Look for any podcast host, guest or anyone
Showing episodes and shows of

Www.blackhat.com

Shows

Security Cryptography WhateverSecurity Cryptography WhateverVegas, Baby!We’re throwing a party in Vegas! Someone called it SCWPodCon last year, and the name stuck. It’s sponsored by Teleport, the infrastructure identity company. Get SSO for SSH! If Thomas was here, I’m sure he’d tell you that Fly.io uses Teleport internally. Oh also there's some thing called Black..pill? Black Pool? Something like that happening in Vegas, with crypto talks, so we chatted about them a bit, plus some other stuffSCWPodCon 2025: https://securitycryptographywhatever.com/events/blackhatTranscript: https://securitycryptographywhatever.com/2025/07/29/vegas-baby/Links:- Fault Injectio...2025-07-291h 00Destination LinuxDestination Linux429: Open Source AI, End of Clear Linux, & the Security Scoop with Sandflyvideo: https://youtu.be/abgTchtrH0k On this episode of Destination Linux, we are joined by security expert Craig Rowland returns for the “Sandfly Security Scoop,” explaining how the stealthy BPFdoor back‑door evades firewalls and sharing tips for DEF CON and Black Hat attendees. We also unpack listener feedback about phone‑addiction myths and mindful smartphone use. Then we discuss Moonshot’s open‑source Kimi AI model that tackles two‑million‑character prompts and beats proprietary LLM benchmarks, sparking a wider chat about open AI guardrails and Linux’s role under the hood. Later, there's some bittersweet news t...2025-07-281h 14BrakeSec Education PodcastBrakeSec Education PodcastJay Beale discusses his K8s class at BlackHat, Kubernetes developments, and mental healthYoutube Video at: https://www.youtube.com/watch?v=yHPvGVfPgjI   Jay Beale is a principal security consultant and CEO/CTO for InGuardians. He is the architect of multiple open source projects, including the Peirates attack tool for Kubernetes (in Kali Linux), the Bustakube CTF Kubernetes cluster, and Bastille Linux. Jay created and leads the Kubernetes CTF at DEF CON and previously helped in the Kubernetes project's Security efforts. He’s co-written eight books and given many public talks at Black Hat, DEF CON, RSA, CanSecWest, Blue Hat, ToorCon, DerbyCon, WWHF, HushCon and others. He tea...2025-07-171h 48Junk FilterJunk FilterTEASER - 201: Michael Mann: Blackhat (with James Slaymaker)Access this entire 70-minute episode (and additional monthly bonus shows) by becoming a Junk Filter patron for only $5.00 (US) a month! Over 30% of episodes are exclusively available to patrons of the show. ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ https://www.patreon.com/posts/201-michael-mann-122785625James Slaymaker, the author of Time is Luck: The Cinema of Michael Mann, returns to the podcast for a show about Mann’s much-maligned 2015 techno-thriller starring Chris Hemsworth as a blackhat hacker named Hathaway, granted release from prison by the FBI in a secret mission between American and Chinese police to track down the leader of an international cybercrime terror...2025-02-2105 minOn Location With Sean Martin And Marco CiappelliOn Location With Sean Martin And Marco CiappelliBlack Hat Announces Content Lineup for Black Hat Europe 2024 | 2 Minutes on ITSPmagazineBlack Hat, the cybersecurity industry’s most established and in-depth security event series, today announced the release of its content lineup for Black Hat Europe 2024. The live, in-person event will take place at the ExCeL London from December 9 to December 12, and feature 41 Briefings hand selected by the Black Hat Europe Review Board, four days of Trainings, 25 Sponsored Sessions, and 64 in-person tool demos and three labs at Black Hat Arsenal.Briefings highlights include:● SpAIware & More: Advanced Prompt Injection Exploits in LLM Applications● SysBumps: Exploiting Speculative Execution in System Calls for Breaking KASLR in macOS for Ap...2024-11-2001 minRedefining CyberSecurityRedefining CyberSecurityBlack Hat Announces Content Lineup for Black Hat Europe 2024 | 2 Minutes on ITSPmagazineBlack Hat, the cybersecurity industry’s most established and in-depth security event series, today announced the release of its content lineup for Black Hat Europe 2024. The live, in-person event will take place at the ExCeL London from December 9 to December 12, and feature 41 Briefings hand selected by the Black Hat Europe Review Board, four days of Trainings, 25 Sponsored Sessions, and 64 in-person tool demos and three labs at Black Hat Arsenal.Briefings highlights include:● SpAIware & More: Advanced Prompt Injection Exploits in LLM Applications● SysBumps: Exploiting Speculative Execution in System Calls for Breaking KASLR in macOS for Ap...2024-11-1901 minITSPmagazine PodcastsITSPmagazine PodcastsBlack Hat Announces Content Lineup for Black Hat Europe 2024 | 2 Minutes on ITSPmagazineBlack Hat, the cybersecurity industry’s most established and in-depth security event series, today announced the release of its content lineup for Black Hat Europe 2024. The live, in-person event will take place at the ExCeL London from December 9 to December 12, and feature 41 Briefings hand selected by the Black Hat Europe Review Board, four days of Trainings, 25 Sponsored Sessions, and 64 in-person tool demos and three labs at Black Hat Arsenal.Briefings highlights include:● SpAIware & More: Advanced Prompt Injection Exploits in LLM Applications● SysBumps: Exploiting Speculative Execution in System Calls for Breaking KASLR in macOS for Ap...2024-11-1901 minBrand Stories PodcastsBrand Stories PodcastsBlack Hat Announces Content Lineup for Black Hat Europe 2024 | 2 Minutes on ITSPmagazineBlack Hat, the cybersecurity industry’s most established and in-depth security event series, today announced the release of its content lineup for Black Hat Europe 2024. The live, in-person event will take place at the ExCeL London from December 9 to December 12, and feature 41 Briefings hand selected by the Black Hat Europe Review Board, four days of Trainings, 25 Sponsored Sessions, and 64 in-person tool demos and three labs at Black Hat Arsenal.Briefings highlights include:● SpAIware & More: Advanced Prompt Injection Exploits in LLM Applications● SysBumps: Exploiting Speculative Execution in System Calls for Breaking KASLR in macOS for Ap...2024-11-1901 minITSPmagazine PodcastsITSPmagazine PodcastsA New People-Centric Approach to Determining an Organization's Exposure to a Third-Party Data Breach | A SecTor Cybersecurity Conference Toronto 2024 Conversation withChristine Dewhurst and Dr. Thomas Lee | On Location CoverageGuests:Christine Dewhurst, Partner, NSC TechOn LinkedIn | https://www.linkedin.com/in/christine-dewhurst-262867a9/At Sector | https://www.blackhat.com/sector/2024/briefings/schedule/speakers.html#christine-dewhurst-48706Dr. Thomas Lee, CEO, Vivo SecurityOn LinkedIn | https://www.linkedin.com/in/thomas-lee-phd-b7766b10/At Sector | https://www.blackhat.com/sector/2024/briefings/schedule/speakers.html#dr-thomas-lee-48707____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, C...2024-11-0926 minRedefining CyberSecurityRedefining CyberSecurityA New People-Centric Approach to Determining an Organization's Exposure to a Third-Party Data Breach | A SecTor Cybersecurity Conference Toronto 2024 Conversation withChristine Dewhurst and Dr. Thomas Lee | On Location CoverageGuests:Christine Dewhurst, Partner, NSC TechOn LinkedIn | https://www.linkedin.com/in/christine-dewhurst-262867a9/At Sector | https://www.blackhat.com/sector/2024/briefings/schedule/speakers.html#christine-dewhurst-48706Dr. Thomas Lee, CEO, Vivo SecurityOn LinkedIn | https://www.linkedin.com/in/thomas-lee-phd-b7766b10/At Sector | https://www.blackhat.com/sector/2024/briefings/schedule/speakers.html#dr-thomas-lee-48707____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, C...2024-11-0926 minOn Location With Sean Martin And Marco CiappelliOn Location With Sean Martin And Marco CiappelliA New People-Centric Approach to Determining an Organization's Exposure to a Third-Party Data Breach | A SecTor Cybersecurity Conference Toronto 2024 Conversation with Christine Dewhurst and Dr. Thomas Lee | On Location CoverageGuests:Christine Dewhurst, Partner, NSC TechOn LinkedIn | https://www.linkedin.com/in/christine-dewhurst-262867a9/At Sector | https://www.blackhat.com/sector/2024/briefings/schedule/speakers.html#christine-dewhurst-48706Dr. Thomas Lee, CEO, Vivo SecurityOn LinkedIn | https://www.linkedin.com/in/thomas-lee-phd-b7766b10/At Sector | https://www.blackhat.com/sector/2024/briefings/schedule/speakers.html#dr-thomas-lee-48707____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, C...2024-11-0926 minHackers to FoundersHackers to FoundersEp.0 - Chris "REal0day" MagistradoWelcome to the 0 episode of "Hackers