Look for any podcast host, guest or anyone
Showing episodes and shows of

Mathy Vanhoef

Shows

Cyber BriefingCyber BriefingJanuary 17, 2025 - Cyber Briefing 👉 What are the latest cybersecurity alerts, incidents, and news? 🚨 #CyberAlerts Star Blizzard Targets WhatsApp Accounts in New Spear-Phishing Campaign Source: Microsoft Threat Intelligence New UEFI Secure Boot Vulnerability Allows Malicious Code Execution Source: David Smolár via ESET Misconfiguration Bypasses Microsoft's NTLMv1 Block in Active Directory Source: Dor Segal via Silverfort Malicious Code Concealed in Images to Deliver Keyloggers and Stealers Source: HP Wolf Security Over 4 Million Systems Exposed to Tunneling Protocol Vulnerabilities Source: Professor Mathy V...2025-01-1709 minCyber BriefingCyber BriefingMay 16, 2024 - Cyber Briefing👉 What's going on in the cyber world today? 🚨 #CyberAlerts Storm-1811 Exploits Quick Assist for Social Engineering Attacks Source: Microsoft Turla Group Uses LunarWeb and LunarMail Backdoors in Diplomatic Missions Source: Filip Jurčacko via ESET Hackers Target Foxit PDF Reader Users for Data Theft Source: Check Point  New Wi-Fi Attack Lets Attackers Connect to Malicious Networks Source: Héloïse Gollier and Mathy Vanhoef Google Patches Third Chrome Zero-Day in a Week Source...2024-05-1608 minCyber BriefingCyber BriefingFebruary 22, 2024 - Cyber Briefing👉 What's going on in the cyber world today? 🚨 #CyberAlerts Google Cloud Run Abused for Banking Trojan Distribution Source : Cisco Talos Intelligence  Wi-Fi Authentication Flaws Endanger Android and Linux Source : Simon Migliano and Mathy Vanhoef via Top10vpn  SSH-Snake Malware Targets SSH Credentials for Lateral Movement Source : Miguel Hernandez via sysdig   Mustang Panda Strikes Asia Using Advanced PlugX Variant Source : Trend Micro Joomla Patches XSS Vulnerabilities for RCE Prevention Source : Joomla  💥 #CyberIncidents Widespread Ce...2024-02-2210 minThinkstScapesThinkstScapesThinkstScapes Research Roundup - Q1 - 2023Smashing Web3 transaction simulations for fun and profitTal Be'ery and Roi Vazan[Blog] [Video]Not what you've signed up for: Compromising Real-World LLM-Integrated Applications with Indirect Prompt InjectionKai Greshake, Sahar Abdelnabi, Shailesh Mishra, Christoph Endres, Thorsten Holz, and Mario Fritz[Paper] [Code] [Demo Website]Using ZK Proofs to Fight DisinformationTrisha Datta and Dan Boneh[Slides] [Video] [Code] [Blog]Crypto Agility and Post-Quantum Cryptography @ GoogleStefan Kölbl, Anvita Pandit, Rafael Misoczki, and Sophie Schmieg[C...2023-05-2622 minCryptography FMCryptography FMEpisode 17: Breaking Wi-Fi With Frame Attacks!Wi-Fi is a pretty central technology to our daily lives, whether at home or at the office. Given that so much sensitive data is regularly exchanged between Wi-Fi devices, a number of standards have been developed to ensure the privacy and authentication of Wi-Fi communications. However, a recent paper shows that every single Wi-Fi network protection standard since 1997, from WEP all the way to WPA3, is exposed to a critical vulnerability that allows the exfiltration of sensitive data. How far does this new attack go? How does it work? And why wasn’t it discovered before? We’ll d...2021-06-0135 minClear To Send: Wireless Network EngineeringClear To Send: Wireless Network EngineeringCTS 263: Wi-Fi Vulnerability – FragAttacksMathy Vanhoef, a well respected Wi-Fi security researcher, has identified a dozen vulnerabilities in the 802.11 protocol called FragAttacks. FragAttacks is short for Fragmentation and Aggregation Attacks. It’s based upon how wireless frames are received and reassembled on a device or access point (AP). Unfortunately, this vulnerability has been present since Wi-Fi existed  and nearly […] The post CTS 263: Wi-Fi Vulnerability – FragAttacks appeared first on Clear To Send.2021-05-1727 minClear To Send PodcastClear To Send PodcastCTS 263: Wi-Fi Vulnerability - FragAttacksMathy Vanhoef, a well respected Wi-Fi security researcher, has identified a dozen vulnerabilities in the 802.11 protocol called FragAttacks. FragAttacks is short for Fragmentation and Aggregation Attacks. It’s based upon how wireless frames are received and reassembled on a device or access point (AP). Unfortunately, this vulnerability has been present since Wi-Fi existed and nearly all wireless devices are vulnerable to FragAttacks. All security methods are impacted, from WEP to WPA3.2021-05-1727 minByteTrax - Tecnología Ciencia GadgetsByteTrax - Tecnología Ciencia GadgetsByteTrax ▴ Tecnología Y Música: Intel • WiFi • Implantes Cerebrales En la nueva emisión de ByteTrax:• Intel anunció una nueva línea de procesadores.