Alert posture used by the United States Armed Forces
POPULARITY
Categories
What if the hackers are actually the heroes?In this mind-blowing episode, host David Mauro sits down with Matt Toussain, elite military cyber warrior, DEF CON speaker, and Founder of Open Security, to reveal how offensive security and real-world hacking tactics are helping businesses reduce risk, fight cybercrime, and stay ten steps ahead of threats.
In this episode of Reimagining Cyber, we set sail into the world of maritime cybersecurity with one of the foremost experts in the field, Dr. Gary Kessler. From GPS spoofing to autonomous vessels, Gary breaks down the evolving threats facing modern ships and ports as they become increasingly digitized and connected. With over 50 years of experience in cybersecurity and a lifelong connection to the water, Gary shares how his career merged passion and profession, leading to groundbreaking research in AIS spoofing and maritime threat mitigation.We explore the real-world cyber risks impacting global logistics, including the infamous 2017 NotPetya attack on Maersk, the rise of ghost and dark fleets, and how pirates are using hacked logistics systems to target high-value cargo. Gary also explains why the term “cybersecurity” may miss the mark—and why protecting the information itself is what really matters.Plus, hear about the upcoming Maritime Hacking Village at DEFCON and how you can get involved. If you're curious about the cyber threats lurking beyond the horizon, this episode is your compass.Links:Maritime Cybersecurity: A Guide for Leaders and ManagersMaritime Hacking VillageFollow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com As featured on Million Podcasts' Best 100 Cybersecurity Podcast and Best 70 Chief Information Security Officer CISO Podcasts rankings.
In just over 80 days of Donald Trump's second administration, the world already seems to have been remade. Even before the tariffs brought economic turmoil, the world watched as legal US residents were deported, and others arbitrarily detained at the border. And now some Australians are questioning whether they should risk travelling to the US at all. The Guardian's Washington DC bureau chief, David Smith, tells Reged Ahmad why experts fear the US is nearing ‘Defcon 1 for our democracy' You can support the Guardian at theguardian.com/fullstorysupport
DEFCON Levels and Zaha Hadid: A Nostalgic Dive into ArchitectureIn this episode of the Coffee Sketch Podcast, Jimmy and Kurt introduce a new DEFCON segment, reminiscing about Y2K, and discussing the art and architecture of Zaha Hadid. They explore the Millennium Dome's controversial legacy and dive into AI-enhanced sketches, juxtaposing traditional and modern architectural techniques. The conversation meanders through topics such as teaching, design iterations, and the influence of past projects on future work, all sprinkled with lighthearted banter and pop culture references.00:00 Introduction and New Podcast Feature01:27 Defcon Levels Explained03:16 Welcome to the Coffee Sketch Podcast04:27 Pie Day and Fundraising12:10 Sketch Collaboration and Y2K Memories16:44 Boomer Prepping and Prince's 199919:01 Millennium Dome and Richard Rogers20:34 Zaha Hadid's Influence and Mind Zone Pavilion22:44 Teaching Architecture and Student Inspirations34:49 AI Sketches and Surprising ResultsSend Feedback :) Support the showBuy some Coffee! Support the Show!https://ko-fi.com/coffeesketchpodcast/shop Our Links Follow Jamie on Instagram - https://www.instagram.com/falloutstudio/ Follow Kurt on Instagram - https://www.instagram.com/kurtneiswender/ Kurt's Practice - https://www.instagram.com/urbancolabarchitecture/ Coffee Sketch on Twitter - https://twitter.com/coffeesketch Jamie on Twitter - https://twitter.com/falloutstudio Kurt on Twitter - https://twitter.com/kurtneiswender
Maybe you've seen those old world maps that were created when a lot of the world was still unexplored. When they reached the edge of what had been explored, they drew a line and then they showed dragons and monsters beyond it - which didn't exactly encourage exploration. The story is told of this first century Roman commander who had to lead his troops beyond the line on the map and into "dragon" territory. He sent a courier back to Rome with a straightforward message - "We have just marched off the map! Please send new orders!" I'm Ron Hutchcraft and I want to have A Word With You today about "When You're Marching Off the Map." That describes how a whole lot of us are feeling since things changed so dramatically back on September 11, 2001 and all of the cataclysmic, unpredictable, unimaginable events that have come since then. We have marched off the map! Things are up for grabs with the economy; a lot of people feel their jobs are insecure. Our personal sense of safety and security have really never been the same. It has turned to a sense of vulnerability. There are prospects of bioterrorism and cyber terrorism. USA Today talked about DEFCON 1, the military's phrase for their highest state of alert - and they said a lot of us feel like we're living at DEFCON 1. We need some certainty after covid and all the upheavals; we need some leadership. We want to hear from our national leaders, from our military leaders, from our financial leaders, but none of them can give us that sense of peace and security that we're needing in this "new world" that's off the map. What we're looking for can ultimately only be found in the leader. That would be the One who created us. The issues of our day and the questions of our heart are just too big to be answered by anyone other than God Himself. In times like these, I am so glad Jesus described His relationship with those who belong to Him as one of a shepherd. Because with no clear direction these days, we're feeling a little like sheep. Here's what Jesus offered to people like us in times like these - it's in our word for today from the Word of God in John 10, beginning in verse 3, "He calls His own sheep by name and leads them out - He goes on ahead of them, and His sheep follow Him." Later, Jesus said, "My sheep listen to My voice; I know them, and they follow Me. I give them eternal life, and they shall never perish; no one can snatch them out of My hand." There is someone who knows the way to go when there is no map and He's the Lord of this universe! And Jesus leads those who belong to Him, giving them daily direction and daily provision, no matter what's happening in the headlines. And He never loses anyone that's His - because, in the words of John 10, He "laid down His life for the sheep." Jesus died for every wrong thing you've ever done so you could belong to Him forever. He's not about to lose you after paying that price for you! The Bible tells us that Jesus weeps for those who are, as He says, "sheep without a shepherd" (Matthew 9:36). That might be you today. But it doesn't have to be you for one more day. He's reaching out to you right now. He's ready to be your Shepherd in these confusing times; your anchor in the stormy times we live in and the storms of our own personal lives. Your relationship with Him begins when you tell Him you're done trying to be your own shepherd, running your own life and that you want to put your total trust in Him to forgive every sin you've ever committed, to direct your life from this day on, and to get you to heaven when you die. That's what He's waiting to give you. He's waiting for you to say, "Jesus, I'm Yours. You are my only hope. Your death on the cross, your resurrection from the dead...I want to belong to you, beginning today." Our website is all about helping you get that relationship started. I would invite you to go there. It is ANewStory.com. We have marched off the map. But Jesus knows exactly where we are - and what the future holds. And He can take you there safely...but, you have to grab His hand.
Here's what we all know, even if you put a lid on it, those tears are still going to boil over. What you don't know is the lid only makes those tears MORE FORCEFUL.
TOPIC: Tariffs PANEL: Edgar Faler, CAR; Paul Eisenstein, Headlight.news; Gary Vasilash, shinymetalboxes.net; John McElroy, Autoline.tv
Grifter is a longtime hacker, DEF CON organizer, and respected voice in the infosec community. From his early days exploring networks to helping shape one of the largest hacker conferences in the world, Grifter has built a reputation for blending deep technical insight with a sharp sense of humor.Learn more about Grifter by visiting grifter.org.SponsorsSupport for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.Support for this show comes from ZipRecruiter. ZipRecruiter has solved the hiring problem. Employers prefer it the most for so many reasons. Let's start by telling you about their matching technology. They work hard to find the best candidates for your needs, and will instantly show you results once you post a job listing. ZipRecruiter will speed up your hiring process. See it for yourself at www.ziprecruiter.com/DARKNET.This show is sponsored by Material Security. Your cloud office (think Google Workspace or Microsoft 365) is the core of your business, but it's often protected by scattered tools and manual fixes. Material is a purpose-built detection and response platform that closes the gaps those point solutions leave behind. From email threats to misconfigurations and account takeovers, Material monitors everything and steps in with real-time fixes to keep your data flowing where it should. Learn more at https://material.security.
