PodGrabber Mascot Cybersecurity Podcasts



Updated 7/13/2024 7:50:23 PM
Click title to play/pause!
Cyber Podcast Archives

Mon 08 Jul 2024 09:00:00
Cyber Security Today, July 8, 2024 - A New Ransomware Group Is Discovered : A new ransomware group that has been discovered is highlighted in this edition

Cybersecurity Today


Cyber Security Today, July 8, 2024 - A New Ransomware Group Is Discovered

Cybersecurity Today Episode Details

Cyber Security Today, July 8, 2024 - A New Ransomware Group Is Discovered : A new ransomware group that has been discovered is highlighted in this edition

Fri 12 Jul 2024 20:46:00
Week in Review: AT&T breach, Security regulations attacked, 10 billion passwords stolen : Link to blog post This weeks Cyber Security Headlines  Week in Review is hosted by Rich Stroffolino with guest Andrew Cannata, CISO, Primo Water Thanks to our show sponsor, Entro Security What are you doing to secure your companys nonhuman identities Vaults and scanners are helpful, but they dont give the context for where your secrets are, how theyre being used, or when its time to remove or rotate them The entro platform provides automated lifecycle management and seamless integration, ensuring comprehensive security & compliance through a unified and easy to use interface All links and the video of this episode can be found on CISO Seriescom

Cyber Security Headlines


Week in Review: AT&T breach, Security regulations attacked, 10 billion passwords stolen

Cyber Security Headlines Episode Details

Week in Review: AT&T breach, Security regulations attacked, 10 billion passwords stolen : Link to blog post This weeks Cyber Security Headlines Week in Review is hosted by Rich Stroffolino with guest Andrew Cannata, CISO, Primo Water Thanks to our show sponsor, Entro Security What are you doing to secure your companys nonhuman identities Vaults and scanners are helpful, but they dont give the context for where your secrets are, how theyre being used, or when its time to remove or rotate them The entro platform provides automated lifecycle management and seamless integration, ensuring comprehensive security & compliance through a unified and easy to use interface All links and the video of this episode can be found on CISO Seriescom

Sat 13 Jul 2024 07:00:00
On the prowl for mobile malware. [Research Saturday] : This week, we are joined by Asheer Malhotra and Vitor Ventura from Cisco Talos, and they are discussing "Operation Celestial Force employs mobile and desktop malware to target Indian entities" Cisco Talos revealed Operation Celestial Force, an espionage campaign by the Pakistani threat group "Cosmic Leopard," targeting Indian defense, government, and technology sectors Active for at least six years, the operation has recently increased its use of mobile malware and commercial spyware for surveillanceThe research can be found here:Operation Celestial Force employs mobile and desktop malware to target Indian entitiesLearn more about your ad choices Visit megaphonefm/adchoices

CyberWire Daily


On the prowl for mobile malware. [Research Saturday]

CyberWire Daily Episode Details

On the prowl for mobile malware. [Research Saturday] : This week, we are joined by Asheer Malhotra and Vitor Ventura from Cisco Talos, and they are discussing "Operation Celestial Force employs mobile and desktop malware to target Indian entities" Cisco Talos revealed Operation Celestial Force, an espionage campaign by the Pakistani threat group "Cosmic Leopard," targeting Indian defense, government, and technology sectors Active for at least six years, the operation has recently increased its use of mobile malware and commercial spyware for surveillanceThe research can be found here:Operation Celestial Force employs mobile and desktop malware to target Indian entitiesLearn more about your ad choices Visit megaphonefm/adchoices

Tue 09 Jul 2024 10:00:00 GMT
Jake Krasnov: From Aerospace to Cybersecurity : About the Guest:Jacob Krasnov is a cybersecurity expert, CEO, and cofounder at BC Security He and his cofounder Anthony and Vincent Rose have significantly contributed to the cybersecurity field, particularly with their work on the Empire project Jacob's background includes aerospace engineering and highlevel cybersecurity assessments in the Air Force, where he was involved in rigorous testing of military aircraft like the F22 and F35 Transitioning to BC Security, Jacob has focused on enhancing tools for red teaming and threat emulation, making sophisticated cybersecurity tools accessible and maintainableEpisode Summary:In this episode of the Phillip Wylie Show, Phillip Wylie sits down with Jacob Krasnov from BC Security to delve into the evolution of the Empire project, cybersecurity's role in modern defense systems, and the importance of making advanced security tools accessible Jacob elaborates on his journey from working on military aircraft cybersecurity assessments to cofounding BC Security, a company that has breathed new life into the Empire projecta project initially shelved by its original developers but resuscitated and advanced by Jacob and his teamThe conversation spotlights the significance of rigorous and repeatable security testing, as well as tying cybersecurity impacts to operational outcomes Jacob details the extensive updates made to Empire, including support for Python 3, new agent types, and a comprehensive code rewrite to enhance maintainability and extend the tool's functionality The show also touches on the importance of entrylevel cybersecurity tools for global teams, the learning curve of such tools, and using AI in cybersecurityKey Takeaways: Evolution of Empire: BC Security transformed Empire from a deprecated tool into a sophisticated platform with Python 3, C sharp, and Iron Python agents Cybersecurity Experience: Jacob's rich back

