however is using statistics to identify cheaters. Statistics don't lie. Also, we discuss the Pretendo project sitting on a vulnerability for a year, is this ethical?
    Show Notes Hacker News searchable database
    Benford's law
    John Oliver Medicaid
    Mario64 invisible walls
    Pretendo
    Pretendo exploit

    • 30 min
    The Notepad++ Parasite Website

    The Notepad++ Parasite Website

    Josh and Kurt talk about a Notepad++ fake website. It's possibly not illegal, but it's certainly ethically wrong. We also end up discussing why it seems like all these weird and wild things keep happening. It's probably due to the massive size of open source (and everything) now. Things have gotten gigantic and we didn't really notice.
    Show Notes Help us to take down the parasite website Open Source is bigger than you can imagine Toronto Pearson International Airport heist

    • 35 min
    FCC cybersecurity label for consumer devices

    FCC cybersecurity label for consumer devices

    Josh and Kurt talk about a new FCC program to provide a cybersecurity certification mark. Similar to other consumer safety marks such as UL or CE. We also tie this conversation into GrapheneOS, and what trying to claim a consumer device is secure really means. Some of our compute devices have an infinite number of possible states. It's a really weird and hard problem.
    Show Notes GrapheneOS FCC approves cybersecurity label for consumer devices Cyber Trust Mark Logo

    • 32 min
    XZ Bonus Spectacular Episode

    XZ Bonus Spectacular Episode

    Josh and Kurt talk about the recent events around XZ. It's only been a few days, and it's amazing what we already know. We explain a lot of the basics we currently know with the attitude much of these details will change quickly over the coming week. We can't fix this problem as it stands, we don't know where to start yet. But that's not a reason to lose hope. We can fix this if we want to, but it won't be flashy, it'll be hard work.
    Show Notes GossiTheDog's Blog Post fr0gger diagram OpenSSF Blog (archive) stb library

    • 1 hr 1 min
    Do you have a security.txt file?

    Do you have a security.txt file?

    Josh and Kurt talk about the security.txt file. It's not new, but it's not something we've discussed before. It's a great idea, an easy format, and well defined. It's not high on many of our todo lists, but it's something worth doing.
    Show Notes RFC 9116

    • 30 min

Customer Reviews

4.7 out of 5
37 Ratings

37 Ratings

adamajreynolds ,

Excellent

I listen every week - it’s great to hear from others in my field.

cspeckrun ,

Most frustrating show I continue listening to

Like a meeting with no agenda it can be informative and entertaining and you’re never quite sure if you should attend again but usually you do.

unbleachedbit ,

The banter is spot on

as of September 2023 be negative reviews may be from non-techs or squishy persons in general. I understand the humor, and every episode that I have listened to so far which is only half a dozen the hosts understand and get what they are talking about. having over 20 years both professionally and not in the information technology field I find myself quite amused at their observations, and more often than not not in agreement more than once an episode. If the hosts, however, ever come across this comment, if you guys would enable Apple podcasts, so that I could toss a few dollars your way I would be more than happy to do so.

Top Podcasts In Technology

No Priors: Artificial Intelligence | Technology | Startups
Conviction | Pod People
Lex Fridman Podcast
Lex Fridman
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Acquired
Ben Gilbert and David Rosenthal
Hard Fork
The New York Times
This Week in XR Podcast
Charlie Fink Productions

You Might Also Like

2.5 Admins
The Late Night Linux Family
LINUX Unplugged
Jupiter Broadcasting
Late Night Linux
The Late Night Linux Family
Malicious Life
Malicious Life
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Self-Hosted
Jupiter Broadcasting