Paul's Security Weekly (Video)
Episodes
Custom Python Encryption, Shady 0-Days, & The Great iPwn - PSW #679
09 Jan 2021
Contributed by Lukas
In the Security News, Nissan Source code leaked, how the shady 0-Day sales game is evolving, Hack the Army 3.0 announced, creating your own custom enc...
What Has Changed (or Not) Since Our Last Visit? - Ming Chow - PSW #679
08 Jan 2021
Contributed by Lukas
-What are we seeing from infosec graduates as they come into the enterprise to begin their careers? -How has data privacy changed since 2014? -Is the ...
Automated Vulnerability Remediation - The Good, the Bad and the Ugly - PSW #679
08 Jan 2021
Contributed by Lukas
The way we identify, prioritize, and mitigate software vulnerabilities was built in the reverse order. Why did it happen? Could a new remediation stra...
SolarWinds Attack, AIR-FI Technique, & Zodiac Cypher Decoded - PSW #678
19 Dec 2020
Contributed by Lukas
In the Security News, How suspected Russian hackers outed their massive cyberattack, Millions of Unpatched IoT, OT Devices Threaten Critical Infrastru...
Securing The Enterprise Software Supply Chain - Harry Sverdlove - PSW #678
18 Dec 2020
Contributed by Lukas
SolarWinds is just the latest example of how the enterprise software supply chain, when compromised, can be used successfully by attackers. These coor...
Generating Threat Insights Using Data Science - Roi Cohen, Shani Dodge - PSW #678
18 Dec 2020
Contributed by Lukas
In this world of countless vulnerabilities, we need to find a way to identify threats. Prioritizing known vulnerabilities is a step in the right direc...
Hacking Matters Panel - PSW #677
12 Dec 2020
Contributed by Lukas
Hacking matters. The term hacking has gotten away from us over the years. I believe we've reclaimed it, to a certain extent. The goal of this panel is...
Innovative Blue Team Techniques Panel - PSW #677
11 Dec 2020
Contributed by Lukas
We often hear that offensive security techniques are "sexier" than defensive blue team techniques. In this panel discussion, we attempt to level the p...
The State Of Penetration Testing Panel - PSW #677
11 Dec 2020
Contributed by Lukas
Join us for a lively discussion surrounding the topic of penetration testing. Sure, we've called out differences between vulnerability scanning and pe...
Security News w/ Ed Skoudis - PSW #676
05 Dec 2020
Contributed by Lukas
Ed Skoudis returns to talk to us about the Holiday Hack Challenge! Then, in the Security News, Thousands of unsecured medical records were exposed onl...
Zero Trust Data Security - Jeff Capone - PSW #676
04 Dec 2020
Contributed by Lukas
Ensure all your data is secure, without impacting the business. This segment is sponsored by SecureCircle. Visit https://securityweekly.com/securec...
From Chaos to Topia - Vicarius - PSW #676
04 Dec 2020
Contributed by Lukas
More computers, more software, and faster development cycles lead to more vulnerabilities. The security and IT teams are put under immense pressure to...
IoT Cybersecurity Improvement Act, TCL Smart TV Flaw, & Popping Reverse Shells - PSW #675
21 Nov 2020
Contributed by Lukas
In the Security News, Verizon has suggestions on how to make DNS more secure, Microsoft is trying to fix another Kerberos vulnerability, Bumble made s...
Understanding How Data Science Applies to Infosec - Michael Roytman - PSW #675
20 Nov 2020
Contributed by Lukas
Michael takes us through some of the common AI and ML methods of data science and how they apply to our InfoSec problems. This segment is sponsored...
Threat Actors & Recent Trends - Jamie Fernandes, Karsten Chearis - PSW #675
20 Nov 2020
Contributed by Lukas
Jamie and Karsten join us for a discussion about recent attack trends, threat actors, and campaigns carried out by malicious threat actors. Everything...