to Founders"! Join Chris Magistrado, aka REal0day, as he dives into his unique journey from gaming glitches to becoming a cybersecurity expert, business enthusiast, and podcast host. In this inaugural episode, Chris self-interviews, sharing personal stories, career advice, and essential insights for aspiring cybersecurity professionals.Connect with Us:Twitter - https://x.com/HackerToFounderInstagram - https://instagram.com/hackerstofoundersTikTok -- https://www.tiktok.com/@hackerstofoundersLinkedIn - https://www.linkedin.com/showcase/105189100Discord - https://discord.gg/2TnH6hkuTGWebsite - https...2024-10-031h 05CyberBytes: The PodcastCyberBytes: The PodcastBlackHat 2024: Winning the RSA Sandbox: 1 Year On - Chris Sestito, HiddenLayer24 incredible leaders from across the cybersecurity ecosystem joined us for our BlackHat 2024 Edition of CyberBytes: The Podcast, and we wrap this year's series up with a bang. Chris Sestito, CEO and Co-founder of AI security vendor, HiddenLayer, joined Oliver Legg for a re-run following our episode at last year's BlackHat. Why? Because HiddenLayer have gone from strength to strength Winning the 2023 RSA Sandbox, a major Microsoft announcement and being named the ML Security Leader by CB Insights have all aided with CISO’s permission to buy and helped land major enterprise wins this past year. Tito and Olly discussed: • Life...2024-09-1716 minCyberBytes: The PodcastCyberBytes: The PodcastBlackHat 2024: 30 Year Problem in the Making - Dov Yoran, Command ZeroIn today’s episode, we welcome Dov Yoran, CEO & Co-Founder at Command Zero on the 2024 BlackHat Edition of CyberBytes. Command Zero recently came out of stealth mode after 2 years with a Seed raise led by a16z to solve the ‘Last Mile’ of Security Operations. Steffen Foley from Aspiron Search sat down with Dov and dug into:  Dov’s background and building a start-up with his brothers The problem Command Zero solves - a better quality of life for SOC folks Command Zero’s initial vision and how it’s evolved...2024-09-1222 minCyberBytes: The PodcastCyberBytes: The PodcastBlackHat 2024: Managing Risk to Become Hyper Growth - Roy Fridman, C2A SecurityIt was a pleasure to welcome Roy Fridman, CEO of C2A Security, on to the 2024 BlackHat Edition of CyberBytes.  C2A Security are a Series-A product security company who specialize in DevSecOps that focuses on the needs of automotive companies to evaluate the risk.  During this episode Ben and Roy discussed:  His background in the Israeli air force which led to becoming an engineer for many years and now leading C2A as a selected CEO of the business. Current plans on imminent funding that will begin the business’ journey to be...2024-09-1019 minCyberBytes: The PodcastCyberBytes: The PodcastBlackHat 2024: Feeling the Pain to Solving the Problem - Nick Sorenson, WhisticIt was great to welcome Nick Sorenson, CEO at Whisitic, to the BlackHat 2024 Edition of CyberBytes: The Podcast.  Whistic is a leading AI-first Third Party Risk Management vendor with an innovative approach to changing the ways that companies publish and evaluate security.  In the episode Steffen and Nick discussed:  Nick’s journey into the cybersecurity industry and landing his position as CEO at Whistic.  Whistic’s unique differentiator and how it allows them to drive innovation within the sector. What is Third Party Risk Management The biggest challeng...2024-09-0915 minCyberBytes: The PodcastCyberBytes: The PodcastBlackHat 2024: Strengthening Mobile App Security in a Changing Landscape - Alan Snyder, NowSecureIt was a pleasure to welcome Alan Snyder, CEO of NowSecure on to the BlackHat Edition of CyberBytes: The Podcast.  Alan has been at the helm of mobile application security vendor, NowSecure, for the past 7 years. We talk through his journey of other start-ups that led to NowSecure: How a full mobile app security suite fills the gap in a pure platform  How the age and generation of users is determining the risk of mobile apps  How the recent CrowdStrike outage has helped elevate customer awareness of their security beyond just des...2024-09-0618 minCyberBytes: The PodcastCyberBytes: The PodcastBlackHat 2024: $200M ARR & Beyond! - Nadir Izrael, ArmisIt was a pleasure to welcome Nadir Izrael Co-Founder and CTO of Armis, on to the 2024 BlackHat Edition of CyberBytes.  Armis are the leading intelligence company who protect organizations in all verticals specializing in Threat Intelligence, OT / ICS & IoT. During this episode Ben and Nadir discussed:  The announcement of the business achieving $200M in ARR. Recent acquisitions of both CTCI & Silk security to bolster the portfolio  Why having a proactive stance is important in Cyber Security.  How Armis is leveraging AI and the development this will have in t...2024-09-0526 minCyberBytes: The PodcastCyberBytes: The PodcastBlackHat 2024: The Future of Modern SOC - Tony Aurigemma, AnomaliIt was a pleasure to welcome Tony Aurigemma, CRO at Anomali, to the 2024 BlackHat Edition of CyberBytes.  Anomali is a leading Security Operations Platform powered by AI. Steffen Foley from Aspiron Search sat down with Tony and dug into:  Tony’s background in to security starting early 2000s and 11 years at IBM How accumulating different skills allowed him to be a successful sales leader The problem Anomali solves and what makes them unique  How they were 947x faster on queries for a Financial Services client Anoma...2024-08-2918 minCyberBytes: The PodcastCyberBytes: The PodcastBlackHat 2024: How The Shopify Idea Transformed Huntress - Chris Bisnett, HuntressIt was a pleasure to welcome Chris Bisnett CTO & Co-Founder of Huntress, on to the 2024 BlackHat Edition of CyberBytes.  Huntress is a leading managed security platform who focus on protecting Endpoints, Identities and Employees with a focus on custom-built for SMB’s to constantly manage and develop their internal security.  During this episode Ben and Chris discussed:  A background in the Navy, leading an Engineering team to finally cracking the Cybersecurity space with Huntress and becoming a co-founder.  A brand new SIEM product that has helped develop their current product stack ...2024-08-2717 minCyberBytes: The PodcastCyberBytes: The PodcastBlackHat 2024: Don’t Click It, Pitch It - Steve Garrison, SVP of MarketingIn today’s episode of CyberBytes: The Podcast BlackHat 2024 Edition we had the pleasure of welcoming Steve Garrison, SVP of Marketing at Stellar Cyber.  Stellar Cyber’s automation-powered Security Operations Platform simplifies cybersecurity, enabling lean security teams of all skill levels to effectively protect their environments. In this episode we discuss: Steve’s transition from physicist to Senior VP of Marketing How Stellar Cyber's unique approach drives customer success Why there is no real AI in the market today The value of a strong, adaptable marketing team that ch...2024-08-2617 minCyberBytes: The PodcastCyberBytes: The PodcastBlackHat 2024: The Long Tail Consequences of Cyber Security Law - Andy Lunsford, BreachRXIt was a pleasure to welcome Andy Lundsford CEO & Co-Founder of BreachRX, on to the 2024 BlackHat Edition of CyberBytes.  BreachRX are a seed stage vendor who have an Incident Response platform that offers end-to-end guidance throughout a Cyber incident to all internal teams.  During this episode Ben and Andy discussed:  His Data litigation and Cyber Law career in the 2000’s that led to him founding BreachRX due to the long tail consequences of incidents. The strict AI laws in America that will make the need for Incident Response even stronger… How b...2024-08-2117 minManhãs em Cibersegurança 🛡️Manhãs em Cibersegurança 🛡️0x03 - CNCS partilha as Boas Práticas para o uso seguro de smartphones Utilizadores da Chequia Alvo de Nova Campanha de Espionagem https://thehackernews.com/2024/08/czech-mobile-users-targeted-in-new.html Novo Risco de Segurança no Windows Relacionado com 'Downdates' https://www.blackhat.com/us-24/briefings/schedule/index.html#windows-downdate-downgrade-attacks-using-windows-updates-38963 https://i.blackhat.com/BH-US-24/Presentations/REVISED_US24-Leviev-Windows-Downdate-Downgrade-Attacks-Using-Windows-Updates-Wednesday.pdf Microsoft Implementa MFA Obrigatório por Etapas para Utilizadores do Azure https://www.crn.com/news/security/2024/microsoft-details-phased-mandatory-mfa-rollout-for-azure-users Microchip Technology Divulga Ataque com Impacto nas suas Operações https://www.bleepingcomputer.com/news/security/microchip-technology-discloses-cyberattack-impacting-operations/ ...2024-08-2105 minCyberBytes: The PodcastCyberBytes: The PodcastBlackHat 2024: Solving API Security - Jonathan DiVincenzo, Impart SecurityIt was awesome to sit down with Jonathan DiVincenzo, CEO & Co-Founder of Impart Security, on the 2024 BlackHat Edition of CyberBytes. Impart Security is an API Security Platform founded by ex-Signal Sciences folks, Jonathan, Brian, and Marc.  