Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

Paul's Security Weekly (Video)

Technology Education

Episodes

Showing 501-600 of 1198
«« ← Prev Page 6 of 12 Next → »»

Custom Python Encryption, Shady 0-Days, & The Great iPwn - PSW #679

09 Jan 2021

Contributed by Lukas

In the Security News, Nissan Source code leaked, how the shady 0-Day sales game is evolving, Hack the Army 3.0 announced, creating your own custom enc...

What Has Changed (or Not) Since Our Last Visit? - Ming Chow - PSW #679

08 Jan 2021

Contributed by Lukas

-What are we seeing from infosec graduates as they come into the enterprise to begin their careers? -How has data privacy changed since 2014? -Is the ...

Automated Vulnerability Remediation - The Good, the Bad and the Ugly - PSW #679

08 Jan 2021

Contributed by Lukas

The way we identify, prioritize, and mitigate software vulnerabilities was built in the reverse order. Why did it happen? Could a new remediation stra...

SolarWinds Attack, AIR-FI Technique, & Zodiac Cypher Decoded - PSW #678

19 Dec 2020

Contributed by Lukas

In the Security News, How suspected Russian hackers outed their massive cyberattack, Millions of Unpatched IoT, OT Devices Threaten Critical Infrastru...

Securing The Enterprise Software Supply Chain - Harry Sverdlove - PSW #678

18 Dec 2020

Contributed by Lukas

SolarWinds is just the latest example of how the enterprise software supply chain, when compromised, can be used successfully by attackers. These coor...

Generating Threat Insights Using Data Science - Roi Cohen, Shani Dodge - PSW #678

18 Dec 2020

Contributed by Lukas

In this world of countless vulnerabilities, we need to find a way to identify threats. Prioritizing known vulnerabilities is a step in the right direc...

Hacking Matters Panel - PSW #677

12 Dec 2020

Contributed by Lukas

Hacking matters. The term hacking has gotten away from us over the years. I believe we've reclaimed it, to a certain extent. The goal of this panel is...

Innovative Blue Team Techniques Panel - PSW #677

11 Dec 2020

Contributed by Lukas

We often hear that offensive security techniques are "sexier" than defensive blue team techniques. In this panel discussion, we attempt to level the p...

The State Of Penetration Testing Panel - PSW #677

11 Dec 2020

Contributed by Lukas

Join us for a lively discussion surrounding the topic of penetration testing. Sure, we've called out differences between vulnerability scanning and pe...

Security News w/ Ed Skoudis - PSW #676

05 Dec 2020

Contributed by Lukas

Ed Skoudis returns to talk to us about the Holiday Hack Challenge! Then, in the Security News, Thousands of unsecured medical records were exposed onl...

Zero Trust Data Security - Jeff Capone - PSW #676

04 Dec 2020

Contributed by Lukas

Ensure all your data is secure, without impacting the business.   This segment is sponsored by SecureCircle. Visit https://securityweekly.com/securec...

From Chaos to Topia - Vicarius - PSW #676

04 Dec 2020

Contributed by Lukas

More computers, more software, and faster development cycles lead to more vulnerabilities. The security and IT teams are put under immense pressure to...

IoT Cybersecurity Improvement Act, TCL Smart TV Flaw, & Popping Reverse Shells - PSW #675

21 Nov 2020

Contributed by Lukas

In the Security News, Verizon has suggestions on how to make DNS more secure, Microsoft is trying to fix another Kerberos vulnerability, Bumble made s...

Understanding How Data Science Applies to Infosec - Michael Roytman - PSW #675

20 Nov 2020

Contributed by Lukas

Michael takes us through some of the common AI and ML methods of data science and how they apply to our InfoSec problems.   This segment is sponsored...

Threat Actors & Recent Trends - Jamie Fernandes, Karsten Chearis - PSW #675

20 Nov 2020

Contributed by Lukas

Jamie and Karsten join us for a discussion about recent attack trends, threat actors, and campaigns carried out by malicious threat actors. Everything...

