Welcome to The Hacker Files, empowering families in the digital age. This podcast is geared towards families and individuals who want a little more info about how to keep themselves safe online.
…
continue reading
Hacker Public Radio is an podcast that releases shows every weekday Monday through Friday. Our shows are produced by the community (you) and can be on any topic that are of interest to hackers and hobbyists.
…
continue reading
The Hacker Mind is an original podcast from the makers of Mayhem Security. It’s the stories from the individuals behind the hacks you’ve read about. It’s about meeting some of the security challenges in software through advanced techniques such as fuzz testing. It’s a view of the hackers and their world that you may not have heard before.
…
continue reading
Data & Fun. Weekly updates from the R programming language open source community. #rstats
…
continue reading
🎙️ The AI-First Business Podcast 🤖 We take you behind the scenes with the leaders and teams writing the playbook on transitioning to an AI-First world
…
continue reading
The CyberBrief Podcast uncovers the latest cyber attacks, hacks, and stories that matter. Cyber crimes are growing exponentially, with many of the latest attacks & hacks being the biggest in history and costing billions of dollars. But what can we as cyber professionals, business leaders, or just people living in a digital age do? In this series, we’ll dive into the history of cybersecurity, some of the top hacks and scams in cyber, and what we can do about it. To mark Cybersecurity Awarenes ...
…
continue reading
Welcome to Vulnerable U, a podcast where we explore the intersection of vulnerability and cyber security. Each episode, we explore how vulnerability can drive growth and foster community resilience within our industry. Get ready for thought-provoking conversations, real-life stories, and curated news that inspire you to embrace discomfort on the road to a more vulnerable you.
…
continue reading
Hidden World Diary I'm a normal guy just like you who was so curious about the dark web. One day, my brother challenged me to hack our neighbor's WIFI and he did it while looking down at me. I was a little skeptical myself, so I accepted the challenge and started my research. As any ethical hacker out there, you know that gathering info is so important for any type of attack. I did some social engineering work, got into his network, scanned it, changed the password and of course he got kicke ...
…
continue reading
Send us a Text Message. In the ever-evolving landscape of social media and online interactions, the phenomenon of cyberbullying has emerged as a pervasive and harmful issue, particularly among the younger demographic. The episode delves into the intricacies of cyberbullying, exploring its various forms, the psychological impact on victims, and the …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Hackers in the news: Was you data stolen?
27:08
27:08
Play later
Play later
Lists
Like
Liked
27:08
Send us a Text Message. This episode breaks down two major hacks, targeting multi-billion dollar corporations that service millions of customers each year. Listen in to find out who was attacked, how it happened, and if your personal information may have been compromised.By The Hacker Files Podcast
…
continue reading
![Artwork](/static/images/128pixel.png)
1
(1/2) From Doctor to Disruptor: Dr. Sven Jungmann On How AI Redefines Healthcare
25:17
25:17
Play later
Play later
Lists
Like
Liked
25:17
Are traditional healthcare models ready for the disruptive innovations of entrepreneurs like Dr. Sven Jungmann? With extensive medical expertise and entrepreneurial vision, Dr. Jungmann co-founded Halitus to develop state-of-the-art breath analysis devices. Using AI/ML and digital health, Dr. Jungmann is bridging healthcare and tech. We cover: Dr. …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Predators and Scams That Target Your Loved Ones
30:03
30:03
Play later
Play later
Lists
Like
Liked
30:03
Send us a Text Message. Humans are social creatures. Opportunities to interact have become more and more prevalent with those outside of your normal sphere. But, it's not all sunshine and rainbows. There are those out there that wish to harm others. Preying on those who don't know any better or who can't protect themselves. This episode will addres…
…
continue reading
Today I Learnt more Bashtips Sgoti talksabout supplying options to bash scripts Tags: Bash tips, TIL, getopts #!/bin/bash# License: GPL v3# This program is free software: you can redistribute it and/or modify# it under the terms of the GNU General Public License as published by# the Free Software Foundation, either version 3 of the License, or# (at…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
When AI Goes Wrong: Governance and Compliance with Armilla’s AI’s Karthik Ramakrishnan
34:48
34:48
Play later
Play later
Lists
Like
Liked
34:48