Steffen Foley from Aspiron Search sat down with Jonathan and discussed:  Jonathan’s background including multiple successful exits What motivated him to co-found Impart Security The initial vision for Impart and how it evolved Some of the biggest challenges they faced in the early days and how they overcame them Wh...2024-08-2020 minCyberBytes: The PodcastCyberBytes: The PodcastBlackHat 2024: The Retro Polar Bear of Runtime Security - Brooke Motta, RAD SecurityIt was a pleasure to welcome Brooke Motta, CEO & Co-founder of RAD Security, on to the 2024 BlackHat Edition of CyberBytes. RAD is the only security vendor to have been finalists of both the 2024 RSA Innovation Sandbox, and the BlackHat Startup Spotlight Competition, which is a huge kudos to the product and team. Oliver Legg from Aspiron Search sat down with Brooke and dug into:How a 3-hour hike in Arizona led to joining forces with Co-founder, Jimmy Mester, to found K8 security vendor, KSOCThe retro rebrand to RAD Security with the sunglasses wearing polar be...2024-08-1617 minCyberBytes: The PodcastCyberBytes: The PodcastBlackHat 2024: Protecting Critical Infrastructure with Benny Czarny from OPSWATIt was a pleasure to welcome Benny Czarny, CEO & Founder of OPSWAT, on to the 2024 BlackHat Edition of CyberBytes. OPSWAT are a leading Cyber Security vendor who were bootstrapped many years ago and focus on protecting critical infrastructure across all areas of Cyber. During this episode Ben and Benny discussed: The recent acquisition of InQuest which will help OPSWAT develop their robust Threat Intelligence solution and allow further growth in the DoD Space.Benny’s background in Engineering and all that time knowing he wanted to be a founder in Cyber Security and being able...2024-08-1426 minCyberBytes: The PodcastCyberBytes: The PodcastBlackHat 2024: Finding the Medium with Jay Leek from SYN VenturesKicking off CyberBytes: The Podcast BlackHat 2024 special edition with an absolute beast of a guest, Jay Leek, Managing Partner & Co-Founder at SYN Ventures. SYN Ventures is a venture capital firm primarily pursuing early-stage security sector opportunities run by security operators with decades of experience.In this episode, we cover:Jay’s fascinating career from security operator to early-stage Cyber VCThe real challenges for a CISOStarting SYN Ventures, the largest dedicated security seed fund and what differentiates SYNJay’s investment thesis and meeting 550 security companies a yearAdvice to founders and the future of Cyber VC and SYN...2024-08-1323 minPEBCAK Podcast: Information Security News by Some All Around Good PeoplePEBCAK Podcast: Information Security News by Some All Around Good PeopleEpisode 173 - Live From Blackhat 2024 and DEFCON 32, Hotel Check-In Tips, Lyft Driver's Side Gig, Bourbon Tasting, Desert Attire Welcome to this week's episode of the PEBCAK Podcast!  We’ve got four amazing stories this week so sit back, relax, and keep being awesome!  Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast   Live from Blackhat 2024 and DEFCON 32!   Checkpoint acquired Zone Alarm https://www.computerworld.com/article/1325524/check-point-software-buying-firewall-vendor-zone-labs.html   Intel CEO prays on Twitter https://www.christianpost.com/news/intel-ceo-draws-mixed-reactions-for-posting-bible-verse.html   Dad Joke of the Week (DJOW)   Please sh...2024-08-121h 12On Location With Sean Martin And Marco CiappelliOn Location With Sean Martin And Marco CiappelliReconstructing the Organizational and Social Structure of a Ransomware Gang | A Black Hat USA 2024 Conversation with L Jean Camp and Dalya Manatova | On Location Coverage with Sean Martin and Marco CiappelliGuests: L Jean Camp, Professor, Luddy School of Computing, Informatics, and Engineering, Indiana University [@IUBloomington]On LinkedIn | https://www.linkedin.com/in/ljean/At BlackHat | https://www.blackhat.com/us-24/briefings/schedule/speakers.html#l-jean-camp-37968Dalya Manatova, Associate Instructor/Ph.D. Student, Luddy School of Computing, Informatics, and Engineering, Indiana University [@IUBloomington]On LinkedIn | https://www.linkedin.com/in/dalyapraz/At BlackHat | https://www.blackhat.com/us-24/briefings/schedule/speakers.html#dalya-manatova-48133____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of...2024-08-0123 minRedefining Society and Technology PodcastRedefining Society and Technology PodcastReconstructing the Organizational and Social Structure of a Ransomware Gang | A Black Hat USA 2024 Conversation with L Jean Camp and Dalya Manatova | On Location Coverage with Sean Martin and Marco CiappelliGuests: L Jean Camp, Professor, Luddy School of Computing, Informatics, and Engineering, Indiana University [@IUBloomington]On LinkedIn | https://www.linkedin.com/in/ljean/At BlackHat | https://www.blackhat.com/us-24/briefings/schedule/speakers.html#l-jean-camp-37968Dalya Manatova, Associate Instructor/Ph.D. Student, Luddy School of Computing, Informatics, and Engineering, Indiana University [@IUBloomington]On LinkedIn | https://www.linkedin.com/in/dalyapraz/At BlackHat | https://www.blackhat.com/us-24/briefings/schedule/speakers.html#dalya-manatova-48133____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of...2024-08-0123 minITSPmagazine PodcastsITSPmagazine PodcastsReconstructing the Organizational and Social Structure of a Ransomware Gang | A Black Hat USA 2024 Conversation with L Jean Camp and Dalya Manatova | On Location Coverage with Sean Martin and Marco CiappelliGuests: L Jean Camp, Professor, Luddy School of Computing, Informatics, and Engineering, Indiana University [@IUBloomington]On LinkedIn | https://www.linkedin.com/in/ljean/At BlackHat | https://www.blackhat.com/us-24/briefings/schedule/speakers.html#l-jean-camp-37968Dalya Manatova, Associate Instructor/Ph.D. Student, Luddy School of Computing, Informatics, and Engineering, Indiana University [@IUBloomington]On LinkedIn | https://www.linkedin.com/in/dalyapraz/At BlackHat | https://www.blackhat.com/us-24/briefings/schedule/speakers.html#dalya-manatova-48133____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of...2024-08-0123 minRedefining CyberSecurityRedefining CyberSecurityReconstructing the Organizational and Social Structure of a Ransomware Gang | A Black Hat USA 2024 Conversation with L Jean Camp and Dalya Manatova | On Location Coverage with Sean Martin and Marco CiappelliGuests: L Jean Camp, Professor, Luddy School of Computing, Informatics, and Engineering, Indiana University [@IUBloomington]On LinkedIn | https://www.linkedin.com/in/ljean/At BlackHat | https://www.blackhat.com/us-24/briefings/schedule/speakers.html#l-jean-camp-37968Dalya Manatova, Associate Instructor/Ph.D. Student, Luddy School of Computing, Informatics, and Engineering, Indiana University [@IUBloomington]On LinkedIn | https://www.linkedin.com/in/dalyapraz/At BlackHat | https://www.blackhat.com/us-24/briefings/schedule/speakers.html#dalya-manatova-48133____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of...2024-08-0123 minOn Location With Sean Martin And Marco CiappelliOn Location With Sean Martin And Marco CiappelliDeep Backdoors in Deep Reinforcement Learning Agents | A Black Hat USA 2024 Conversation with Vas Mavroudis and Jamie Gawith | On Location Coverage with Sean Martin and Marco CiappelliGuests: Vas Mavroudis, Principal Research Scientist, The Alan Turing InstituteWebsite | https://mavroud.is/At BlackHat | https://www.blackhat.com/us-24/briefings/schedule/speakers.html#vasilios-mavroudis-34757Jamie Gawith, Assistant Professor of Electrical Engineering, University of BathOn LinkedIn | https://www.linkedin.com/in/jamie-gawith-63560b60/At BlackHat | https://www.blackhat.com/us-24/briefings/schedule/speakers.html#jamie-gawith-48261____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martin...2024-08-0124 minRedefining CyberSecurityRedefining CyberSecurityDeep Backdoors in Deep Reinforcement Learning Agents | A Black Hat USA 2024 Conversation with Vas Mavroudis and Jamie Gawith | On Location Coverage with Sean Martin and Marco CiappelliGuests: Vas Mavroudis, Principal Research Scientist, The Alan Turing InstituteWebsite | https://mavroud.is/At BlackHat | https://www.blackhat.com/us-24/briefings/schedule/speakers.html#vasilios-mavroudis-34757Jamie Gawith, Assistant Professor of Electrical Engineering, University of BathOn LinkedIn | https://www.linkedin.com/in/jamie-gawith-63560b60/At BlackHat | https://www.blackhat.com/us-24/briefings/schedule/speakers.html#jamie-gawith-48261____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martin...2024-08-0124 minITSPmagazine PodcastsITSPmagazine PodcastsDeep Backdoors in Deep