Phillip Wylie Show


Jake Krasnov: From Aerospace to Cybersecurity

Phillip Wylie Show Episode Details

Jake Krasnov: From Aerospace to Cybersecurity : About the Guest:Jacob Krasnov is a cybersecurity expert, CEO, and cofounder at BC Security He and his cofounder Anthony and Vincent Rose have significantly contributed to the cybersecurity field, particularly with their work on the Empire project Jacob's background includes aerospace engineering and highlevel cybersecurity assessments in the Air Force, where he was involved in rigorous testing of military aircraft like the F22 and F35 Transitioning to BC Security, Jacob has focused on enhancing tools for red teaming and threat emulation, making sophisticated cybersecurity tools accessible and maintainableEpisode Summary:In this episode of the Phillip Wylie Show, Phillip Wylie sits down with Jacob Krasnov from BC Security to delve into the evolution of the Empire project, cybersecurity's role in modern defense systems, and the importance of making advanced security tools accessible Jacob elaborates on his journey from working on military aircraft cybersecurity assessments to cofounding BC Security, a company that has breathed new life into the Empire projecta project initially shelved by its original developers but resuscitated and advanced by Jacob and his teamThe conversation spotlights the significance of rigorous and repeatable security testing, as well as tying cybersecurity impacts to operational outcomes Jacob details the extensive updates made to Empire, including support for Python 3, new agent types, and a comprehensive code rewrite to enhance maintainability and extend the tool's functionality The show also touches on the importance of entrylevel cybersecurity tools for global teams, the learning curve of such tools, and using AI in cybersecurityKey Takeaways: Evolution of Empire: BC Security transformed Empire from a deprecated tool into a sophisticated platform with Python 3, C sharp, and Iron Python agents Cybersecurity Experience: Jacob's rich back

Thu 11 Jul 2024 10:00:00
Telling Stories with Security Metrics : All links and images for this episode can be found on CISO Series Check out this post for the discussion that is the basis of our conversation on this weeks episode cohosted by me, David Spark dspark, the producer of CISO Series, and Steve Zalewski Joining us is our sponsored guest, Shirley Salzman, CEO and cofounder, SeeMetrics In this episode: Finding the purpose in metrics Using metrics to answer business questions Speaking to your audience Communication is a twoway street Thanks to our podcast sponsor, SeeMetrics SeeMetrics automates cybersecurity metrics programs, continuously measuring and helping prioritize risks based on context SeeMetrics unifies siloed data from your security stack and offers hundreds of readytouse metrics Once connected with SeeMetrics, security teams reduce risk, minimize exposure and optimize performance while eliminating tedious repetitive manual work Ready to automate your security programs start connecting your environment at seemetricsco

Defense in Depth


Telling Stories with Security Metrics

Defense in Depth Episode Details

Telling Stories with Security Metrics : All links and images for this episode can be found on CISO Series Check out this post for the discussion that is the basis of our conversation on this weeks episode cohosted by me, David Spark dspark, the producer of CISO Series, and Steve Zalewski Joining us is our sponsored guest, Shirley Salzman, CEO and cofounder, SeeMetrics In this episode: Finding the purpose in metrics Using metrics to answer business questions Speaking to your audience Communication is a twoway street Thanks to our podcast sponsor, SeeMetrics SeeMetrics automates cybersecurity metrics programs, continuously measuring and helping prioritize risks based on context SeeMetrics unifies siloed data from your security stack and offers hundreds of readytouse metrics Once connected with SeeMetrics, security teams reduce risk, minimize exposure and optimize performance while eliminating tedious repetitive manual work Ready to automate your security programs start connecting your environment at seemetricsco