Cobalt Strike Leak, DNS Cache Poisoning, & Decrypting Open SSH - PSW #674

14 Nov 2020

Contributed by Lukas

In the Security News, not all cyberattacks are created equal, Google patches two more Chrome zero days, What does threat intelligence really mean, Cob...

Challenges With Securing Container Environments - Badri Raghunathan, Sumedh Thakar - PSW #674

13 Nov 2020

Contributed by Lukas

Sumedh and Badri discuss challenges associated with container Security & DevOps need for visibility into containers. Qualys' new approach to runtime s...

Disrupt Attacks at the Endpoint with Attivo Networks - Joseph Salazar - PSW #674

13 Nov 2020

Contributed by Lukas

Attackers have repeatedly demonstrated that they can evade perimeter defenses to compromise a system inside the network. Once they get in, they must b...

Multiple iOS 0-Days, Intel Malware Defense, & Windows 0-Day Under Attack - PSW #673

07 Nov 2020

Contributed by Lukas

In the Security News, Deception Technology: No Longer Only A Fortune 2000 Solution, Windows 10 zero-day could allow hackers to seize control of your c...

Proactive Security Using Runbooks - Dan DeCloss - PSW #673

06 Nov 2020

Contributed by Lukas

Runbooks can be a game changer when it comes to executing proactive security assessments and tabletop exercises. This segment will highlight how to us...

Abusing JWT (JSON Web Tokens) - Sven Morgenroth - PSW #673

06 Nov 2020

Contributed by Lukas

Learn how JWTs are implemented, both the correct way and the insecure way. Spoiler alert, most implement them insecurely. Sven will also show you some...

JavaScript Web Tokens, NVIDIA GeForce Experience Vulns, & Hacking Coffee Pots - PSW #672

31 Oct 2020

Contributed by Lukas

In the Security News, the KashmirBlack botnet is behind attacks on CMSs such as WordPress, Joomla, and Drupal, Cybercriminals are Coming After Your Co...

How Computer Vision Balances Thoroughness & Speed - PSW #672

30 Oct 2020

Contributed by Lukas

Polarity uses computer vision that works like augmented reality for your data. It's not a new dashboard to search or a new portal to manage. Polarity ...

Determining Vulnerability Exploitation With Real Software Activity - PSW #672

30 Oct 2020

Contributed by Lukas

Only integrating vulnerability characteristics to determine risk leaves half the prioritization canvas empty. Observing and analyzing user interaction...

Discord Vulnerabilities, Chrome 0-Day, & Severe WordPress Flaw - PSW #671

24 Oct 2020

Contributed by Lukas

In the Security News, Testing firm NSS Labs closes up shop, stringing vulnerabilities together to pwn the Discord desktop app, a Wordpress plugin aime...

Hackers Hitting Below The Belt - Scott Scheferman - PSW #671

23 Oct 2020

Contributed by Lukas

In 2020 attackers are increasingly targeting firmware and hardware - going below the operating system to hide from traditional security solutions and ...

Sysmon Endpoint Monitoring, Now w/ Clipboard Voyeurism - Corey Thuen - PSW #671

23 Oct 2020

Contributed by Lukas

Sysmon is a free endpoint monitoring tool published by Microsoft in their sysinternals suite. It generates process creations, network connections, fil...

'BleedingTooth' Vulnerability, Zoom Rolls Out E2EE, & 50,000 Cameras Compromised - PSW #670

17 Oct 2020

Contributed by Lukas

In the Security News, Microsoft Uses Trademark Law to Disrupt Trickbot Botnet, Barnes & Noble cyber incident could expose customer shipping addresses ...

Democratizing & Saasifying Security Operations - Patrick Garrity - PSW #670

16 Oct 2020

Contributed by Lukas

Threats are no longer only a concern of large sophisticated organizations and there is a continued need to democratize security operations and control...