Reinforcement Learning Agents | A Black Hat USA 2024 Conversation with Vas Mavroudis and Jamie Gawith | On Location Coverage with Sean Martin and Marco CiappelliGuests: Vas Mavroudis, Principal Research Scientist, The Alan Turing InstituteWebsite | https://mavroud.is/At BlackHat | https://www.blackhat.com/us-24/briefings/schedule/speakers.html#vasilios-mavroudis-34757Jamie Gawith, Assistant Professor of Electrical Engineering, University of BathOn LinkedIn | https://www.linkedin.com/in/jamie-gawith-63560b60/At BlackHat | https://www.blackhat.com/us-24/briefings/schedule/speakers.html#jamie-gawith-48261____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martin...2024-08-0124 minRedefining Society and Technology PodcastRedefining Society and Technology PodcastIs Defense Winning? | A Black Hat USA 2024 Conversation with Jason Healey | On Location Coverage with Sean Martin and Marco CiappelliGuest: Jason Healey, Senior Research Scholar, Cyber Conflict Studies, SIPA at Columbia University [@Columbia]On LinkedIn | https://www.linkedin.com/in/jasonhealey/At BlackHat: https://www.blackhat.com/us-24/briefings/schedule/speakers.html#jason-healey-31682____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesO...2024-07-2625 minOn Location With Sean Martin And Marco CiappelliOn Location With Sean Martin And Marco CiappelliIs Defense Winning? | A Black Hat USA 2024 Conversation with Jason Healey | On Location Coverage with Sean Martin and Marco CiappelliGuest: Jason Healey, Senior Research Scholar, Cyber Conflict Studies, SIPA at Columbia University [@Columbia]On LinkedIn | https://www.linkedin.com/in/jasonhealey/At BlackHat: https://www.blackhat.com/us-24/briefings/schedule/speakers.html#jason-healey-31682____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesO...2024-07-2625 minRedefining CyberSecurityRedefining CyberSecurityIs Defense Winning? | A Black Hat USA 2024 Conversation with Jason Healey | On Location Coverage with Sean Martin and Marco CiappelliGuest: Jason Healey, Senior Research Scholar, Cyber Conflict Studies, SIPA at Columbia University [@Columbia]On LinkedIn | https://www.linkedin.com/in/jasonhealey/At BlackHat: https://www.blackhat.com/us-24/briefings/schedule/speakers.html#jason-healey-31682____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesO...2024-07-2625 minITSPmagazine PodcastsITSPmagazine PodcastsIs Defense Winning? | A Black Hat USA 2024 Conversation with Jason Healey | On Location Coverage with Sean Martin and Marco CiappelliGuest: Jason Healey, Senior Research Scholar, Cyber Conflict Studies, SIPA at Columbia University [@Columbia]On LinkedIn | https://www.linkedin.com/in/jasonhealey/At BlackHat: https://www.blackhat.com/us-24/briefings/schedule/speakers.html#jason-healey-31682____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesO...2024-07-2625 minSecurity Cryptography WhateverSecurity Cryptography WhateverSummertime SadnessAre you going to be in Vegas during BlackHat / DEF CON? We're hosting a mixer, sponsored by Observa! We have limited capacity, so please only register if you can actually come. Location details are in the confirmation email. Tickets will be released in batches, so if you get waitlisted, there's a good chance you still get in. Looking forward to seeing you in Vegas!Ticket Link: https://www.eventbrite.com/e/scwpod-vegas-2024-tickets-946939099337We talk about CrowdStrike in this episode, but we know we made some mistakes:The sys files may be code in...2024-07-2557 minBug Bounty JP PodcastBug Bounty JP PodcastBBJP_Podcast #4Speaker morioka12 (⁠⁠⁠⁠@scgajge12⁠⁠⁠⁠) mokusou (⁠⁠⁠⁠@Mokusou4⁠⁠⁠⁠) RyotaK (⁠⁠⁠⁠@ryotkak⁠⁠⁠⁠) Summary (link) [大テーマ] 最近の取り組み Mutation XSS (MXSS) https://research.securitum.com/mutation-xss-via-mathml-mutation-dompurify-2-0-17-bypass/ DOMPurify 2.5.3 https://github.com/cure53/DOMPurify/releases/tag/2.5.3 WAF Bypass https://x.com/hackerscrolls/status/1273254212546281473 https://gist.github.com/hackerscrolls/5c0990dfc734eeb4a9ce8cf2ccdf6fba NahamCon 2024 https://www.nahamcon.com/schedule https://scgajge12.hatenablog.com/entry/nahamcon_2024 [中テーマ] Black Hat USA 2024 "Listen to the Whispers: Web Timing Attacks that Actually Work" https://www.blackhat.com/us-24/briefings/schedule/index.html#listen-to-the-whispers-web-timing-attacks-that-actually-work-38297 "Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!" https://www.blackhat.com/us-24/briefings/schedule/index.html#confusion-attacks-exploiting-hidden-se...2024-05-2858 minBrakeSec Education PodcastBrakeSec Education PodcastJosh Grossman - building Appsec programs, bridging security and developer gapsYoutube VOD: https://youtu.be/G3PxZFmDyj4   #appsec, #owasp, #ASVS, #joshGrossman, #informationsecurity, #SBOM, #supplychain, #podcast, #twitch, #brakesec, #securecoding, #Codeanalysis Questions and topics: 1. The background to the topic, why is it something that interests you? How do you convince developers to take your course? 2. What do you think the root cause of the gap is? 3. Who is causing the gaps? (‘go fast’ culture, overzealous security, GRC requirements, basically everyone?) 4. Where do gaps begin? Is it the ‘need’ to ‘move fast’? 5. What can devs do to in...2024-04-151h 16Crafted ConversationsCrafted Conversations#33 - Blackhat Distillery w/ Kim ImmelIn this episode I traveled to Colorado Springs, CO on the heels of the 2024 American Craft Spirits Association Convention in Denver! I've admired Blackhat from afar and am so grateful for the opportunity to stop by and talk to their head distiller Kim Immel. Visit https://www.blackhatdistillery.com/Follow @blackhatdistilleryIf you enjoyed this episode, I’d really appreciate a follow and share on social media, subscribe to our YouTube, and be sure to give us a rating and review on your favorite podcast platform!Everything you see and hear is out of po...2024-04-1351 minRedefining CyberSecurityRedefining CyberSecurityConfused Learning: Supply Chain Attacks through Machine Learning Models | A Conversation With Adrian Wood and Mary Walker | On Location Coverage with Sean Martin and Marco CiappelliGuests: Mary Walker, Security Engineer, Dropbox [@Dropbox]On LinkedIn | https://www.linkedin.com/in/marywalkerdfir/At Black Hat | https://www.blackhat.com/asia-24/briefings/schedule/speakers.html#mary-walker-47392Adrian Wood, Security Engineer, Dropbox [@Dropbox]On LinkedIn | https://www.linkedin.com/in/adrian-wood-threlfall/At Black Hat | https://www.blackhat.com/asia-24/briefings/schedule/speakers.html#adrian-wood-39398____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ci...2024-04-0928 minOn Location With Sean Martin And Marco CiappelliOn Location With Sean Martin And Marco CiappelliConfused Learning: Supply Chain Attacks through Machine Learning Models | A Conversation With Adrian Wood and Mary Walker | On Location Coverage with Sean Martin and Marco CiappelliGuests: Mary Walker, Security Engineer, Dropbox [@Dropbox]On LinkedIn | https://www.linkedin.com/in/marywalkerdfir/At Black Hat | https://www.blackhat.com/asia-24/briefings/schedule/speakers.html#mary-walker-47392Adrian Wood, Security Engineer, Dropbox [@Dropbox]On LinkedIn | https://www.linkedin.com/in/adrian-wood-threlfall/At Black Hat | https://www.blackhat.com/asia-24/briefings/schedule/speakers.html#adrian-wood-39398____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ci...2024-04-0928 minITSPmagazine PodcastsITSPmagazine PodcastsConfused Learning: Supply Chain Attacks through Machine Learning Models | A Conversation With Adrian Wood and Mary Walker | On Location Coverage with Sean Martin and Marco CiappelliGuests: Mary Walker, Security Engineer, Dropbox [@Dropbox]On LinkedIn | https://www.linkedin.com/in/marywalkerdfir/At Black Hat | https://www.blackhat.com/asia-24/briefings/schedule/speakers.html#mary-walker-47392Adrian Wood, Security Engineer, Dropbox [@Dropbox]On LinkedIn | https://www.linkedin.com/in/adrian-wood-threlfall/At Black Hat | https://www.blackhat.com/asia-24/briefings/schedule/speakers.html#adrian-wood-39398____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ci...2024-04-0928 minCinephile Hissy FitCinephile Hissy FitBlackhat (2015)For their 142nd episode, two hack critics, two hackist dads, and two hacker teachers, Will Johnson and Don Shanahan, begin the first episode of a two-part guest arc with Jordan Puga and Paul Keelan of the Cinematic Underdog podcast. Both Will and Don have been on their show, it was our time to get them on ours. Our target was a Michael Mann double feature. This first epsiode covers Mann's maligned 2015 geo-techno thriller "Blackhat" starring Chris Hemsworth. With a four-man room, the opinions and pixels fly! Come for the shared challenge and stay for the mutual love and respect...2024-02-0259 minMrparka\'s Weekly Reviews and Update/ The Secret Top 