Thu 11 Jul 2024 10:01:42 GMT
Episode 79: The State of CSS Injection - Leaking Text Nodes & HTML Attributes : Episode 79: In this episode of Critical Thinking  Bug Bounty Podcast we deepdive CSS injection, and explore topics like sequential import chaining, font ligatures, and attribute exfiltrationFollow us on twitter at: ctbbpodcastSend us any feedback here: infocriticalthinkingpodcastioShoutout to YTCracker for the awesome intro music Links Follow your hosts Rhynorater & Teknogeek on twitter:https://twittercom/0xteknogeekhttps://twittercom/rhynorater Ways to Support CTBBPodcast Hop on the CTBB Discord at https://ctbbshow/discordWe also do Discord subs at 25, 10, and 5  premium subscribers get access to private masterclasses, exploits, tools, scripts, unredacted bug reports, etcResources:SpaceRaccoon’s Universal Code Execution ExtensionsEscalating Client Side Path TraversalFulltime Bug Bounty BlueprintSequential Import ChainingCSS ExfiltationLink that Justin was talking aboutFont LigaturesLava Dome bypassStealing Data in Great StyleSteal Script ContentsMasato Kinugawa’s tweetAttacking with Just CSSCSS Injection PrimitivesTimestamps:00:00:00 Introduction00:02:32 Universal Code Execution00:11:32 Escalating Client Side Path Traversal00:16:56 Justin’s Defcon talk & Bug Bounty Blueprint00:23:32 CSS Injection00:39:23 Font Ligatures00:54:30 Descent Override and display:block

Critical Thinking - Bug Bounty Podcast


Episode 79: The State of CSS Injection - Leaking Text Nodes & HTML Attributes

Critical Thinking - Bug Bounty Podcast Episode Details

Episode 79: The State of CSS Injection - Leaking Text Nodes & HTML Attributes : Episode 79: In this episode of Critical Thinking Bug Bounty Podcast we deepdive CSS injection, and explore topics like sequential import chaining, font ligatures, and attribute exfiltrationFollow us on twitter at: ctbbpodcastSend us any feedback here: infocriticalthinkingpodcastioShoutout to YTCracker for the awesome intro music Links Follow your hosts Rhynorater & Teknogeek on twitter:https://twittercom/0xteknogeekhttps://twittercom/rhynorater Ways to Support CTBBPodcast Hop on the CTBB Discord at https://ctbbshow/discordWe also do Discord subs at 25, 10, and 5 premium subscribers get access to private masterclasses, exploits, tools, scripts, unredacted bug reports, etcResources:SpaceRaccoon’s Universal Code Execution ExtensionsEscalating Client Side Path TraversalFulltime Bug Bounty BlueprintSequential Import ChainingCSS ExfiltationLink that Justin was talking aboutFont LigaturesLava Dome bypassStealing Data in Great StyleSteal Script ContentsMasato Kinugawa’s tweetAttacking with Just CSSCSS Injection PrimitivesTimestamps:00:00:00 Introduction00:02:32 Universal Code Execution00:11:32 Escalating Client Side Path Traversal00:16:56 Justin’s Defcon talk & Bug Bounty Blueprint00:23:32 CSS Injection00:39:23 Font Ligatures00:54:30 Descent Override and display:block

Tue 09 Jul 2024 08:00:00 -0400
Tanya Janca -- Secure Guardrails : Join us for a conversation with Tanya Janka, also known as SheHacksPurple, as she discusses secure guardrails, the difference between guardrails and paved roads, and how to implement both in application security Tanya, an awardwinning public speaker and head of education at SEMGREP, shares her insights on creating secure software and teaching developers Tanya also shares with us about her hobby farm and love for gardeningMentioned in this episode:Tanya Janca  What Secure Coding Really MeansTanya Janca  Mentoring Monday  5 Minute AppSecTanya Janca and Nicole Becher  Hacking APIs and Web Services with DevSlopThe Expanse Series by James SA CoreyAlice and Bob Learn Application Security by Tanya JancaFOLLOW OUR SOCIAL MEDIA: Twitter: AppSecPodcastLinkedIn: The Application Security PodcastYouTube: https://wwwyoutubecom/ApplicationSecurityPodcast Thanks for Listening

The Application Security Podcast


Tanya Janca -- Secure Guardrails

The Application Security Podcast Episode Details

Tanya Janca -- Secure Guardrails : Join us for a conversation with Tanya Janka, also known as SheHacksPurple, as she discusses secure guardrails, the difference between guardrails and paved roads, and how to implement both in application security Tanya, an awardwinning public speaker and head of education at SEMGREP, shares her insights on creating secure software and teaching developers Tanya also shares with us about her hobby farm and love for gardeningMentioned in this episode:Tanya Janca What Secure Coding Really MeansTanya Janca Mentoring Monday 5 Minute AppSecTanya Janca and Nicole Becher Hacking APIs and Web Services with DevSlopThe Expanse Series by James SA CoreyAlice and Bob Learn Application Security by Tanya JancaFOLLOW OUR SOCIAL MEDIA: Twitter: AppSecPodcastLinkedIn: The Application Security PodcastYouTube: https://wwwyoutubecom/ApplicationSecurityPodcast Thanks for Listening