Listen to reports and excerpts from the protests demanding the release of Mahmoud Khalil and against the the broader fascist repression of the student movement to free Palestine. Sam and Mark discuss the moment we're in and the critical need to mobilize intensely for the upcoming protest on April 5 in DC (with additional gatherings in cities around the country). Then, Sam talks with David Smith, the Guardian's Washington DC bureau chief. Read The Trump administration is descending into authoritarianism: From media to culture and the arts to the refusal to abide by court orders, we're nearing ‘Defcon 1 for our democracy', experts say and his latest: ‘It reminds you of a fascist state': Smithsonian Institution braces for Trump rewrite of US history and follow his work at theguardian.com.Act:Join the Refuse Fascism Contingent in D.C. on Saturday April 5 at the HANDS OFF ProtestRead, Sign, Spread A Call to Conscience...A Call to ActVisit RefuseFascism.org for all links mentioned in this episode.We are on TikTok officially now! Follow @refusefashism (that spelling is intentional to get around TikTok censors). Send your comments to samanthagoldman@refusefascism.org or find Refuse Fascism on all the socials, usually spelled correctly. Connect with the movement at RefuseFascism.org and support: patreon.com/refusefascismMusic for this episode: Penny the Snitch by Ikebe Shakedown
We talk about Tony's birthday gift, DEFSEC? moar lik DEFCON, 23 and Me goes belly up, Trump junk for sale, Barron can actually TURN ON A COMPUTER! The TX dildo law, Jasmine Crockett, Fetterman panders and more.
Contact AnnmarieIn this episode of Words, Wobbles, and Wisdom, Annmarie Miles takes a look at the classic procrastination trap—waiting for the perfect Monday to start making changes. Whether it's dieting, exercising, or tackling a long-overdue project, so many people delay taking action, thinking that ‘Monday' will bring fresh motivation. But what if Monday never comes?Annmarie introduces the psychology behind this mindset, delving into the ‘Three Ds' - something she learned on the DreamBuilder course run by her colleagues at TechPixies. Dissuasion, Distraction, and DEFCON - these keep people stuck in a cycle of delay. Through relatable stories, humour, and practical tips, this episode will help listeners break free from procrastination and start taking action today.What Listeners Will Learn:✅ Why ‘I'll start Monday' rarely leads to real change✅ How the ‘Three Ds'—Dissuasion, Distraction, and DEFCON—impact motivation✅ The hidden ways the brain encourages procrastination✅ Simple and achievable steps to take action immediately✅ How small wins are the key to long-term success
In this conversation, Mike Lisi shares his journey into the cybersecurity field, detailing his early interest in computers, the challenges he faced while obtaining his OSCP certification, and his transition into consulting. He discusses the importance of understanding client needs incybersecurity assessments and his leadership role in the Red Team Village. Mike also elaborates on the NCAE Cyber Games and the design of Capture The Flag (CTF) challenges, providing insights into effective content development for cybersecurity education. The conversation concludes with Mike sharing unique experiences from cybersecurity events and his thoughts on future engagements.TIMESTAMPS:00:00 - Introduction to Cybersecurity Journey03:23 - The Path to OSCP Certification06:13 - Transitioning to Consulting in Cybersecurity09:14 - Understanding Client Needs in Cybersecurity11:56 - Leadership in Red Team Village14:32 - NCAE Cyber Games and CTF Design17:26 - Creating Effective CTF Challenges20:04 Resources for Aspiring CTF Participants22:57 Content Development for Cybersecurity Education25:49 Unique Experiences in Cybersecurity Events28:25 Closing Thoughts and Future Engagements SYMLINKS:[Maltek Solutions Website] - https://malteksolutions.com/A cybersecurity consulting firm specializing in offensive security services, penetration testing, and risk assessments, founded by Mike Lisi.[Mike Lisi LinkedIn] - https://www.linkedin.com/in/mikelisi/Mike Lisi's official LinkedIn profile, where he shares insights on cybersecurity, offensive security consulting, and industry trends.[Red Team Village (RTV) Website] - https://redteamvillage.ioA nonprofit organization dedicated to providing educational experiences in offensive security. RTV organizes workshops, talks, and training opportunities, primarily at DEF CON and other cybersecurity conferences.[Red Team Village Discord] - https://discord.com/invite/redteamvillageThe official Red Team Village Discord server where members can connect, discuss offensive security topics, and stay updated on upcoming events and volunteer opportunities.[Red Team Village X (Twitter)]- https://twitter.com/redteamvillage_RTV's official social media account for announcements, event updates, and cybersecurity-related discussions.[MetaCTF Website] - https://metactf.comA platform offering cybersecurity competitions and Capture The Flag (CTF) events designed to help participants develop their cybersecurity skills through hands-on challenges.[CTF Time Website] - https://ctftime.orgA website that tracks cybersecurity Capture The Flag (CTF) competitions worldwide, providing schedules, rankings, and resources for both beginners and experienced competitors.[Hack The Box Website] - https://www.hackthebox.comA cybersecurity training platform offering hands-on, gamified hacking labs and challenges to develop penetration testing skills.[TryHackMe Website] - https://tryhackme.comAn interactive cybersecurity learning platform that provides guided tutorials and virtual labs for security professionals and beginners.CONNECT WITH US www.barcodesecurity.com Become a Sponsor Follow us on LinkedIn Tweet us at @BarCodeSecurity Email us at info@barcodesecurity.com
Andra Lezza and Javan Rasokat discuss the complexities of securing AI and LLM applications. With years of experience in Application Security (AppSec), Andra and Javan share their journey and lessons from their DEF CON talk on building and defending LLMs. They explore critical vulnerabilities, prompt injection, hallucinations, and the importance of data security. This discussion sheds light on the evolving landscape of AI and LLM security, offering practical advice for developers and security professionals alike. Javan's blog article: Adversarial Misuse of Generative AIJavan's recommendation for the TLDR newsletterAndra's book recommendation: The Cuckoo's Egg by Cliff StollFOLLOW OUR SOCIAL MEDIA: ➜Twitter: @AppSecPodcast➜LinkedIn: The Application Security Podcast➜YouTube: https://www.youtube.com/@ApplicationSecurityPodcast Thanks for Listening! ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
All guests join us on the Farm Bureau Insurance guest line, and we are LIVE from the BankPlus Studio! Learn more about your ad choices. Visit megaphone.fm/adchoices
Silverback hasn't seen 2 girls one cup so Kid tries to describe it for him in this episode of the Goin' Deep Show. The two relive a night at Hooters, telling you pricks to treat women nice—those pussies take a fucking pounding. Go balls-deep and get some asshole to yank your nutsack so your dick looks like a goddamn monster. Retro Rewinde from March of 2012. Go Deep. 1:30 Kleen is selling you something 1:40 Salespeople… gotta love em 2:00 Facebook and Google will buttock us 2:30 Who's vagina are you down on… It's Calories 3:00 Can I log them in as Tator Tots 3:10 Dimples Breakfast 3:25 Two Girls one Cup 4:00 The Description 5:00 Hooters Seating Technique 6:30 Hooters in BC is not so good 7:00 Why am I giggling around - The greatest idea ever 8:30 We love Beer and we're feeling it 9:00 Who wants to get into the Kid's Head? 9:30 The JMac Agenda 10:00 Shownotes 11:00 Hat Trick is Focused 11:20 Scare your children then dating students 12:10 The Setup 12:20 It's Not….. 13:00 Every guys dream - Porn Star Stern 13:25 Evan Stone's Goat Balls 14:00 The Ron Jeremy of our generation 14:45 Sacrafice your balls 15:00 Internet we need you to suck our balls 15:20 Serenity X can dance and suck our balls 15:45 We can gang bang Serrenity X 16:00 Romance to get in the pants 16:30 Women are Dumb 17:00 The Midlife Crisis 17:20 Do they know enough to know? 18:30 Hat Trick doesn't need Romance 19:00 Silverback made her left arm go numb 20:00 You severed my spinal cord 20:30 Treat a woman right because her twits gonna get hit… hard 20:50 Oldies are excited to see a band 21:20 How to scope out a bar 22:00 Bartender with boobies hanging out. 22:25 Never seen a ring that can plug a hole 22:45 Primal panty move 23:00 watch the panty rug burn 23:40 Banker ends his reign at the Wheel 24:50 NORAD 25:00 Defcon 4 happened at the Wheel 25:40 Sloppy Sounds 27:00 Swinging ? 28:00 I don't share 28:40 Wrap up and Thank you 29:30 the Essentials
The Daily Quiz - General Knowledge Today's Questions: Question 1: What toy was released in 1957, creating an instant craze among children? Question 2: What does the Latin abbreviation term 'e.g.' mean? Question 3: When is the Feast of St. Nicholas? Question 4: What does the military acronym DEFCON stand for? Question 5: Which word is defined as 'in Turkey and some other Oriental countries, a decree or mandate issued by the sovereign'? Question 6: Which word is defined as 'high-waisted skiing pants with shoulder straps'? Question 7: What Native Language Would Jesus Christ Have Spoken? Question 8: Where did the first atomic bomb explode? This podcast is produced by Klassic Studios Learn more about your ad choices. Visit megaphone.fm/adchoices
AI is reshaping defense, mobility, and logistics. Yisroel Brumer, Co-founder & CEO of DEFCON AI, joins Paige Kuderka, Partner at Daversa, to discuss the future of AI in national security, scaling defense tech, and the challenges of innovation in a high-stakes industry. Tune in for a sharp look at how AI is redefining modern warfare and beyond.