10Mrparka's Weekly Reviews and Update/ The Secret Top 10Mrparka's Weekly Reviews and Update Week 340 (11.17.2023) Blackhat The Lost Blue RitaMrparka's Weekly Reviews and Update Week 340 (11.17.2023) Blackhat The Lost Blue Rita www.youtube.com/mrparka https://www.instagram.com/mrparka/ https://twitter.com/mrparka00 http://www.screamingtoilet.com/dvd--blu-ray https://www.facebook.com/mrparka https://www.facebook.com/screamingpotty/ https://letterboxd.com/mrparka/ https://www.patreon.com/mrparka https://open.spotify.com/show/2oJbmHxOPfYIl92x5g6ogK https://anchor.fm/mrparka https://www.stitcher.com/show/shut-up-brandon-podcast https://podcasts.apple.com/us/podcast/mrparkas-weekly-reviews-and-update-the-secret-top-10/id1615278571 Time Stamps 0:00 “The Lost” Review – 0:53 “Blue Rita” Review – 7:33 “Full Body Massage” Reviews –10:28 “Blackhat” 4K Review – 13:30 1981 “Phra Rot-Meri” Review – 17:25 1981 “Summer of Demon” Review – 24:39 1981 “Toukaidou Yotsuya Kaidan: The Anime” Review – 27:17 Patreon Pick...2023-11-1549 minRedefining Society and Technology PodcastRedefining Society and Technology PodcastKeynote | A SecTor Event Coverage Conversation with Laura PayneGuest: Laura Payne, Chief Enablement Officer & VP Security Consulting at White Tuque [@WhiteTuque]On Linkedin | https://www.linkedin.com/in/laura-l-payne/?originalSubdomain=ca____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________Episode Notes ____________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:📺 https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq...2023-10-2534 minThe Security Insights ShowThe Security Insights ShowMicrosoft Security Insights Show Episode 169 - Sarah YoungJoin us this episode as we welcome Rod's teammate and security extraordinaire, Sarah Young. Sarah recently spent time attending and participating at Blackhat and Defcon in Las Vegas. With Microsoft proposing a bigger presence there next year, hear about the value of attending.Show Notes/Links:* Sarah Young LinkedIn: https://www.linkedin.com/in/sarahyo16/* Bsides link: http://www.securitybsides.com/w/page/12194156/FrontPage* BlackHat: https://www.blackhat.com/* Defcon: https://defcon.org/* KQL Hat: https://must-learn-kql.creator-spring.com/listing/keep-on-kqlin-trucker-s-hat?product=2172&variation=106057&size=7042Catch...2023-09-141h 00The Jerich Show PodcastThe Jerich Show PodcastPost BSides LV/BlackHat/DEFCON and cyberstories of the weekErich and Javvad are back after taking a couple of weeks off to vacation and to attend BSides Las Vegas, Blackhat and DEFCON. In this episode they talk about the conference and what has been happening in the cyber world for the past couple of weeks   Stories from the show: Danish cloud host says customers ‘lost all data’ after ransomware attack https://techcrunch.com/2023/08/23/cloudnordic-azero-cloud-host-ransomware/ Cybercriminals turn to AI to bypass modern email security measures https://www.helpnetsecurity.com/2023/08/23/ai-enabled-email-threats/ TP-Link smart bulbs can let hackers steal your...2023-08-2524 minEnterprise Security Weekly (Video)Enterprise Security Weekly (Video)Talking to a co-founder of Gomboc.ai, a Blackhat Startup Spotlight Finalist - Ian Amit - ESW #327We discuss Ian Amit's background and what led him to want to leave the CISO life to create a startup! It's one thing for a security product to report problems to a security team. Everyone has these tools, but the problem is that someone has to analyze and triage all those findings, leading to alert fatigue and not a lot getting fixed. Gomboc is proposing to address this gap by auto-generating the fix. https://www.blackhat.com/us-23/spotlight.html   Visit https://www.securityweekly.com/esw for all the latest episodes! Sh...2023-08-1143 minCyber Distortion Podcast SeriesCyber Distortion Podcast SeriesS2 - Episode 009 – DEFCON – An Exhaustive Guide to Hacker Summer Camp – (with Dr. Louis DeWeaver) This very special episode is our contribution to all existing or soon-to-be DEFCON attendees!  We go deep under the covers to crack the shell of all things Hacker Summer Camp in this definitive, ALL YOU NEED TO KNOW, and truly exhaustive guide.  We join forces with our good friend, who we met at Hacker Summer Camp, Dr. Louis DeWeaver. Louis is a former professor and a seasoned cybersecurity expert who brings years of knowledge and many trips to DEFCON to this conversation. His upbeat personality is one of a kind! We like to say that Lo...2023-08-041h 30Paul\'s Security Weekly (Audio)Paul's Security Weekly (Audio)Security Certification - Rohit Misuriya, Sumit Siddharth - PSW #791This week, up first is the Security News: Microsoft lost its keys, LOL drivers, If you were the CSO, try to keep employees happy but remove their accounts when they leave, gaming device finds a missing child, $3 brute forcing, undocumented instructions are sometimes the best instructions, remote code on your Oscilloscope, fuzzing satellites, routers are great places to hide, typos lead to information leaks of US military emails, pwning yourself, pwning security researchers, getting pwned by a movie, and WormGPT! Sumit comes on the show to teach us a little about PHP type-juggling, introduce a free online...2023-07-203h 17Security Weekly Podcast Network (Audio)Security Weekly Podcast Network (Audio)Security Certification - Rohit Misuriya, Sumit Siddharth - PSW #791This week, up first is the Security News: Microsoft lost its keys, LOL drivers, If you were the CSO, try to keep employees happy but remove their accounts when they leave, gaming device finds a missing child, $3 brute forcing, undocumented instructions are sometimes the best instructions, remote code on your Oscilloscope, fuzzing satellites, routers are great places to hide, typos lead to information leaks of US military emails, pwning yourself, pwning security researchers, getting pwned by a movie, and WormGPT! Sumit comes on the show to teach us a little about PHP type-juggling, introduce a free online...2023-07-203h 17Paul\'s Security Weekly (Video)Paul's Security Weekly (Video)Security Certification - Rohit Misuriya, Sumit Siddharth - PSW #791Sumit comes on the show to teach us a little about PHP type-juggling, introduce a free online security lab, and discuss the new certifications being offered in collaboration with Blackhat. Segment Resources: Our SecOps exams: https://secops.group/cyber-security-certifications/ Black Hat's Certified Pentester exam: https://www.blackhat.com/us-23/certified-pentester.html Vulnmachines platform: https://www.vulnmachines.com/   Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-791 2023-07-2050 minCinema Gold ShowCinema Gold ShowFlashback Friday: Blackhat - Michael Mann Biggest DisappointmentIn this episode of Flashback Friday, we delve into the 2015 film "Blackhat" directed by Michael Mann. The film revolves around a devastating hack on a Chinese nuclear power station and the subsequent cyber assault on the stock market. Computer genius Hathaway, portrayed by Chris Hemsworth, is enlisted to track down the culprit and teams up with the FBI and Chinese cyber experts. As we analyze Mann's direction, we uncover the strengths and weaknesses of "Blackhat."Mann's signature style brings a seductive air to the world of hacking, with captivating visuals and intense action sequences. We explore the...2023-06-1710 minThe ProjectorsThe ProjectorsBlackhat (2015)During Michael Mann May we watched modern crime dramas from the past four decades and in 2015 Mann gave us a film about cyber crime and hacking which also happens to be his last movie released as of this writing. (Ferrari is not quite out yet) Chris Hemsworth is a hacker and a fighter and kind of a detective but more than anything he is a hacker and he and agents from the United States and China must work together to stop a mystery fellow from causing mass hack-lord destruction. We’re talking about the 2015, globe hopping “hack” thriller “Blackhat” and your b...2023-05-3136 minSecurity Weekly Podcast Network (Audio)Security Weekly Podcast Network (Audio)ASW #230 - Lina LauJoin us for this segment with Lina Lau to learn lessons from real incident response engagements covering types of attacks leveraged against the cloud, war stories from supply chain breaches seen in the last 1-2 years, and how defenders and enterprises can better protect and proactively defend against these attacks.   Segment Resources: Attacking and Defending the Cloud (Training) https://training.xintra.org/ Blackhat Singapore 2023 Training ADVANCED APT THREAT HUNTING & INCIDENT RESPONSE (VIRTUAL) https://www.blackhat.com/asia-23/training/schedule/index.html#advanced-apt-threat-hunting--incident-response-virtual-29792 Blackhat USA 2023 Training ADVANCED APT THREAT HUNTING & I...2023-03-011h 11Application Security Weekly (Audio)Application Security Weekly (Audio)ASW #230 - Lina LauJoin us for this segment with Lina Lau to learn lessons from real incident response engagements covering types of attacks leveraged against the cloud, war stories from supply chain breaches seen in the last 1-2 years, and how defenders and enterprises can better protect and proactively defend against these attacks.   