Thu 11 Jul 2024 10:00:00 -0500
Episode 74: Internship Intrigue : On this episode of the SecureAF Podcast, Keelan Knox interviews our 2024 interns They share insights on how they got in, what they are learning, and where this will take themWatch the full video at youtubecom/aliascybersecurityCatch the whole episode now at https://bitly/47eYPTKListen on Apple Podcasts, Spotify and anywhere you get you're podcasts

Secure AF - A Cybersecurity Podcast


Episode 74: Internship Intrigue

Secure AF - A Cybersecurity Podcast Episode Details

Episode 74: Internship Intrigue : On this episode of the SecureAF Podcast, Keelan Knox interviews our 2024 interns They share insights on how they got in, what they are learning, and where this will take themWatch the full video at youtubecom/aliascybersecurityCatch the whole episode now at https://bitly/47eYPTKListen on Apple Podcasts, Spotify and anywhere you get you're podcasts

Tue 09 Jul 2024 11:10:00
DFSP # 438 - Old Nix : This week, I will be discussing the Linux operating system from a DFIR perspective It is highly recommended for every examiner to become proficient in Linux, especially with the increasing prevalence of cloudbased infrastructures in enterprise environments As these platforms become the norm, you can expect to encounter Linux systems frequently during your investigations

Digital Forensic Survival Podcast


DFSP # 438 - Old Nix

Digital Forensic Survival Podcast Episode Details

DFSP # 438 - Old Nix : This week, I will be discussing the Linux operating system from a DFIR perspective It is highly recommended for every examiner to become proficient in Linux, especially with the increasing prevalence of cloudbased infrastructures in enterprise environments As these platforms become the norm, you can expect to encounter Linux systems frequently during your investigations

Tue 09 Jul 2024 18:55:02 PDT
SN 982: The Polyfill.io Attack - Entrust Responds, Passkey Redaction Attacks : Entrust Responds Other major Certificate Authorities respond Passkey Redaction Attacks Syncing passkeys Port Knocking Fail2Ban The Polyfillio Attack Show Notes  https://wwwgrccom/sn/SN982Notespdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twittv/shows/securitynow Get episodes adfree with Club TWiT at https://twittv/clubtwit You can submit a question to Security Now at the GRC Feedback Page For 16kbps versions, transcripts, and notes including fixes, visit Steve’s site: grccom, also the home of the best disk maintenance and recovery utility ever written Spinrite 6Sponsors:lookoutcomvantacom/SECURITYNOWbitwardencom/twitpanopticaapp

Security Now (Audio)


SN 982: The Polyfill.io Attack - Entrust Responds, Passkey Redaction Attacks

Security Now (Audio) Episode Details

SN 982: The Polyfill.io Attack - Entrust Responds, Passkey Redaction Attacks : Entrust Responds Other major Certificate Authorities respond Passkey Redaction Attacks Syncing passkeys Port Knocking Fail2Ban The Polyfillio Attack Show Notes https://wwwgrccom/sn/SN982Notespdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twittv/shows/securitynow Get episodes adfree with Club TWiT at https://twittv/clubtwit You can submit a question to Security Now at the GRC Feedback Page For 16kbps versions, transcripts, and notes including fixes, visit Steve’s site: grccom, also the home of the best disk maintenance and recovery utility ever written Spinrite 6Sponsors:lookoutcomvantacom/SECURITYNOWbitwardencom/twitpanopticaapp