'AI-First' has replaced 'Data-Driven'. AI technology must be integrated into systems, teams, tools, and products to survive. But what about the legal and compliance? Ramakrishnan has been at the forefront of AI adoption for enterprises, having held executive and advisory roles at Element AI and Perpetua Labs. Currently, he's co-founder and CEO at A…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Dangerous Truth About TikTok and Social Media Apps
29:06
29:06
Play later
Play later
Lists
Like
Liked
29:06
Send us a Text Message. While social media and gaming have been massive game changers in bringing the world together. Apps like TikTok have opened up endless possibilities for those willing to put themselves out there. Unfortunately, most don't think of the consequences that come with using such platforms. In this episode, we will discuss the dange…
…
continue reading
Send us a Text Message. The Hacker Files Podcast: empowering families in the digital age. Hey, Anita and Ken here! We are excited to share our years of knowledge and experience as Cybersecurity professionals with you and help protect one of the most important commodities in existence, our families. Join us as we navigate through the dangers of Cybe…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
AI Unleashed: Wes Cummins on Supercomputing-as-a-Service and the Future of AI Infrastructure
44:27
44:27
Play later
Play later
Lists
Like
Liked
44:27
Join us to dive into the world of AI infrastructure with Wes Cummins, CEO and Chairman of Applied Digital. Prior to founding the company he also founded and led 272 Capital LP and led B. Riley Asset Management as President. Applied Digital (Nasdaq: APLD) designs, develops and operates next-generation datacenters across North America to provide digi…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Becoming AI-Native: Ben Parr's Vision for Personal Branding, Problem Solving Across Industries, and Global Innovation
39:02
39:02
Play later
Play later
Lists
Like
Liked
39:02
Ben Parr is a tech industry veteran with a career spanning from award-winning author to influential editor at CNET and Mashable. He's also the co-founder of Octane AI and the driving force behind the AI Analyst, a decade-long voice at the intersection of tech, business, media, and society. 💼🚀📱 🎙️ Looking for daily strategies on how to integrate AI …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
EP 85: The Rise Of Bots (and Bots As A Service)
40:49
40:49
Play later
Play later
Lists
Like
Liked
40:49
Bots are actionable scripts that can slow your day to day business, be enlisted in denial of service attacks, or even keep you from getting those tickets Taylor Swift you desperately want. Antoine Vastel from DataDome explains how it's an arms race: the better we get at detecting them, the more the bots evolve to evade detection. Transcript here.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Hacker-Centric Cybersecurity and Maximizing ROI in AI Projects: Insights from Hadrian's Jasper and Klaas
48:56
48:56
Play later
Play later
Lists
Like
Liked
48:56
Engineers and data leads engaged in grassroots AI projects or tackling challenges related to AI headcount, budget, and ROI expectations might find this episode particularly resonates. Hadrian's Klaas Meinke and Jasper Insinger join us to share their experiences in founding AI projects at Hadrian, collaborating across functions, and achieving busine…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Hackers Turn Whistleblowers: Ransomware Gang Files SEC Complaint
11:39
11:39
Play later
Play later
Lists
Like
Liked
11:39
Howdy friends. This week I discuss how ALPHV/Blackcat filed a SEC complaint against one of their ransomware victims, ALPHV/Blackcat’s use of Google Ads to target victims, LockBit’s leak of Boeing’s files, Google’s confirmation that they will disable uBlock in Chrome in 2024, the release of new CVSS 4.0 vulnerability severity rating standard, YouTub…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
EP 84: When Old Medical Devices Keep Pre-shared Keys
43:38
43:38
Play later
Play later
Lists
Like
Liked
43:38
You would think there is a procedure to End-of-Life a medical device, right? Erase personal health info. Erase network configuration info. Speaking at SecTor 2023, Deral Heiland from Rapid 7 said he found that he was able to buy infusion pumps on the secondary market with the network credentials for the original Health Care Delivery Organization in…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Biden’s 8 Rules for AI Usage & What it Means For You
16:02
16:02
Play later
Play later
Lists
Like
Liked
16:02
Howdy friends. This week I cover Biden’s AI executive order, the pledge that 40 countries took to not pay ransom to cybercriminals, Prolific Puma, Lazarus hacking group’s focus on infecting blockchain experts with malware, the pwning of the JFK taxi system by Russian hackers, and Boeing’s recent ‘cyber incident’. We’re sticking with just the news o…
…
continue reading