Cobalt Strike Leak, DNS Cache Poisoning, & Decrypting Open SSH - PSW #674
14 Nov 2020
Contributed by Lukas
In the Security News, not all cyberattacks are created equal, Google patches two more Chrome zero days, What does threat intelligence really mean, Cob...
Challenges With Securing Container Environments - Badri Raghunathan, Sumedh Thakar - PSW #674
13 Nov 2020
Contributed by Lukas
Sumedh and Badri discuss challenges associated with container Security & DevOps need for visibility into containers. Qualys' new approach to runtime s...
Disrupt Attacks at the Endpoint with Attivo Networks - Joseph Salazar - PSW #674
13 Nov 2020
Contributed by Lukas
Attackers have repeatedly demonstrated that they can evade perimeter defenses to compromise a system inside the network. Once they get in, they must b...
Multiple iOS 0-Days, Intel Malware Defense, & Windows 0-Day Under Attack - PSW #673
07 Nov 2020
Contributed by Lukas
In the Security News, Deception Technology: No Longer Only A Fortune 2000 Solution, Windows 10 zero-day could allow hackers to seize control of your c...
Proactive Security Using Runbooks - Dan DeCloss - PSW #673
06 Nov 2020
Contributed by Lukas
Runbooks can be a game changer when it comes to executing proactive security assessments and tabletop exercises. This segment will highlight how to us...
Abusing JWT (JSON Web Tokens) - Sven Morgenroth - PSW #673
06 Nov 2020
Contributed by Lukas
Learn how JWTs are implemented, both the correct way and the insecure way. Spoiler alert, most implement them insecurely. Sven will also show you some...
JavaScript Web Tokens, NVIDIA GeForce Experience Vulns, & Hacking Coffee Pots - PSW #672
31 Oct 2020
Contributed by Lukas
In the Security News, the KashmirBlack botnet is behind attacks on CMSs such as WordPress, Joomla, and Drupal, Cybercriminals are Coming After Your Co...
How Computer Vision Balances Thoroughness & Speed - PSW #672
30 Oct 2020
Contributed by Lukas
Polarity uses computer vision that works like augmented reality for your data. It's not a new dashboard to search or a new portal to manage. Polarity ...
Determining Vulnerability Exploitation With Real Software Activity - PSW #672
30 Oct 2020
Contributed by Lukas
Only integrating vulnerability characteristics to determine risk leaves half the prioritization canvas empty. Observing and analyzing user interaction...
Discord Vulnerabilities, Chrome 0-Day, & Severe WordPress Flaw - PSW #671
24 Oct 2020
Contributed by Lukas
In the Security News, Testing firm NSS Labs closes up shop, stringing vulnerabilities together to pwn the Discord desktop app, a Wordpress plugin aime...
Hackers Hitting Below The Belt - Scott Scheferman - PSW #671
23 Oct 2020
Contributed by Lukas
In 2020 attackers are increasingly targeting firmware and hardware - going below the operating system to hide from traditional security solutions and ...
Sysmon Endpoint Monitoring, Now w/ Clipboard Voyeurism - Corey Thuen - PSW #671
23 Oct 2020
Contributed by Lukas
Sysmon is a free endpoint monitoring tool published by Microsoft in their sysinternals suite. It generates process creations, network connections, fil...
'BleedingTooth' Vulnerability, Zoom Rolls Out E2EE, & 50,000 Cameras Compromised - PSW #670
17 Oct 2020
Contributed by Lukas
In the Security News, Microsoft Uses Trademark Law to Disrupt Trickbot Botnet, Barnes & Noble cyber incident could expose customer shipping addresses ...
Democratizing & Saasifying Security Operations - Patrick Garrity - PSW #670
16 Oct 2020
Contributed by Lukas
Threats are no longer only a concern of large sophisticated organizations and there is a continued need to democratize security operations and control...
