A podcast that takes a look at the origin and history of some of those gems of language, idioms, and then goes from there.
…
continue reading
Peter and Tara work through The Twilight Zone in order beginning with the original classic series.
…
continue reading
Two first time watchers begin with Star Trek: The Original Series and work their way through the entire franchise
…
continue reading
Almost Cancelled is a TV show review show by Peter and Connor of Mild Fuzz TV. This feed will host audio versions of their reviews of the bigger cable shows such as Twin Peaks, Better Call Saul, The Handmaid's Tale, The Expanse and more. We have a dedicated feed for Netflix original reviews as well as a dedicated Mr Robot feed.
…
continue reading
The Hacker Mind is an original podcast from the makers of Mayhem Security. It’s the stories from the individuals behind the hacks you’ve read about. It’s about meeting some of the security challenges in software through advanced techniques such as fuzz testing. It’s a view of the hackers and their world that you may not have heard before.
…
continue reading
The Yellow Sub Sandwich is the official podcast to accompany and celebrate the 50th anniversary cinema re-release of the Beatles’ #YellowSubmarine movie. http://www.yellowsubmarine.film/#tickets Presented by music and movies expert Edith Bowman and movie critic Robbie Collin, this is a podcast with a difference; it comes in two parts: “before” and “after” - a bit to listen to before you see the movie and a bit for after. With great stories about the making of the movie and fresh insight into ...
…
continue reading
1
Moon Idioms: Moonstruck; Moonshine; Once in a blue moon; Moonlight; Hang the moon; Shoot for the moon; Mooning away, over, around, or about;
24:16
24:16
Play later
Play later
Lists
Like
Liked
24:16
Over the moon; The moon is made of green cheese; Love you to the moon and back; Shoot the moon; Moonshot; Ask for the moon; Moon on a stick; Cast beyond the moon; Barking at the moon; Harvest moon; Blood moon; Moon-faced; Moongazing
…
continue reading
1
EP 85: The Rise Of Bots (and Bots As A Service)
40:49
40:49
Play later
Play later
Lists
Like
Liked
40:49
Bots are actionable scripts that can slow your day to day business, be enlisted in denial of service attacks, or even keep you from getting those tickets Taylor Swift you desperately want. Antoine Vastel from DataDome explains how it's an arms race: the better we get at detecting them, the more the bots evolve to evade detection. Transcript here.…
…
continue reading
1
EP 84: When Old Medical Devices Keep Pre-shared Keys
43:38
43:38
Play later
Play later
Lists
Like
Liked
43:38
You would think there is a procedure to End-of-Life a medical device, right? Erase personal health info. Erase network configuration info. Speaking at SecTor 2023, Deral Heiland from Rapid 7 said he found that he was able to buy infusion pumps on the secondary market with the network credentials for the original Health Care Delivery Organization in…
…
continue reading
1
Pots and Pans Idioms, Part II: Pot calling the kettle black; Melting pot; Stirring the pot; Jackpot; Crackpot; Different kettle of fish; Tempest in a teapot; Keep the pot boiling; Potluck
19:31
19:31
Play later
Play later
Lists
Like
Liked
19:31
Potpourri; Perpetual stew; Potlatch; Pot of gold at the end of a rainbow; Tosspot; Fusspot; Honeypot; Sexpot; Pretty kettle of fish
…
continue reading
1
EP 83: Tales From The Dark Web: Ransomware, Data Extortion, and Operational Technology
37:07
37:07
Play later
Play later
Lists
Like
Liked
37:07
With the recent Clop attack on customers of MoveIt, ransomware is now old news. Attackers are skipping the encryption and simply extorting the exfiltrated data, according to Thomas “Mannie” Wilken, from the Accenture Cyber Threat Intelligence Dark Web Reconnaissance Team. He should know; he spends his days on the Dark Web seeing the rise of new inf…
…
continue reading
1
Pots and Pans Idioms, Part I: Flash in the pan; Out of the frying pan into the fire; Pan out; Pan over; Pan as criticism; Deadpan; Going to pot; Potshot
13:04
13:04
Play later
Play later
Lists
Like
Liked
13:04
Pothunter; Down the pan; Down the toilet; Cast iron skillets
…
continue reading
Imagine a data dump of files similar to the Snowden Leaks in 2013, only this it’s not from the NSA but from NT Vulkan, a Russian contractor. And it’s a framework for targeting critical IT infrastructures. In a talk at DEF CON 31, Joe Slowick from Huntress, shares what a Russian whistleblower released in the form of emails and documents, and how we …
…
continue reading
1
US President Idioms, Part 6: Bloviation; Normalcy; America First; Lightning in a bottle; Americanism; Founding Fathers
20:16
20:16
Play later
Play later
Lists
Like
Liked
20:16
Dollar Diplomacy; Panda Diplomacy; Writing history with lightning; Bottled lightning; THE Congress
…
continue reading
1
EP 81: Hacking Visual Studio Code Extensions
49:11
49:11
Play later
Play later
Lists
Like
Liked
49:11