Thu 11 Jul 2024 00:00:00 +0100
Teachers TikTok targeted, and fraud in the doctors’ waiting room : Execs at a health tech startup are sentenced to jail after a massive ad fraud, and a school is shaken after teachers are targeted via TikTokAll this and more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole TheriaultPlus don’t miss our featured interview with Jason Meller of 1PasswordWarning: This podcast may contain nuts, adult themes, and rude languageEpisode links:Outcome, a hot tech startup, misled advertisers with manipulated information, sources say  Wall Street JournalThree Former Executives Sentenced for 1B Corporate Fraud Scheme  US Department of JusticeGraham dancing  TikTokStudents Target Teachers in Group TikTok Attack, Shaking Their School  The New York TimesThank you very much indeedPresumed Innocent  Official Trailer  YoutubePresumed Innocent  Apple TVSmashing Security merchandise tshirts, mugs, stickers and stuffSponsored by:1Password Extended Access Management  Secure every signin for every app on every devicemWISE  Don’t miss the cybersecurity conference built by practitioners, for practitioners mWISE runs September 18  19 2024 in DenverVanta  Expand the scope of your security program with marketleading compliance automation while saving time and money Smashing Security listeners get 1000 offSUPPORT THE SHOW:Tell your friends and colleagues about Smashing Security, and leave us a review on Apple Podcasts or PodchaserBecome a supporter via Patreon or Apple Podcasts for adfree episodes and our earlyrelease feedFOLLOW US:Follow us on Twitter at SmashinSecurity, or Mastodon, or on the Smashing Security subreddit, and

Smashing Security


Teachers TikTok targeted, and fraud in the doctors’ waiting room

Smashing Security Episode Details

Teachers TikTok targeted, and fraud in the doctors’ waiting room : Execs at a health tech startup are sentenced to jail after a massive ad fraud, and a school is shaken after teachers are targeted via TikTokAll this and more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole TheriaultPlus don’t miss our featured interview with Jason Meller of 1PasswordWarning: This podcast may contain nuts, adult themes, and rude languageEpisode links:Outcome, a hot tech startup, misled advertisers with manipulated information, sources say Wall Street JournalThree Former Executives Sentenced for 1B Corporate Fraud Scheme US Department of JusticeGraham dancing TikTokStudents Target Teachers in Group TikTok Attack, Shaking Their School The New York TimesThank you very much indeedPresumed Innocent Official Trailer YoutubePresumed Innocent Apple TVSmashing Security merchandise tshirts, mugs, stickers and stuffSponsored by:1Password Extended Access Management Secure every signin for every app on every devicemWISE Don’t miss the cybersecurity conference built by practitioners, for practitioners mWISE runs September 18 19 2024 in DenverVanta Expand the scope of your security program with marketleading compliance automation while saving time and money Smashing Security listeners get 1000 offSUPPORT THE SHOW:Tell your friends and colleagues about Smashing Security, and leave us a review on Apple Podcasts or PodchaserBecome a supporter via Patreon or Apple Podcasts for adfree episodes and our earlyrelease feedFOLLOW US:Follow us on Twitter at SmashinSecurity, or Mastodon, or on the Smashing Security subreddit, and

Mon 08 Jul 2024 04:00:00
Ep. 266 - Human Element Series - Work in Progress with Dr. Abbie Maroo : Today we are joined by Dr Abbie Maroo Bringing a unique level of experience and scientific validation to her work, Dr Maroo is both a scientist and a practitioner in the field of human behavior The United States Department of State has recognized her international acclaim and record of extraordinary achievements, placing her in the top 1 of her field Underscoring her recognized expertise, Dr Abbie has been invited to provide specialized behavior analysis training for elite units such as the Internet Crimes Against Children ICAC Task Force This prestigious group includes agents from the US Secret Service, FBI, Department of Homeland Security, and local law enforcement agencies  Having completed her PhD in Psychology, Dr Abbie became a Professor of Psychology by the age of 23 She is now the Director of Education at SocialEngineer, LLC, and specializes in behavior analysis A regular contributor to Forbes and Apple News, Abbie has also been featured in WIRED and Forbes Breaking News She is an active member of several internationally recognized research groups and was awarded Reviewer of the Year in 2020 for her significant contribution to the academic community Additionally, she is an author, expert consultant, coach, and a TEDx speaker July 8, 2024  00:00  Intro 00:17  Intro Links  SocialEngineercom http://wwwsocialengineercom/  Managed Voice Phishing https://wwwsocialengineercom/services/vishingservice/  Managed Email Phishing https://wwwsocialengineercom/services/sephishingservice/  AdversarialSimulations https://wwwsocialengineercom/services/socialengineeringpenetrationtest/  SocialEngineer channel on SLACK https://socialengineeringhqslackcom/ssb  CLUTCH http://wwwprorockcom/  innocentlivesfoundationorg http://wwwinnocentlivesfoundationorg/ 04:07  Dr Abbie Maroo In

