Def Con public
[search 0]
More
Download the App!
show episodes
 
Welcome to the podcast from 404 Media where Joseph, Sam, Emanuel, and Jason catch you up on the stories we published this week. 404 Media is a journalist-owned digital media company exploring the way technology is shaping–and is shaped by–our world. We bring you unparalleled access to hidden worlds both online and IRL through investigative reporting, smart blogging, and breaking news. At 404 Media you’ll read, and hear, stories you can’t find anywhere else written by journalists who are lead ...
  continue reading
 
ReliaQuest's ShadowTalk is a weekly podcast featuring discussions on the latest cybersecurity news and threat research. ShadowTalk's hosts come from threat intelligence, threat hunting, security research, and leadership backgrounds providing practical perspectives on the week's top cybersecurity stories. www.reliaquest.com
  continue reading
 
Hosted by Nyedis CIO and co-founder Adam Callen, the Nyedis Anarchy Series gives expert insight into Identity and Access Management, enterprise cloud security, web3, and much more. Callen, who previously went by the IDM Rockstar, gives practical advice on every episode dealing with cutting edge technologies, real world experiences from his clients, and truly unbiased vendor reviews. Callen chats with other leading names in the field and invites questions from the audience on how they can be ...
  continue reading
 
Artwork

1
Shared Security

Tom Eston, Scott Wright, Kevin Johnson

Unsubscribe
Unsubscribe
Weekly
 
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
  continue reading
 
SquareX is excited to launch The Be Fearless Podcast Series, where we bring together industry experts and professionals from the cybersecurity community. Hosted by SquareX Founder - and cybersecurity veteran - Vivek Ramachandran, look forward to insights about our guests’ journeys in security, the evolution of the field, the changing threatscape and how enterprises across industries are addressing them today.
  continue reading
 
The Cyber Consulting Room Podcast and Meetup Network is your gateway to a world of knowledge and collaboration in the ever-evolving realm of cyber security and consulting. Our podcast, hosted by Gordon Draper, brings you in-depth interviews with industry leaders, experts, and trailblazers, offering invaluable insights, strategies, and experiences. From award-winning professionals to those paving the way for diversity in the field, we delve into the most pressing issues and emerging trends. B ...
  continue reading
 
Want to learn about all of the latest security tools and techniques? This is the show for you! We show you how to install, configure and use a wide variety of security tools for both offense and defense. Whether you are a penetration tester or defending enterprise networks, this show will help you
  continue reading
 
Global Bob who is a cyber security expert and political science hobbyist brings you a show that fuses these topics together to explain in simple terms the interaction between the two. He uses his years of experience in both the government, commercial and private sector to give a unique perspective on these topics.
  continue reading
 
Want to learn about all of the latest security tools and techniques? This is the show for you! We show you how to install, configure and use a wide variety of security tools for both offense and defense. Whether you are a penetration tester or defending enterprise networks, this show will help you!
  continue reading
 
Loading …
show series
 
Are cybersecurity conferences just another industry event, or are they the driving force behind the next big leap in the field? When you think about the future of cybersecurity, do you consider the role of gatherings like Black Hat USA and DEF CON? In this episode of the Cyber Consulting Room podcast, host Gordon Draper explores the recent Black Ha…
  continue reading
 
We recently covered what went down at this year's DEF CON 32 in Las Vegas. Without a doubt, the biggest event was the controversy sorrounding this year's badge, concluding in one of the developers, Dmitry Grinberg, being escorted off stage and banned from the convention. We are thrilled that Dmitry agreed to come on with us and tell the full story …
  continue reading
 
Earlier this month, our Swarm of ethical hackers attended DEF CON 32 in Las Vegas, one of the most anticipated events in the hacking community. On this episode, join our Head of People and Culture and host, Ellie Lancaster, as she interviews our colleagues Faith, Alex, and Joao about their standout moments from the event. Learn about the different …
  continue reading
 
This month Joseph went to the annual DEF CON hacking conference and spoke to a bunch of interesting hackers, researchers, and technologists. We wanted to provide our paying subscribers with a snapshot of what it's like to be at DEF CON—the sounds, the vibe, the people, the hacks. Become a paying subscriber now at 404media.co to listen! The Golden A…
  continue reading
 