Rather than use backdoor exploits, attackers are stealing credentials going through the front door. How are they gaining credentials. Sometimes it’s from the tools we trust. Paul Geste and Thomas Chauchefoin discuss their DEF CON 31 presentation Visual Studio Code is why I have (Workspace) Trust issues as well as the larger question of how much we …
…
continue reading
What if an GPC project OAUTH access token wasn’t deleted? This could expose databases to bad actors. Tal Skverer from Astrix discusses his DEF CON 31 presentation GhostToken: Exploiting Google Cloud Platform App Infrastructure to Create Unremovable Trojan Apps. Transcript here.By Robert Vamosi
…
continue reading
1
Gauntlets, Gamuts, and Gloves: Run the gauntlet; Run the gamut; Throw down the gauntlet; Take up the gauntlet; Step into the breach; Take off the gloves; Rule with a velvet glove
13:29
13:29
Play later
Play later
Lists
Like
Liked
13:29
Once more unto the breach; More honored in the breach than the observance; Drop the gloves; Gloves are off; Iron fist in a velvet glove; Next into the breach; Run the gantlet
…
continue reading
1
Foreign Idioms: Neither the fuzz nor the feather; When the crawdad whistles on the mountain; Boondocks; Thresh empty straw; Once upon a time and other fairy tale endings
17:41
17:41
Play later
Play later
Lists
Like
Liked
17:41
Ни пуха ни пера, Break a leg; Когда рак на горе свистнет, When pigs fly; Делать из мухи слона, Make a mountain out of a molehill; Не в своей тарелке, Not in one’s element, or like a fish out of water; Первый блин всегда комом; Prvi se mačići u vodu bacaju; Bogu iza nogu; Ne traži dlaku u jajetu; Mlatiti praznu slamu, Beat a dead horse; There’s no c…
…
continue reading
1
EP 79: Conducting Incident Response in Costa Rica Post Conti Ransomware
56:50
56:50
Play later
Play later
Lists
Like
Liked
56:50
How do you conduct an incident response for an entire country? When it’s 27 different life-critical government ministries each with up to 850 individual devices -- that’s uncharted territory. Esteban Jimenez of ATTI Cyber talks about his experience with the reconstruction of the cybersecurity system following Conti, how the country handled a second…
…
continue reading
1
EP 78: Defending Costa Rica From Conti Ransomware
56:46
56:46
Play later
Play later
Lists
Like
Liked
56:46
What is is like to hack an entire country, to take it’s government services offline, to deny a government an ability to function? Costa Rica knows. Esteban Jimenez of ATTI Cyber has been helping Costa Rica improve its cybersecurity posture for more than 16 years, and he has been helping them recently recover from a crippling ransomware attack in Ap…
…
continue reading
1
EP 77: Security Chaos Engineering with Kelly Shortridge
40:32
40:32
Play later
Play later
Lists
Like
Liked
40:32
Speaking at Black Hat 2023, Kelly Shortridge is bringing cybersecurity out of the dark ages by infusing security by design to create secure patterns and practices. It’s a subject of her new book on Security Chaos Computing, and it’s a topic that’s long overdue to be discussed in the field. Transcript.…
…
continue reading
Are we doing enough to secure our health delivery organizations? Given the rise of ransomware attacks, one could day we are not. Karl Sigler from Trustwave SpiderLabs, talks about a new report that his team has written that is focused on the threat landscape for medical devices and the healthcare industry in general. Transcript here.…
…
continue reading
1
EP 75: Hacking .Mil And Other TLD Domains (Ethically)
48:45
48:45
Play later
Play later
Lists
Like
Liked
48:45
Internet domains are brittle. One could hack into a military, a foreign government, or even global commercial web services domain using flaws in the underlying architecture. Fredrik Nordberg Almroth, co-founder of Detectify, talks about how he did just that -- hack .mil, hack the top level domain of the Democratic Republic of Congo, and even Gmail …
…
continue reading
Phishing is everywhere. Who among us has not seen phish in their inbox? Aviv Grafi, from Votiro, gets into the weeds about how malicious documents are formed and how they might (despite good secure posture) still end up in your inbox or browser. He’s created a rather novel method to strip out the good content from the bad without affecting your ove…
…
continue reading
Could the nudges and prompts like those from our Fitbits and Apple watches be effective in enforcing good security behavior as well? Oz Alashe, CEO and founder of CybSafe, brings his experience in the UK Intelligence Community to the commercial world along with some solid science around what motivates us to make changes in our lives. It’s not just …
…
continue reading
1
Sick Idioms and Slang: Under the weather; Green around the gills; To turn a blind eye; Frog in the throat; Feeling groggy; Off-kilter; Out-of-sorts; Down in the dumps; Sick as a dog
17:39
17:39
Play later
Play later
Lists
Like
Liked
17:39
Slang: Bussin'; Slappin; Slay; 'Sup; Aight; Word; Hella; Shiznit; The bomb; Booyah; Oh snap; As if; Not!; Whatever!