Prioritize This, Prioritize That, Prioritize With Context! - Roi Cohen, Shani Dodge - PSW #670
16 Oct 2020
Contributed by Lukas
Software vulnerabilities are exploding in growth at an unprecedented rate, and security teams are struggling to stay afloat. Lifebuoys (i.e. CVSS base...
10 Years Since Stuxnet, Rare Bootkit Discovered, & Thin Client Vulnerabilities - PSW #669
10 Oct 2020
Contributed by Lukas
US Air Force slaps Googly container tech on yet another war machine to 'run advanced ML algorithms', Rare Firmware Rootkit Discovered Targeting Diplom...
Assembling Your First Infosec Home Lab - Tony "tjnull" Punturiero - PSW #669
09 Oct 2020
Contributed by Lukas
Assembling an infosec home lab is great way to learn more about the ever-changing programs and systems in the cyber world. However, it can get complic...
Fast And Secure Web - Alexander Krizhanovsky - PSW #669
09 Oct 2020
Contributed by Lukas
Tempesta FW is an open source hybrid of an HTTPS accelerator and a firewall aiming to accelerate web resources and protect them against DDoS and web a...
Ryuk Ransomware Attack, Windows XP Server Leak, & Potential Return to 'Hackers' - PSW #668
03 Oct 2020
Contributed by Lukas
In the Security News, Rumored Windows XP Source Code Leaked Online, Hospitals hit by countrywide ransomware attack, China-linked 'BlackTech' hackers s...
Intrusion Detection Honeypots: Detection Through Deception - Chris Sanders - PSW #668
02 Oct 2020
Contributed by Lukas
Intrusion Detection Honeypots are fake services, data, and tokens placed inside the network to lure attackers into interacting with them to give away ...
NGINX As An RTMP Proxy - PSW #668
02 Oct 2020
Contributed by Lukas
Paul will discuss his process for creating a docker container for running NGINX as an RTMP proxy for streaming video to multiple services; complete wi...
Zerologon Attack, CrimeOps, & BLESA Bluetooth Flaw - PSW #667
19 Sep 2020
Contributed by Lukas
Three Cybersecurity Lessons from a 1970s KGB Key Logger, MFA Bypass Bugs Opened Microsoft 365 to Attack, How Hackers Can Pick Your LocksJust By Listen...
Elastic Security Opens Public Detections Rules Repo - James Spiteri - PSW #667
18 Sep 2020
Contributed by Lukas
Following the release of our detection engine, Elastic opened up a new GitHub repo of our public detection rules. See: https://github.com/elastic/dete...
Key Findings From The Newly Released BSIMM11 Report - Mike Ware - PSW #667
18 Sep 2020
Contributed by Lukas
BSIMM11, the latest version of the Building Security In Maturity Model (BSIMM), was created to help organizations plan, execute, measure, and improve ...
Chrome Sandbox Exploit, Cisco Jabber CVE, & Lea Snyder w/ BSides Boston - PSW #666
12 Sep 2020
Contributed by Lukas
We welcome special guest Lea Snyder, BSides Boston Organizer, to talk all things BSides Boston 2020 for its 10 year anniversary! In the Security News,...
Building Security Into the DevOps Lifecycle - Sumedh Thakar - PSW #666
11 Sep 2020
Contributed by Lukas
DevOps has gained momentum over the years as its methods have been used by teams worldwide to accelerate application delivery. But where we continue t...
The Patchless Horseman - Roi Cohen & David Asraf - PSW #666
11 Sep 2020
Contributed by Lukas
Every time you deploy a patch nothing has ever gone wrong, right? Most of us have been burned by deploying a patch, causing downtime in your environme...
Slack RCE, Tesla Dodges Ransomware, & Cisco Router 0-Day - PSW #665
05 Sep 2020
Contributed by Lukas
The NSA Makes Its Powerful Cybersecurity Tool Open Source, The bizarre reason Amazon drivers are hanging phones in trees near Whole Foods, Elon Musk C...