While the excitement of this years Premier League may be dwindling the magic of the cup is still in full effect. But, this weekend it felt the magic was darker than ever.A horrendous high boot on Crystal Palace's Mateta was the most obvious red card in the history of football to everyone watching, except of course to the man in charge of handing out the cards Michael Oliver.A crash out of epic proportions saw Brazil star Matheus Cunha sent off in the 120th minute, leading to Wolves being knocked out of the cup.Newcastle also crashed out, with injuries to Isak and Lewis Hall and Anthony Gordon picking up a mush based red card. The desperation continues with the Carabao Cup final rapidly approaching.Who cares if Man United are out of the F.A Cup, its the league they want to win according to manager Ruben Amorim who, once again just to confirm, is not going to change.We have some ideas to freshen up the cup branding and make these 5th round fixtures more exciting.Support the showWant to support us and also get some sweet bonus exclusive pods? Head to patreon.com/nononsensepod where you can get access to:* Weekly Bonus Episodes! Midweek games, European games, it's all there folks!* A 20+ episode mini-pod called After The Nonsense where we chat everything except football* A full archive of all our bonus content in one handy to find spot!Retro Kits!Want a retro kit to show off your ball knowledge. Use this link and support the show!Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to youhttps://www.classicfootballshirts.co.uk/?ref=nwuyn2q&cid=
⬥GUEST⬥Jake Braun, Acting Principal Deputy National Cyber Director, The White House | On LinkedIn: https://www.linkedin.com/in/jake-braun-77372539/⬥HOST⬥Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine: https://www.itspmagazine.com/sean-martin⬥EPISODE NOTES⬥Cybersecurity is often framed as a battle between attackers and defenders, but what happens when hackers take on a different role—one of informing policy, protecting critical infrastructure, and even saving lives? That's the focus of the latest Redefining Cybersecurity podcast episode, where host Sean Martin speaks with Jake Braun, former Acting Principal Deputy National Cyber Director at the White House and current Executive Director of the Cyber Policy Initiative at the University of Chicago.Braun discusses The Hackers' Almanack, a project developed in partnership with DEF CON and the Franklin Project to document key cybersecurity findings that policymakers, industry leaders, and technologists should be aware of. This initiative captures some of the most pressing security challenges emerging from DEF CON's research community and translates them into actionable insights that could drive meaningful policy change.DEF CON, The Hackers' Almanack, and the Franklin ProjectDEF CON, one of the world's largest hacker conferences, brings together tens of thousands of security researchers each year. While the event is known for its groundbreaking technical discoveries, Braun explains that too often, these findings fail to make their way into the hands of policymakers who need them most. That's why The Hackers' Almanack was created—to serve as a bridge between the security research community and decision-makers who shape regulations and national security strategies.This effort is an extension of the Franklin Project, named after Benjamin Franklin, who embodied the intersection of science and civics. The initiative includes not only The Hackers' Almanack but also a volunteer-driven cybersecurity support network for under-resourced water utilities, a critical infrastructure sector under increasing attack.Ransomware: Hackers Filling the Gaps Where Governments Have StruggledOne of the most striking sections of The Hackers' Almanack examines the state of ransomware. Despite significant government efforts to disrupt ransomware groups, attacks remain as damaging as ever. Braun highlights the work of security researcher Vangelis Stykas, who successfully infiltrated ransomware gangs—not to attack them, but to gather intelligence and warn potential victims before they were hit.While governments have long opposed private-sector hacking in retaliation against cybercriminals, Braun raises an important question: Should independent security researchers be allowed to operate in this space if they can help prevent attacks? This isn't just about hacktivism—it's about whether traditional methods of law enforcement and national security are enough to combat the ransomware crisis.AI Security: No Standards, No Rules, Just ChaosArtificial intelligence is dominating conversations in cybersecurity, but according to Braun, the industry still hasn't figured out how to secure AI effectively. DEF CON's AI Village, which has been studying AI security for years, made a bold statement: AI red teaming, as it exists today, lacks clear definitions and standards. Companies are selling AI security assessments with no universally accepted benchmarks, leaving buyers to wonder what they're really getting.Braun argues that industry leaders, academia, and government must quickly come together to define what AI security actually means. Are we testing AI applications? The algorithms? The data sets? Without clarity, AI red teaming risks becoming little more than a marketing term, rather than a meaningful security practice.Biohacking: The Blurry Line Between Innovation and BioterrorismPerhaps the most controversial section of The Hackers' Almanack explores biohacking and its potential risks. Researchers at the Four Thieves Vinegar Collective demonstrated how AI and 3D printing could allow individuals to manufacture vaccines and medical devices at home—at a fraction of the cost of commercial options. While this raises exciting possibilities for healthcare accessibility, it also raises serious regulatory and ethical concerns.Current laws classify unauthorized vaccine production as bioterrorism, but Braun questions whether that definition should evolve. If underserved communities have no access to life-saving treatments, should they be allowed to manufacture their own? And if so, how can regulators ensure safety without stifling innovation?A Call to ActionThe Hackers' Almanack isn't just a technical report—it's a call for governments, industry leaders, and the security community to rethink how we approach cybersecurity, technology policy, and even healthcare. Braun and his team at the Franklin Project are actively recruiting volunteers, particularly those with cybersecurity expertise, to help protect vulnerable infrastructure like water utilities.For policymakers, the message is clear: Pay attention to what the hacker community is discovering. These findings aren't theoretical—they impact national security, public safety, and technological advancement in ways that require immediate action.Want to learn more? Listen to the full episode and explore The Hackers' Almanack to see how cybersecurity research is shaping the future.⬥SPONSORS⬥LevelBlue: https://itspm.ag/attcybersecurity-3jdk3ThreatLocker: https://itspm.ag/threatlocker-r974⬥RESOURCES⬥The DEF CON 32 Hackers' Almanack: https://thehackersalmanack.com/defcon32-hackers-almanackDEF CON Franklin Project: https://defconfranklin.com/ | On LinkedIn: https://www.linkedin.com/company/def-con-franklin/DEF CON: https://defcon.org/Cyber Policy Initiative: https://harris.uchicago.edu/research-impact/initiatives-partnerships/cyber-policy-initiative⬥ADDITIONAL INFORMATION⬥✨ More Redefining CyberSecurity:
video: https://youtu.be/O4KGfG2UJmo Join us for an insightful conversation with Craig Rowland as we dive into Linux security, cybersecurity, and the evolution of hacking from BBS days to modern threats. We explore how Sandfly Security's agentless approach protects Linux systems, the role of AI in cybersecurity, and whether you really need antivirus on Linux. Plus, we discuss startup scaling, Defcon's rise, and the cleverest Linux attack we've seen. Don't miss it! Forum Discussion Thread (https://destinationlinux.net/forum) Download as MP3 (https://aphid.fireside.fm/d/1437767933/32f28071-0b08-4ea1-afcc-37af75bd83d6/b3a44155-6616-48f2-8fe8-f269a49f9725.mp3) Support the show by becoming a patron at tuxdigital.com/membership (https://tuxdigital.com/membership) or get some swag at tuxdigital.com/store (https://tuxdigital.com/store) Hosted by: Ryan (DasGeek) = dasgeek.net (https://dasgeek.net) Jill Bryant = jilllinuxgirl.com (https://jilllinuxgirl.com) Michael Tunnell = michaeltunnell.com (https://michaeltunnell.com) Chapters: 00:00:00 Intro 00:01:56 TWIL 300 Celebration 00:05:11 Community Feedback 00:21:16 Agentless Linux Security: A Chat with Craig Rowland 00:21:46 Cybersecurity in the Military: Craig's Wildest Lessons 00:26:51 Scaling Startups & Catching the Eye of Tech Giants 00:29:27 Old-School Hacking: BBS and Salvaged Tech 00:32:52 From Small Rooms to Global Stages: The Rise of Defcon 00:35:21 Protecting Linux: The Sandfly Security Story 00:40:01 The Magic Behind Sandfly's Agentless Security 00:43:21 Assuming Linux Is Secure? Think Again! 