Episodes
Bots are actionable scripts that can slow your day to day business, be enlisted in denial of service attacks, or even keep you from getting those tickets Taylor Swift you desperately want.
Published 11/29/23
Published 11/29/23
You would think there is a procedure to End-of-Life a medical device, right? Erase personal health info. Erase network configuration info.That isn’t necessarily so.
Published 11/14/23
With the recent Clop attack on customers of MoveIt, ransomware is now old news. Attackers are skipping the encryption and simply extorting the exfiltrated data, according to Thomas “Mannie” Wilken, from the Accenture Cyber Threat Intelligence Dark Web Reconnaissance Team.
Published 11/01/23
Imagine a data dump of files similar to the Snowden Leaks in 2013, only this it’s not from the NSA but from NT Vulkan, a Russian contractor. And it’s a framework for targeting critical IT infrastructures.
Published 10/17/23
Rather than use backdoor exploits, attackers are stealing credentials going through the front door. How are they gaining credentials. Sometimes it’s from the tools we trust. Paul Geste and Thomas Chauchefoin discuss their DEF CON 31 presentation Visual Studio Code is why I have (Workspace) Trust issues as well as the larger question of how much we should trust tools that we depend on daily.
Published 10/03/23
What if an GPC project OAUTH access token wasn’t deleted? This could expose databases to bad actors.
Published 09/19/23
How do you conduct an incident response for an entire country? When it’s 27 different life-critical government ministries each with up to 850 individual devices -- that’s uncharted territory.
Published 09/06/23
What is is like to hack an entire country, to take it’s government services offline, to deny a government an ability to function? Costa Rica knows.
Published 08/23/23
Speaking at Black Hat 2023, Kelly Shortridge is bringing cybersecurity out of the dark ages by infusing security by design to create secure patterns and practices.
Published 08/08/23
Are we doing enough to secure our health delivery organizations? Given the rise of ransomware attacks, one could day we are not.
Published 07/25/23
Internet domains are brittle. One could hack into a military, a foreign government, or even global commercial web services domain using flaws in the underlying architecture.
Published 07/12/23
Who among us has not seen phish in their inbox? Aviv Grafi, from Votiro, gets into the weeds about how malicious documents are formed and how they might (despite good secure posture) still end up in your inbox or browser.
Published 06/27/23
Could the nudges and prompts like those from our Fitbits and Apple watches be effective in enforcing good security behavior as well?
Published 06/13/23
Say you’re an organization that’s been hit with ransomware. At what point do you need to bring in a ransomware negotiator? Should you pay, should you not?
Published 05/30/23
Small to Medium Business are increasingly the target of APTs and ransomware. Often they lack the visibility of a SOC. Or even basic low level threat analysis.
Published 05/18/23
More and more criminals are identified through open source intelligence (OSINT). Sometimes a negative Yelp review can reveal their true identity.
Published 05/03/23
It’s time to evolve beyond the UNIX operating system. OSes today are basically ineffective database managers, so why not build an OS that’s a database manager?
Published 04/19/23
Incident response in the cloud. How is it different, and why do we need to pay more attention to it today, before something major happens tomorrow.
Published 04/04/23
We’ve seen drug marketplaces and extremists use the Dark Web. Will generative AI tools like ChatGPT make things crazier by lowering the barrier to entry?
Published 03/21/23
Booth babes and rampant sexism were more of a problem in infosec in the past. That is, until Chenxi Wang spoke up. And she’s not done changing the industry.
Published 03/08/23
What if DEF CON CTFs were televised? What if you could see their screens and have interviews with the players in the moment? Turns out, you can.
Published 02/22/23
When we hear about bad actors on a compromised system for 200+ days, we wonder how they survived for so long. Often they hide in common misconfigurations. Paula Januszkiewicz, CEO of Cqure, returns to The Hacker Mind to explain.
Published 02/08/23
Having a common framework around vulnerabilities, around threats, helps us understand the infosec landscape better. STRIDE provides an easy mnemonic.
Published 01/25/23
Hacking websites is perhaps often underestimated yet is super interesting with all its potential for command injections and cross site scripting attacks.
Published 01/10/23