Overview Recently Ken Fallon did a show on HPR, number3962, in which he used a Bashpipeline of multiple commands feeding their output into awhile loop. In the loop he processed the lines produced bythe pipeline and used what he found to download audio files belonging toa series with wget. This was a great show and contained some excellent advice, b…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Okta hacked! 1Password and Cloudflare caught in the splash damage
11:16
11:16
Play later
Play later
Lists
Like
Liked
11:16
Howdy friends. This week I go over the Okta security breach, SolarWinds and their Chief Information Security Officer charged by the SEC with Fraud, Cisco’s second recent 0-day, Browser-based attacks on Apple devices, Telegram’s continued leaks, and the 34 Spanish cyber criminals arrested for stealing 4 million people's data. We’re sticking with jus…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
EP 83: Tales From The Dark Web: Ransomware, Data Extortion, and Operational Technology
37:07
37:07
Play later
Play later
Lists
Like
Liked
37:07
With the recent Clop attack on customers of MoveIt, ransomware is now old news. Attackers are skipping the encryption and simply extorting the exfiltrated data, according to Thomas “Mannie” Wilken, from the Accenture Cyber Threat Intelligence Dark Web Reconnaissance Team. He should know; he spends his days on the Dark Web seeing the rise of new inf…
…
continue reading
Howdy friends. This week I discuss the North Korean IT workers found to have been sending wages from their remote jobs back to North Korea to fund weapons programs, the massive Cisco device 0-day, the fall of the ACG hacking group, a complex malvertising campaign that was recently uncovered, and the discovery of government-backed hackers exploiting…
…
continue reading
Welcome to a special edition of the Cyber Brief Podcast, the cybersecurity show that uncovers the latest cyber-attacks, hacks, and stories that matter to all of us. This podcast is brought to you by the National Cybersecurity Center. We’re bringing to you our nationally acclaimed cyber training from our Cyber for Government Leaders Program, package…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Data Care for Everyone: Don’t click on things you shouldn’t and what to do if you did
5:21
5:21
Play later
Play later
Lists
Like
Liked
5:21
Welcome to a special edition of the Cyber Brief Podcast, the cybersecurity show that uncovers the latest cyber-attacks, hacks, and stories that matter to all of us. This podcast is brought to you by the National Cybersecurity Center. We’re bringing to you our nationally acclaimed cyber training from our Cyber for Government Leaders Program, package…
…
continue reading
Welcome to a special edition of the Cyber Brief Podcast, the cybersecurity show that uncovers the latest cyber-attacks, hacks, and stories that matter to all of us. This podcast is brought to you by the National Cybersecurity Center. We’re bringing to you our nationally acclaimed cyber training from our Cyber for Government Leaders Program, package…
…
continue reading
Welcome to a special edition of the Cyber Brief Podcast, the cybersecurity show that uncovers the latest cyber-attacks, hacks, and stories that matter to all of us. This podcast is brought to you by the National Cybersecurity Center. We’re bringing to you our nationally acclaimed cyber training from our Cyber for Government Leaders Program, package…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Data Care for Everyone: Update Software Regularly
4:18
4:18
Play later
Play later
Lists
Like
Liked
4:18
Welcome to a special edition of the Cyber Brief Podcast, the cybersecurity show that uncovers the latest cyber-attacks, hacks, and stories that matter to all of us. This podcast is brought to you by the National Cybersecurity Center. We’re bringing to you our nationally acclaimed cyber training from our Cyber for Government Leaders Program, package…
…
continue reading
Imagine a data dump of files similar to the Snowden Leaks in 2013, only this it’s not from the NSA but from NT Vulkan, a Russian contractor. And it’s a framework for targeting critical IT infrastructures. In a talk at DEF CON 31, Joe Slowick from Huntress, shares what a Russian whistleblower released in the form of emails and documents, and how we …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Unlocking Intelligent Digital Products: AI, ML, and Trust in Data - A Conversation with Joseph Reeve from Amplitude's AI R&D Team
1:04:07
1:04:07
Play later
Play later
Lists
Like
Liked
1:04:07
Joseph Reeve from Amplitude Analytics' AI R&D team explores the world of building intelligent digital products using AI and ML. In our conversation we cover: Data Governance: Discussion on the importance of data governance, including proactive and reactive strategies. Proactive governance involves planning data collection, while reactive governance…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
October 10: 23andMe data breach hate crime, attack against iPhone encryption by dark-money network, the massive increase in police use of Google’s data, hacking scams on the elderly community, Cisco Emergency ...