00:47:16 Should You Run Antivirus on Linux? 00:54:15 Breaking Into Cybersecurity: Advice for Linux Enthusiasts 00:58:41 Distro Talk: What's on Craig's Machine? 00:59:58 Sandfly for the Desktop: Home Edition Arrives! 01:05:15 How AI is Changing the Cybersecurity Game 01:13:11 Linux is Everywhere—How Does Sandfly Keep Up? 01:15:59 The Most Clever Linux Attack We've Seen 01:20:51 Catching Hackers in the Act: A Sandfly Success Story 01:23:03 Drift Detection: Now with More Horsepower! 01:23:42 Think Fast! It's Lightning Round Time 01:28:38 SCALE 22x is coming 01:30:03 Red Hat Summit 2025 01:30:47 Support the Show 01:32:36 Outro Links: TWIL 300 Celebration https://thisweekinlinux.com/300 (https://thisweekinlinux.com/300) Community Feedback https://destinationlinux.net/comments (https://destinationlinux.net/comments) https://destinationlinux.net/forum (https://destinationlinux.net/forum) Craig Rowland of Sandfly Security https://destinationlinux.net/sandfly (https://destinationlinux.net/sandfly) Discount Code: destination50 Defcon https://defcon.org/ (https://defcon.org/) SCALE 22x is coming https://www.socallinuxexpo.org/scale/22x (https://www.socallinuxexpo.org/scale/22x) Red Hat Summit 2025 https://www.redhat.com/en/summit (https://www.redhat.com/en/summit) Support the Show https://tuxdigital.com/membership (https://tuxdigital.com/membership) https://store.tuxdigital.com/ (https://store.tuxdigital.com/)
⬥GUEST⬥Jake Braun, Acting Principal Deputy National Cyber Director, The White House | On LinkedIn: https://www.linkedin.com/in/jake-braun-77372539/⬥HOST⬥Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine: https://www.itspmagazine.com/sean-martin⬥EPISODE NOTES⬥Cybersecurity is often framed as a battle between attackers and defenders, but what happens when hackers take on a different role—one of informing policy, protecting critical infrastructure, and even saving lives? That's the focus of the latest Redefining Cybersecurity podcast episode, where host Sean Martin speaks with Jake Braun, former Acting Principal Deputy National Cyber Director at the White House and current Executive Director of the Cyber Policy Initiative at the University of Chicago.Braun discusses The Hackers' Almanack, a project developed in partnership with DEF CON and the Franklin Project to document key cybersecurity findings that policymakers, industry leaders, and technologists should be aware of. This initiative captures some of the most pressing security challenges emerging from DEF CON's research community and translates them into actionable insights that could drive meaningful policy change.DEF CON, The Hackers' Almanack, and the Franklin ProjectDEF CON, one of the world's largest hacker conferences, brings together tens of thousands of security researchers each year. While the event is known for its groundbreaking technical discoveries, Braun explains that too often, these findings fail to make their way into the hands of policymakers who need them most. That's why The Hackers' Almanack was created—to serve as a bridge between the security research community and decision-makers who shape regulations and national security strategies.This effort is an extension of the Franklin Project, named after Benjamin Franklin, who embodied the intersection of science and civics. The initiative includes not only The Hackers' Almanack but also a volunteer-driven cybersecurity support network for under-resourced water utilities, a critical infrastructure sector under increasing attack.Ransomware: Hackers Filling the Gaps Where Governments Have StruggledOne of the most striking sections of The Hackers' Almanack examines the state of ransomware. Despite significant government efforts to disrupt ransomware groups, attacks remain as damaging as ever. Braun highlights the work of security researcher Vangelis Stykas, who successfully infiltrated ransomware gangs—not to attack them, but to gather intelligence and warn potential victims before they were hit.While governments have long opposed private-sector hacking in retaliation against cybercriminals, Braun raises an important question: Should independent security researchers be allowed to operate in this space if they can help prevent attacks? This isn't just about hacktivism—it's about whether traditional methods of law enforcement and national security are enough to combat the ransomware crisis.AI Security: No Standards, No Rules, Just ChaosArtificial intelligence is dominating conversations in cybersecurity, but according to Braun, the industry still hasn't figured out how to secure AI effectively. DEF CON's AI Village, which has been studying AI security for years, made a bold statement: AI red teaming, as it exists today, lacks clear definitions and standards. Companies are selling AI security assessments with no universally accepted benchmarks, leaving buyers to wonder what they're really getting.Braun argues that industry leaders, academia, and government must quickly come together to define what AI security actually means. Are we testing AI applications? The algorithms? The data sets? Without clarity, AI red teaming risks becoming little more than a marketing term, rather than a meaningful security practice.Biohacking: The Blurry Line Between Innovation and BioterrorismPerhaps the most controversial section of The Hackers' Almanack explores biohacking and its potential risks. Researchers at the Four Thieves Vinegar Collective demonstrated how AI and 3D printing could allow individuals to manufacture vaccines and medical devices at home—at a fraction of the cost of commercial options. While this raises exciting possibilities for healthcare accessibility, it also raises serious regulatory and ethical concerns.Current laws classify unauthorized vaccine production as bioterrorism, but Braun questions whether that definition should evolve. If underserved communities have no access to life-saving treatments, should they be allowed to manufacture their own? And if so, how can regulators ensure safety without stifling innovation?A Call to ActionThe Hackers' Almanack isn't just a technical report—it's a call for governments, industry leaders, and the security community to rethink how we approach cybersecurity, technology policy, and even healthcare. Braun and his team at the Franklin Project are actively recruiting volunteers, particularly those with cybersecurity expertise, to help protect vulnerable infrastructure like water utilities.For policymakers, the message is clear: Pay attention to what the hacker community is discovering. These findings aren't theoretical—they impact national security, public safety, and technological advancement in ways that require immediate action.Want to learn more? Listen to the full episode and explore The Hackers' Almanack to see how cybersecurity research is shaping the future.⬥SPONSORS⬥LevelBlue: https://itspm.ag/attcybersecurity-3jdk3ThreatLocker: https://itspm.ag/threatlocker-r974⬥RESOURCES⬥The DEF CON 32 Hackers' Almanack: https://thehackersalmanack.com/defcon32-hackers-almanackDEF CON Franklin Project: https://defconfranklin.com/ | On LinkedIn: https://www.linkedin.com/company/def-con-franklin/DEF CON: https://defcon.org/Cyber Policy Initiative: https://harris.uchicago.edu/research-impact/initiatives-partnerships/cyber-policy-initiative⬥ADDITIONAL INFORMATION⬥✨ More Redefining CyberSecurity:
