podcast
details
.com
Print
Share
Look for any podcast host, guest or anyone
Search
Showing episodes and shows of
Mathy Vanhoef
Shows
Cyber Briefing
January 17, 2025 - Cyber Briefing
👉 What are the latest cybersecurity alerts, incidents, and news? 🚨 #CyberAlerts Star Blizzard Targets WhatsApp Accounts in New Spear-Phishing Campaign Source: Microsoft Threat Intelligence New UEFI Secure Boot Vulnerability Allows Malicious Code Execution Source: David Smolár via ESET Misconfiguration Bypasses Microsoft's NTLMv1 Block in Active Directory Source: Dor Segal via Silverfort Malicious Code Concealed in Images to Deliver Keyloggers and Stealers Source: HP Wolf Security Over 4 Million Systems Exposed to Tunneling Protocol Vulnerabilities Source: Professor Mathy V...
2025-01-17
09 min
Cyber Briefing
May 16, 2024 - Cyber Briefing
👉 What's going on in the cyber world today? 🚨 #CyberAlerts Storm-1811 Exploits Quick Assist for Social Engineering Attacks Source: Microsoft Turla Group Uses LunarWeb and LunarMail Backdoors in Diplomatic Missions Source: Filip Jurčacko via ESET Hackers Target Foxit PDF Reader Users for Data Theft Source: Check Point New Wi-Fi Attack Lets Attackers Connect to Malicious Networks Source: Héloïse Gollier and Mathy Vanhoef Google Patches Third Chrome Zero-Day in a Week Source...
2024-05-16
08 min
Cyber Briefing
February 22, 2024 - Cyber Briefing
👉 What's going on in the cyber world today? 🚨 #CyberAlerts Google Cloud Run Abused for Banking Trojan Distribution Source : Cisco Talos Intelligence Wi-Fi Authentication Flaws Endanger Android and Linux Source : Simon Migliano and Mathy Vanhoef via Top10vpn SSH-Snake Malware Targets SSH Credentials for Lateral Movement Source : Miguel Hernandez via sysdig  Mustang Panda Strikes Asia Using Advanced PlugX Variant Source : Trend Micro Joomla Patches XSS Vulnerabilities for RCE Prevention Source : Joomla 💥 #CyberIncidents Widespread Ce...
2024-02-22
10 min
ThinkstScapes
ThinkstScapes Research Roundup - Q1 - 2023
Smashing Web3 transaction simulations for fun and profitTal Be'ery and Roi Vazan[Blog] [Video]Not what you've signed up for: Compromising Real-World LLM-Integrated Applications with Indirect Prompt InjectionKai Greshake, Sahar Abdelnabi, Shailesh Mishra, Christoph Endres, Thorsten Holz, and Mario Fritz[Paper] [Code] [Demo Website]Using ZK Proofs to Fight DisinformationTrisha Datta and Dan Boneh[Slides] [Video] [Code] [Blog]Crypto Agility and Post-Quantum Cryptography @ GoogleStefan Kölbl, Anvita Pandit, Rafael Misoczki, and Sophie Schmieg[C...
2023-05-26
22 min
Cryptography FM
Episode 17: Breaking Wi-Fi With Frame Attacks!
Wi-Fi is a pretty central technology to our daily lives, whether at home or at the office. Given that so much sensitive data is regularly exchanged between Wi-Fi devices, a number of standards have been developed to ensure the privacy and authentication of Wi-Fi communications. However, a recent paper shows that every single Wi-Fi network protection standard since 1997, from WEP all the way to WPA3, is exposed to a critical vulnerability that allows the exfiltration of sensitive data. How far does this new attack go? How does it work? And why wasn’t it discovered before? We’ll d...
2021-06-01
35 min
Clear To Send: Wireless Network Engineering
CTS 263: Wi-Fi Vulnerability – FragAttacks
Mathy Vanhoef, a well respected Wi-Fi security researcher, has identified a dozen vulnerabilities in the 802.11 protocol called FragAttacks. FragAttacks is short for Fragmentation and Aggregation Attacks. It’s based upon how wireless frames are received and reassembled on a device or access point (AP). Unfortunately, this vulnerability has been present since Wi-Fi existed and nearly […] The post CTS 263: Wi-Fi Vulnerability – FragAttacks appeared first on Clear To Send.
2021-05-17
27 min
Clear To Send Podcast
CTS 263: Wi-Fi Vulnerability - FragAttacks
Mathy Vanhoef, a well respected Wi-Fi security researcher, has identified a dozen vulnerabilities in the 802.11 protocol called FragAttacks. FragAttacks is short for Fragmentation and Aggregation Attacks. It’s based upon how wireless frames are received and reassembled on a device or access point (AP). Unfortunately, this vulnerability has been present since Wi-Fi existed and nearly all wireless devices are vulnerable to FragAttacks. All security methods are impacted, from WEP to WPA3.