Cybersecurity & Patient Safety - Justin Armstrong - PSW #665
04 Sep 2020
Contributed by Lukas
Successful attacks on healthcare entities are steadily increasing. Sophisticated criminals and nation states are focusing more attention on healthcare...
Lovable Security: Be a Data Custodian, Not a Data Owner - Fredrick "Flee" Lee - PSW #665
04 Sep 2020
Contributed by Lukas
Loveable Security: Flee's approach to cybersecurity is that is should be "loveable." He thinks cybersecurity perpetuates a myth of an elite, isolated ...
Predicting Vulnerabilities In Compiled Code - Roi Cohen & Shani Dodge - PSW #664
29 Aug 2020
Contributed by Lukas
The growth in software vulnerability exploitation creates a need for better prediction capabilities. Over time, there have been shifts in the ways of ...
SWVHSC Micro Interviews: Polarity & Netsparker - Ferruh Mavituna, Paul Battista - PSW #664
28 Aug 2020
Contributed by Lukas
Most analysts will tell you that they balance between being thorough and getting the job done quickly. Paul Battista asked the security community to w...
Hacking Tesla's Model 3, 28,000 Printers Hijacked, & iOS 14 Privacy Changes - PSW #664
28 Aug 2020
Contributed by Lukas
Google Researcher Reported 3 Flaws in Apache Web Server Software, Medical Data Leaked on GitHub Due to Developer Errors, Experts hacked 28,000 unsecur...
SWVHSC Micro Interviews: Gravwell & Rapid7 - Corey Thuen, Deral Heiland - PSW #663
22 Aug 2020
Contributed by Lukas
What use cases are addressed by Threat Hunting Platforms and SIEMs? Where is the overlap and where are the differences? Corey Thuen, Founder of Gravwe...
Voice Phishers, 'SpiKey' Lock Picking, & Coffee Cup Hackers - PSW #663
21 Aug 2020
Contributed by Lukas
New Microsoft Defender ATP Capability Blocks Malicious Behaviors, Voice Phishers Targeting Corporate VPNs, IBM finds vulnerability in IoT chips presen...
Protecting Critical Infrastructure In Hybrid Clouds - Dan Perkins, Harry Sverdlove - PSW #663
21 Aug 2020
Contributed by Lukas
Customers are concerned about protecting critical services such as Active Directory from compromise. It's game over if AD is compromised. AD environme...
Vulnerability Rich - Contextually Blind! - Michael Assraf - PSW #662
15 Aug 2020
Contributed by Lukas
It s not uncommon to find the traditional vulnerability assessment report buried under the CISO family picture, compliance books, and his latest blood...
Adobe RCEs, Amazon Alexa Vulns, & TeamViewer Flaw - PSW #662
14 Aug 2020
Contributed by Lukas
This week, Amazon Alexa One-Click Attack Can Divulge Personal Data, Adobe tackles critical code execution vulnerabilities in Acrobat, Reader, Threat a...
Why Elastic Is Making Endpoint Security 'Free And Open' - Mike Nichols - PSW #662
14 Aug 2020
Contributed by Lukas
Elastic believes that transparency and collaboration must be the new norm for the greater infosec community to succeed in stopping threats at scale. W...
Automating Your Vulnerability Management Program - Mehul Revankar, Sumedh Thakar - PSW #661
08 Aug 2020
Contributed by Lukas
In this segment, we discuss the importance of automating the Vulnerability Management Program and discuss Qualys VMDR which takes vulnerability manage...
SWVHSC: Netgear Flaws, Satellite Spying, & Stealing UltraLoq Keys - PSW #661
07 Aug 2020
Contributed by Lukas
How hackers could spy on satellite internet traffic with just $300 of home TV equipment, Smart locks opened with nothing more than a MAC address, 17-Y...
SWVHSC: Observing Disinformation Campaigns - Chad Anderson - PSW #661
07 Aug 2020
Contributed by Lukas
Chad talks about the DomainTools COVID research (and how they stumbled on the CovidLock Android ransomware), mapping the Reopen Campaigns in more deta...