9:44
9:44
Play later
Play later
Lists
Like
Liked
9:44
Howdy friends. This week I explain the 23andMe data breach, the new group responsible for attacking iPhone encryption backed by a political dark-money network, the uptick in police use of Google’s data, the increase in hacking scam on the elderly community, Cisco Emergency Responder static credential vulnerability, the iOS 17 0-day, Qualcomm's thre…
…
continue reading
This is a response show tohpr3959:: Download any HPR series with english file names "A dir with theseries name will be created and all shows will be renamed toShowTitle.mp3 inside it" This was the first show by gemlog and he used Bash, sed, grep, wget,to scrape the HPR site. This is great but as he points out any change tothe site will break the sc…
…
continue reading
Hello all. This is gemlog from Terrace, bc, canada just up near thealaska panhandle. Some of you may know me from in COM chat on sdf dot org or as afedizen on the tilde dot zone instance of mastodon. Now, the other day I finally got around to checking out HPR properly,even though my masto-pal claw-dio-m turned me on to it a couple of yearsago. Rece…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Paul Koullick: AI-Driven Systems, Beyond Rules-Based Software and Revolutionizing Tax Filings
51:32
51:32
Play later
Play later
Lists
Like
Liked
51:32
You can view screen-share from Paul on Youtube here In this episode, Keeper's Founder and CEO Paul Koullick explores the transformative impact of AI for tax preparation software. He discusses the limitations of rules-based systems and how AI, as exemplified by Keeper, simplifies tax preparation with machine learning. Paul also delves into the chang…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
EP 81: Hacking Visual Studio Code Extensions
49:11
49:11
Play later
Play later
Lists
Like
Liked
49:11
Rather than use backdoor exploits, attackers are stealing credentials going through the front door. How are they gaining credentials. Sometimes it’s from the tools we trust. Paul Geste and Thomas Chauchefoin discuss their DEF CON 31 presentation Visual Studio Code is why I have (Workspace) Trust issues as well as the larger question of how much we …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
October 2: WebP 0day, a youth hacking ring at the center of recent cybercrime sprees, the UNC3944 threat actor’s shift to ransomware attacks, University of Minnesota’s data breach, the $200 million crypto ...
9:03
9:03
Play later
Play later
Lists
Like
Liked
9:03
Howdy friends. This week I dive into the WebP 0day, the Youth hacking ring at the center of recent cybercrime spree, the financially motivated UNC3944 threat actor that has shifted its focus to ransomware attacks, University of Minnesota’s data breach, the $200 million crypto hack on Mixin, and the discovery of China-linked threat actors who have m…
…
continue reading
Welcome to a special edition of the Cyber Brief Podcast, the cybersecurity show that uncovers the latest cyber-attacks, hacks, and stories that matter to all of us. This podcast is brought to you by the National Cybersecurity Center. We’re bringing to you our nationally acclaimed cyber training from our Cyber for Government Leaders Program, package…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Data Care for Everyone: Don't get D.U.P.E.D.