…
continue reading
1
EP 72: Tales From A Ransomware Negotiator
41:31
41:31
Play later
Play later
Lists
Like
Liked
41:31
Say you’re an organization that’s been hit with ransomware. At what point do you need to bring in a ransomware negotiator? Should you pay, should you not? Mark Lance, the VP of DFIR and Threat Intelligence for GuidePoint Security, provides The Hacker Mind with stories of ransomware cases he’s handled and best practices for how to handle such an eve…
…
continue reading
1
Veggie Idioms: Can't squeeze blood from a turnip; Fell off the turnip truck; Cornfed; Corny; Carrot-and-stick; Like peas and carrots; Two peas in a pod
16:10
16:10
Play later
Play later
Lists
Like
Liked
16:10
Can't get blood from a stone; Fresh off the boat; Cabbage-head; Turnip-head; I don't boil my cabbage twice; I'm not so green as cabbage looking; Cornbread; Cornball; Hokey; Easy as shelling peas; Thick as pea soup
…
continue reading
Small to Medium Business are increasingly the target of APTs and ransomware. Often they lack the visibility of a SOC. Or even basic low level threat analysis. Chris Gray of Deepwatch talks about the view from the inside of a virtual SOC, the ability to see threats against a large number of SMB organizations, and the changes to cyber insurance we’re…
…
continue reading
1
Tool Idioms: Wrench in the works; Monkeywrench; If all you have's a hammer everything's a nail; Hit the nail on the head; Go at it hammer and tongs; Bring the hammer down
14:34
14:34
Play later
Play later
Lists
Like
Liked
14:34
Use a sledgehammer to crack a nut; Throw a spanner in the works; Bodies upon the gears; Maslow's hammer; Between the hammer and the anvil; Between a rock and a hard place; Drop the hammer on; Go under the hammer; Dumb as a bag of hammers; Dumb as a box of rocks; Not the sharpest tool in the shed; Sledgehammer argument; Poor craftsman that blames hi…
…
continue reading
1
EP 70: Hacking Real World Criminals Online
58:00
58:00
Play later
Play later
Lists
Like
Liked
58:00
More and more criminals are identified through open source intelligence (OSINT). Sometimes a negative Yelp review can reveal their true identity. Daniel Clemens, CEO of ShadowDragon, talks about his more than two decades of digital investigations, from the origins of the Code Red worm to the mass shooter in Las Vegas, with a fair number of pedophil…
…
continue reading
It’s time to evolve beyond the UNIX operating system. OSes today are basically ineffective database managers, so why not build an OS that’s a database manager? Michael Coden, Associate Director, Cybersecurity, MIT Sloan, along with Michael Stonebreaker will present this novel concept at RSAC 2023. You can learn more at dbos-project.github.io…
…
continue reading
1
Coincidences and Rubbing Idioms: There's the rub; Shuffle off this mortal coil; Rub it in; Rub someone the wrong way; Rub salt in someone's wound; Rub elbows with; Rub off on
17:38
17:38
Play later
Play later
Lists
Like
Liked
17:38
Rub shoulders with; Rub your hands with glee; Rub of the green; Rub out; Rub someone's nose in it; Ruffle someone's feathers
…
continue reading
Incident response in the cloud. How is it different, and why do we need to pay more attention to it today, before something major happens tomorrow. James Campbell, CEO of Cado Security, shares his experience with traditional incident response, and how the cloud, with its elastic structure, able to spin up and spin down instances, is changing incide…
…