Prioritize This, Prioritize That, Prioritize With Context! - Roi Cohen, Shani Dodge - PSW #670

16 Oct 2020

Contributed by Lukas

Software vulnerabilities are exploding in growth at an unprecedented rate, and security teams are struggling to stay afloat. Lifebuoys (i.e. CVSS base...

10 Years Since Stuxnet, Rare Bootkit Discovered, & Thin Client Vulnerabilities - PSW #669

10 Oct 2020

Contributed by Lukas

US Air Force slaps Googly container tech on yet another war machine to 'run advanced ML algorithms', Rare Firmware Rootkit Discovered Targeting Diplom...

Assembling Your First Infosec Home Lab - Tony "tjnull" Punturiero - PSW #669

09 Oct 2020

Contributed by Lukas

Assembling an infosec home lab is great way to learn more about the ever-changing programs and systems in the cyber world. However, it can get complic...

Fast And Secure Web - Alexander Krizhanovsky - PSW #669

09 Oct 2020

Contributed by Lukas

Tempesta FW is an open source hybrid of an HTTPS accelerator and a firewall aiming to accelerate web resources and protect them against DDoS and web a...

Ryuk Ransomware Attack, Windows XP Server Leak, & Potential Return to 'Hackers' - PSW #668

03 Oct 2020

Contributed by Lukas

In the Security News, Rumored Windows XP Source Code Leaked Online, Hospitals hit by countrywide ransomware attack, China-linked 'BlackTech' hackers s...

Intrusion Detection Honeypots: Detection Through Deception - Chris Sanders - PSW #668

02 Oct 2020

Contributed by Lukas

Intrusion Detection Honeypots are fake services, data, and tokens placed inside the network to lure attackers into interacting with them to give away ...

NGINX As An RTMP Proxy - PSW #668

02 Oct 2020

Contributed by Lukas

Paul will discuss his process for creating a docker container for running NGINX as an RTMP proxy for streaming video to multiple services; complete wi...

Zerologon Attack, CrimeOps, & BLESA Bluetooth Flaw - PSW #667

19 Sep 2020

Contributed by Lukas

Three Cybersecurity Lessons from a 1970s KGB Key Logger, MFA Bypass Bugs Opened Microsoft 365 to Attack, How Hackers Can Pick Your LocksJust By Listen...

Elastic Security Opens Public Detections Rules Repo - James Spiteri - PSW #667

18 Sep 2020

Contributed by Lukas

Following the release of our detection engine, Elastic opened up a new GitHub repo of our public detection rules. See: https://github.com/elastic/dete...

Key Findings From The Newly Released BSIMM11 Report - Mike Ware - PSW #667

18 Sep 2020

Contributed by Lukas

BSIMM11, the latest version of the Building Security In Maturity Model (BSIMM), was created to help organizations plan, execute, measure, and improve ...

Chrome Sandbox Exploit, Cisco Jabber CVE, & Lea Snyder w/ BSides Boston - PSW #666

12 Sep 2020

Contributed by Lukas

We welcome special guest Lea Snyder, BSides Boston Organizer, to talk all things BSides Boston 2020 for its 10 year anniversary! In the Security News,...

Building Security Into the DevOps Lifecycle - Sumedh Thakar - PSW #666

11 Sep 2020

Contributed by Lukas

DevOps has gained momentum over the years as its methods have been used by teams worldwide to accelerate application delivery. But where we continue t...

The Patchless Horseman - Roi Cohen & David Asraf - PSW #666

11 Sep 2020

Contributed by Lukas

Every time you deploy a patch nothing has ever gone wrong, right? Most of us have been burned by deploying a patch, causing downtime in your environme...

Slack RCE, Tesla Dodges Ransomware, & Cisco Router 0-Day - PSW #665

05 Sep 2020

Contributed by Lukas

The NSA Makes Its Powerful Cybersecurity Tool Open Source, The bizarre reason Amazon drivers are hanging phones in trees near Whole Foods, Elon Musk C...

