Podcasts about DEFCON

Alert posture used by the United States Armed Forces

  • 1,264PODCASTS
  • 3,562EPISODES
  • 56mAVG DURATION
  • 1DAILY NEW EPISODE
  • Sep 1, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about DEFCON

Show all podcasts related to defcon

Latest podcast episodes about DEFCON

David Bombal
#507: He Quit Cybersecurity After 34 Years — Here's Why

David Bombal

Play Episode Listen Later Sep 1, 2025 22:23


Big thank you to Proton Pass for sponsoring this video. To sign up for Proton Pass, please use the following link https://proton.me/davidbombal to get a 60% discount. Cybersecurity icon Mikko Hyppönen sits down with David Bombal at Black Hat to explain his bold move from antivirus to anti-drone defense after 34 years. He breaks down why mobile operating systems are the biggest security improvement of the past 15 years, how attackers have shifted from device exploits to human scams, and why he believes defenders currently have the edge with AI. They unpack the rise of fiber-tethered drones that evade RF detection, the coming reality of autonomous “killer robots” (not yet here—but inevitable), and the grim state of privacy as everyday IoT devices go online by default—his “internet asbestos” warning. Mikko also reflects on achieving keynote goals at DEF CON, RSA, and Black Hat, and shares career advice: set goals, don't drift. Topics: mobile OS security, social engineering, AI for defense, zero-day research, drone warfare, privacy and encryption policy, IoT risks, career pivot. // Mikko Hypponen's SOCIALS // X: https://x.com/mikko Website: https://mikko.com/ LinkedIn: https://www.linkedin.com/in/hypponen/... // Books REFERENCE // If it's smart it's vulnerable: US: https://amzn.to/41lkSaG UK: https://amzn.to/4oTpOgN // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:56 - Mikko Hyppönen keynote talks 01:51 - Proton Pass sponsored segment 04:09 - Pivoting from cybersecurity to anti-drone 09:28 - Humanoid robots are near 09:54 - How cybersecurity has improved 12:11 - Defenders have the advantage with AI 15:26 - Pros and Cons of the AI revolution 16:57 - Privacy is dying 21:36 - Advice for your future // Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.

Just Above The Average FPL
Is Joao Pedro The Best Striker In The League? | GW4 First Look

Just Above The Average FPL

Play Episode Listen Later Aug 31, 2025 105:46


This week on Above Average FPL, Adam and Baker unpack a brutal Gameweek 3 filled with blanks, benchings, and bonus-point heartbreak. From Salah's continued struggles to Bruno's last-minute redemption, we explore the tactical trends and FPL implications heading into the international break.

Badlands Media
Why We Vote Ep. 139: Exposing Election Vulnerabilities w/ Phillip Davis

Badlands Media

Play Episode Listen Later Aug 30, 2025 90:12


CannCon and Ashe in America welcome Phillip Davis, known online as @Mad_Liberals, for a deep-dive into election vulnerabilities exposed at DEFCON. Davis, a veteran software developer with decades in fingerprint identification systems, walks through how voting machines can be accessed and manipulated using readily available technician and poll worker cards. He explains the ease of altering ballots, prompts, and even candidate displays without leaving an audit trail, demonstrating how voters themselves can be unknowingly hacked. The conversation also unpacks the infamous Halderman Report, systemic security failures, and the lack of accountability in election administration. From Goodwill voting machines to encryption keys left in plain sight, Davis reveals how fragile U.S. election infrastructure really is, sparking a raw discussion on trust, oversight, and the future of voting.

Book It! A Wrestling Podcast
Episode 302-EWO: Def Con One – Part 2 (BookIt!Verse 5)

Book It! A Wrestling Podcast

Play Episode Listen Later Aug 30, 2025 76:58


The Bad Guy Kenny's Elite Wrestling Organization continues with Def Con One – Part 2 in BookIt!Verse 5!If Part 1 set the tone, Part 2 raises the stakes with bigger matches, shocking twists, and Kenny's signature chaos.

ScanNetSecurity 最新セキュリティ情報
チーム GMOイエラエ、DEF CON 33 Cloud Village CTF で 3 年連続世界 1 位獲得

ScanNetSecurity 最新セキュリティ情報

Play Episode Listen Later Aug 28, 2025 0:19


GMOサイバーセキュリティ byイエラエ株式会社は8月26日、同社に所属するホワイトハッカーチーム「GMOイエラエ」が「DEF CON 33」CTFにおける「Cloud Village CTF」で優勝し、3年連続で世界1位を獲得したと発表した。

Badlands Media
DEFCON ZERQ Ep. 006: Codex 9/11, Flynn's Role, and Trump's War on the Cartels

Badlands Media

Play Episode Listen Later Aug 27, 2025 129:46


Alpha Warrior and Josh Reid return for a hard-hitting episode of DEFCON ZERQ, joined by Brad Zerbo to dig into the revelations behind his documentary Codex 9/11. From CIA fingerprints, missing gold, and the forever war model, to the global cabal's use of terror as a money funnel, the discussion exposes the hidden networks fueling America's darkest chapters. The hosts then connect the dots to today, breaking down Pam Bondi's cryptic posts, drops, and what Trump's National Guard deployments really mean. Is the administration preparing for cartel crackdowns, sleeper cell roundups, and a reckoning on 9/11 itself? With deep dives into John Brennan, James Comey, Flynn's quiet advisory role, and looming moves in Venezuela, this episode blends geopolitics, military strategy, and decoding with the unfiltered edge DEFCON ZERQ is known for.

UNSECURITY: Information Security Podcast
Unsecurity Episode 245: DEF CON Recap w/ Matt Dowd, Matt Findlay, Pinky Thompson

UNSECURITY: Information Security Podcast

Play Episode Listen Later Aug 27, 2025 30:35


Returning from this year's DEF CON, hear from our Offensive Team Managers, Dowd and Findlay, and Pinky, IR Manager and co-host of The Hackle Box. Hear about new highlights, CTF's, and villages, and reflection from Brad as a Blue Team member navigating past challenges. Have something to say? Contact us at unsecurity@frsecure.com and follow us for more!LinkedIn: frsecure Instagram: frsecureofficialFacebook: frsecureBlueSky: frsecureAbout FRSecure: https://frsecure.com/ FRSecure is a mission-driven information security consultancy headquartered in Minneapolis, MN. Our team of experts is constantly developing solutions and training to assist clients in improving the measurable fundamentals of their information security programs. These fundamentals are lacking in our industry, and while progress is being made, we can't do it alone. Whether you're wondering where to start, or looking for a team of experts to collaborate with you, we are ready to serve.