continue reading
1
Bean Idioms: Spill the beans; Bean counter; Doesn't amount to a hill of beans; Full of beans; Cool beans; Politics ain't bean bag
14:58
14:58
Play later
Play later
Lists
Like
Liked
14:58
Old bean; Bean time; Bean wagon; Not have a bean; String bean; Beanpole; Bean head; Not know beans; Boring as beans
…
continue reading
1
EP 67: When The Dark Web Discovered ChatGPT
40:54
40:54
Play later
Play later
Lists
Like
Liked
40:54
We’ve seen drug marketplaces and extremists use the Dark Web. Will generative AI tools like ChatGPT make things crazier by lowering the barrier to entry? Delilah Schwartz, from Cybersixgill, brings her extensive background with online extremism to The Hacker Mind to talk about how she’s seeing a lot of chatter in the dark web.about AI online. She d…
…
continue reading
1
Heel Idioms: Well-heeled; Down-at-the-heels; Achilles' heel; Dig in one's heels; Bring someone to heel; Under the heel; Take to one's heels; Show one's heels; Kick up your heels; Cool one's heels;
17:59
17:59
Play later
Play later
Lists
Like
Liked
17:59
Out at elbows; Out at heels; Drag your heels; Set back on your heels; At someone's heels; Hard on someone's heels; Hot on someone's heels; Under the thumb; Show a clean pair of heels; Cop a heel; Spin on one's heels; Turn on your heels; Fall head over heels in love; Head over heels in debt; Real heel…
…
continue reading
1
EP 66: Shattering InfoSec’s Glass Ceiling
42:55
42:55
Play later
Play later
Lists
Like
Liked
42:55
Booth babes and rampant sexism were more of a problem in infosec in the past. That is, until Chenxi Wang spoke up. And she’s not done changing the industry. She’s an amazing person who has done an incredible number of things in a short amount of time -- a PhD in Computer Engineering, inventor of a process still used by the DoD today, a successful t…
…
continue reading
1
Hat Idioms, Part II: I'll eat my hat; Feather in your cap; Tip of the hat; Doff one's hat; Pass the hat; With hat in hand; Hat trick; At the drop of a hat; All hat and no cattle
16:02
16:02
Play later
Play later
Lists
Like
Liked
16:02
Hats off; Old hat; All sizzle and no steak; All bark and no bite
…
continue reading
1
Hat Idioms: Mad as a hatter; Hang one's Hat; To throw your hat into the ring; Keep something under your hat; Put your name in the hat; Put your thinking cap on; Dunce cap
18:44
18:44
Play later
Play later
Lists
Like
Liked
18:44
Hang up one's hat; Tin foil hat; Hang on to your hat; To wear more than one hat; Pooh-bah
…
continue reading
1
EP 65: The Hacker Revolution Will Be Televised
50:32
50:32
Play later
Play later
Lists
Like
Liked
50:32
What if DEF CON CTFs were televised? What if you could see their screens and have interviews with the players in the moment? Turns out, you can. Jordan Wiens, from Vector 35, maker of Binary Ninja, is no stranger to CTFs. He’s played in ten final DEF CON CTFs, was a part of DARPA’s Cyber Grand Challenge, and recently he’s moderated the live broadca…
…
continue reading
1
Egg Idioms: Egg on your face; Egghead; Baker's dozen; Egg someone on; Nest egg; Can't make an omelet without breaking some eggs; Good egg; Go suck an egg
20:44
20:44
Play later
Play later
Lists
Like
Liked
20:44
Bad egg; Don't put all your eggs in one basket; Egg money; Bald as an egg; Which came first, the chicken or the egg; Over-egg the pudding; Egging; Teaching your grandma to suck eggs; Rotten egg; Last one in is a rotten egg; Can't boil an egg; Can't unboil an egg.