Cybersecurity & Patient Safety - Justin Armstrong - PSW #665

04 Sep 2020

Contributed by Lukas

Successful attacks on healthcare entities are steadily increasing. Sophisticated criminals and nation states are focusing more attention on healthcare...

Lovable Security: Be a Data Custodian, Not a Data Owner - Fredrick "Flee" Lee - PSW #665

04 Sep 2020

Contributed by Lukas

Loveable Security: Flee's approach to cybersecurity is that is should be "loveable." He thinks cybersecurity perpetuates a myth of an elite, isolated ...

Predicting Vulnerabilities In Compiled Code - Roi Cohen & Shani Dodge - PSW #664

29 Aug 2020

Contributed by Lukas

The growth in software vulnerability exploitation creates a need for better prediction capabilities. Over time, there have been shifts in the ways of ...

SWVHSC Micro Interviews: Polarity & Netsparker - Ferruh Mavituna, Paul Battista - PSW #664

28 Aug 2020

Contributed by Lukas

Most analysts will tell you that they balance between being thorough and getting the job done quickly. Paul Battista asked the security community to w...

Hacking Tesla's Model 3, 28,000 Printers Hijacked, & iOS 14 Privacy Changes - PSW #664

28 Aug 2020

Contributed by Lukas

Google Researcher Reported 3 Flaws in Apache Web Server Software, Medical Data Leaked on GitHub Due to Developer Errors, Experts hacked 28,000 unsecur...

SWVHSC Micro Interviews: Gravwell & Rapid7 - Corey Thuen, Deral Heiland - PSW #663

22 Aug 2020

Contributed by Lukas

What use cases are addressed by Threat Hunting Platforms and SIEMs? Where is the overlap and where are the differences? Corey Thuen, Founder of Gravwe...

Voice Phishers, 'SpiKey' Lock Picking, & Coffee Cup Hackers - PSW #663

21 Aug 2020

Contributed by Lukas

New Microsoft Defender ATP Capability Blocks Malicious Behaviors, Voice Phishers Targeting Corporate VPNs, IBM finds vulnerability in IoT chips presen...

Protecting Critical Infrastructure In Hybrid Clouds - Dan Perkins, Harry Sverdlove - PSW #663

21 Aug 2020

Contributed by Lukas

Customers are concerned about protecting critical services such as Active Directory from compromise. It's game over if AD is compromised. AD environme...

Vulnerability Rich - Contextually Blind! - Michael Assraf - PSW #662

15 Aug 2020

Contributed by Lukas

It s not uncommon to find the traditional vulnerability assessment report buried under the CISO family picture, compliance books, and his latest blood...

Adobe RCEs, Amazon Alexa Vulns, & TeamViewer Flaw - PSW #662

14 Aug 2020

Contributed by Lukas

This week, Amazon Alexa One-Click Attack Can Divulge Personal Data, Adobe tackles critical code execution vulnerabilities in Acrobat, Reader, Threat a...

Why Elastic Is Making Endpoint Security 'Free And Open' - Mike Nichols - PSW #662

14 Aug 2020

Contributed by Lukas

Elastic believes that transparency and collaboration must be the new norm for the greater infosec community to succeed in stopping threats at scale. W...

Automating Your Vulnerability Management Program - Mehul Revankar, Sumedh Thakar - PSW #661

08 Aug 2020

Contributed by Lukas

In this segment, we discuss the importance of automating the Vulnerability Management Program and discuss Qualys VMDR which takes vulnerability manage...

SWVHSC: Netgear Flaws, Satellite Spying, & Stealing UltraLoq Keys - PSW #661

07 Aug 2020

Contributed by Lukas

How hackers could spy on satellite internet traffic with just $300 of home TV equipment, Smart locks opened with nothing more than a MAC address, 17-Y...