GNU GRUB2 Vulnerability, 'BootHole' Secure Boot Threat, & Garmin Ransomware Hack - PSW #660
04 Aug 2020
Contributed by Lukas
A Vulnerability that Allowed Brute-Forcing Passwords of Private Zoom Meetings, Russia's GRU Hackers Hit US Government and Energy Targets, a New tool t...
MIDAS - Siddharth Bhatia - PSW #660
01 Aug 2020
Contributed by Lukas
MIDAS uses unsupervised learning to detect anomalies in a streaming manner in real-time and has become a new baseline. It was designed keeping in mind...
Gravwell Big Bang Release - Corey Thuen - PSW #660
31 Jul 2020
Contributed by Lukas
The Gravwell Data Fusion platform is releasing a major update this week. New features make analyzing logs and network data much easier for new users w...
Cisco Security Flaw, Million Dollar Bounties, & Jackpotting ATMs - PSW #659
25 Jul 2020
Contributed by Lukas
Vulnerable Cellular Routers Targeted in Latest Attacks on Israel Water Facilities, Fugitive Wirecard Executive Jan Marsalek Was Involved In Attempt to...
The Power of the Cloud Platform: One Single Agent, One Global View - Sumedh Thakar - PSW #659
24 Jul 2020
Contributed by Lukas
Leveraging the unifying power of a cloud-based security platform to provide full context and comprehensive visibility into the entire attack chain for...
Affects of COVID-19 on Web Applications - Zane Lackey - PSW #659
24 Jul 2020
Contributed by Lukas
Zane Lackey joins us once again to talk about Zero Trust, Cloud Security, and the impact of COVID-19 on Digital Transformation! This segment is sponso...
Twitter Mega Hack, 3rd Party IoT Vulns, & Windows DNS SIGRed RCE - PSW #658
18 Jul 2020
Contributed by Lukas
Microsoft fixes critical wormable RCE SigRed in Windows DNS servers, Zoom Addresses Vanity URL Zero-Day, Docker attackers devise clever technique to a...
Welcome Our Newest Host! - John Snyder - PSW #658
18 Jul 2020
Contributed by Lukas
The guys welcome our newest host to the family. John Snyder will replace Matt Alderman on Security and Compliance Weekly. Tune in to hear about how Jo...
Artificial Intelligence and Machine Learning in Cybersecurity - Ankur Chowdhary - PSW #658
17 Jul 2020
Contributed by Lukas
With advent of Internet of Things (IoT) and emerging cloud technologies, ensuring continued cybersecurity at scale is a challenging task. An ever grow...
RCE Chaos, Zoom 0-Day, & Banning TikTok - PSW #657
11 Jul 2020
Contributed by Lukas
Hackers Are Exploiting a 5-Alarm Bug in Networking Equipment, Cisco Talos discloses technical details of Chrome and Firefox flaws, Palo Alto Networks ...
Fighting IoT Insecurities - Terry Dunlap - PSW #657
10 Jul 2020
Contributed by Lukas
Arrested at 17 while hacking with a Commodore 64, Terry went on to work for the US National Security Agency help track terrorists. He left the NSA in ...
IPv6 Tunneling - Joff Thyer - PSW #657
10 Jul 2020
Contributed by Lukas
In this technical demo, Joff will show how you can bring up an IPv6 tunnel to learn and play with IPv6 connectivity and basic concepts. This tech segm...
Netgear RCE, Guacamole Flaws, & 'Lucifer' DDoS Botnet - PSW #656
05 Jul 2020
Contributed by Lukas
Cisco Releases Security Advisory for Telnet Vulnerability in IOS XE Software, Firefox 78 is out with a mysteriously empty list of security fixes, Pyth...