2021-05-17
27 min
ByteTrax - TecnologĂa Ciencia Gadgets
ByteTrax â–´ TecnologĂa Y MĂşsica: Intel • WiFi • Implantes Cerebrales
En la nueva emisiĂłn de ByteTrax:• Intel anunciĂł una nueva lĂnea de procesadores.• Mathy Vanhoef publicĂł detalles de los ataques de fragementaciĂłn en WiFi.• Los implantes cerebrales convierten la escritura imaginaria en texto. En la mĂşsica:“Bitch” de Meredith Brooks.“On My Way” de Alex Lahey.“Cloud Nine” de Retro Video Club. SĂguenos en:Facebook @ENCOM.computadoraswww.encom.com.mx Te recomendamos escuchar los podcasts de Defrag.mx:HotMix – Mixshow de lo mejor de la mĂşsica HAC, Dance, NuDisco, House y Tran...
2021-05-14
25 min
DEFRAG
ByteTrax â–´ TecnologĂa Y MĂşsica: Intel • WiFi • Implantes Cerebrales
En la nueva emisiĂłn de ByteTrax:• Intel anunciĂł una nueva lĂnea de procesadores.• Mathy Vanhoef publicĂł detalles de los ataques de fragementaciĂłn en WiFi.• Los implantes cerebrales convierten la escritura imaginaria en texto. En la mĂşsica:“Bitch” de Meredith Brooks.“On My Way” de Alex Lahey.“Cloud Nine” de Retro Video Club. SĂguenos [...] El podcast ByteTrax â–´ TecnologĂa y MĂşsica: Intel • WiFi • Implantes Cerebrales apareciĂł primero en Defrag.mx.
2021-05-14
25 min
Post Mortem
#2 Dragonblood is still leaking 🇫🇷
Wi-Fi Protected Access 3 (WPA3) est destiné à remplacer WPA 2 - en service depuis 2004 - en rendant presque impossible de craquer le mot de passe d'un réseau. Problème, des chercheurs ont révélé qu'un attaquant peut exploiter des failles dans les implémentations existantes de WPA 3 pour récupérer le mot de passe de la victime. Dans cet épisode, Mohamed Sabt, maître de conférence à l'université de Rennes 1 enseignant la cybersécurité et chercheur au sein de l'équipe "Sécurité et Cryptographie Embarquées" (EMSEC) nous révèle une toute nouvelle cyberattaque sur...
2020-10-14
46 min
State of Cybercrime
Hacking the Wi-fi of Today & Tomorrow With Mathy Vanhoef
Mathy's Website: https://www.mathyvanhoef.comMathy's YouTube Channel: https://twitter.com/vanhoefmMathy's Paper on Defeating MAC Address Randomization: https://papers.mathyvanhoef.com/asiaccs2016.pdfThis podcast is brought to you by Varonis, if you'd like to learn more check out the Cyber Attack Lab at https://www.varonis.com/cyber-workshop/ Want to join us live? Save a seat here: https://www.varonis.com/state-of-cybercrimeMore from Varonis ⬇️ Visit our website: https://www.varonis.comLinkedIn: https://www.linkedin.com/company/varoni...
2020-03-04
1h 06
De Grote Tech Show | BNR
Standaarden voor Internet of Things: goed idee?
Mede mogelijk gemaakt door: Orange Cyberdefense Crypto-believer Huis en haard verkopen.... en omzetten in cryptovaluta. Dat doen alleen mensen die écht een rotsvast vertrouwen hebben in de toekomst van crypto. Didi Taihuttu is zo'n persoon... hij verkocht onder andere zijn huis en andere bezittingen en woont nu - met zijn gezin - op een camping in Venlo. Lek in WPA2 Nadat eerder bluetooth al een lek bleek te bevatten, was deze week WiFi aan de beurt. Het WPA2-protocol - dat een veilige WiFi-verbinding moet garanderen - blijkt een lek t...
2017-10-18
20 min
BSD Now
182: Bloaty McBloatface
This week on the show, we’ve got FreeBSD quarterly Status reports to discuss, OpenBSD changes to the installer, EC2 and IPv6 and more. Stay This episode was brought to you by Headlines OpenBSD changes of note 6 OpenBSD can now be cross built with clang. Work on this continues Build ld.so with -fno-builtin because otherwise clang would optimize the local versions of functions like _dl_memset into a call to memset, which doesn’t exist. Add connection timeout for ftp (http). Mostly for the installer so it can...
2017-02-22
1h 06