eSentire, a leading global Managed Detection and Response (MDR) cybersecurity services provider, has announced that it has awarded the annual "Sean Hennessy Bursary" to Munster Technological University (MTU)computer science student, James Spillane. This year, eSentire is also celebrating the 10-year anniversary of the opening of its international headquarters and Security Operations Centre (SOC) in Cork, Ireland. eSentire established the Sean Hennessy Bursary award in 2021, in collaboration with the Department of Computer Science at MTU, in response to Ireland's growing cybersecurity skills shortage. According to Cyber Ireland's 2024 Security Snapshot Report, the cybersecurity industry employs approximately 8,000 professionals in Ireland, an increase of 8% since 2022. The Sean Hennessy Bursary provides college financial aid, as well as the opportunity to participate in a nine-month internship with eSentire. The scholarship is named in honour of the late Sean Hennessy, a former eSentire team member who was instrumental in establishing and managing eSentire's Global SOC in Cork in 2015. Sean Hennessy passed away in 2016. This is the fourth year that the Sean Hennessy Bursary has been awarded to a MTU student. Impressively, the three previous recipients of the award are all currently employed with eSentire's Global SOC in Cork, Ireland. Each of them has reached various stages of eSentire's Career Development Program, which fosters and supports security analysts' growth through attainment of internal and external certifications, mentoring and progression. "I am delighted and honoured to have been selected as this year's recipient of the Sean Hennessy Bursary," said James Spillane, 2025 eSentire Sean Hennessy Bursary winner. "I would like to sincerely thank everyone at eSentire for this incredible opportunity to further explore the fascinating world of cybersecurity, which is a passion and interest of mine. I am also grateful to MTU for their support and guidance through my studies. Receiving this award is an honour and a fulfilling achievement, I want to thank everyone involved for this prestigious opportunity." eSentire has been protecting organisations from known and unknown cyber threats for 20+ years, providing complete attack surface coverage on premises and in the cloud. With 2000+ customers in 80+ countries, eSentire provides Exposure Management, Managed Detection and Response, and Digital Forensics and Incident Response services designed to build an organisation's cyber resilience and prevent business disruption. eSentire protects the world's most targeted organisations, with 65% of its global base recognised as critical infrastructure, vital to economic health and stability. eSentire operates the largest SOC in the Southwest region of Ireland, and as a global leader in providing award-winning cybersecurity solutions, eSentire has contributed to the broader development of the Cork region and its security analysts are highly trained experts on the frontlines of cybercrime. "The 10-year anniversary of the opening of our Global SOC and headquarters in Cork is an important milestone for us," said Ciaran Luttrell, Vice President of eSentire's Global Security Operations. "We have grown our operations and currently employ over 50 staff members, we have completed over 25 SOC analyst internships, and this is the fourth year of our special bursary program honouring the memory of Sean Hennessy." "Reflecting on our ten years in Cork, we are especially proud to have led the way in contributing to the growth of the cybersecurity community," continued Luttrell. "It is through programs such as the annual bursary, our work as Chapter Leads with Cyber Ireland, the sponsorship of CorkSec, a Cork-based Def Con meetup group; and most recently, our partnership with Cyber Innovate, an incubator program supporting cybersecurity start-up companies, which launched in 2024. We could not have accomplished all these achievements without our strong ...
Austin Shamlin is the CEO and Founder of Traverse Project—a nonprofit organization that combats the human trafficking threat through data intelligence—where has pioneered data-driven methodologies to combat human trafficking. He is a former police executive who currently sits on the Advisory Board for the University of Houston’s Center for Research Excellence to Counter Human Trafficking, as well as the Board of Directors for Operation Path Forward—a nonprofit supporting those who serve America. Previously, Austin directed international counter-human trafficking operations for a nonprofit under the Tim Tebow Foundation and managed law enforcement operations for D.C. Public Schools. He has also worked as a government contractor in Afghanistan, Haiti, Iraq, and Somalia. He is a recognized speaker at Blackhat USA, DefCon, BENS, and other major conferences.See omnystudio.com/listener for privacy information.
00:00 - PreShow Banter™ — Get Political05:27 - BHIS - Talkin' Bout [infosec] News 2025-02-2506:07 - Story # 1: Trump 2.0 Brings Cuts to Cyber, Consumer Protections37:57 - Story # 2: OpenAI Uncovers Evidence of A.I.-Powered Chinese Surveillance Tool49:48 - Story # 3: Apple pulls data protection tool after UK government security row55:00 - Story # 4: Judge dismisses Chris Hadnagy lawsuit against DEF CON
Cash the Ticket had some bumps in the road this week so we apologize for the lack of episodes. Valenti explains it all and gives out "system plays" in college basketball for Wednesday evening. Download the latest episode of Cash the Ticket today. To learn more about listener data and our privacy practices visit: https://www.audacyinc.com/privacy-policy Learn more about your ad choices. Visit https://podcastchoices.com/adchoices
DEF CON is more than just a hacking conference—it's a community. In this episode, host AJ Nash sits down with Ada Zebra, a longtime goon and leader behind DEF CON Hotline, a resource dedicated to handling security incidents, harassment reports, and crisis situations at the event. Ada shares her journey from a first-time attendee to a key figure in DEF CON's security efforts, shedding light on the history and evolution of the hotline.She discusses how the hotline was born out of necessity after an incident in 2017, when leadership realized DEF CON needed a dedicated space for attendees to report issues safely. Since its launch in 2018, the hotline has grown every year, bringing in highly trained volunteers to assist in complex situations ranging from restraining orders to personal safety concerns.AJ and Ada also explore the hotline's relationship with DEF CON's security team, how volunteers are selected and trained, and why fostering an inclusive environment matters in the hacker community. If you've ever wondered what happens behind the scenes at one of the world's largest hacker gatherings, this episode offers an inside look at the challenges, responsibilities, and impact of the DEF CON Hotline.Send us a textSupport the show
You're Being Hacked Right Now—And You Don't Even Know It Ever wonder how cybercriminals manipulate human behavior to breach even the most secure organizations? In this episode of The Audit, Eric Brown and Nick Mellum sit down with renowned social engineer and penetration tester Alethe Denis to break down real-world hacking techniques, red team strategies, and the shocking ways attackers exploit trust. From winning DEF CON's Black Badge Social Engineering competition to executing high-stakes red team engagements, Alith shares jaw-dropping stories and expert insights on modern security threats. Key topics we cover: The art of social engineering and why it still works Wildly effective pretexts hackers use to gain access How AI and deepfakes are shaping the future of cybercrime Physical penetration testing stories that will make you rethink office security Simple but powerful strategies to protect yourself and your organization Don't wait until your organization is the next headline. Whether you're a cybersecurity pro or just getting started, this episode is packed with eye-opening insights you can't afford to miss. Like, share, and subscribe for more in-depth security discussions! #Cybersecurity #SocialEngineering #PenTesting #EthicalHacking #RedTeam
While one live service game thrives, another dies. We kick things off by talking about the end of MultiVersus, a game both unique as a live service game and has the strength of IP. The console war officially is over between PlayStation and Xbox as Xbox brings one of its biggest franchises to PlayStation. Speaking of PlayStation we are at Defcon 1 for a State of Play and give our predictions. We wrap things up with a listener email about the Like A Dragon franchise. Thanks for listening! Intro: MultiVersus 4 Things: - MulitVersus Shutting Down - Forza Horizon 5 Coming To PS5 - State of Play February 2025 Predictions - Email! Outro: J-E-N-O-V-A - Emergence - Final Fantasy 7 Rebirth by Yoshinori Nakamura Questions or comments? Please send emails to BetweenTheJoysticks@gmail.com. Follow us on Twitter @JoysticksPod Subscribe to us on Youtube @BetweenTheJoysticks
The gears of economic warfare are turning, and today on The Brief, Patrick Gunnels and Ashe in America break down Trump's latest power move: the creation of a U.S. Sovereign Wealth Fund—a first in American history. Is it just tariffs funding it, or is there a little “what's theirs is ours” energy in play? We connect the dots back to Saudi Arabia's 2017 purge and why this could be very bad news for the deep state's bank accounts. Meanwhile, Trudeau folds like a cheap lawn chair as Canada agrees to ramp up border security and tackle fentanyl in exchange for a tariff pause—but is this all just theater? Also, Panama kicks China's Belt and Road Initiative to the curb after a visit from Marco Rubio (yes, that Marco Rubio), and USAID's panic levels hit DEFCON 1 as Elon's band of autists dismantle their empire. All that, plus the libertarian take on tariffs, leftist meltdowns over Trump's CIA pick, and why “fair trade” has always been a scam. Buckle up, because it's all happening.