In this DEF CON 32 special, Michael Kouremetis, Principal Adversary Emulation Engineer from MITRE discusses the Caldera project, research on LLMs and their implications for cybersecurity. If you’re interested in the intersection of AI and cybersecurity, this is one episode you don’t want to miss! 0:00 Introduction and the story behind Caldera 2:40 …
  continue reading
 
"I found multiple demo versions available without any authentication. I went there, extracted all the requests, and fuzzed all the parameters for SQL injection. Then I changed the domain to the in-scope domain of the company I was hacking and ran SQL commands to dump their database." Hear from Nikhil “Niks” Srivastava bug bounty hunter and founder …
  continue reading
 
Sponsor by ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠SEC Playground⁠ --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
  continue reading
 
Our Digital Media Producer, Ian Scotto, was in attendance at this year's Identity Week in Washington DC and got to interview some important figures in the identity management and biometrics fields. For this episode we have Tom Michalsky, co-founder of German based company IDloop talking the amazing technology they're using for contactless 3D finger…
  continue reading
 
Sponsor by ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠SEC Playground⁠ --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
  continue reading
 
Earlier this month Adam joined Mark Callahan & Granville Schmidt from Strata for a fascinating panel discussing real-world IAM architecture. Here it is in its entirety for you to watch and learn something from the pros! Download BreachCast from the iOS App Store to get live breach, CVE, and media news all specific for IAM professionals. It's free t…
  continue reading
 
In this episode of ShadowTalk, host Chris, along with Corey and Anna, discuss the latest news in cyber security and threat research. Topics this week include: Threat actors express difficulty in retrieving stolen Fortinet data Amadey malware's novel approach: Users locked in Kiosk Mode Aftermath of incident affecting Transport for London (TFL) Reli…
  continue reading
 
We chime in on the developing story coming out of Lebanon about a wave of exploding pagers. Jason has some unusual expertise that is pretty relevant here. After the break, Jason breaks down why Larry Ellison's AI-powered surveillance dystopia is already here. In the subscribers-only section, Emanuel explains how he figured out what is, and is not, …
  continue reading
 
Sponsor by ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠SEC Playground⁠ --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
  continue reading
 
Our Digital Media Producer, Ian Scotto, was in attendance at this year's Identity Week in Washington DC and got to interview some important figures in the identity management and biometrics fields. For this episode we have James Alexander, Senior Sales Engineer with HID talking the future of security. Download BreachCast from the iOS App Store to g…
  continue reading
 
Sponsor by ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠SEC Playground⁠ --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
  continue reading
 
AI is taking over everything, and if you've watched this podcast, I'm a superfan of DOOM (I have the full sleeve tatt to prove it.) Well, AI has gotten it's hands on this as well, and it's pretty awesome. This leads to a larger discussion about AI and the future of entertainment. Download BreachCast from the iOS App Store to get live breach, CVE, a…
  continue reading
 
In episode 346, we discuss new AI-driven voicemail scams that sound convincingly real and how to identify them. We also explore recent research on the privacy concerns surrounding donations to political parties through their websites. Additionally, we celebrate the 15th anniversary of the podcast and share some reflections and fun facts about the j…
  continue reading
 
Sponsor by ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠SEC Playground⁠ --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
  continue reading
 
Sponsor by ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠SEC Playground⁠ --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
  continue reading
 
Sponsor by ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠SEC Playground⁠ --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
  continue reading
 
Late last month we uploaded a music video for "Nyedis Rebellion," a completely AI generated song & video devoted to our company. Here we tell you how we did it, what programs were used, and we show you how an AI generated song is created in real time. Check out that original video here: https://youtu.be/v2vX2dmOHYM For full video of this episode, h…
  continue reading
 
Mohit Tiwari, co-founder and CEO of Symmetry Systems, joins Vivek and Aleksandra in this DEF CON 32 Special Episode of our podcast! Hear directly from him on his journey towards entrepreneurship, how Symmetry Systems (https://www.symmetry-systems.com) solves modern data security problems, practical advice for those wishing to start their own compan…
  continue reading
 
As many of you know by now, Pavel Durov, Telegram's founder and CEO was arrested in France late last month. What does this mean for the future of internet privacy? We dive into what's at stake. Download BreachCast from the iOS App Store to get live breach, CVE, and media news all specific for IAM professionals. It's free to download and ad free: ht…
  continue reading
 