What the Hack with Adam Levin
Episode 214: DEF CON Redux with Rachel Tobac!

What the Hack with Adam Levin

Play Episode Listen Later Aug 26, 2025 34:44


In this second installment of our DEF CON two-parter, we talked to SocialProof Security CEO Rachel Tobac about how and why people are often the weakest link in so many cybersecurity protocols and how making yourself a harder target will cause most threat actors to move on to an easier mark. Learn more about your ad choices. Visit megaphone.fm/adchoices

SECURE AF
DEF CON 33 Debrief

SECURE AF

Play Episode Listen Later Aug 26, 2025 48:45


Got a question or comment? Message us here!Fresh off the chaos of DEF CON 33, Tanner, Hickman, and Will break down the four-day hacker conference, from the eye-opening hacker villages and mind-bending talks to Hickman's clutch CTF victory and Will's bold dive into the Social Engineering Community's Vishing Competition. No sleep, all signal.Support the showWatch full episodes at youtube.com/@aliascybersecurity.Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.

Absolute AppSec
Episode 295 - DEF CON 33 Recap, Crocs and Socks (and Bots)

Absolute AppSec

Play Episode Listen Later Aug 26, 2025


Seth and Ken return with a new episode summarizing their experience at DEF CON 33 and all things Las Vegas over the past month. This includes panels, talks, workshops, happy hours, and even corporate (boo) events. This is followed by discussion of a few research items that came out of the conference, including James Kettle's HTTP1.1 Must Die talk. Finally, why AI is infecting Application Security.

Pebkac Podcast
433 - DEFCON No More?

Pebkac Podcast

Play Episode Listen Later Aug 26, 2025 64:16


Three hosts discuss their recent con visits.

Holofote
Teresa Pereira

Holofote

Play Episode Listen Later Aug 25, 2025 14:55


Mesmo sem saber como tudo ia funcionar, Teresa Pereira candidatou-se e foi uma de 14 participantes escolhidos no mundo para a competição de vishing na DEF CON, uma das maiores conferências internacionais de hackers.

mesmo defcon teresa pereira
Ham Radio Crash Course
Huntsville and DefCon Recaps

Ham Radio Crash Course

Play Episode Listen Later Aug 23, 2025 195:00


Show Notes (contains affiliate links): Huntsville and DefCon Recaps    On this week's episode of Ham Radio Crash Course, a podcast roughly based on amateur radio but mostly made up of responding to emails from listeners, hosted by Josh Nass - KI6NAZ and his reluctant wife, Leah - KN6NWZ, we talk about portable SSTV, Huntsville and DefCon recaps and Baba Vanga predictions.    Announcements: HRCC Net - https://hrcc.link.   Gigaparts Link (get 10% with code JOSH) - https://www.gigaparts.com/nsearch/?lp=JOSH   Ham Radio Minute: Fun with Portable SSTV.   Ham Radio Test Study with Leah - Extra Exam HamStudy: https://hamstudy.org Support by getting something from Signal Stuff: https://signalstuff.com/?ref=622   Gordon West Ham Radio Test Prep Books with HRCC Links  -Technician: https://amzn.to/3AVHGU1 -General: https://amzn.to/4ehQ5zz -Extra: https://amzn.to/4efCqJ2   Free Fastrack to Your Ham Radio License Books on Audible (for new to Audible readers): https://www.amazon.com/hz/audible/mlp/membership/premiumplus?tag=hrccpodcast-20   Join the conversation by leaving a review on Apple Podcast for Ham Radio Crash Course podcast at https://podcasts.apple.com/us/podcast/ham-radio-crash-course/id1400794852 and/or emailing Leah@hamtactical.com. Leaving a review wherever you listen to podcasts will help Ham Radio Crash Course reach more hams and future hams and we appreciate it!   Show Topic: Huntsville Hamfest and DefCon Recaps   Hog Wild in the Salted Ham Cellar. Sovereign citizen against ham radio licenses.   Preparedness Corner - Baba Vanga Predictions for 2026 https://timesofindia.indiatimes.com/astrology/zodiacs-astrology/baba-vanga-predictions-for-2026-will-scare-you-alien-contact-natural-disasters-global-war-and-more/articleshow/123416653.cms   Email Correspondent's Tower: We answer emails with ham radio questions, comments on previous podcasts, T-shirt suggestions and everything in between.   Links mentioned in the ECT: Doug's Sleepy Hollow Park Video -  https://youtu.be/tLFnq2dM-XY HRCC Movie Club    Voted and suggested movies here - https://poll.ly/N7Jt2ACU1Epz5PSJmknw   CJ's Nifty List of HRCC Movie Club movies here - https://letterboxd.com/roguefoam/list/ham-radio-crash-course-podcast-movie-club/   The 5th Wave 10/30 War of the Worlds (2005) 10.5/30 Hitchhiker's Guide To The Galaxy 11/30 Maximum Overdrive 11/30  The Tomorrow War 11/30 On The Beach (1959) 12/30 The Postman 12/30 Soylent Green 12/30 World War Z 12/30 Waterworld 13/30 San Andreas 13/30 Airplane 14/30 The Day After (1983) 14/30 The Day After Tomorrow 14/30 Z is for Zachariah 14/30 Fall (2022) 14.5/30 Signs 15/30 Deep Impact 15/30  The Birds 15/30 Twisters (2024) 15/30  Armageddon 15.5/30 Sean of the Dead 16/30 Zombieland 16/30 The Book of Eli Ranked: 16.75/30 Love and Monsters 17/30 Frequency 17/30 2012 17/30 Greenland 17/30 12 Monkeys 17.5/30  Threads 18/30 The Survivalist 18/30 Independence Day 18.5/30 Contact (1997) 19/30 The Towering Inferno 19/30 Don't Look Up 19.5/30 Twister  19.5/30 Dante's Peak 19.5/30 Tremors 20/30 The Road 21/30 The Quiet Place 21/30 Red Dawn (1984) 22/30 Wall-E 23/30 Blast From The Past (1999) 23.5/30 28 Days Later 24.5/30 Apollo 13 24.5/30 Contagion 25/30 I Am Legend 25/30 10 Cloverfield Lane 26.5/30 The Martian 27/30   On Hiatus Indefinitely    Thank you all for listening to the podcast.  We have a lot of fun making it and the fact you listen and send us feedback means a lot to us!   Want to send us something? Josh Nass  P.O. Box 5101 Cerritos, CA 90703-5101 Support the Ham Radio Crash Course Podcast: Patreon - https://www.patreon.com/hoshnasi Shop HamTactical: http://www.hamtactical.com Shop Our Affiliates: http://hamradiocrashcourse.com/affiliates/ Shop Our Amazon Store: https://www.amazon.com/shop/hamradiocrashcourse As an Amazon Associate I earn from qualifying purchases.   Connect with Us: Website...................► http://hamradiocrashcourse.com YouTube..................► https://www.youtube.com/c/HamRadioCrashCourse Podcast...................► https://hamradiocrashcourse.podbean.com/ Discord....................► https://discord.gg/xhJMxDT Facebook................► https://goo.gl/cv5rEQ Twitter......................► https://twitter.com/Hoshnasi Instagram.................► https://instagram.com/hoshnasi (Josh) Instagram.................►https://instagram.com/hamtactical (Leah) Instagram.................►https://instagram.com/nasscorners (Leah)