SWVHSC: Observing Disinformation Campaigns - Chad Anderson - PSW #661

07 Aug 2020

Contributed by Lukas

Chad talks about the DomainTools COVID research (and how they stumbled on the CovidLock Android ransomware), mapping the Reopen Campaigns in more deta...

GNU GRUB2 Vulnerability, 'BootHole' Secure Boot Threat, & Garmin Ransomware Hack - PSW #660

04 Aug 2020

Contributed by Lukas

A Vulnerability that Allowed Brute-Forcing Passwords of Private Zoom Meetings, Russia's GRU Hackers Hit US Government and Energy Targets, a New tool t...

MIDAS - Siddharth Bhatia - PSW #660

01 Aug 2020

Contributed by Lukas

MIDAS uses unsupervised learning to detect anomalies in a streaming manner in real-time and has become a new baseline. It was designed keeping in mind...

Gravwell Big Bang Release - Corey Thuen - PSW #660

31 Jul 2020

Contributed by Lukas

The Gravwell Data Fusion platform is releasing a major update this week. New features make analyzing logs and network data much easier for new users w...

Cisco Security Flaw, Million Dollar Bounties, & Jackpotting ATMs - PSW #659

25 Jul 2020

Contributed by Lukas

Vulnerable Cellular Routers Targeted in Latest Attacks on Israel Water Facilities, Fugitive Wirecard Executive Jan Marsalek Was Involved In Attempt to...

The Power of the Cloud Platform: One Single Agent, One Global View - Sumedh Thakar - PSW #659

24 Jul 2020

Contributed by Lukas

Leveraging the unifying power of a cloud-based security platform to provide full context and comprehensive visibility into the entire attack chain for...

Affects of COVID-19 on Web Applications - Zane Lackey - PSW #659

24 Jul 2020

Contributed by Lukas

Zane Lackey joins us once again to talk about Zero Trust, Cloud Security, and the impact of COVID-19 on Digital Transformation! This segment is sponso...

Twitter Mega Hack, 3rd Party IoT Vulns, & Windows DNS SIGRed RCE - PSW #658

18 Jul 2020

Contributed by Lukas

Microsoft fixes critical wormable RCE SigRed in Windows DNS servers, Zoom Addresses Vanity URL Zero-Day, Docker attackers devise clever technique to a...

Welcome Our Newest Host! - John Snyder - PSW #658

18 Jul 2020

Contributed by Lukas

The guys welcome our newest host to the family. John Snyder will replace Matt Alderman on Security and Compliance Weekly. Tune in to hear about how Jo...

Artificial Intelligence and Machine Learning in Cybersecurity - Ankur Chowdhary - PSW #658

17 Jul 2020

Contributed by Lukas

With advent of Internet of Things (IoT) and emerging cloud technologies, ensuring continued cybersecurity at scale is a challenging task. An ever grow...

RCE Chaos, Zoom 0-Day, & Banning TikTok - PSW #657

11 Jul 2020

Contributed by Lukas

Hackers Are Exploiting a 5-Alarm Bug in Networking Equipment, Cisco Talos discloses technical details of Chrome and Firefox flaws, Palo Alto Networks ...

Fighting IoT Insecurities - Terry Dunlap - PSW #657

10 Jul 2020

Contributed by Lukas

Arrested at 17 while hacking with a Commodore 64, Terry went on to work for the US National Security Agency help track terrorists. He left the NSA in ...

IPv6 Tunneling - Joff Thyer - PSW #657

10 Jul 2020

Contributed by Lukas

In this technical demo, Joff will show how you can bring up an IPv6 tunnel to learn and play with IPv6 connectivity and basic concepts. This tech segm...

Netgear RCE, Guacamole Flaws, & 'Lucifer' DDoS Botnet - PSW #656

05 Jul 2020

Contributed by Lukas

Cisco Releases Security Advisory for Telnet Vulnerability in IOS XE Software, Firefox 78 is out with a mysteriously empty list of security fixes, Pyth...