2:41
2:41
Play later
Play later
Lists
Like
Liked
2:41
Welcome to a special edition of the Cyber Brief Podcast, the cybersecurity show that uncovers the latest cyber-attacks, hacks, and stories that matter to all of us. This podcast is brought to you by the National Cybersecurity Center. We’re bringing to you our nationally acclaimed cyber training from our Cyber for Government Leaders Program, package…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Data Care for Everyone: Misinformation and Disinformation
5:36
5:36
Play later
Play later
Lists
Like
Liked
5:36
Welcome to a special edition of the Cyber Brief Podcast, the cybersecurity show that uncovers the latest cyber-attacks, hacks, and stories that matter to all of us. This podcast is brought to you by the National Cybersecurity Center. We’re bringing to you our nationally acclaimed cyber training from our Cyber for Government Leaders Program, package…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Data Care for Everyone: Intersection of Cybersecurity and Physical Security
3:33
3:33
Play later
Play later
Lists
Like
Liked
3:33
Welcome to a special edition of the Cyber Brief Podcast, the cybersecurity show that uncovers the latest cyber-attacks, hacks, and stories that matter to all of us. This podcast is brought to you by the National Cybersecurity Center. We’re bringing to you our nationally acclaimed cyber training from our Cyber for Government Leaders Program, package…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Data Care for Everyone Introduction: Phishing
4:47
4:47
Play later
Play later
Lists
Like
Liked
4:47
Welcome to a special edition of the Cyber Brief Podcast, the cybersecurity show that uncovers the latest cyber-attacks, hacks, and stories that matter to all of us. This podcast is brought to you by the National Cybersecurity Center. We’re bringing to you our nationally acclaimed cyber training from our Cyber for Government Leaders Program, package…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Amin Dorostanian: Demystifying AI Adoption, Five Pillars for Success and the Journey from Turbo Pascal to LSTMs
47:35
47:35
Play later
Play later
Lists
Like
Liked
47:35
Amin's journey into the world of artificial intelligence (AI) began around 2006 when he became captivated by the potential of neural networks to learn from data. He noticed that AI experienced periods of intense hype followed by quieter moments. Amin delved into AI by building neural networks from scratch in C. This hands-on experience enabled him …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
September 22: The MGM and Caesars hacks, Github launches passkeys, the scam on Mark Cuban's crypto wallet, Microsoft AI researchers data leak, the Microsoft teams' phishing problem, Cisco’s Splunk acquisition ...
10:56
10:56
Play later
Play later
Lists
Like
Liked
10:56
Howdy friends. This week I will discuss the MGM Resorts and Caesars Entertainment hacks, Github’s launch of passkeys, Mark Cuban’s crypto wallet hack, the Microsoft AI researchers accidental data leak, the Microsoft teams phishing problem, Cisco’s acquisition of Splunk, and the latest T-mobile data breach We’re sticking with just the news on this v…
…
continue reading
What if an GPC project OAUTH access token wasn’t deleted? This could expose databases to bad actors. Tal Skverer from Astrix discusses his DEF CON 31 presentation GhostToken: Exploiting Google Cloud Platform App Infrastructure to Create Unremovable Trojan Apps. Transcript here.By Robert Vamosi
…
continue reading
![Artwork](/static/images/128pixel.png)
1
EP 79: Conducting Incident Response in Costa Rica Post Conti Ransomware
56:50
56:50
Play later
Play later
Lists
Like
Liked
56:50
How do you conduct an incident response for an entire country? When it’s 27 different life-critical government ministries each with up to 850 individual devices -- that’s uncharted territory. Esteban Jimenez of ATTI Cyber talks about his experience with the reconstruction of the cybersecurity system following Conti, how the country handled a second…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
September 5: Flax Tycoon hacks, Brazilian phone spyware hack, MOVEit hack stats, the dismantling of QakBot infrastructure, a fake Signal app, and Saudi’s death penalty over a man’s tweets
10:25
10:25
Play later
Play later
Lists
Like
Liked
10:25
Howdy friends. This week I am covering the China-backed Flax Tycoon hack on Taiwan, a Brazilian phone spyware that was hacked, the MOVEit hack statistics, the FBI and partners dismantling of Qakbot infrastructure in a massive international cyber takedown, a fake Signal app planted on the Google Play store, and the tragic death of a Saudi man by dea…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
August 28: UK surveillance changes, CloudNordic’s ransomware incident, a SIM-Swap Crypto Hack, Citrix Sharefile flaw exploit, Tesla’s data breach, and updates on the Lapsus$ and Discord stories from last ...