Mike and Bulldog talk the Sabres and also discuss the movie War Games
https://duplicationnation.com/ If you want to become an empowering, effective leader, you've got to learn conflict resolution skills, and how to solve challenges. And do this in a way that doesn't disempower your team, or even lead to a serious blow up. This is high-level leadership advice from one of the strongest leaders our profession has ever known. Please rate and subscribe. Show notes: DEFCON 1 Direct Selling: https://www.amazon.com/Defcon-Direct-Selling-Manual-Leaders/dp/1119642116/ref=sr_1_1
The Daily Quiz - General Knowledge Today's Questions: Question 1: What is the Chihuahua named after? Question 2: Where did the first atomic bomb explode? Question 3: Which word is defined as 'to drink often; to eat and;or drink noisily'? Question 4: What word is used in the NATO Phonetic Alphabet for the letter P? Question 5: What word is used in the NATO Phonetic Alphabet for the letter U? Question 6: Which word is defined as 'an old Scots term meaning to look at somebody while they're eating in the hope that they'll give you some of their food'? Question 7: What is the value of the letter Q in Scrabble? Question 8: What does the military acronym DEFCON stand for? Question 9: What were 'Little Boy' and 'Fat Man'? This podcast is produced by Klassic Studios Learn more about your ad choices. Visit megaphone.fm/adchoices
Mike Grover is a security researcher, InfoSec expert, and the creator of the infamous O.MG Cable. He gained prominence in 2019 when he showcased his malicious USB cable prototype at DEF CON, capable of recording keystrokes and executing remote commands. Grover's O.MG Cable looks identical to a regular charging cable, but contains a tiny implant that creates a Wi-Fi hotspot, allowing attackers to access the connected device from up to 300 feet away. Since its inception, Grover has refined the O.MG Cable design, making it indistinguishable from normal USB cables and expanding its capabilities. The latest iteration includes features such as geofencing, self-destruct mechanisms, and support for various connector types including Lightning and USB-C. Grover's work aims to raise awareness about hardware security risks while providing tools for red teams and security researchers to test and improve organizational defenses. Shawn Ryan Show Sponsors: https://ROKA.com | Use Code SRS https://ExpressVPN.com/SRS https://ZipRecruiter.com/SRS https://RocketMoney.com/SRS https://prizepicks.onelink.me/LME0/SRS https://ShawnLikesGold.com | 855-936-GOLD #goldcopartner https://americanfinancing.net/srs NMLS 182334, nmlsconsumeraccess.org. Call 866-781-8900 for details about credit costs and terms. Mike Grover Links: Website - https://o.mg.lol/ X - https://x.com/_MG_ LinkedIn - linkedin.com/in/mgrover Please leave us a review on Apple & Spotify Podcasts. Vigilance Elite/Shawn Ryan Links: Website | Patreon | TikTok | Instagram | Download Learn more about your ad choices. Visit podcastchoices.com/adchoices
Superpowers School Podcast - Productivity Future Of Work, Motivation, Entrepreneurs, Agile, Creative
We explore the power of storytelling with Geoff White, an investigative journalist and co-host of the popular BBC podcast 'The Lazarus Heist.' Geoff shares the story of North Korea's cybercriminal activities, particularly the infamous Bangladesh Bank heist. He shares insights into the underpinnings of successful cybersecurity breaches and the human vulnerabilities they exploit.Geoff also discusses his career trajectory, tips for compelling storytelling, and his experiences interviewing key figures involved in these cybercrimes. The episode highlights the importance of emotional connection and narrative in effectively communicating complex information, both in cybersecurity and beyond. 00:00 The Tragic Tale of Ignaz Semmelweis 03:52 Introducing Geoff White: Master Storyteller 14:53 The Genesis of the Lazarus Heist 18:24 The Bangladesh Bank Heist 20:47 The Heist Unfolds: From Bank to Casino 22:28 Personal Connection to the Heist 23:26 Cybersecurity Lessons from the Lazarus Heist 26:25 The Art of Storytelling in Investigative Journalism 30:42 Memorable Interviews and Behind-the-Scenes 33:31 Final Thoughts⚡️ In each episode, Paddy Dhanda deep dives into a new human Superpower to help you thrive in the age of AI.Paddy Dhanda (Host)Paddy works at the largest Tech training organisation in the UK and is passionate about helping tech professionals build human skills to thrive in the age of AI.Contact Paddy: paddy@superpowers.schoolSubscribe to my newsletter:
Today’s Network Automation Nerds episode discusses Cox Communications’ journey to getting network automation right. We also talk about how they used network automation to support operating the network at the DEF CON hacker convention. Our guests are David Ezell, Joshua Watkins and Eric Hansen from Cox Communications. We dive into initial steps and challenges in... Read more »
Today’s Network Automation Nerds episode discusses Cox Communications’ journey to getting network automation right. We also talk about how they used network automation to support operating the network at the DEF CON hacker convention. Our guests are David Ezell, Joshua Watkins and Eric Hansen from Cox Communications. We dive into initial steps and challenges in... Read more »
In this engaging conversation, Chris Glanden interviews Brandon Prince, also known as Syntax, a multifaceted individual who is a hacker, DJ, and motorcycle racer. They delve into Brandon's early life, his journey into hacking and music, his experiences at DefCon, and his insights into the current job market in cybersecurity. Brandon shares unique stories from his life, including his transition from competitive motorcycle racing to DJing at security conferences, and discusses the challenges of navigating the job market today. In this engaging conversation, Chris Glanden and Syntax delve into various topics surrounding cybersecurity, innovative uses of technology, and the vibrant hacker community. They discuss the intricacies of Windows language packs and their implications for security, the creative use of Twitch as a command and control platform, and the importance of community-driven conferences. Syntax shares his experiences with unique venues and bars across the country, culminating in a humorous discussion about the concept of a cybersecurity-themed bar, complete with signature drinks that reflect hacker culture.TIMESTAMPS:00:00 - Introduction to Brandon Prince03:52 - Early Life and Hacking Beginnings06:33 - Navigating the Hacker Community08:59 - The DJ Journey and DefCon Experience11:22 - Incorporating Hacking into Music14:01 - Motorbike Racing Adventures16:35 - Current Job Market Insights19:14 - Unique Hacking Experiences26:46 - Resume Hacking29:35 - Exploring Windows Language Packs and Exploits31:39 - Innovative Use of Twitch as a C237:25 - Upcoming Conferences and Events39:37 - Preference for Community-Based Conferences46:29 - Unique Venues and Bar Experiences51:29 - Conceptualizing a Cybersecurity-Themed BarSYMLINKS:Syntax on Twitch - https://twitch.tv/Syntax976Syntax's official Twitch channel where he streams music, sim racing, and hacker-themed content.Syntax on SoundCloud - https://soundcloud.com/Syntax976SoundCloud profile featuring Syntax's original tracks, including contributions to Defcon soundtracks.DEF CON Media Server - https://media.defcon.orgOfficial media server for DEF CON, hosting soundtracks, talks, and other resources.Meow Wolf Official Website - https://meowwolf.comInteractive and immersive art experiences, including Meow Wolf venues mentioned by Syntax.CactusCon Official Website - https://cactuscon.comDetails about the CactusCon conference in Phoenix, Arizona, where Syntax may perform.CONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com
The Daily Quiz - General Knowledge Today's Questions: Question 1: What Native Language Would Jesus Christ Have Spoken? Question 2: What is the technical name for the pair of intersecting lines in a firearm scope? Question 3: What is the world's largest library, with over 115 million volumes on 532 miles of bookshelves? Question 4: What does the military acronym DEFCON stand for? Question 5: Which word is defined as 'an interpreter or professional guide for travelers'? Question 6: Where is Capitol Hill? Question 7: According to the nursery rhyme, who, 'sat in the corner eating a Christmas Pie''? Question 8: Which word is defined as 'of, pertaining to, or resembling a hedgehog'? Question 9: What does the "touch of Midas" turn everything? This podcast is produced by Klassic Studios Learn more about your ad choices. Visit megaphone.fm/adchoices