Segment Resources: Attacking and Defending the Cloud (Training) https://training.xintra.org/ Blackhat Singapore 2023 Training ADVANCED APT THREAT HUNTING & INCIDENT RESPONSE (VIRTUAL) https://www.blackhat.com/asia-23/training/schedule/index.html#advanced-apt-threat-hunting--incident-response-virtual-29792 Blackhat USA 2023 Training ADVANCED APT THREAT HUNTING & I...2023-02-281h 11Application Security Weekly (Video)Application Security Weekly (Video)Supply Chain Breaches and Hacking the Cloud: Lessons Learned from IR - Lina Lau - ASW #230Join us for this segment with Lina Lau to learn lessons from real incident response engagements covering types of attacks leveraged against the cloud, war stories from supply chain breaches seen in the last 1-2 years, and how defenders and enterprises can better protect and proactively defend against these attacks.   Segment Resources: Attacking and Defending the Cloud (Training) https://training.xintra.org/ Blackhat Singapore 2023 Training ADVANCED APT THREAT HUNTING & INCIDENT RESPONSE (VIRTUAL) https://www.blackhat.com/asia-23/training/schedule/index.html#advanced-apt-threat-hunting--incident-response-virtual-29792 Blackhat USA 2023 Training ADVANCED APT THREAT HUNTING & I...2023-02-2833 minApplication Security Weekly (Video)Application Security Weekly (Video)Supply Chain Breaches and Hacking the Cloud: Lessons Learned from IR - Lina Lau - ASW #230Join us for this segment with Lina Lau to learn lessons from real incident response engagements covering types of attacks leveraged against the cloud, war stories from supply chain breaches seen in the last 1-2 years, and how defenders and enterprises can better protect and proactively defend against these attacks.   Segment Resources: Attacking and Defending the Cloud (Training) https://training.xintra.org/ Blackhat Singapore 2023 Training ADVANCED APT THREAT HUNTING & INCIDENT RESPONSE (VIRTUAL) https://www.blackhat.com/asia-23/training/schedule/index.html#advanced-apt-threat-hunting--incident-response-virtual-29792 Blackhat USA 2023 Training ADVANCED APT THREAT HUNTING & I...2023-02-2833 minLes Makers | PodcastLes Makers | PodcastDavid BlackHat - Une méthode efficace pour atteindre 10k€/mois en édition de site | E3Aujourd'hui nous recevons David BlackHat, éditeur de site en affiliation et Dropshipping. Il a désormais l'ambition de transmettre ses compétences au plus grand nombre et gratuitement, afin d'aider le plus de personnes possible à devenir libre financièrement !  Les 2 Tweet dont ils parle dans le Podcast : 👉 Trouver une niche via les liens d'affiliation : https://twitter.com/asyncr0ne/status/1550375146900307969?s=20&t=bHa6ygC6DW5TEpLaSbK2mQ  👉 S'inspirer d'un site US : https://twitter.com/asyncr0ne/status/1564508221024378881?s=20&t=YOg1Mu4Vj1No0rPb8o9SLg  2022-10-241h 40Kibertámadás!Kibertámadás!„Halló, Vegas?” Ilyen volt a BlackHat és a Def Con [aktuális]Las Vegas-ból jelentkezett kollégánk a BlackHatről és a DefConról, a világ két leghíresebb hacker konferenciájáról, amelyeken a tavalyi HCSC nyerteseivel vett részt. Kiderül, hogy miért is elképesztő élmény egy ilyen „hacker vidámpark”, és betekintést nyerhettek egy-két izgalmas előadásba is.BlackHat: https://www.blackhat.com/us-22Def Con: https://defcon.org/Kevin Mitnick a Twitteren: https://twitter.com/kevinmitnickNemzetbiztonsági Szakszolgálat Nemzeti Kibervédelmi IntézetWeb: https://nki.gov.huEma...2022-08-1729 minThe Gate 15 Podcast ChannelThe Gate 15 Podcast ChannelThe Gate 15 Interview EP 25. Amanda Berlin and Megan Roddie talk cybersecurity, mental health hackers, DEFCON, musicals, fruits, and more!In this episode of The Gate 15 Interview, Andy Jabbour speaks with Amanda Berlin and Megan Roddie, cybersecurity leaders & mental health hackers, and they’ve got their hands in a lot more too!  Amanda is the Lead Incident Detection Engineer at Blumira and has worked in I.T. for almost her entire adult life. Before working at Blumira, Amanda’s responsibilities have included infrastructure security, network hardware and software repair, email management, network/server troubleshooting and installation, purple teaming with a focus on phishing employees and organizational infrastructure as well as teaching employees about security and preventing exploits. She currently serves as th...2022-07-251h 01Security Weekly Podcast Network (Audio)Security Weekly Podcast Network (Audio)ASW #201 - IE11 Goes to ZeroThis week in the AppSec News: SynLapse shows shell injection via ODBC, Java deserialization example, MFA for Ruby Gems ecosystem, simple flaws in firmware, the decade-long journey of a Safari vuln, & more!   IE has gone to 11 and is no more. There's some notable history related to IE11 and bug bounty programs. In 2008, Katie Moussouris and others from Microsoft announced their vulnerability disclosure program. In 2013 this evolved into a bug bounty program piloted with IE11, with award ranges from $500 to $11,000. Ten years later, that bounty range is still common across the industry. The technical goals of t...2022-07-121h 03Application Security Weekly (Audio)Application Security Weekly (Audio)ASW #201 - IE11 Goes to ZeroThis week in the AppSec News: SynLapse shows shell injection via ODBC, Java deserialization example, MFA for Ruby Gems ecosystem, simple flaws in firmware, the decade-long journey of a Safari vuln, & more!   IE has gone to 11 and is no more. There's some notable history related to IE11 and bug bounty programs. In 2008, Katie Moussouris and others from Microsoft announced their vulnerability disclosure program. In 2013 this evolved into a bug bounty program piloted with IE11, with award ranges from $500 to $11,000. Ten years later, that bounty range is still common across the industry. The technical goals of t...2022-07-121h 03Application Security Weekly (Video)Application Security Weekly (Video)IE11 Goes to Zero -- A History of Browser Security and Bug Bounties - ASW #201IE has gone to 11 and is no more. There's some notable history related to IE11 and bug bounty programs. In 2008, Katie Moussouris and others from Microsoft announced their vulnerability disclosure program. In 2013 this evolved into a bug bounty program piloted with IE11, with award ranges from $500 to $11,000. Ten years later, that bounty range is still common across the industry. The technical goals of the program remain similar as well -- RCEs, universal XSS, and sandbox escapes are all vulns that can easily gain $10,000+ (or an order of magnitude greater) in modern browser bounty programs. So, even if we've finally...2022-06-2132 minApplication Security Weekly (Video)Application Security Weekly (Video)IE11 Goes to Zero -- A History of Browser Security and Bug Bounties - ASW #201IE has gone to 11 and is no more. There's some notable history related to IE11 and bug bounty programs. In 2008, Katie Moussouris and others from Microsoft announced their vulnerability disclosure program. In 2013 this evolved into a bug bounty program piloted with IE11, with award ranges from $500 to $11,000. Ten years later, that bounty range is still common across the industry. The technical goals of the program remain similar as well -- RCEs, universal XSS, and sandbox escapes are all vulns that can easily gain $10,000+ (or an order of magnitude greater) in modern browser bounty programs. So, even if we've finally...2022-06-2132 minDid You Know That?Did You Know That?How Do Hackers Work? with Will Hunt"Hackers are breaking the systems for profit. Before, it was about intellectual curiosity and pursuit of knowledge and thrill, and now hacking is big business." Kevin MitnickNot a day goes by now where you don’t read about some sort of cyberattack and how the motive was profit for the hackers. But what do hackers do with a stolen database of encrypted passwords? How do they breach systems to launch ransomware or bots or other exploitative software? Glad you asked.Will Hunt has been professional hacker for almost a decade (he’s been working in tech...2022-01-061h 15The Jerich Show PodcastThe Jerich Show PodcastThe Jerich Show Episode 57 - Back from Blackhat and DEFCON, a criminal returning money, phish reportsIn this episode, Erich reminisces about Blackhat and DEFCON, comparing past years to 2021 and Javvad and him discuss some crazy news stories, including one where a cyber thief actually returns $260 million and a new UK governement software that adds a button to report emails to the 'Ministry of Phishy Things', or some such government entity.  