The Social-Engineer Podcast


Ep. 266 - Human Element Series - Work in Progress with Dr. Abbie Maroo

The Social-Engineer Podcast Episode Details

Ep. 266 - Human Element Series - Work in Progress with Dr. Abbie Maroo : Today we are joined by Dr Abbie Maroo Bringing a unique level of experience and scientific validation to her work, Dr Maroo is both a scientist and a practitioner in the field of human behavior The United States Department of State has recognized her international acclaim and record of extraordinary achievements, placing her in the top 1 of her field Underscoring her recognized expertise, Dr Abbie has been invited to provide specialized behavior analysis training for elite units such as the Internet Crimes Against Children ICAC Task Force This prestigious group includes agents from the US Secret Service, FBI, Department of Homeland Security, and local law enforcement agencies Having completed her PhD in Psychology, Dr Abbie became a Professor of Psychology by the age of 23 She is now the Director of Education at SocialEngineer, LLC, and specializes in behavior analysis A regular contributor to Forbes and Apple News, Abbie has also been featured in WIRED and Forbes Breaking News She is an active member of several internationally recognized research groups and was awarded Reviewer of the Year in 2020 for her significant contribution to the academic community Additionally, she is an author, expert consultant, coach, and a TEDx speaker July 8, 2024 00:00 Intro 00:17 Intro Links SocialEngineercom http://wwwsocialengineercom/ Managed Voice Phishing https://wwwsocialengineercom/services/vishingservice/ Managed Email Phishing https://wwwsocialengineercom/services/sephishingservice/ AdversarialSimulations https://wwwsocialengineercom/services/socialengineeringpenetrationtest/ SocialEngineer channel on SLACK https://socialengineeringhqslackcom/ssb CLUTCH http://wwwprorockcom/ innocentlivesfoundationorg http://wwwinnocentlivesfoundationorg/ 04:07 Dr Abbie Maroo In

Thu 11 Jul 2024 05:00:00
The costly consequences of communication scams. : This week Dave shares a story on Business email compromise BEC scams, and how they are a major threat, costing 26 billion annually The story shares how it’s crucial for employees to verify suspicious emails through a secondary channel and for companies to foster transparent communication to mitigate such risks Joe shares two stories with us this week The first is from a listener named Jay, who received a story from a relative In this story, someone claiming to be a constable calls to warn about a person who has gift cards with the victim’s name on them, then tries to get the caller to call the police to confirm Joe’s second story comes from Allison Gormly at Consumer reporter at WTHR in Indianapolis Allison share’s videos videos on Instagram that all start with Hey Allison, this one starts with Hey Allison, a stranger sent me money on Venmo, should I send it back Our catch of the day comes from listener Cameron, who shares how he is a business owner with a publicfacing email address, and how he gets his fair share of scam emails, but this one takes the cakePlease take a moment to fill out anaudience survey Let us know how we are doingLinks to the stories:How to Spot a Business Email Compromise ScamScam alert on Venmo, CashApp & ZelleHave a Catch of the Day you’d like to share Email it to us athackinghumansthecyberwirecom

Hacking Humans


The costly consequences of communication scams.

Hacking Humans Episode Details

The costly consequences of communication scams. : This week Dave shares a story on Business email compromise BEC scams, and how they are a major threat, costing 26 billion annually The story shares how it’s crucial for employees to verify suspicious emails through a secondary channel and for companies to foster transparent communication to mitigate such risks Joe shares two stories with us this week The first is from a listener named Jay, who received a story from a relative In this story, someone claiming to be a constable calls to warn about a person who has gift cards with the victim’s name on them, then tries to get the caller to call the police to confirm Joe’s second story comes from Allison Gormly at Consumer reporter at WTHR in Indianapolis Allison share’s videos videos on Instagram that all start with Hey Allison, this one starts with Hey Allison, a stranger sent me money on Venmo, should I send it back Our catch of the day comes from listener Cameron, who shares how he is a business owner with a publicfacing email address, and how he gets his fair share of scam emails, but this one takes the cakePlease take a moment to fill out anaudience survey Let us know how we are doingLinks to the stories:How to Spot a Business Email Compromise ScamScam alert on Venmo, CashApp & ZelleHave a Catch of the Day you’d like to share Email it to us athackinghumansthecyberwirecom