OSINT Scraping with Python - Ryan Hays - PSW #656
04 Jul 2020
Contributed by Lukas
With bug bounties becoming more and more main stream for organizations. The bounty hunters are turning to more and more automation. Open source intell...
Work From Home Cyber Security - Jerry Chen - PSW #656
03 Jul 2020
Contributed by Lukas
Hackers know that more people are working from home now and accessing/ sending/ sharing sensitive company data through their home networks. How can bu...
New Web Technology & Impact on Automated Security Testing - Benjamin Daniel Mussler - PSW #655
13 Jun 2020
Contributed by Lukas
As web applications have evolved from static HTML pages into fully-fledged applications with a native feel to them, web browsers continue to provide d...
OSS Vulnerabilities, UPnP Flaws, & 0-Days for Bad People - PSW #655
13 Jun 2020
Contributed by Lukas
Hospital-busting hacker crew may be behind ransomware attack that made Honda halt car factories, 3 common misconceptions about PCI compliance, SMBleed...
Enhancing Vulnerability Management By Including Penetration Testing Results - Dan DeCloss - PSW #655
12 Jun 2020
Contributed by Lukas
We'll discuss how organizations can improve their vulnerability management life cycle and demo some quick ways to get started with vulnerability manag...
Root Cert Chaos, Octopus Scanner, & RobbinHood & the Merry Men - PSW #654
06 Jun 2020
Contributed by Lukas
Octopus Scanner Sinks Tentacles into GitHub Repositories, RobbinHood and the Merry Men, Zoom Restricts End-to-End Encryption to Paid Users, Hackers st...
PCAPS Or It Didn't Happen- Corey Thuen - PSW #654
06 Jun 2020
Contributed by Lukas
Threat hunting activities often require packet capture analysis but capturing and storing PCAP at scale is rough. This segment covers open source tool...
Lightweight Vulnerability Management Using NMAP - PSW #654
05 Jun 2020
Contributed by Lukas
Paul delivers a Technical Segment on Lightweight Vulnerability Management using NMAP! Visit https://www.securityweekly.com/psw for all the latest e...
Ed Skoudis & Security News - PSW #653
30 May 2020
Contributed by Lukas
In this week's Security News, NSA warns Russia-linked APT group is exploiting Exim flaw since 2019, Hackers Compromise Cisco Servers Via SaltStack Fla...
"Burn-In: A Novel of the Real Robotic Revolution" - Peter Singer - PSW #653
29 May 2020
Contributed by Lukas
"Burn-In: A Novel of the Real Robotic Revolution" (May 26 release) is a new kind of novel+nonfiction. It uses the technothriller format as a way to sh...
2020 MITRE ATT&CK Malware Trends - Greg Foss - PSW #653
29 May 2020
Contributed by Lukas
The MITRE ATT&CK framework has had a major impact on the cybersecurity industry and has given a defenders a haystack in which to focus their defensive...
Stuxnet, RCE's Everywhere, & Breach Chaos - PSW #652
23 May 2020
Contributed by Lukas
In the Security News, Hackers target the air-gapped networks of the Taiwanese and Philippine military, Stored XSS in WP Product Review Lite plugin all...
HTTP Security Headers In Action - Sven Morgenroth - PSW #652
23 May 2020
Contributed by Lukas
HTTP security headers are an easy and effective way to harden your application against all kinds of client side attacks. We'll discuss which security ...
Building An InfoSec Career - Jason Nickola - PSW #652
22 May 2020
Contributed by Lukas
The guests on Trust Me I'm Certified have dropped some real knowledge and I'd like to distill that down as well as talk about building technical skill...
Ramsay Malware, Top 10 CVE's, & Reverse RDP Attacks - PSW #651
16 May 2020
Contributed by Lukas
In the Security News, Palo Alto Networks Patches Many Vulnerabilities in PAN-OS, Zerodium will no longer acquire certain types of iOS exploits due to ...