OSINT Scraping with Python - Ryan Hays - PSW #656

04 Jul 2020

Contributed by Lukas

With bug bounties becoming more and more main stream for organizations. The bounty hunters are turning to more and more automation. Open source intell...

Work From Home Cyber Security - Jerry Chen - PSW #656

03 Jul 2020

Contributed by Lukas

Hackers know that more people are working from home now and accessing/ sending/ sharing sensitive company data through their home networks. How can bu...

New Web Technology & Impact on Automated Security Testing - Benjamin Daniel Mussler - PSW #655

13 Jun 2020

Contributed by Lukas

As web applications have evolved from static HTML pages into fully-fledged applications with a native feel to them, web browsers continue to provide d...

OSS Vulnerabilities, UPnP Flaws, & 0-Days for Bad People - PSW #655

13 Jun 2020

Contributed by Lukas

Hospital-busting hacker crew may be behind ransomware attack that made Honda halt car factories, 3 common misconceptions about PCI compliance, SMBleed...

Enhancing Vulnerability Management By Including Penetration Testing Results - Dan DeCloss - PSW #655

12 Jun 2020

Contributed by Lukas

We'll discuss how organizations can improve their vulnerability management life cycle and demo some quick ways to get started with vulnerability manag...

Root Cert Chaos, Octopus Scanner, & RobbinHood & the Merry Men - PSW #654

06 Jun 2020

Contributed by Lukas

Octopus Scanner Sinks Tentacles into GitHub Repositories, RobbinHood and the Merry Men, Zoom Restricts End-to-End Encryption to Paid Users, Hackers st...

PCAPS Or It Didn't Happen- Corey Thuen - PSW #654

06 Jun 2020

Contributed by Lukas

Threat hunting activities often require packet capture analysis but capturing and storing PCAP at scale is rough. This segment covers open source tool...

Lightweight Vulnerability Management Using NMAP - PSW #654

05 Jun 2020

Contributed by Lukas

Paul delivers a Technical Segment on Lightweight Vulnerability Management using NMAP!   Visit https://www.securityweekly.com/psw for all the latest e...

Ed Skoudis & Security News - PSW #653

30 May 2020

Contributed by Lukas

In this week's Security News, NSA warns Russia-linked APT group is exploiting Exim flaw since 2019, Hackers Compromise Cisco Servers Via SaltStack Fla...

"Burn-In: A Novel of the Real Robotic Revolution" - Peter Singer - PSW #653

29 May 2020

Contributed by Lukas

"Burn-In: A Novel of the Real Robotic Revolution" (May 26 release) is a new kind of novel+nonfiction. It uses the technothriller format as a way to sh...

2020 MITRE ATT&CK Malware Trends - Greg Foss - PSW #653

29 May 2020

Contributed by Lukas

The MITRE ATT&CK framework has had a major impact on the cybersecurity industry and has given a defenders a haystack in which to focus their defensive...

Stuxnet, RCE's Everywhere, & Breach Chaos - PSW #652

23 May 2020

Contributed by Lukas

In the Security News, Hackers target the air-gapped networks of the Taiwanese and Philippine military, Stored XSS in WP Product Review Lite plugin all...

HTTP Security Headers In Action - Sven Morgenroth - PSW #652

23 May 2020

Contributed by Lukas

HTTP security headers are an easy and effective way to harden your application against all kinds of client side attacks. We'll discuss which security ...

Building An InfoSec Career - Jason Nickola - PSW #652

22 May 2020

Contributed by Lukas

The guests on Trust Me I'm Certified have dropped some real knowledge and I'd like to distill that down as well as talk about building technical skill...

Ramsay Malware, Top 10 CVE's, & Reverse RDP Attacks - PSW #651

16 May 2020

Contributed by Lukas

In the Security News, Palo Alto Networks Patches Many Vulnerabilities in PAN-OS, Zerodium will no longer acquire certain types of iOS exploits due to ...