Sun 30 Jun 2024 00:21:00
S3 – Episode 005 – The Great Cyber Divide (w/ Special Guests: The Bare Knuckles & Brass Tacks Podcast Team) : In this episode, Kevin and Jason sit down to talk shop with George Kamide and George AlKoura the hosts of the awesome podcast Bare Knuckles and Brass Tacks Their podcast is focused on talking about whether or not there truly is a vendor/customer divide Its a cybersecurity podcast dedicated to answering that question George Kamide comes from the vendor side, and George AlKoura is a CISO on the customer side They have REAL conversations from opposing sides of the pitch about cybersecurity marketing, sales, and gotomarket strategies They confront these topics and bad practices with bare knuckles Then its down to brass tacks, as they look for solutions They have guests on either side, including CISOs, SMEs, leaders, frontline account managers, and more George Kamide is a Multidisciplinary thinker with a penchant for blowing up silos He loves tackling big problems This might mean orchestrating gotomarket product strategies, or creating stimulating thought leadership in dynamic tech environments Other times it means taking on industrywide issues of representation, customer/vendor trust challenges, or big questions like responsible AI George AlKoura is a CISO Chief Information Security Officer, he leads the strategy and execution of cybersecurity for a global online dating company that empowers people to connect and explore their relationships He has over 15 years of experience in the security profession, spanning military, government, and commercial sectors, with a focus on cyber and security threat intelligence We pick their brains on their podcast, their origin story, and much, much more Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITILF and serves as the Information Security Director for a Manufacturing company  CITATIONS: Links to find the

Cyber Distortion Podcast Series


S3 – Episode 005 – The Great Cyber Divide (w/ Special Guests: The Bare Knuckles & Brass Tacks Podcast Team)

Cyber Distortion Podcast Series Episode Details

S3 – Episode 005 – The Great Cyber Divide (w/ Special Guests: The Bare Knuckles & Brass Tacks Podcast Team) : In this episode, Kevin and Jason sit down to talk shop with George Kamide and George AlKoura the hosts of the awesome podcast Bare Knuckles and Brass Tacks Their podcast is focused on talking about whether or not there truly is a vendor/customer divide Its a cybersecurity podcast dedicated to answering that question George Kamide comes from the vendor side, and George AlKoura is a CISO on the customer side They have REAL conversations from opposing sides of the pitch about cybersecurity marketing, sales, and gotomarket strategies They confront these topics and bad practices with bare knuckles Then its down to brass tacks, as they look for solutions They have guests on either side, including CISOs, SMEs, leaders, frontline account managers, and more George Kamide is a Multidisciplinary thinker with a penchant for blowing up silos He loves tackling big problems This might mean orchestrating gotomarket product strategies, or creating stimulating thought leadership in dynamic tech environments Other times it means taking on industrywide issues of representation, customer/vendor trust challenges, or big questions like responsible AI George AlKoura is a CISO Chief Information Security Officer, he leads the strategy and execution of cybersecurity for a global online dating company that empowers people to connect and explore their relationships He has over 15 years of experience in the security profession, spanning military, government, and commercial sectors, with a focus on cyber and security threat intelligence We pick their brains on their podcast, their origin story, and much, much more Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITILF and serves as the Information Security Director for a Manufacturing company CITATIONS: Links to find the

Sat 01 Jun 2024 20:57:00
Tanya Janca Talks secure coding, Semgrep Academy, and community building, and more! : Check out the BrakeSecEd Twitch at https://twitchtv/brakesec Join the Discord https://discordgg/brakesec #youtube VOD in 1440p: https://wwwyoutubecom/watchvaxQWGyd79NM Questions and topics: Bsides Vancouver discussion Semgrep Community and Academy Building communities What are secure guardrails Reducing barriers between security and developers How to sell security to devs: hey, if you want to see us less, buy/use this Security is your barrier, but we have goals that we cant reach without your help https://wehackpurplecom/devsecopsworstpracticesartificialgates/ How are you seeing things like AI being used to help with DevOps or is it just making things more complicated Not just helping write code, but infrastructure Ops, software inventories, code repo hygiene, etc OWASP PNW https://wwwappsecpnworg/ Alice and Bob coming next year Additional information / pertinent LInks Would you like to know more: shehackpurpleca Semgrep https://semgrepdev/ https://aliceandboblearncom/ https://academysemgrepdev/ free training Netflix paved roads: https://netflixtechblogcom/howwebuildcodeatnetflixc5d9bd727f15 https://enwikipediaorg/wiki/Nudgetheory https://wwwperforcecom/blog/qac/whatislinting https://wwwyoutubecom/watchvFSPTiw8gSEU https://techhqcom/2024/02/aircanadarefundforcustomerwhousedchatbot/ Show points of Contact: Amanda Berlin: infosystir hackershealth Brian Boettcher: boettcherpwned Bryan Brake: https://linkedincom/in/brakeb Brakesec Website: https://wwwbrakeingsecuritycom Youtube channel: https://youtubecom/BrakeSecEd Twitch Channel: https://twitchtv/brakesec

BrakeSec Education Podcast


Tanya Janca Talks secure coding, Semgrep Academy, and community building, and more!