Sponsor by ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠SEC Playground⁠ --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
  continue reading
 
In this episode of ShadowTalk, host Chris Morgan, along with Marken Teder, discuss the latest news in cyber security and threat research. Topics this week include: Russia's Military Intelligence target CNI, identified using "Non-Lethal Acoustic Weapons" New Sextortion scam targets spouses Privacy concerns with smart automobiles ReliaQuest research …
  continue reading
 
We've got a really varied one today. First, Sam talks about the new wave of sextortion emails which send a target their home address to scare them into paying. After the break, Jason talks about the rise of the right to repair movement, but for your body and prescription drugs. In the subscribers-only section, Jason breaks down a years old Reddit m…
  continue reading
 
Sponsor by ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠SEC Playground⁠ --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
  continue reading
 
That's right, Amazon has invested a hefty $4 billion into upgrading Alexa using Claude AI. This is going to be on everyone's holiday shopping list. Download BreachCast from the iOS App Store to get live breach, CVE, and media news all specific for IAM professionals. It's free to download and ad free: https://apps.apple.com/us/app/breachcast-by-nyed…
  continue reading
 
This week, we discuss a critical SQL injection vulnerability discovered in an app used by the TSA, raising ethical questions about responsible disclosure. Plus, we shed light on the alarming rise of Bitcoin ATM scams exploiting older adults, providing essential tips to protect your loved ones from these devious schemes. Tune in for unique insights …
  continue reading
 
Get an insider’s view of how the famed Black Hat cybersecurity conference is run from Steve Wylie, General Manager of Black Hat himself! In this episode, Vivek and Aleksandra have a conversation with Steve on how Black Hat is organized, the associated challenges and highlights and the important role of entrepreneurship within the cybersecurity comm…
  continue reading
 
Sponsor by ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠SEC Playground⁠ --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
  continue reading
 
Sponsor by ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠SEC Playground⁠ --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
  continue reading
 
c0ldbru & Steve Jabs are the guys behind rot13labs, described on their website as a small shop in Florida that specializes in building and designing small electronics for hackers. This includes everything from USB and wifi hacking tools to custom electronic conference badges. They came across our video about this year's DEF CON, and left us a comme…
  continue reading
 
Sponsor by ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠SEC Playground⁠ --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
  continue reading
 
AI is brilliant for many things, and that's why we embrace this technology here at Nyedis. What it should NOT be trusted for though is giving you factual information on historical events. Here we explain why. Download BreachCast from the iOS App Store to get live breach, CVE, and media news all specific for IAM professionals. It's free to download …
  continue reading
 
Sponsor by ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠SEC Playground⁠ --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
  continue reading
 
FLUX.1 from Black Forest Labs is the most amazing Open Source AI image generator out there. To view the full tutorial this is from, see more here 💻 https://youtu.be/KmhkR1mzbck Download BreachCast from the iOS App Store to get live breach, CVE, and media news all specific for IAM professionals. It's free to download and ad free: https://apps.apple.…
  continue reading
 
In this episode of ShadowTalk, hosts Chris and Kim, along with guest CISO Rob F, discuss the latest news in cyber security and threat research. Topics this week include: City of Columbus Ohio sue security researcher following ransomware breach Dutch Data Protection Authority fine AI/Facial recognition company Building security teams and improving y…
  continue reading
 
The organization that runs National Novel Writing Month, a November challenge to write 50,000 words, said "the categorical condemnation of Artificial Intelligence has classist and ableist undertones." Does it? Also Discussed: NaNoWriMo Says Condemning AI Is ‘Classist and Ableist’ This Is Doom Running on a Diffusion Model Learn more about your ad ch…
  continue reading
 
Sponsor by ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠SEC Playground⁠ --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
  continue reading
 
In this episode, we explore the recent arrest of Telegram founder Pavel Durov in France and discuss the app's encryption claims. Is Telegram truly an encrypted messaging app? Joining the conversation is co-host Kevin Johnson, bringing his trademark opinions. We also talk about some intriguing documentaries, including 'LulaRich' about the LuLaRoe le…
  continue reading
 
Loading …

Quick Reference Guide