We are now a Marvel Rivals fancast! Listen to us discuss the new heroes, rank ALL 35 heroes and discuss strategies around the new meta. Not really but we have fun teasing Jon on this episode. We answer YOUR emails about Marvel Rivals, “Soulsborne” games and movies. We then expand our discussion about the Nintendo Switch 2 as we are at Defcon 1 for the new hardware to be announced. Finally, Jon continues his adventures in Rapture as he revisits one of the greatest games of all time. Thanks for listening! Intro: Marvel Rivals 4 Things: - Marvel Rivals - Email! - Nintendo Switch 2 Predictions Part II - Bioshock Outro: Path to Rivals (Login Theme) - Marvel Rivals by Synchron Stage Orchestra, Masahiro Aoki Questions or comments? Please send emails to BetweenTheJoysticks@gmail.com. Follow us on Twitter @JoysticksPod Subscribe to us on Youtube @BetweenTheJoysticks
DianeKazer.com DianeKazer.com/PEPTIDES DianeKazer.com/PURCHASEPEPTIDES DianeKazer.com/VIP DianeKazer.com/SHOP DianeKazer.com/PATIENT Sabrina Wallace and Her Extensive Research https://odysee.com/@VictorHugoArt:1/Sabrina-Wallace-Ryan-Veli-Victor-Hugo:2 Transhumanism https://www.bibliotecapleyades.net/ciencia3/ciencia_transhumanism109.htm Weather https://www.instagram.com/reel/DEgkvcRpJ2z/?igsh=cDU4OG85bXlsZHpk CIPRO Paralysis https://www.instagram.com/reel/DEitvzNSZaQ/?igsh=MXNuM3E1ZXE1b3k0bg%3D%3D 2 Men & Dog In Palisades Fire https://www.instagram.com/reel/DEgkvcRpJ2z/?igsh=cDU4OG85bXlsZHpk X Users Streaks https://www.instagram.com/reel/DEjkPMTuI3Y/?igsh=MTg0ZG4zanA4bjJpMw%3D%3D What's In The Fog https://www.instagram.com/reel/DEcMZU6yCPd/?igsh=enJrYmQ3djQ2dmtk Food Supply https://www.instagram.com/reel/DEYr4XYJJCr/?igsh=MTdpYjdmbjd3MzZzcQ%3D%3D Tsunami Fog Bank https://www.instagram.com/reel/DD0-qN1xeJN/?igsh=ZTlmMmY1a2lhY2E5 Fake Fruits https://www.instagram.com/reel/DBHSf-sRfiH/?igsh=OWliOWc1YTRuaXA3 Surgeon General's Warning on Alcohol https://www.hhs.gov/about/news/2025/01/03/us-surgeon-general-issues-new-advisory-link-alcohol-cancer-risk.html We are literally in THE battle for our life right now. The toxins have increased to DEFCON 5 and they are attacking us from every angle. And no, this is not hyperbole, this is the reality. I'm not here to SCARE you but simply to AWARE you…your survival depends on it. I know you've seen this ‘FOG' all over the place. Well my friend, it hasn't lifted and we have no idea when the evil insanity will end. There's no sitting on the sidelines at this point. So what in the heck can you do? You've got to be detoxing your body, your home, your office and every environment you NOW. I'm urging you to take serious action. And this is what I'll be sharing with you today, during our CHI Podcast: DOC TALK: The TOP 5 TOXINS and my TOP 5 PEPTIDE SOLUTIONS. So my warriors, you've got questions about toxins (and peptides and just why they are phenomenal solutions) and I've got the answers. I'm going live here Wednesday, January 8th at 10am PT / 1pm ET to give you all the details you need to know for our survival. Don't miss out, I'm answering your peptide questions LIVE and I'm offering you the solutions on WHAT to do, HOW to do it and WHERE to get your peptides to begin your healing journey. WE COVER: The TOP 5 TOXIC EXPOSURES of 2025 to Reduce & Detox NOW WHY Peptides Are a Solution the MAINSTREAM MEDICAL SCAM doesn't want you to use NEW & Rising Ozempic Dangers & What to do Instead to Lose weight FAST Let's dive deeper into my TOP 5 PEPTIDE FAV'S to Increase your Energy, Immunity, Beauty, Vitality by addressing Hormone Optimization, Infection, Inflammation + Weight Gain, Body Pain and Broken Brain! WHERE to get the solutions - JOIN our VIP Mastermind Tribe for the ‘Take Action After Party' and SHOW-AND-TELL on all things peptides for EVEN MORE INFO!
Podcast: PrOTect It All (LS 24 · TOP 10% what is this?)Episode: Key Conferences and Networking Opportunities for Cybersecurity Professionals in 2025Pub date: 2025-01-06Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationHappy New Year 2025. In this episode, host Aaron Crow guides you through the evolving cybersecurity landscape impacting everything from power utilities and transportation to manufacturing and healthcare. Aaron explores the importance of integrating people, processes, and technology to build resilient systems. He also outlines the major cybersecurity events and conferences you won't want to miss this year, including s4 in Tampa, RSA in San Francisco, and Black Hat and DEFCON in Vegas. And don't miss the Lone Star Cyber Shootout happening in January. Click here to participate in this exclusive event - https://corvosec.com/lonestar-cyber-shootout/ With a focus on community and networking, Aaron emphasizes how these connections can elevate your cybersecurity strategy. Stay tuned for actionable insights, expert interviews, and real-world case studies to kickstart your year. Let's make 2025 a year of impactful cybersecurity advancements together. Key Moments: 00:40 Resilience needs technology, people, and processes. 05:03 Annual Vegas cybersecurity events: Black Hat, DEFCON. 09:01 Networking is crucial for career and growth. 11:42 Secure messaging suggests normal texting may be compromised. 16:04 Balance technical skills with essential soft skills. 17:11 Excellent professionals struggle in untrained management roles. Connect With Aaron Crow: Website: www.corvosec.com LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co Website: https://protectitall.co/ X: https://twitter.com/protectitall YouTube: https://www.youtube.com/@PrOTectITAll FaceBook: https://facebook.com/protectitallpodcast To be a guest or suggest a guest/episode, please email us at info@protectitall.co Please leave us a review on Apple/Spotify Podcasts: Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
A Boston researcher and physician warn that we're at ‘DEFCON 3' for bird flu, Face mask mandates return across multiple states in the US as doctors warn of ‘quad-demic’ of four viral infections, China steps up monitoring of emerging respiratory diseases while a “mystery disease outbreak” overwhelms their hospitals in a chilling echo of the […]
Join us for a special bonus episode of Patch [FIX] Tuesday, an hour-long compilation of the vulnerabilities that help shaped the cybersecurity landscape in 2024. This episode recaps some the most critical and interesting exploits, from supply chain compromises to elevation of privilege threats targeting widely used platforms. Whether you're an IT administrator, security professional, or tech enthusiast, this episode provides valuable insights to stay ahead of evolving threats.Here's a list of vulnerabilities discussed in this episode, and be sure to tune into the Patch [FIX] Tuesday podcast on the second Tuesday of every month. Operation Triangulation (00:13)CVE-2024-21401: Microsoft Entra Jira Single-Sign-On Plugin Elevation of Privilege Vulnerability (5:00)CVE-2024-21400: Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability (11:00)CVE-2024-3094: XZ/Liblzma Supply Chain Backdoor (17:08)CVE-2024-4671: Google Chrome Use-After-Free Vulnerability (30:00)CVE-2024-30078: Windows WiFi Driver Remote Code Execution Vulnerability(35:03)CVE-2024-38053: Windows Layer Two Bridge Network RCE (47:14)CVE-2024-38180: SmartScreen Prompt Remote Code Execution Vulnerability (53:12)CVE-2024-43491: Microsoft Windows Update Remote Code Execution Vulnerability (1:00:00)CVE-2024-43533: Remote Desktop Client Remote Code Execution Vulnerability (1:04:24)CVE-2024-5535: Microsoft Defender for Endpoint Remote Code Execution Vulnerability (1:07:35)CVE-2024-49093: Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability (1:09:36)