Badlands Media
DEFCON ZERO Ep. 005: False Flags, Cyber Fronts & Global Power Plays

Badlands Media

Play Episode Listen Later Aug 20, 2025 138:12 Transcription Available


Alpha Warrior and Josh Reid dig into the mechanics of false flag operations and how they're used to manipulate public perception and justify political agendas. They explore the cyber domain as the new frontline of global conflict, highlighting how governments and shadow networks wage war through digital means. The conversation ties these tactics to shifting global power structures, exposing how narratives are engineered to keep the public distracted while larger moves play out behind the scenes. With sharp analysis and candid discussion, the hosts connect the dots between covert strategy, technological warfare, and the battle for geopolitical dominance.

The FPL Wire
Gameweek 2 Pod FPL 2025 | The FPL Wire | Fantasy Premier League Tips 2025/26

The FPL Wire

Play Episode Listen Later Aug 20, 2025 91:49


Serious Haaland FOMO on this one as we discuss what we learned from Gameweek 1 and discuss the early bandwagons ━━━━━━━━━━━━━

What the Hack with Adam Levin
Episode 213: Inside DEF CON's Social Engineering Village

What the Hack with Adam Levin

Play Episode Listen Later Aug 19, 2025 41:34


At DEF CON's Social Engineering Village, contestants have 22 minutes to charm real employees at real companies into revealing real details that could lead to a breach. We step inside the booth to see how persuasion, improv, and psychology fuel both ethical hacking and the rise of cybercrime worldwide. Learn more about your ad choices. Visit megaphone.fm/adchoices

Next in Tech
Black Hat and DefCon

Next in Tech

Play Episode Listen Later Aug 19, 2025 30:12 Transcription Available


The annual “security summer camp” that is made up of the Black Hat and DefCon conferences is just past and the security analyst team, Scott Crawford, Dan Kennedy, Justin Lam and Mark Ehr, join host Eric Hanselman to examine what they saw and discuss the implications. Despite the heat of a Las Vegas summer, it's become bigger than the two main conferences, with a number of side events, like B-Sides, there's a lot going on. AI conversations are evolving and maturing. We've mostly moved beyond blaming user foibles for breaches, but AI is expanding the attack surface with new and more complex tactics for user manipulation. AI is lowering the barriers for attackers. The days of script kiddies have morphed into Claude Code-fueled attack development. The larger question is how security vendors are responding to AI risks. Claims that tier 1 security analysts should start looking for another job just seem irresponsible in the current environment. AI augmentation can reduce toil and digest the masses of events that security teams struggle to deal with today. At the same time, AI is scaling attack volumes. It's the constant hegemony that's always played out at the core of security. More S&P Global Content: RSAC Conference 2025: Breaking records at the threshold of uncertainty AI for security: Agentic AI will be a focus for security operations in 2025 Next in Tech | Ep. 215: RSA Conference Preview Deep Pocket Inspection: RSAC Innovation Sandbox Retrospective & Perspective Next in Tech | Ep. 227: Managed Security Services Next in Tech | Ep. 225: Security for MCP For S&P Global Subscribers: Use of GenAI security solutions has spiked, continued uptake projected – Highlights from VotE: Information Security Infosec spending projected to rise 27% on average in 2025 – Highlights from VotE: Information Security CNAPP in focus after large infosec acquisition – Highlights from VotE: Information Security Data Insight: Data security market to top $26B in 2029 Data Security Market Monitor & Forecast CNAPP matures into full-spectrum security solution Credits: Host/Author: Eric Hanselman Guests: Scott Crawford, Dan Kennedy, Justin Lam, Mark Ehr Producer/Editor: Adam Kovalsky Published With Assistance From: Sophie Carr, Feranmi Adeoshun, Kyra Smith

The I.T. Career Podcast
Bonus: What They Don't Tell You About DEFCON

The I.T. Career Podcast

Play Episode Listen Later Aug 19, 2025 9:10


Dive deeper with Snow Goat — the free hands-on lab that inspired this video. https://hubs.ly/Q03CSkb80 Plus, check out the Varonis blog for real-world cybersecurity insights https://hubs.ly/Q03CShBG0DEF CON isn't just a hacker conference — it's a chaotic, creative, overwhelming, and wildly inspiring deep dive into everything cybersecurity. From packed villages and surprise CTFs to some of the most welcoming communities I've ever seen… this year completely changed how I think about tech conferences.In this video, I'm breaking down what caught me off guard, what I loved most, and what you need to know if you're thinking about going.Check out the Noob Village Discord: https://discord.gg/FGzPh4Upeh  The GingerHacker YouTube: @GingerHacker Kevtech IT YouTube: @KevtechITSupport InfoSecPat YouTUbe: @InfosecEdu

Gull Og Grønne Piler
GW1 Breakdown!

Gull Og Grønne Piler

Play Episode Listen Later Aug 19, 2025 19:17


Torkel tar en kjapp oppsummering av nøkkelpunktene fra GW1. Tung start for både Jon og Torkel, men ingen grunn til panikk. Eller må Reijnders, Semenyo og co på fort som fy? Tar også en gjennomgang av hvilke spillere som nådde DefCon-grensa.

CTF Radiooo
021 - Live from DEF CON 33 with Andrew and Perri

CTF Radiooo

Play Episode Listen Later Aug 18, 2025 43:05


Youtube Video of podcast Shownotes and Links In this episode, which seems to be an annual tradition, adamd and Zardus report LIVE from DEF CON 33 about the AIxCC results, first alone then together with Andrew Carney and Perri Adams, the key people involved in creating and running the AIxCC. Links AIxCC @ DEF CON 33 Open-source AIxCC Systems

Book It! A Wrestling Podcast
Episode 301- EWO: Def Con One – Part 1 (BookIt!Verse 5)

Book It! A Wrestling Podcast

Play Episode Listen Later Aug 16, 2025 83:39


The Bad Guy Kenny makes his BookIt!Verse 5 debut with the launch of the Elite Wrestling Organization (EWO).The first show, Def Con One – Part 1, sets the tone with shocking twists, high-stakes matches, and Kenny's signature brand of chaos.