…
continue reading
1
EP 64: Gaining Persistence On Windows Boxes
38:59
38:59
Play later
Play later
Lists
Like
Liked
38:59
When we hear about bad actors on a compromised system for 200+ days, we wonder how they survived for so long. Often they hide in common misconfigurations. From her talk at SecTor 2022, Paula Januszkiewicz, CEO of Cqure, returns to The Hacker Mind and explains how a lot of little configuration errors in common Windows tools and services can open the…
…
continue reading
1
Smoke Idioms: Smoke and mirrors; Put that in your pipe and smoke it; Blowing smoke; Smoking gun; Where there's smoke there's fire; Get smoked; Pipe-dream
17:24
17:24
Play later
Play later
Lists
Like
Liked
17:24
Blowing smoke up someone's ass; Smoke the peace pipe; Smokescreen; Holy smoke(s); What have you been smoking
…
continue reading
1
Duck Idioms: Lucky duck; Sitting duck; Dead duck; Lame duck; Duck and cover; Have one's ducks in a row; Duck soup; Like a duck to water; Milkshake duck
16:55
16:55
Play later
Play later
Lists
Like
Liked
16:55
Since one was knee-high to a duck; Lovely weather for ducks; Like water off a duck's back; Duck face; If it walks like a duck, quacks like a duck, and swims like a duck, then it must be a duck.
…
continue reading
1
EP 63: What Star Wars Can Teach Us About Threat Modeling
42:57
42:57
Play later
Play later
Lists
Like
Liked
42:57
Having a common framework around vulnerabilities, around threats, helps us understand the infosec landscape better. STRIDE provides an easy mnemonic. Adam Shostack has a new book, Threats: What Every Engineer Should Learn From Star Wars. that uses both Star Wars and STRIDE to help engineers under vulnerabilities and threats in software development.…
…
continue reading
1
Bird Idioms: Birds of a feather; Bird in the hand; A little bird told me; Sing like a bird; Boobird; Odd bird; Rare bird; Kill two birds with one stone
17:27
17:27
Play later
Play later
Lists
Like
Liked
17:27
Flip the bird; Tough old bird; Yardbird; Snowbird; Anapodoton; Black swan
…
continue reading
Hacking websites is perhaps often underestimated yet is super interesting with all its potential for command injections and cross site scripting attacks. Tib3rius from White Oak Security discusses his experience as a web application security pen tester, his OSCP certification, and how he’s giving back to the community with his Twitch, Youtube, and …
…
continue reading
1
Blade Idioms: Sword of Damocles; Hang by a thread; Fall on one's sword; Beat swords into plowshares; Saber-rattling; Bury the hatchet; Hatchet job;
15:48
15:48
Play later
Play later
Lists
Like
Liked
15:48
Take up the hatchet; Hatchet man; Hatched-faced; Scalpel, not an ax
…
continue reading
Holiday air travel tips from The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data by Kevin Mitnick and Robert Vamosi. This is a short episode until The Hacker Mind returns in the new year.By Robert Vamosi
…
continue reading
1
White idioms: White elephant; white knight; white lies; white knuckle; white hat hacker
15:08
15:08
Play later
Play later
Lists
Like
Liked
15:08
White as a ghost; white as a sheet; White Christmas
…
continue reading
1
Cutting Idioms, part 2: Cut it out; Cut out for; Work cut out for; Cut from whole cloth; Cut a deal; Cut against the grain; Cut the cord; Cut to ribbons; Cut corners;Cut both ways; Cut it with a knife
15:19
15:19
Play later
Play later
Lists
Like
Liked
15:19
Cut a figure; Knock it off; Cut a check; Double-edged sword
…
continue reading
1
EP 60: Hacking Latency In Live Music Online
53:44
53:44
Play later
Play later
Lists
Like
Liked
53:44
If you call someone on the other side of the world, perhaps you notice the delay in their response. For voice that’s okay, but for live music that’s disastrous. Mark Goldstein thinks he’s solved the latency problem associated with the production of live musical performances online. Having one musician in Bangalore, another in California, and yet an…
…
continue reading
Rock the boat; bully pulpit; mollycoddle; muckraking; pull yourself up by the bootstraps; lunatic fringe; loose cannon
…
continue reading
1
Cutting Idioms: Cut one's teeth; Cut of someone's jib; Cut the mustard; Cut a rug; Cut to the quick; Cut and run; Fish or cut bait; Cut a wide swathe
15:33
15:33
Play later
Play later
Lists
Like
Liked
15:33
Cut off your nose to spite your face; Unkindest cut; Cut to the bone; Cut and dried
…
continue reading
1
Gem Idioms: Hidden Gem; Diamond in the rough; The world is your oyster; Clutch one's pearls
17:00
17:00
Play later
Play later
Lists
Like
Liked
17:00
A cut above; Casting pearls before swine; Pearl of great price; Pearls of wisdom; Idaho the gem state
…
continue reading