Don't forget to Like, Subscribe and Share for more fun looks at very serious topics. Stories from the show: Cryptocurrency heist hacker returns $260m in funds: https://www.bbc.com/news/business-58180692 New one-click button w...2021-08-1331 minInSession Film PodcastInSession Film PodcastThe Conjuring: The Devil Made Me Do It / Blackhat - Episode 433This week on the InSession Film Podcast, we discuss the horror film The Conjuring: The Devil Made Me Do It and Diego Crespo joins us as we conclude our Michael Mann Movie Series with Blackhat! Plus, a few thoughts on Cruella and The Killing of Two Lovers. - Review: The Conjuring 3 (5:49) - Notes / Discussion (49:06) - Michael Mann: Blackhat (1:29:47) Thanks for listening and be sure to subscribe on iTunes, Google Play, Stitcher, Soundcloud or TuneIn Radio! iTunes: https://itunes.apple.com/us/podcast/insession-film-podcast/id605634337 Spotify: https://open...2021-06-092h 44Call It, FriendoCall It, Friendo33. Blackhat (2015) & Collateral (2004)This week we discuss two films from American screenwriter and director Michael Mann. The first is Blackhat (2015), starring Thor himself, Chris Hemsworth, as a blackhat hacker named Hathaway. The film, Mann’s most recent, was a giant financial flop. The second is Collateral (2004), starring Jamie Foxx and Tom Cruise. An LA cabbie unwillingly drives an assassin around the city as he bumps off witnesses and key players in a cartel court case.   Timestamps What We’ve Been Watching/Playing (00:01:00) Andy – Hernán, The Last of Us Part 2 Do...2021-04-261h 23Luisão na ÁreaLuisão na ÁreaMARKETING DIGITAL: O QUE É BLACKHAT? #EP77MARKETING DIGITAL O QUE É BLACKHAT ▶️ Aperte o play e confira... ⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀ #negócio #empreendedorismo #empreendedordigital #negocioonline #marketingdigital #boravender #marketing #negocioonline #vendasonline #luisão #luishenrique #vendasnoinstagram #hotmart _____________________________________________________ Quer ter resultados incríveis em seu Negócio?  👉 Entre em contato pelo instagram: @luisaomkd  ✅ ACOMPANHE NAS REDES SOCIAIS: - Instagram: https://www.instagram.com/luisaomkd - Youtube: https://www.youtube.com/channel/UCXgikd16XG6_lt48Z81ov0w ⚫  CURSO ON...2021-01-1500 minSecurity in ColorSecurity in Color33. Cybersecurity News: Latest breaches, Wordpress Security Flaws, Blackhat recap and more.The Security in Color podcast delivers the latest news, resources and skills needed to succeed in cyber and cloud security. Hosted by Dominique West (@domyboo)  *******  This week on Security in Color I discuss:  Canon the latest victim in ransomware attack  Instagram flaw pays $6,000  Alexa information not as secure as you think  Blackhat recap - nation state actors actively attacking our reliable information  More Information  To support the platform and get exclusive content, join our patreon community here: https://www.patreon.com/securityincolor  Join our cyber mailing list: https://bit.ly/sicsubscribe  Visit our website: www.securityincolor.com  Follow us on social medi...2020-08-1921 minTurvakäräjätTurvakäräjätEpisodi 12 - Fake NewsMatteplays feat Laura video YouTubessahttps://www.youtube.com/watch?v=2LPXwzxoEYISANS tietomurto, RIP Juhon tiedothttps://www.sans.org/dataincident2020Blackhat O365 tutkimushttps://www.blackhat.com/us-20/briefings/schedule/#my-cloud-is-apts-cloud-investigating-and-defending-office--20982Juhon MFA kalasteluthttps://twitter.com/juhojauhiainen/status/1293903184377724935?s=21NSA ja FBI maltsututkimushttps://www.reuters.com/article/us-usa-cyber-russia/nsa-fbi-expose-russian-intelligence-hacking-tool-report-idUSKCN2592HYBitcoinien ympäristövaikutuksistahttps://digiconomist.net/bitcoin-energy-consumption/NISTin “Zero Trust Architecture” - nolla luotto arkkitehtuurihttps://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdfF...2020-08-1751 minMovies UnhackedMovies Unhacked058: Blackhat (2015)Why is the main character so unlikable? Why was the badguy's plan so disappointing? And what was the deal with Stuxnet? Listen now to find out! Scott Croco and Matt Janulewicz unhack Blackhat (2015). When a nuclear facility gets hacked, the FBI brings in an expert, who happens to be in prison, to help solve the crime. Chris Hemsworth stars in Michael Mann's Blackhat (2015)! Episode Log: January 2015 trivia (2:30) Unknown Superstar (3:05) Summary of Blackhat's story/plot (5:25) Movie review (8:05) Technology portrayal thoughts (25:25) Stuxnet (40:15) Who knows what kind of software is out there right now (51:05) The size and...2020-07-301h 04The ThreatConnect PodcastThe ThreatConnect PodcastIt's 5-O'SOC Somewhere with ThreatConnect, Episode 2: BlackHat DebriefHear ThreatConnect’s Research team (Marika Chauvin, Kyle Ehmke, and Alex Valdivia) discuss their thoughts, impressions, and what they learned at this year’s Black Hat and DefCon conferences in Las Vegas. Spoiler Alert: below are links to a few of the briefings and other curiosities mentioned by the team!  MITRE ATT&CK: The Play at Home Edition https://www.blackhat.com/us-19/briefings/schedule/?linkId=70782980#mitre-attck-the-play-at-home-edition-15035 Katie Nickels, ATT&CK Threat Intelligence Lead, MITRE and Ryan Kovar, Principal Security Strategist, Splunk Detecting Deep Fakes with Mice https://www.blackhat.com/us-19/brief...2019-08-2030 minAll TWiT.tv Shows (MP3)All TWiT.tv Shows (MP3)Security Now 727: BlackHat & DefConThis Week's StoriesBlackHat and Def Con 2019Microsoft dangles $300,000 for Azure hacks at BlackHat...Hotel chaos from Germany's Chaos Computer Club40 dangerous driversGoogle's battle to allow its Incognito users' Incognitoness to be IncognitoMicrosoft ranks the industry's top bug huntersApple bumps its bountiesWe invite you to read our show notes at https://www.grc.com/sn/SN-727-Notes.pdf Hosts: Steve Gibson and Jason Howell Download or subscribe to this show at https://twit.tv/shows/security-now. You can submit a question to Security Now! at the GRC Feedback Page.2019-08-142h 09State of CybercrimeState of CybercrimeLiving Vicariously through Blackhat Attendees and SpeakersWhile some of our colleagues geeked out at Blackhat, some of us vicariously experienced it online by following #BHUSA. The keynote was electric. They’re great ideas and we’ve seen them implemented in certain spaces. However, the reality is, we have a lot more work to do. There was also a serious talk about burn out, stress, and coping with alcohol as a form of escape. We learned that mental health is growing concern in the security space. As more organizations rely on technology, security pros are called on at all hours of the day...2018-08-1520 minSEO para GoogleSEO para Google150: Cuidado con el Blackhat SEOCuidado con el Blackhat SEO 29/9/2017Curso SEO para bloggers: https://www.borjagiron.com/curso-seo-para-bloggers/Sobre todo si tienes blog, web de seguros, cerrajeros, créditos, joyas, casinos, dinero.Cosas que pueden estar haciéndo a tu web/blog1. Mandan emails en tu nombre pidiendo que se quite algún link con email falso 2. Se añaden enlaces a tu web en Wikipedia en forma de spam para no permitirte conseguir enlaces ahí 3. Compran 100.000 links de baja calidad de casinos, adulto con anchor text malo 4. Ataque ToS para tumba...2017-09-2915 minState of CybercrimeState of CybercrimeBlackhat Briefings That Will Add to Your Tool BeltWe’re counting down to Blackhat USA to attend one of the world’s leading information security conference to learn about the latest research, development and trends. We’ll also be at booth #965 handing out fabulous fidget spinners and showcasing all of our solutions that will help you protect your data from insider threats and cyberattacks. In this podcast episode, we discuss sessions you should attend as well as questions to ask that will help you reduce risk. We even cover why it isn't wise to only rely on important research methods like honeypots save you fro...2017-07-2526 minBrakeSec Education PodcastBrakeSec Education Podcast2017-024-infosec_mental_health_defcon_contest-with-rand0h-and-tottenkophDirect Link: http://traffic.libsyn.com/brakeingsecurity/2017-024-mental_health_podcast-with-Rand0h-and-tottenkoph.mp3 The infosec industry and the infosec culture is so diverse, with many different points of view, many different thoughts and opinions, and many of us deal with our own internal demons, like addictions, mental afflictions like depression or bipolar disorders. And 'imposter syndrome' is another thing that seems to add to the mix, making some believe they have to be constantly innovating or people think negatively of them. So this week, we invited Ms. Magen Wu (@tottenkoph), and Danny (@dakacki) and we d...2017-07-161h 30BrakeSec Education PodcastBrakeSec Education Podcast2017-023-Jay_Beale_Securing Linux-LXC-Selinux-Apparmor-Jails_and_moreDirect Link: http://traffic.libsyn.com/brakeingsecurity/2017-023-Jay_Beale-selinux-apparmor-securing_lxc.mp3   Jay Beale works for a pentest firm called "Inguardians", and has always been a fierce friend of the show. He's running a class at both BlackHat and Defcon all about hardening various parts of the Linux OS. This week, we discuss some of the concepts he teaches in the class.  