On this Screaming in the Cloud Replay, we're taking you back to our chat with Nick Frichette. He's the maintainer of hackingthe.cloud, and holds security and solutions architect AWS certifications, and in his spare time, he conducts vulnerability research at Hacking the Cloud. Join Corey and Nick as they talk about the various kinds of cloud security researchers and touch upon offensive security, why Nick decided to create Hacking the Cloud, how AWS lets security researchers conduct penetration testing in good faith, some of the more interesting AWS exploits Nick has discovered, how it's fun to play keep-away with incident response, why you need to get legal approval before conducting penetration testing, and more.Show Highlights(0:00) Intro(0:42) The Duckbill Group sponsor read(1:15) What is a Cloud Security Researcher?(3:49) Nick's work with Hacking the Cloud(5:24) Building relationships with cloud providers(7:34) Nick's security findings through cloud logs(13:05) How Nick finds security flaws(15:31) Reporting vulnerabilities to AWS and “bug bounty” programs(18:41) The Duckbill Group sponsor read(19:24) How to report vulnerabilities ethically(21:52) Good disclosure programs vs. bad ones(28:23) What's next for Nick(31:27) Where you can find more from NickAbout Nick FrichetteNick Frichette is a Staff Security Researcher at Datadog, specializing in offensive security within AWS environments. His focus is on discovering new attack vectors targeting AWS services, environments, and applications. From his research, Nick develops detection methods and preventive measures to secure these systems. Nick's work often leads to the discovery of vulnerabilities within AWS itself, and he collaborates closely with Amazon to ensure they are remediated.Nick has also presented his research at major industry conferences, including Black Hat USA, DEF CON, fwd:cloudsec, and others.LinksHacking the Cloud: https://hackingthe.cloud/Determine the account ID that owned an S3 bucket vulnerability: https://hackingthe.cloud/aws/enumeration/account_id_from_s3_bucket/Twitter: https://twitter.com/frichette_nPersonal website:https://frichetten.comOriginal Episodehttps://www.lastweekinaws.com/podcast/screaming-in-the-cloud/hacking-aws-in-good-faith-with-nick-frichette/SponsorThe Duckbill Group: duckbillgroup.com
This is the story of the secret life of cellular chips and why we need to mitigate against the unintended access they provide. Deral Heiland, Principal Security Research for IoT at Rapid 7, describes a research project he presented at the IoT Village at DEF CON 32 where they compiled AT command manuals from various vendors, discovering unexpected functionalities, such as internal web services.
Joseph Cox is an award-winning investigative journalist covering hacking, crime, and privacy. He is author of the book, "Dark Wire: The Incredible True Story of the Largest Sting Operation Ever," and gave a popular DEF CON 32 presentation titled “Inside the FBI's Secret Encrypted Phone Company, Anom." In this episode, Cox breaks down his experience discovering the FBI's secret phone company, and more. • For more on cybersecurity, visit us at https://cybersecurityventures.com
In this episode of Stats on Stats, we sit down with Dakshitaa Babu, Security Researcher and Product Evangelist at Square X. Based in Singapore, Dakshitaa shares her inspiring journey from sustainability to cybersecurity and her pivotal role in addressing emerging browser vulnerabilities. We explore groundbreaking research unveiled at DEF CON, why browser security is crucial in today's threat landscape, and the innovative tools Square X provides for enterprises and individual users. Guest Connect LinkedIn: https://www.linkedin.com/in/dakshitaababu/ SquareX: https://www.sqrx.com/ SquareX for Beginners: https://labs.sqrx.com/squarex-for-beginners-ae8fac17ea68 Stats on Stats Resources Merch: https://www.statsonstats.io/shop LinkTree: https://linktr.ee/statsonstatspodcast Stats on Stats Partners & Affiliates IntelliCON 2025 Website: https://www.intelliguards.com/intellic0n-speakers Register: https://www.eventbrite.com/e/intellic0n-2025-tickets-1002600072807 Use Discount Code for 20% off Tickets: STATSONSTATS Path AI Website: https://yourpath.ai Discount Code: Join our Discord community for access! Antisyphon Training Website: https://www.antisyphontraining.com MAD20 Training Website: https://mad20.io Discount Code: STATSONSTATS15 Ellington Cyber Academy: https://kenneth-ellington.mykajabi.com Discount Code: STATSONSTATS Kevtech Academy Website: https://www.kevtechitsupport.com Dream Chaser's Coffee Website: https://dreamchaserscoffee.com Discount code: STATSONSTATS Podcasts We Like DEM Tech Folks Website: https://linktr.ee/developeverymind YouTube: https://www.youtube.com/@demtechfolks IntrusionsInDepth Website: https://www.intrusionsindepth.com YouTube: https://www.youtube.com/@IntrusionsInDepth
Howdy, y'all, and welcome to The Cyber Ranch Podcast! That's Jon Green, an experienced CISO but also an experienced CTO. Jon is currently the CSO and CTO at HPE's Aruba. He's also a DefCon goon and a Team8 Villager. He's done the marketing engineer side, the network engineer side… Quite a storied past. We are thrilled to be talking with him about the differences between CSO/CISO and CTO. Jon, thank you so much for joining us at the ‘Ranch! Tell us about your early career, did you start in security or as a technologist? What are the key priorities for someone with a CTO title? As someone who has held both CTO and CSO titles, how does the pressure to deliver revenue impacting products differ from the pressure cyber leaders face? What does it feel like to be on the receiving end of security requirements which are often developed in the abstract or for the general case? When you are assessing future trends and technology shifts, what are the different lenses you use to make the security evaluation vs the more functional and integration-oriented evaluation? What is something you have learned which surprised you? What do you wish other CSOs understood better? What is a piece of advice… You've been involved in Defcon and other cyber events for many years, what changes have you seen during that time? Y'all be good now!
In this special edition podcast, N2K's Executive Editor Brandon Karpf talks with author, CEO and cybersecurity advisor Dr. Bilyana Lilly about her new novel "Digital Mindhunters." Book Overview In a high-stakes game of espionage and deception, a female analyst uncovers Russia's plot to wield artificial intelligence, espionage, and disinformation as weapons of chaos against the United States. As she races against time to thwart an assassination plot, she finds herself entangled in a web of international intrigue and discovers a parallel threat from a Chinese spy network aiming to steal data, manipulate American voters, and harness technology to dismantle the very foundations of U.S. democracy. In a world where lies are a weapon and trust is a luxury, she navigates the treacherous worlds of arms dealers, hackers, and spies to protect her country. About the author Dr. Bilyana Lilly is a cybersecurity and information warfare expert. She advises senior executives in the private and public sector on how to mitigate cybersecurity risk across their enterprises. Dr. Lilly serves on the Advisory Boards of the venture capital firm Night Dragon and the cybersecurity firm RunSafe Security. She chairs the Democratic Resilience Track of the Warsaw Security Forum and is an adjunct senior advisor for critical infrastructure and resilience at the Institute for Security and Technology. Her previous roles include a manager at Deloitte's Financial Cybersecurity Practice and a fellow at the RAND Corporation. Dr. Lilly holds a PhD in policy analysis and cyber security, and three master's degrees, including an honors degree from Oxford University. Her book "Russian Information Warfare" became a bestseller and is on display at the Pentagon. Dr. Lilly is a mentor and a speaker at RSA, DefCon, CyCon, and the Executive Women's Forum. She has been denounced by Russia's Ministry of Foreign Affairs and called cyber expert by Tom Hanks. Learn more about your ad choices. Visit megaphone.fm/adchoices
Mike Evans, Brandon Stokley, and Mark Schlereth set the table with their favorite topics of the morning like which DEFCON the Nuggets and Avs should be at after two uninspiring losses. Stoke debunks a bunch of sour grapes coming from a former fan favorite. The guys have an uncomfortable conversation about the state of the Nuggets and the Avalanche and whether it’s time to shake things up. Mike and Stoke lament the lack of football this weekend, Mike still being hung up on the Buffs’ loss to the Jayhawks. The guys bookend today’s show by hitting the hardwood and looking ahead to the Nuggets’ road ahead.