Adventures of Alice & Bob
Ep. 85 - The MGM Help Desk Heist // Matthew Toussain

Adventures of Alice & Bob

Play Episode Listen Later Aug 15, 2025 48:51


Join host James Maude for a candid conversation with Matthew Toussaint - founder of Open Security and mastermind behind the legendary Subterfuge framework that once forced Starbucks to overhaul its Wi-Fi security. From his unexpected path as an aspiring Air Force lawyer to becoming a renowned cybersecurity educator, Matthew shares a lifetime of stories: a physical pen test that went spectacularly wrong at a franchise location, a medical clinic investigation that exposed an insider threat with international stakes, and how the MGM breach proved the devastating power of old-school phone-based social engineering.They dive into why AI is about to make help desk social engineering terrifyingly scalable, how a nervous 21-year-old's DefCon talk reshaped network security, and why, despite decades of warnings, the industry is still failing at the basics while attackers rapidly scale with artificial intelligence.

Black Hills Information Security
DEF CON RECAP – 2025-08-11

Black Hills Information Security

Play Episode Listen Later Aug 14, 2025 59:54


Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — Wading Through Woods06:06 - DEF CON RECAP - Talkin' Bout [infosec] News 2025-08-1109:16 - Story # 1: It's time to acknowledge HTTP/1.1 is insecure12:36 - Story # 2: Research reveals possible privacy gaps in Apple Intelligence's data handling17:51 - Story # 3: Federal court filing system hit in sweeping hack21:09 - Story # 4: Cisco discloses data breach impacting Cisco.com user accounts32:17 - Story # 5: Google says its AI-based bug hunter found 20 security vulnerabilities34:20 - Story # 6: Automate security reviews with Claude Code39:01 - Story # 7: Flipper Zero ‘DarkWeb' Firmware Bypasses Rolling Code Security on Major Vehicle Brands44:44 - Story # 7b: OnStar assists CHP in stopping fleeing SUV with toddler inside47:12 - Story # 7c: That viral video of a ‘deactivated' Tesla Cybertruck is a fake49:37 - Story # 8: LegalPwn Attack Tricks GenAI Tools Into Misclassifying Malware as Safe Code50:53 - Story # 9: Microsoft Launches Project Ire to Autonomously Classify Malware Using AI Tools53:08 - Story # 10: A Single Poisoned Document Could Leak ‘Secret' Data Via ChatGPT58:10 - Story # 11: Millions of Dell Laptops Vulnerable to Device Takeover and Persistent Malware Attacks

Critical Thinking - Bug Bounty Podcast
Episode 135: Akamai's Ryan Barnett on WAFs, Unicode Confusables, and Triage Stories

Critical Thinking - Bug Bounty Podcast

Play Episode Listen Later Aug 14, 2025 86:21


Episode 135: In this episode of Critical Thinking - Bug Bounty Podcast Justin sits down with Ryan Barnett for a deep dive on WAFs. We also recap his Exploiting Unicode Normalization talk from DEFCON, and get his perspective on bug hunting from his time at Akamai. Follow us on twitter at: https://x.com/ctbbpodcastGot any ideas and suggestions? Feel free to send us any feedback here: info@criticalthinkingpodcast.ioShoutout to YTCracker for the awesome intro music!====== Links ======Follow your hosts Rhynorater and Rez0 on Twitter: https://x.com/Rhynoraterhttps://x.com/rez0__====== Ways to Support CTBBPodcast ======Hop on the CTBB Discord at https://ctbb.show/discord!We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.You can also find some hacker swag at https://ctbb.show/merch!Today's Sponsor - ThreatLocker. Checkout ThreatLocker Detect! https://www.criticalthinkingpodcast.io/tl-detectToday's Guest: https://x.com/ryancbarnett====== Resources ======Accidental Stored XSS Flaw in Zemanta 'Related Posts' Plugin for TypePadhttps://webappdefender.blogspot.com/2013/04/accidental-stored-xss-flaw-in-zemanta.htmlXSS Street-Fighthttps://media.blackhat.com/bh-dc-11/Barnett/BlackHat_DC_2011_Barnett_XSS%20Streetfight-Slides.pdfBlackhat USA 2025 - Lost in Translation: Exploiting Unicode Normalizationhttps://www.blackhat.com/us-25/briefings/schedule/#lost-in-translation-exploiting-unicode-normalization-44923====== Timestamps ======(00:00:00) Introduction(00:02:49) Accidental Stored XSS in Typepad Plugin (00:06:34) Chatscatter & Abusing third party Analytics(00:11:42) Ryan Barnett Introduction(00:21:11) Virtual Patching & WAF Challenges(00:40:39) AWS API Gateways & Whitelisting Bug Hunter Traffic(00:49:59) Lost in Translation: Exploiting Unicode Normalization(01:11:29) CSPs at the WAF level & 'Bounties for Bypass'

Autonomous IT
CISO IT — Hacker Summer Camp 2025: A Recap of Black Hat & DEF CON, E19

Autonomous IT

Play Episode Listen Later Aug 14, 2025 6:17


Join Automox CISO and SVP of Product Jason Kikta for a recap of Black Hat and DEF CON 2025. In this episode, Jason shares his take on the conversation around AI in cybersecurity shifting from hype to practical tools for defenders. Hear why integrating AI into your CI/CD pipeline, alert triage, and vulnerability management could be a game changer, plus thoughts on choosing the right security events for your personality and goals. Whether you're a conference veteran or a curious first-timer, this episode offers insights, humor, and encouragement to get more involved in the security community.