Securing Remote Access: Quarantines & Security - Harry Sverdlove - PSW #651

15 May 2020

Contributed by Lukas

We use terms such as Social Distancing, Quarantine, and Contact Tracing on a regular basis amid the current crisis. How do these apply to Information ...

MITRE ATT&CK & Security Visibility: Looking Beyond Endpoint Data - Mike Nichols - PSW #651

15 May 2020

Contributed by Lukas

In this episode of Paul's Security Weekly, we will dive into the recently published MITRE ATT&CK second-round evaluation based on APT29. While MITRE d...

Vulnerability Madness, IoT Botnets, & Breach Chaos - PSW #650

11 May 2020

Contributed by Lukas

In the Security News, Naikon APT Hid Five-Year Espionage Attack Under Radar, PoC Exploit Released for DoS Vulnerability in OpenSSL, 900,000 WordPress ...

Project Fantastic - Bringing The CLI to GUI Users - PSW #650

08 May 2020

Contributed by Lukas

Lots of IT and security professionals do not want to use the CLI, which has set them back. Fantastic exposes the same power as the CLI in an easy to u...

Public Utility Security and National Guard Support - Chris Elgee, Jim McPherson - PSW #650

08 May 2020

Contributed by Lukas

Public utilities are under fire from malicious actors now, more than ever. At the same time, authorities for National Guard units are expanding, allow...

Defensive Strategies and Qualys VMDR - PSW #649

02 May 2020

Contributed by Lukas

The crew talks about how to accomplish asset management, vulnerability management, prioritization of remediation, and the actual remediation steps! No...

Python Pickling, Sophos 0-Day, & AWS RDS MySQL - PSW #649

02 May 2020

Contributed by Lukas

In the Security News, Half a Million Zoom Accounts Compromised by Credential Stuffing, Sold on Dark Web, Scammers pounce as stimulus checks start flow...

Fighting the Cyber War With Battlefield Tactics - Jeremy Miller, Philip Niedermair - PSW #649

01 May 2020

Contributed by Lukas

Jeremy Miller, a former Green Beret and current CEO of Lionfish Cyber Security, will discuss how mission set tactics used by Special Forces can be app...

iOS Mail Hijack, Hacking Satellites, & 0-Days for Days - PSW #648

25 Apr 2020

Contributed by Lukas

In the Security News, Legions of cybersecurity volunteers rally to protect hospitals during COVID-19 crisis, Wanna hack a Satellite? The Navy will let...

Layer8 Conference & WorkshopCon - Ori Zigindere, Patrick Laverty - PSW #648

25 Apr 2020

Contributed by Lukas

Patrick Laverty created and co-organizes the Layer 8 Conference with Lea Snyder. This year will be the 3rd annual conference that solely focuses on so...

The Insider Threat - Steven Bay - PSW #648

24 Apr 2020

Contributed by Lukas

Steven Bay has over 16 years of cybersecurity experience, spanning the military, government, consulting, and enterprise security. For 10 of those year...

Hospital Hackers, $500K Zoom 0day, & SFO Windows Hackers - PSW #647

18 Apr 2020

Contributed by Lukas

This week in the Security News, How to teach your iPhone to recognize you while wearing a mask, Hackers Targeting Critical Healthcare Facilities With ...

Pen Testing to Validate Vulnerability Scanners - Magno Gomes - PSW #647

18 Apr 2020

Contributed by Lukas

Many people inaccurately use vulnerability scans or vulnerability assessments as terms that are synonymous with penetration tests. Those that do know ...

Threat Intel Program Strategies - Wade Woolwine - PSW #647

17 Apr 2020

Contributed by Lukas

Defining key areas of investment that organizations need to consider in their programs. Within the areas of investment, we talk about functional areas...

Zoom, Kubernetes, and Hacking - PSW #646

11 Apr 2020

Contributed by Lukas

A little about Zoom vulnerabilities and data leaks and Cisco Webex vulnerabilities. We talk about security Kubernetes and how the same security princi...

«« ← Prev Page 6 of 12 Next → »»