10:31
10:31
Play later
Play later
Lists
Like
Liked
10:31
Howdy friends. In this video I go over UK Surveillance requirement revisions, CloudNordic’s ransomware incident, a SIM-Swap Crypto Hack perpetrated on a crypto investor, the Citrix Sharefile flaw exploit, Tesla’s massive data breach of employee’s personal information, and updates on the Discord and Lapsus$ stories from last week We’re sticking with…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
EP 78: Defending Costa Rica From Conti Ransomware
56:46
56:46
Play later
Play later
Lists
Like
Liked
56:46
What is is like to hack an entire country, to take it’s government services offline, to deny a government an ability to function? Costa Rica knows. Esteban Jimenez of ATTI Cyber has been helping Costa Rica improve its cybersecurity posture for more than 16 years, and he has been helping them recently recover from a crippling ransomware attack in Ap…
…
continue reading
HPR Shows by Klaatu. Source: hpr3887 ::10 must-know commands for a new cloud admin. Source: hpr3882 ::Alternatives to the cd command. Hot sauce lady. Source: Franks Red Hot Queen2011. pwd && ls --group-directories-first --classify --almost-all# some more ls aliasesalias la='ls -l --human-readable --group-directories-first --classify --almost-all'al…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
August 21: GitHub’s move to Two-Factor, Discord.io’s data breach, Kubernetes misconfiguration that exposes data from Fortune 500 companies, PSNI and UK voter breaches, and the $70 device that spoofs Apple ...
11:32
11:32
Play later
Play later
Lists
Like
Liked
11:32
Howdy friends. In this video, I cover GitHub’s plans to require two-factor authentication, Discord.io’s recent data breach and shutdown, the Kubernetes misconfiguration that exposes data of several Fortune 500 companies and possibly hundreds more, the PSNI and UK voter breaches and why they should be taken more seriously, and finally the $70 device…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
August 14: Hackers rig casino card-shuffling machine, Rapid7 layoffs, Homeland Security’s report on the Lapsus$ breaches, EvilProxy's phishing campaign, and the cyberattack that caused CardioComm to take ...
8:01
8:01
Play later
Play later
Lists
Like
Liked
8:01
Howdy friends. In this video, I go over how hackers have rigged casino card-shuffling machines, my take on the Rapid7 layoffs, Homeland Security’s report on the Lapsus$ breaches, EvilProxys phishing campaign, and the cyberattack that caused medical provider CardioComm to take their system offline. We’re sticking with just the news on this video, bu…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
August 8: Unlimited Airline Miles, Microsoft Called Out, and Russian Phishing in MS Teams
10:56
10:56
Play later
Play later
Lists
Like
Liked
10:56
Howdy friends. In this video, the juiciest in infosec news including a vulnerability that led to unlimited airline miles, Microsoft gets called out, and Russian phishing in MS Teams. We’re sticking with just the news on this video, but you can find more Vulnerable U personal and professional growth content on my blog: https://www.mattjay.com/blog/ …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
EP 77: Security Chaos Engineering with Kelly Shortridge
40:32
40:32
Play later
Play later
Lists
Like
Liked
40:32
Speaking at Black Hat 2023, Kelly Shortridge is bringing cybersecurity out of the dark ages by infusing security by design to create secure patterns and practices. It’s a subject of her new book on Security Chaos Computing, and it’s a topic that’s long overdue to be discussed in the field. Transcript.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Vulnerable News: SEC vote requiring incident disclosures, an intentional back door, Google's 0-day year in review, malware in Call of Duty and Lazarus linked to two heists
5:32
5:32
Play later
Play later
Lists
Like
Liked
5:32
Howdy friends. In this video, I walk through the SEC vote requiring companies to disclose cybersecurity incidents, an intentional backdoor discovered in radio comms, Google’s 0-day year in review, malware in Call of Duty, and Lazarus linked to two heists. We’re sticking with just the news on this video, but you can find more Vulnerable U personal a…
…
continue reading