Webcology on WebmasterRadio.fm
The Define AI as it Weirdly Goes Wild Edition

Webcology on WebmasterRadio.fm

Play Episode Listen Later Aug 14, 2025 65:04


The AI makeover of everything is well underway and we're at the point where the most obvious problems are becoming more obvious amidst the hype. This week's vibe is partially informed by Kristine's annual visits to the Blackhat and DEF CON conferences where Kristine came across AdHacks by the Russian Mob, ways to subvert Gemini using popular Google apps like Gmail and Calendar, and how hackers can now prompt inject using AI agents without their victim taking an unfortunate action. Meanwhile, OpenAI is building a browser that will be agentically controlled, Grok is still weirdly obsessed with Taylor Swift, Leaked Meta documents show rules where chatbots can have adult chats with children, Perplexity offers Goolge $34.5billion for Chrome, Google confirms it wants AI generated content to be edited by humans, Gary Illyes reminds us why Google needs to control the signals it looks at, Microsoft wants to know how often your conversions come from AI driven clicks, and Google might be using generic undocumented crawlers.Support this podcast at — https://redcircle.com/webcology/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy

Cyber Security Today
Urgent Vulnerabilities: Patching Exchange, Citrix, and Fortinet

Cyber Security Today

Play Episode Listen Later Aug 13, 2025 14:33 Transcription Available


In this episode of Cybersecurity Today, host David Shipley covers critical security updates and vulnerabilities affecting Microsoft Exchange, Citrix NetScaler, and Fortinet SSL VPNs. With over 29,000 unpatched Exchange servers posing a risk for admin escalation and potential full domain compromise, urgent action is needed. Citrix Bleed 2 is actively being exploited, with significant incidents reported in the Netherlands and thousands of devices still unpatched globally. Fortinet SSL VPNs are experiencing a spike in brute force attacks, hinting at a possible new vulnerability on the horizon. Lastly, Shipley highlights notable moments from DEFCON 33, including innovative security hacks and sobering realities of the hacker community. Tune in for detailed breakdowns and insights on how to stay vigilant against these threats. 00:00 Introduction and Overview 00:32 Microsoft Exchange Vulnerability 02:54 Citrix Bleed Two Exploits 05:21 Fortinet SSL VPN Brute Force Attacks 07:39 Insights from DEFCON 33 13:46 Conclusion and Final Thoughts

The Personal Computer Radio Show
The Personal Computer Radio Show 8-13-25

The Personal Computer Radio Show

Play Episode Listen Later Aug 13, 2025 55:19


The Personal Computer Show Wednesday August 13th 2025 www.PRN.live - Streaming on the Internet 6:00 PM Eastern Time In the News • Trump Calls on Intel CEO to Resign ‘Immediately' • Taiwan Detains TSMC Staff for Alleged Theft of Key Technology Trade Secrets • Report from DEF CON 33 in Las Vegas • Amazon Restructures its Podcast Business • Apple Wants to Reclaim its Place in the AI Development Race. • Apple's China Reality Check • Big Tech's AI Spending Spree – Is AI Demand Finally Catching Up? ITPro Series with Benjamin Rockwell • All of Us at Every Level Need to be Looking to AI to Improve Our Skills and Jobs From the Tech Corner • Phone Cameras are Evolving Fast, but Photography as an Art is Dying Quietly Technology Chatter - (Benjamin Rockwell and Marty Winston) • Three Kinds of Meeting Monsters 

LINUX Unplugged
627: The 2 a.m. Rescue

LINUX Unplugged

Play Episode Listen Later Aug 11, 2025 84:38 Transcription Available


Wes performs a 2 a.m. rescue at DEFCON, and Chris attempts to build a Linux desktop using nothing but vibes.Sponsored By:Managed Nebula: Meet Managed Nebula from Defined Networking. A decentralized VPN built on the open-source Nebula platform that we love. 1Password Extended Access Management: 1Password Extended Access Management is a device trust solution for companies with Okta, and they ensure that if a device isn't trusted and secure, it can't log into your cloud apps. Unraid: A powerful, easy operating system for servers and storage. Maximize your hardware with unmatched flexibility. Support LINUX UnpluggedLinks:

ITSPmagazine | Technology. Cybersecurity. Society
From Fish Tanks to AI Agents: Why the Words “We're Secure” Means Nothing Without Proof | A Black Hat USA 2025 Conversation with Viktor Petersson | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 11, 2025 27:02


When security becomes more than a checkbox, the conversation shifts from “how much” to “how well.” At Black Hat USA 2025, Sean Martin, CISSP, Co-Founder of ITSPmagazine, and Viktor Petersson, Founder of an SBOM artifact platform, unpack how regulatory forces, cultural change, and AI innovation are reshaping how organizations think about security.Viktor points to the growing role of Software Bill of Materials (SBOMs) as not just a best practice, but a likely requirement in future compliance frameworks. The shift, he notes, is driven largely by regulation—especially in Europe—where security is no longer a “nice to have” but a mandated operational function. Sean connects this to a market reality: companies increasingly see transparent security practices as a competitive differentiator, though the industry still struggles with the hollow claim of simply being “secure.”AI naturally dominates discussions, but the focus is nuanced. Rather than chasing hype, both stress the need for strong guardrails before scaling AI-driven development. Viktor envisions engineers supervising fleets of specialized AI agents—handling tasks from UX to code auditing—while Sean sees AI as a way to rethink entire operational models. Yet both caution that without foundational security practices, AI only amplifies existing risks.The conversation extends to IoT and supply chain security, where market failures allow insecure, end-of-life devices to persist in critical environments. The infamous “smart fish tank” hack in a Las Vegas casino serves as a reminder: the weakest link often isn't the target itself, but the entry point it provides.DEFCON, Viktor notes, offers a playground for challenging assumptions—whether it's lock-picking to illustrate perceived versus actual security, or examining the human factor in breaches. For both hosts, events like Black Hat and DEFCON aren't just about the latest vulnerabilities or flashy demos—they're about the human exchange of ideas, the reframing of problems, and the collaboration that fuels more resilient security strategies.___________Guest:Viktor Petersson, Founder, sbomify | On LinkedIn: https://www.linkedin.com/in/vpetersson/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974BlackCloak: https://itspm.ag/itspbcwebAkamai: https://itspm.ag/akamailbwcDropzoneAI: https://itspm.ag/dropzoneai-641Stellar Cyber: https://itspm.ag/stellar-9dj3___________ResourcesLearn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25ITSPmagazine Webinar: What's Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year's Hacker Conference — An ITSPmagazine Thought Leadership Webinar | https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conferenceCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

Cyber Security Today
Cyber Attacks, Jailbreaking GPT-5, and Hacker Summer Camp 2025 Highlights

Cyber Security Today

Play Episode Listen Later Aug 11, 2025 14:34 Transcription Available


In today's episode of Cybersecurity Today, host David Shipley covers critical updates on recent cyber attacks and breaches impacting the US Federal judiciary's case management systems, and SonicWall firewall compromises. He also discusses researchers' new jailbreak method against GPT-5, which bypasses ethical guardrails to produce harmful instructions. Shipley shares insights and standout sessions from Hacker Summer Camp 2025, including BSides Las Vegas, the I Am the Cavalry track, and Defcon, highlighting ongoing efforts and challenges in the cybersecurity landscape. Stay informed, stay secure, and join the conversation in this detailed overview of current cybersecurity issues and innovations. 00:00 Introduction and Headlines 00:31 US Federal Judiciary Cyber Attack 02:29 SonicWall Ransomware Attacks 04:14 AI Jailbreak Techniques 07:44 Hacker Summer Camp 2025 Highlights 08:10 BSides Las Vegas and Community Insights 09:29 Healthcare Cybersecurity and Crash Cart Project 12:11 Defcon Reflections and Final Thoughts 13:45 Conclusion and Listener Engagement