Why do we disable Selinux? Is it as difficult to enable as everyone believes? What benefit do we get from using it?  We also discuss other hardening applications, like ModS...2017-07-101h 09BrakeSec Education PodcastBrakeSec Education Podcast2017-019-Ms. Jessy Irwin, Effective Training in Small/Medium Businesses  This week, we invited Ms. Jessy Irwin (@jessysaurusrex) on to discuss the issues Small and medium businesses and startups have with getting good training, training that is effective and what can be done to address these issues. We also go through several ideas for training subjects that should be addressed by training, and what maybe would be addressed by policy.   ------- Upcoming BrakeSec Podcast training: Ms. Sunny Wear - Web App Security/OWASP 14 June - 21 June - 28 June at 1900 Eastern (1600 Pacific, 2300 UTC) $20 USD on...2017-06-061h 11BrakeSec Education PodcastBrakeSec Education Podcast2017-018-SANS_course-EternalBlue_and_Samba_vulnerabilities-DerbyCon contest detailsWe discuss SANS courses, including the one I just took (SEC504). How did I do in class? You can listen to the show and find out. Since it's been a few weeks, we also discuss all the interesting WannaCry reports, the ease at which this vulnerability was exploited, and why would a company allow access to SMB (tcp port 445) from the Internet? We discuss some upcoming training that we are holding starting 14 June. Ms. Sunny Wear will be doing 3 sessions discussing the use of Burp, and showing how to exploit various web application vulnerabilities.  Details a...2017-05-3050 minBrakeSec Education PodcastBrakeSec Education Podcast2017-017-Zero_Trust_Networking_With_Doug_Barth,_and_Evan_Gilman Zero trust networking may be a foreign concept to you, but Google and others have been utilizing this method of infrastructure and networking for quite a while now. It stands more traditional networking on it's head by not having a boundry in the traditional sense. There's no VPN, no ACLs to audit, no firewall to maintain... Sounds crazy right? Well, it's all about trust, or the lack of it. No one trusts anyone without a proper chain of permission. Utilizing 2FA, concepts of port knocking, and CA certificates are used to properly vet both the host and t...2017-05-091h 25BrakeSec Education PodcastBrakeSec Education Podcast2017-016-Fileless_Malware, and reclassifying malware to suit your needs Malware is big business, both from the people using it, to the people who sell companies blinky boxes to companies saying that they scare off bad guys. The latest marketdroid speak appears to be the term 'fileless malware', which by definition...   FTA: “Malware from a "fileless" attack is so-called because it resides solely in memory, with commands delivered directly from the internet. The approach means that there's no executable on disk and no artefacts ("files") for conventional computer forensic analysis to pick up, rendering the attacks stealthy, if not invisible. Malware infections will stil...2017-05-021h 05BrakeSec Education PodcastBrakeSec Education Podcast2017-015-Being a 'security expert' vs. 'security aware'This week, we have a little story time. Developers should be aware of the kinds of vulnerabilities their code can be attacked with. XSS, Buffer overflows, heap overflows, etc should be terms that they understand. But is it enough that they are 'aware' of them, and yet seem to do nothing? Or should they be experts in their own particular area of development, and leave infosec people to deal with more generic issues? We discuss the pros and cons of this argument this week, as well as how the idea of training people are flawed, because of...2017-04-2744 minBrakeSec Education PodcastBrakeSec Education Podcast2017-014-Policy_writing_for_the_masses-master_fingerprints_and_shadowbrokersSo, I (Bryan) had a bit of a work issue to discuss. It has become one of my myriad jobs at work to write up some policies. In and of itself, it's not particularly fun work, and for whatever reason, this is causing me all kinds of issues. So this week we take a quick look at why I'm having these issues, if they are because I don't get it, or because the method I must follow is flawed. After that, we add on to last week's show on #2FA and #MFA (http://traffic.libsyn.com/brakeingsecurity/2017...2017-04-201h 00BrakeSec Education PodcastBrakeSec Education Podcast2017-013-Multi-factor Auth implementations, gotchas, and solutions with MattMost everyone uses some kind of Multi-factor or '2 Factor Authentication". But our guest this week (who is going by "Matt" @infosec_meme)... Wanted to discuss some gotchas with regard to 2FA or MFA, the issues that come from over-reliance on 2FA, including some who believe it's the best thing ever, and we finally discuss other methods of 2FA that don't just require a PIN from a mobile device or token. We also discuss it's use with concepts like "beyondCorp", which is google's concept of "Software Defined Perimeter" that we talked about a few weeks ago with...2017-04-1348 minLiquidmatrix Security Digest PodcastLiquidmatrix Security Digest PodcastLiquidmatrix Security Digest TV - mini0x12Matthew Keys is in jail for not giving up a source - http://arstechnica.com/tech-policy/2016/11/speaking-from-prison-incarcerated-reporter-maintains-innocence/ Go Secure botnet analysis - https://gosecure.net/2016/11/02/exposing-the-ego-market-the-cybercrime-performed-by-the-linux-moose-botnet/ Blackhat EU talks - https://www.blackhat.com/eu-16/ getting root on wemos - https://www.invincealabs.com/blog/tag/wemo/  2016-11-1002 minBrakeSec Education PodcastBrakeSec Education Podcast2016-032-BlackHat-Defcon-Debrief, Brakesec_CTF_writeup, and blending in while travelingCo-Host Brian Boettcher went to BlackHat and Defcon this year, as an attendee of the respective cons, but also as a presenter at "Arsenal", which is a venue designed to show up and coming software and hardware applications. We started off by asking him about his experiences at Arsenal, and how he felt about "Hacker Summer Camp" Our second item was to discuss the recent Brakesec PodCast CTF we held to giveaway a free ticket to Derbycon. We discussed some pitfalls we had, how we'll prepare for the contest next year, and steps it took to solve...2016-08-1559 minAm I On The Air?Am I On The Air?The American Blackhat RingerSend us a textSeason 10 Episode 3 "The American Blackhat Ringer" : This episode we discuss the Oscar Nominations, Tom Hardy out of Suicide Squad, Avatar 2 pushed to 2017, Some big TV show renewals, Zachary Levi leading the new Heroes Reborn miniseries and so much more. Plus Reviews of "American Sniper" "Blackhat" & "The Wedding Ringer"Support the showwww.AmIOnTheAir.comFollow on Twitter at @AmIOnTheAirLike us on Facebook at Facebook.com/AmIOnTheAirFollow on TikTok, Instagram and YouTubeSupport the Show on Cashapp $DONMEGA and Venmo at @DONMEGA2015-01-201h 07SecuraBitSecuraBitSecuraBit Episode 62: Visualizing Data with NetWitnessSecuraBit  Episode 62: Visualizing Data with NetWitnessHosts:Anthony Gartner – @anthonygartner http://anthonygartner.comChris Gerling  – @chrisgerlingChristopher Mills – @thechrisamAndrew Borel –  @andrew_secbitGuests:Eddie Schwartz - @eddieschwartzGeneral topics:BSidesLV http://www.securitybsides.com/BSidesLasVegasBlackHat https://www.blackhat.com/html/bh-us-10/bh-us-10-home.htmlDefcon https://www.defcon.org/html/defcon-18/dc-18-schedule.htmlShmoocon Woot Video http://www.youtube.com/watch?v=HJ0ypgZU_D0NetWitness Visualize http://visualize.netwitness.com/Brief panel on certifications.iPhone App...2010-08-0100 minSecuraBitSecuraBitSecuraBit Episode 62: Visualizing Data with NetWitnessSecuraBit  Episode 62: Visualizing Data with NetWitnessHosts:Anthony Gartner – @anthonygartner http://anthonygartner.comChris Gerling  – @chrisgerlingChristopher Mills – @thechrisamAndrew Borel –  @andrew_secbitGuests:Eddie Schwartz - @eddieschwartzGeneral topics:BSidesLV http://www.securitybsides.com/BSidesLasVegasBlackHat https://www.blackhat.com/html/bh-us-10/bh-us-10-home.htmlDefcon https://www.defcon.org/html/defcon-18/dc-18-schedule.htmlShmoocon Woot Video http://www.youtube.com/watch?v=HJ0ypgZU_D0NetWitness Visualize http://visualize.netwitness.com/Brief panel on certifications.iPhone App...2010-08-0157 min