BrakeSec Education Podcast Episode Details

Tanya Janca Talks secure coding, Semgrep Academy, and community building, and more! : Check out the BrakeSecEd Twitch at https://twitchtv/brakesec Join the Discord https://discordgg/brakesec #youtube VOD in 1440p: https://wwwyoutubecom/watchvaxQWGyd79NM Questions and topics: Bsides Vancouver discussion Semgrep Community and Academy Building communities What are secure guardrails Reducing barriers between security and developers How to sell security to devs: hey, if you want to see us less, buy/use this Security is your barrier, but we have goals that we cant reach without your help https://wehackpurplecom/devsecopsworstpracticesartificialgates/ How are you seeing things like AI being used to help with DevOps or is it just making things more complicated Not just helping write code, but infrastructure Ops, software inventories, code repo hygiene, etc OWASP PNW https://wwwappsecpnworg/ Alice and Bob coming next year Additional information / pertinent LInks Would you like to know more: shehackpurpleca Semgrep https://semgrepdev/ https://aliceandboblearncom/ https://academysemgrepdev/ free training Netflix paved roads: https://netflixtechblogcom/howwebuildcodeatnetflixc5d9bd727f15 https://enwikipediaorg/wiki/Nudgetheory https://wwwperforcecom/blog/qac/whatislinting https://wwwyoutubecom/watchvFSPTiw8gSEU https://techhqcom/2024/02/aircanadarefundforcustomerwhousedchatbot/ Show points of Contact: Amanda Berlin: infosystir hackershealth Brian Boettcher: boettcherpwned Bryan Brake: https://linkedincom/in/brakeb Brakesec Website: https://wwwbrakeingsecuritycom Youtube channel: https://youtubecom/BrakeSecEd Twitch Channel: https://twitchtv/brakesec

Fri 12 Jul 2024 20:30:00 GMT
DISARM with Dr Pablo Breuer : In this episode of Phoenix Cast, hosts John, Rich and Kyle are joined by Dr Pablo Breuer and they discuss the DISARM frameworkShare your thoughts with us on Twitter: USMCTFPhoenix Now verified Follow MARFORCYBER, MCCYWG, & MCCOG on Twitter, LinkedIn, Facebook, and YouTube Leave your review on Apple PodcastsLinks:DISARM website  https://wwwdisarmfoundation/frameworkBlackHat talk  https://wwwyoutubecom/watchvtrxzyEfG8cY&t6s&ppygUVYmxhY2toYXQgcGFibG8gYnJldWVySTIX/TAXI  https://wwwfirstorg/resources/papers/munich2016/wunderstixtaxiiOverviewpdfTrust me Im Lying  https://wwwamazoncom/TrustMeLyingConfessionsManipulator/dp/1591846285LikeWar: The Weaponization of Social Mediahttps://wwwamazoncom/LikeWarWeaponizationPWSinger/dp/1328695743How to Lose the information War: Nina Jankowiczhttps://aco/d/08YE6l6UThe DemonHaunted World: Science as a Candle in the Dark: Carl Saganhttps://aco/d/01C7dhRb

Phoenix Cast


DISARM with Dr Pablo Breuer

Phoenix Cast Episode Details

DISARM with Dr Pablo Breuer : In this episode of Phoenix Cast, hosts John, Rich and Kyle are joined by Dr Pablo Breuer and they discuss the DISARM frameworkShare your thoughts with us on Twitter: USMCTFPhoenix Now verified Follow MARFORCYBER, MCCYWG, & MCCOG on Twitter, LinkedIn, Facebook, and YouTube Leave your review on Apple PodcastsLinks:DISARM website https://wwwdisarmfoundation/frameworkBlackHat talk https://wwwyoutubecom/watchvtrxzyEfG8cY&t6s&ppygUVYmxhY2toYXQgcGFibG8gYnJldWVySTIX/TAXI https://wwwfirstorg/resources/papers/munich2016/wunderstixtaxiiOverviewpdfTrust me Im Lying https://wwwamazoncom/TrustMeLyingConfessionsManipulator/dp/1591846285LikeWar: The Weaponization of Social Mediahttps://wwwamazoncom/LikeWarWeaponizationPWSinger/dp/1328695743How to Lose the information War: Nina Jankowiczhttps://aco/d/08YE6l6UThe DemonHaunted World: Science as a Candle in the Dark: Carl Saganhttps://aco/d/01C7dhRb