PEBCAK Podcast: Information Security News by Some All Around Good People
Episode 220 - Live From Black Hat 2025 and DEFCON 33, Drop In Las Vegas Tourism, Hotel Fees, Agentic AI

PEBCAK Podcast: Information Security News by Some All Around Good People

Play Episode Listen Later Aug 11, 2025 48:00


Welcome to this week's episode of the PEBCAK Podcast!  We've got some amazing stories this week so sit back, relax, and keep being awesome!  Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast   Please share this podcast with someone you know!  It helps us grow the podcast and we really appreciate it!   Tourism drop in Las Vegas https://www.roadsideamerica.com/story/12552 https://www.foxnews.com/travel/las-vegas-tourism-drops-sharply-some-visitors-claim-casinos-empty-amid-rising-costs     Dad Joke of the Week (DJOW)   Find the hosts on LinkedIn: Chris - https://www.linkedin.com/in/chlouie/ Brian - https://www.linkedin.com/in/briandeitch-sase/ Glenn - https://www.linkedin.com/in/glennmedina/ Tyson - https://www.linkedin.com/in/tyson-kindler-910658101/ Koby - https://www.linkedin.com/in/koby-caputo-117358145/

The Daily Scoop Podcast
The Army looks to build a drone marketplace; DARPA's AI Cyber Challenge reveals winning models

The Daily Scoop Podcast

Play Episode Listen Later Aug 11, 2025 5:17


The Army will be creating a marketplace to better match drones with units based on their requirements. With so many vendors providing a variety of unmanned aerial systems, it can be difficult for formations to determine if certain systems will in fact meet their needs. Col. Danielle Medaglia, project manager for UAS at program executive office for aviation, shared details about the new initiative during a recent teleconference, saying it is meant to ensure drones products do what they advertise they can do, along with confirming NDAA compliance and other specs. The forthcoming marketplace is part of the drone revolution occurring within the Pentagon. Secretary of Defense Pete Hegseth issued a directive last month on “Unleashing U.S. Military Drone Dominance,” which sought to improve how the department develops and employs small UAS. That directive calls for every squad to be equipped with low-cost, expendable drones by the end of 2026. Army offiicals called the new marketplace and approach a “fundamental shift” in how traditional acquisition is conducted. The goal is to get systems into the hands of troops as quickly as possible. The Pentagon's two-year public competition to spur the development of cyber-reasoning systems that use large language models to autonomously find and patch vulnerabilities in open-source software concluded Friday with $8.5 million awarded to three teams of security specialists at DEF CON. The Defense Advanced Research Project Agency's AI Cyber Challenge seeks to address a persistent bottleneck in cybersecurity — patching vulnerabilities before they are discovered or exploited by would-be attackers. DARPA Director Stephen Winchell said: “We're living in a world right now that has ancient digital scaffolding that's holding everything up. A lot of the code bases, a lot of the languages, a lot of the ways we do business, and everything we've built on top of it has all incurred huge technical debt… It is a problem that is beyond human scale.” The seven semifinalists that earned their spot out of 90 teams convened at last year's DEF CON were scored against their models' ability to quickly, accurately and successfully identify and generate patches for synthetic vulnerabilities across 54 million lines of code. The models discovered 77% of the vulnerabilities presented in the final scoring round and patched 61% of those synthetic defects at an average speed of 45 minutes, the competition organizers said. The models also discovered 18 real zero-day vulnerabilities, including six in the C programming language and 12 in Java codebases. The teams' models patched none of the C codebase zero-days, but automatically patched 11 of the Java zero-days, according to the final results shared Friday. Team Atlanta took the first-place prize of $4 million, Trail of Bits won second place and $3 million in prize money, and Theori ranked third, taking home $1.5 million. The competition's organizers allocated an additional $1.4 million in prize money for participants who can demonstrate when their technology is deployed into critical infrastructure. The Daily Scoop Podcast is available every Monday-Friday afternoon. If you want to hear more of the latest from Washington, subscribe to The Daily Scoop Podcast  on Apple Podcasts, Soundcloud, Spotify and YouTube.

Stats On Stats Podcast
Stats on Stats x B.I.C. @ DEF CON 33: Finding Your Village with Veronika

Stats On Stats Podcast

Play Episode Listen Later Aug 11, 2025 5:05


Join us for an insightful conversation at DEF CON 33 as we sit down with Veronika, a passionate cybersecurity enthusiast who has been immersed in the field since middle school. She shares her journey into cybersecurity, her experiences with Capture The Flag (CTF) competitions, and more.Veronika discusses the importance of mentorship and she offers valuable advice for anyone feeling out of place in the field and stresses the importance of staying true to oneself.

Stats On Stats Podcast
Stats on Stats x B.I.C. @ DEF CON 33: Finding Your Village with Dietrich

Stats On Stats Podcast

Play Episode Listen Later Aug 11, 2025 7:11


Join us for a conversation with Dietrich at DEF CON 33, live from the Blacks in Cybersecurity Village. Dietrich shares his journey with Respect the Tech and discusses the vital role community plays in cybersecurity.Learn how the collaboration between Respect the Tech and Blacks in Cybersecurity is creating a supportive space for learning, networking, and mentorship. Dietrich also delves into his experiences in blue team operations, the psychology behind cybersecurity, and the challenges of insider threat investigations.Guest ConnectDietrich BempahLinkedIn: https://www.linkedin.com/in/dietrich-bempah/Blacks in CybersecurityWebsite: https://www.blacksincyberconf.com/

Stats On Stats Podcast
Stats on Stats x B.I.C. @ DEF CON 33: Finding Your Village with Leron

Stats On Stats Podcast

Play Episode Listen Later Aug 11, 2025 7:30


Join us for an insightful conversation at DEF CON 33! Tiffiny interviews Leron, live from the Blacks in Cybersecurity Village, as he shares his experience in creating Capture the Flag (CTF) challenges.Discover the mindset behind designing challenges that cater to both beginners and experienced professionals, and get valuable tips for first-time CTF participants. Leron highlights the importance of practice and points to resources like Hack the Box, TryHackMe, and more for newcomers to enhance their skills.Guest ConnectLeron GrayLinkedIn: https://www.linkedin.com/in/leron-gray/Blacks in CybersecurityWebsite: https://www.blacksincyberconf.com/

All Jupiter Broadcasting Shows
The 2 a.m. Rescue | LINUX Unplugged 627

All Jupiter Broadcasting Shows

Play Episode Listen Later Aug 10, 2025


Wes performs a 2 a.m. rescue at DEFCON, and Chris attempts to build a Linux desktop using nothing but vibes.