• Mathy Vanhoef publicó detalles de los ataques de fragementación en WiFi.• Los implantes cerebrales convierten la escritura imaginaria en texto. En la música:“Bitch” de Meredith Brooks.“On My Way” de Alex Lahey.“Cloud Nine” de Retro Video Club. Síguenos en:Facebook @ENCOM.computadoraswww.encom.com.mx Te recomendamos escuchar los podcasts de Defrag.mx:HotMix – Mixshow de lo mejor de la música HAC, Dance, NuDisco, House y Tran...2021-05-1425 minDEFRAGDEFRAGByteTrax ▴ Tecnología Y Música: Intel • WiFi • Implantes CerebralesEn la nueva emisión de ByteTrax:• Intel anunció una nueva línea de procesadores.• Mathy Vanhoef publicó detalles de los ataques de fragementación en WiFi.• Los implantes cerebrales convierten la escritura imaginaria en texto. En la música:“Bitch” de Meredith Brooks.“On My Way” de Alex Lahey.“Cloud Nine” de Retro Video Club. Síguenos [...] El podcast ByteTrax ▴ Tecnología y Música: Intel • WiFi • Implantes Cerebrales apareció primero en Defrag.mx.2021-05-1425 minPost MortemPost Mortem#2 Dragonblood is still leaking 🇫🇷Wi-Fi Protected Access 3 (WPA3) est destiné à remplacer WPA 2 - en service depuis 2004 - en rendant presque impossible de craquer le mot de passe d'un réseau.  Problème, des chercheurs ont révélé qu'un attaquant peut exploiter des failles dans les implémentations existantes de WPA 3 pour récupérer le mot de passe de la victime.  Dans cet épisode, Mohamed Sabt, maître de conférence à l'université de Rennes 1 enseignant la cybersécurité et chercheur au sein de l'équipe "Sécurité et Cryptographie Embarquées" (EMSEC) nous révèle une toute nouvelle cyberattaque sur...2020-10-1446 minState of CybercrimeState of CybercrimeHacking the Wi-fi of Today & Tomorrow With Mathy VanhoefMathy's Website: https://www.mathyvanhoef.comMathy's YouTube Channel: https://twitter.com/vanhoefmMathy's Paper on Defeating MAC Address Randomization: https://papers.mathyvanhoef.com/asiaccs2016.pdfThis podcast is brought to you by Varonis, if you'd like to learn more check out the Cyber Attack Lab at https://www.varonis.com/cyber-workshop/  Want to join us live? Save a seat here: https://www.varonis.com/state-of-cybercrimeMore from Varonis ⬇️ Visit our website: https://www.varonis.comLinkedIn: https://www.linkedin.com/company/varoni...2020-03-041h 06De Grote Tech Show | BNRDe Grote Tech Show | BNRStandaarden voor Internet of Things: goed idee?Mede mogelijk gemaakt door: Orange Cyberdefense Crypto-believer Huis en haard verkopen.... en omzetten in cryptovaluta. Dat doen alleen mensen die écht een rotsvast vertrouwen hebben in de toekomst van crypto. Didi Taihuttu is zo'n persoon... hij verkocht onder andere zijn huis en andere bezittingen en woont nu - met zijn gezin - op een camping in Venlo. Lek in WPA2 Nadat eerder bluetooth al een lek bleek te bevatten, was deze week WiFi aan de beurt. Het WPA2-protocol - dat een veilige WiFi-verbinding moet garanderen - blijkt een lek t...2017-10-1820 minBSD NowBSD Now182: Bloaty McBloatfaceThis week on the show, we’ve got FreeBSD quarterly Status reports to discuss, OpenBSD changes to the installer, EC2 and IPv6 and more. Stay This episode was brought to you by Headlines OpenBSD changes of note 6 OpenBSD can now be cross built with clang. Work on this continues Build ld.so with -fno-builtin because otherwise clang would optimize the local versions of functions like _dl_memset into a call to memset, which doesn’t exist. Add connection timeout for ftp (http). Mostly for the installer so it can...2017-02-221h 06