Securing Remote Access: Quarantines & Security - Harry Sverdlove - PSW #651
15 May 2020
Contributed by Lukas
We use terms such as Social Distancing, Quarantine, and Contact Tracing on a regular basis amid the current crisis. How do these apply to Information ...
MITRE ATT&CK & Security Visibility: Looking Beyond Endpoint Data - Mike Nichols - PSW #651
15 May 2020
Contributed by Lukas
In this episode of Paul's Security Weekly, we will dive into the recently published MITRE ATT&CK second-round evaluation based on APT29. While MITRE d...
Vulnerability Madness, IoT Botnets, & Breach Chaos - PSW #650
11 May 2020
Contributed by Lukas
In the Security News, Naikon APT Hid Five-Year Espionage Attack Under Radar, PoC Exploit Released for DoS Vulnerability in OpenSSL, 900,000 WordPress ...
Project Fantastic - Bringing The CLI to GUI Users - PSW #650
08 May 2020
Contributed by Lukas
Lots of IT and security professionals do not want to use the CLI, which has set them back. Fantastic exposes the same power as the CLI in an easy to u...
Public Utility Security and National Guard Support - Chris Elgee, Jim McPherson - PSW #650
08 May 2020
Contributed by Lukas
Public utilities are under fire from malicious actors now, more than ever. At the same time, authorities for National Guard units are expanding, allow...
Defensive Strategies and Qualys VMDR - PSW #649
02 May 2020
Contributed by Lukas
The crew talks about how to accomplish asset management, vulnerability management, prioritization of remediation, and the actual remediation steps! No...
Python Pickling, Sophos 0-Day, & AWS RDS MySQL - PSW #649
02 May 2020
Contributed by Lukas
In the Security News, Half a Million Zoom Accounts Compromised by Credential Stuffing, Sold on Dark Web, Scammers pounce as stimulus checks start flow...
Fighting the Cyber War With Battlefield Tactics - Jeremy Miller, Philip Niedermair - PSW #649
01 May 2020
Contributed by Lukas
Jeremy Miller, a former Green Beret and current CEO of Lionfish Cyber Security, will discuss how mission set tactics used by Special Forces can be app...
iOS Mail Hijack, Hacking Satellites, & 0-Days for Days - PSW #648
25 Apr 2020
Contributed by Lukas
In the Security News, Legions of cybersecurity volunteers rally to protect hospitals during COVID-19 crisis, Wanna hack a Satellite? The Navy will let...
Layer8 Conference & WorkshopCon - Ori Zigindere, Patrick Laverty - PSW #648
25 Apr 2020
Contributed by Lukas
Patrick Laverty created and co-organizes the Layer 8 Conference with Lea Snyder. This year will be the 3rd annual conference that solely focuses on so...
The Insider Threat - Steven Bay - PSW #648
24 Apr 2020
Contributed by Lukas
Steven Bay has over 16 years of cybersecurity experience, spanning the military, government, consulting, and enterprise security. For 10 of those year...
Hospital Hackers, $500K Zoom 0day, & SFO Windows Hackers - PSW #647
18 Apr 2020
Contributed by Lukas
This week in the Security News, How to teach your iPhone to recognize you while wearing a mask, Hackers Targeting Critical Healthcare Facilities With ...
Pen Testing to Validate Vulnerability Scanners - Magno Gomes - PSW #647
18 Apr 2020
Contributed by Lukas
Many people inaccurately use vulnerability scans or vulnerability assessments as terms that are synonymous with penetration tests. Those that do know ...
Threat Intel Program Strategies - Wade Woolwine - PSW #647
17 Apr 2020
Contributed by Lukas
Defining key areas of investment that organizations need to consider in their programs. Within the areas of investment, we talk about functional areas...
Zoom, Kubernetes, and Hacking - PSW #646
11 Apr 2020
Contributed by Lukas
A little about Zoom vulnerabilities and data leaks and Cisco Webex vulnerabilities. We talk about security Kubernetes and how the same security princi...