Stats On Stats Podcast
Stats on Stats x B.I.C. @ DEF CON 33: Finding Your Village with Rahiem

Stats On Stats Podcast

Play Episode Listen Later Aug 10, 2025 5:08


Join us for a conversation with Rahiem, a dedicated member of the Blacks in Cybersecurity community. With five years of DEF CON experience and a passion for media coverage, photography, and design, Rahiem reflects on his journey into tech and the critical importance of representation in the industry.Guest ConnectRahiem ThompsonLinkedIn: https://www.linkedin.com/in/rahiemthompson/Blacks in CybersecurityWebsite: https://www.blacksincyberconf.com/

Stats On Stats Podcast
Stats on Stats x B.I.C. @ DEF CON 33: Finding Your Village with Mariah

Stats On Stats Podcast

Play Episode Listen Later Aug 10, 2025 3:10


Join us for a conversation with Mariah, recorded live at DEF CON 33 in the Blacks in Cybersecurity Village! Mariah shares her unique journey from wedding planning to the world of tech and cybersecurity.Mariah discusses her transition into tech during the pandemic, her experiences in help desk and project management, and how a mentorship program helped her land her first job in cybersecurity. She emphasizes the importance of networking, asking questions, and maintaining a positive mindset throughout the learning process.Whether you're considering a career in tech or just looking for some life advice, Mariah's insights and encouragement will resonate with you. Tune in to hear her valuable tips on resources, networking, and the power of believing in yourself!Guest ConnectMariah HardyLinkedIn: https://www.linkedin.com/in/tylermariahhardy/Blacks in CybersecurityWebsite: https://www.blacksincyberconf.com/

Dog Days of Podcasting Challenge
Kyle Nishioka : Mad Marv's Notebook

Dog Days of Podcasting Challenge

Play Episode Listen Later Aug 10, 2025


Talking about Toastmasters and taking on the role of District Finance Manager. Also noticed that DefCon is going on this weekend.

Stats On Stats Podcast
Stats on Stats x B.I.C. @ DEF CON 33: Finding Your Village with Levone

Stats On Stats Podcast

Play Episode Listen Later Aug 9, 2025 4:27


Join us for a conversation with Levone Campbell, a seasoned cybersecurity expert with 20 years of experience, live from the Blacks in Cybersecurity Village at DEF CON 33. Levone discusses his journey into tech, his dedication to the BIC community, and the vital role of representation in the industry.Guest ConnectLevone CampbellLinkedIn: https://www.linkedin.com/in/levone-campbell-mba-mps-cissp-3b305234/Blacks in CybersecurityWebsite: https://www.blacksincyberconf.com/

Stats On Stats Podcast
Stats on Stats x B.I.C. @ DEF CON 33: Finding Your Village with Samantha

Stats On Stats Podcast

Play Episode Listen Later Aug 9, 2025 3:59


Join us for a conversation with Samantha, a passionate cybersecurity professional and volunteer with Blacks in Cybersecurity (BIC). She shares her inspiring journey from social work to becoming a pen tester, overcoming fears and challenges along the way.Samantha reflects on her transformative experience at DEF CON, where the Blacks in Cybersecurity Village offered a safe and supportive environment. As the leader of the Black Women in Cybersecurity initiative, she is committed to uplifting Black women in the field through mentorship, resources, and community.We dive into the importance of representation in tech, the upcoming Black Women in Cybersecurity cohort, and Samantha's valuable advice for anyone looking to succeed in the tech industry.Blacks in CybersecurityWebsite: https://www.blacksincyberconf.com/

Stats On Stats Podcast
Stats on Stats x B.I.C. @ DEF CON 33: Finding Your Village with Yassin & Marc

Stats On Stats Podcast

Play Episode Listen Later Aug 9, 2025 11:31


Join us for a conversation with Marc Lawrence and Yassin Sabir, the co-founders of Respect the Tech. They share their DEF CON 33 experience, including hosting their own Capture the Flag (CTF) competitions and a unique AI bank chatbot challenge designed to educate participants on vulnerabilities in AI systems.In this discussion, they highlight the importance of community, particularly within the Blacks in Cybersecurity network, and how it empowers individuals to thrive in tech. Marc and Yassin also preview their upcoming event, Respect Day, where tech professionals can dive into hands-on workshops and challenges.Whether you're a seasoned expert or just starting out, this conversation is filled with valuable insights and advice on breaking into cybersecurity. Don't miss their tips for success and resources for aspiring tech professionals!Guest ConnectMarc LawrenceLinkedIn: https://www.linkedin.com/in/marcanthonylawrence/Yassin SabirLinkedIn: https://www.linkedin.com/in/yassin-sabir-csap-crtp-01b470157/Respect the TechWebsite: https://www.respectthetech.us/Blacks in CybersecurityWebsite: https://www.blacksincyberconf.com/

The Valenti Show
What DEFCON Level Are You At With The Tigers?

The Valenti Show

Play Episode Listen Later Aug 7, 2025 9:54


The guys discuss their concern level with the Tigers right now.

The Valenti Show
HOUR 2: Tigers DEFCON Levels

The Valenti Show

Play Episode Listen Later Aug 7, 2025 39:27


Mike and Rico spent the second hour discussing which DEFCON level they are at when it comes to the Tigers. They took plenty of your calls and read your ticket texts throughout the hour.

Microsoft Threat Intelligence Podcast
How Microsoft Stays Ahead of the World's Most Dangerous Hackers

Microsoft Threat Intelligence Podcast

Play Episode Listen Later Aug 7, 2025 77:33


In this episode of the Microsoft Threat Intelligence Podcast, host⁠ ⁠⁠Sherrod DeGrippo is joined by Aarti Borkar, Simeon Kakpovi, and Andrew Rapp for a behind-the-scenes look at how Microsoft Threat Intelligence and Microsoft Incident Response teams collaborate as part of a closed-loop system, the emotional toll of breaches, and how organizations of any size can build resilience through preparation and psychological safety. By listening to this segment, you'll get a preview of what this group brought to the main stage of Black Hat this year.  Later, Sherrod chats with Snow, co-founder of the Social Engineering Community Village at DEF CON, about her journey from special effects makeup to elite social engineer, and how empathy, creativity, and even a ladder can be powerful tools in physical security testing.  In this episode you'll learn:       How Microsoft's Digital Crimes Unit uses legal tactics to disrupt threat actors  Why rehearsing your incident response plan can save weeks of recovery time  How AI is being trained to make social engineering phone calls on its own  Some questions we ask:      How would you describe the overall health of the global cybersecurity landscape?  Why does tailoring AI prompts sometimes feel like social engineering?  What is the feedback loop between incident response, intelligence, and product protections?    Resources:   View Aarti Borkar on LinkedIn  View Simeon Kakpovi on LinkedIn   View Andrew Rapp on LinkedIn    View Sherrod DeGrippo on LinkedIn   Microsoft at Black Hat USA 2025    Related Microsoft Podcasts:                    Afternoon Cyber Tea with Ann Johnson  The BlueHat Podcast  Uncovering Hidden Risks        Discover and follow other Microsoft podcasts at microsoft.com/podcasts     Get the latest threat intelligence insights and guidance at Microsoft Security Insider    The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network.  

Fantasy Football Scout
The FPL Scout: New Drafts, Def Cons, Promoted Teams!

Fantasy Football Scout

Play Episode Listen Later Aug 6, 2025 78:37


Andy, Hibbo and Nacho discuss their NEW drafts, promoted teams and Def Con points! SPONSERED BY FANTEAM - https://af.fanteam.com/click?o=1&a=14&c=7 New Customer Welcome Offer!

Badlands Media
DEFCON ZERQ EP. 004 - DROPS RETURNING - SCAVINO TRUMP COMS - SOROS ON DECK - DURHAM REPORT

Badlands Media

Play Episode Listen Later Aug 6, 2025 127:58 Transcription Available


In Episode 004 of DEFCON ZERQ, Alpha Warrior and Josh Reid dissect the return of high-signal drops, drawing connections between Scavino's posts, Trump's recent statements, and coordinated comms pointing to a broader information offensive. The hosts analyze what these patterns suggest about timing, messaging, and the psychological battlefield ahead. They also dig into Soros's positioning, global narratives around controlled opposition, and the lasting significance of the Durham Report, not as a dead-end, but as a marker in the ongoing exposure of institutional corruption. With a focus on decoding the signals, not the noise, this episode challenges listeners to zoom out, connect the timelines, and prepare for what's next.

Planet FPL - The Fantasy Football Podcast
Leeds United with Ed Salinger | Correspondent Week ep.5 | Planet FPL 2025/26

Planet FPL - The Fantasy Football Podcast

Play Episode Listen Later Aug 5, 2025 48:22


Day 2 of Correspondent Week opens with the Championship titles winners as James is joined be Ed Salinger to discuss all things Leeds United and there are some interesting FPL options to consider. One such, is Joel Piroe, 5.5, talisman forward and on pens. But is it that straightforward? There's discussion on all the new additions, a considered debate on two 4.0 defender options, if Karl Darlow remains an option, and if there may be a hidden DEFCON magnet from the midfield enablers. Follow Ed on Twitter/x: https://x.com/fplrhinos Next on Correspondent Week: ep.6 with Lewis James on Fulham Later today on Correspondent Week: Neil Grover on Bournemouth and Tom Medd on Brentford Tonight on Patreon: The Debrief with Suj on today's four Podcasts (IT+) and After The Podcast with today's Correspondents (AT) Want to become a member of our FPL community and support the Podcast?  Join us on Patreon: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.patreon.com/planetfpl⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Follow James on Twitter/x: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/PlanetFPLPod⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Follow Suj on Twitter/x: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/sujanshah⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Follow Clayton on Twitter/x: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/claytsAFC⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Follow Nico on Twitter/x: https://twitter.com/nico_semedo Subscribe to our YouTube channel: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.youtube.com/@PlanetFPL⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Like us on Facebook: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.facebook.com/planetfpl⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Follow us on Instagram: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.instagram.com/planetfpl⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ #FantasyPremierLeague #FPL #LUFC Learn more about your ad choices. Visit podcastchoices.com/adchoices

ITSPmagazine | Technology. Cybersecurity. Society
From Hacker Defense to Civil Liberties: Threat Modeling Meets Constitutional Law | A Black Hat USA 2025 Keynote Conversation with Jennifer Granick | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 4, 2025 22:47


At Black Hat USA 2025, Jennifer Granick—Surveillance and Cybersecurity Counsel at the American Civil Liberties Union—takes the keynote stage to make a bold case: we are long overdue for a new threat model, one that sees government surveillance not as a background risk, but as a primary threat to constitutional privacy.Granick draws from decades of experience defending hackers, fighting surveillance overreach, and engaging with the security community since DEFCON 3. She challenges the audience to reconsider outdated assumptions about how the Fourth Amendment is interpreted and applied. While technology has made it easier than ever for governments to collect data, the legal system hasn't kept pace—and in many cases, fails to recognize the sheer scope and sensitivity of personal information exposed through modern services.Her talk doesn't just raise alarm; it calls for action. Granick suggests that while legal reform is sluggish—stymied by a lack of political will and lobbying power—there's an urgent opportunity for the technical community to step up. From encryption to data minimization and anonymization, technologists have the tools to protect civil liberties even when the law falls short.The session promises to be a wake-up call for engineers, designers, policymakers, and privacy advocates. Granick wants attendees to leave not only more informed, but motivated to build systems that limit the unnecessary collection, retention, and exposure of personal data.Her keynote also surfaces a critical cultural shift: from the “Spot the Fed” days of DEFCON to a more nuanced understanding of government roles—welcoming collaboration where it serves the public good, but not at the expense of unchecked surveillance.This conversation reframes privacy as a design problem as much as a legal one—and one that requires collective effort to address. If the law can't fix it, the question becomes: will the technology community rise to the challenge?___________Guest:Jennifer Granick, Surveillance and Cybersecurity Counsel at American Civil Liberties Union | On LinkedIn: https://www.linkedin.com/in/jennifergranick/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974BlackCloak: https://itspm.ag/itspbcwebAkamai: https://itspm.ag/akamailbwcDropzoneAI: https://itspm.ag/dropzoneai-641Stellar Cyber: https://itspm.ag/stellar-9dj3___________ResourcesKeynote: Threat Modeling and Constitutional Law: https://www.blackhat.com/us-25/briefings/schedule/index.html#keynote-threat-modeling-and-constitutional-law-48276Learn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25ITSPmagazine Webinar: What's Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year's Hacker Conference — An ITSPmagazine Thought Leadership Webinar | https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conferenceCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More