Podcasts about DEFCON

Alert posture used by the United States Armed Forces

  • 1,273PODCASTS
  • 3,582EPISODES
  • 56mAVG DURATION
  • 1DAILY NEW EPISODE
  • Sep 17, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about DEFCON

Show all podcasts related to defcon

Latest podcast episodes about DEFCON

Let's Talk FPL
FPL GAMEWEEK 5 PREVIEW

Let's Talk FPL

Play Episode Listen Later Sep 17, 2025 32:12


In this video I take you through the latest news, hot-topics and answer your FPL questions ahead of Gameweek 5. ━━━━━━━━━━━━━

Badlands Media
DEFCON ZERQ Ep. 009: CHARLIE KIRK ASSASSINATION DEBRIEF & MORE

Badlands Media

Play Episode Listen Later Sep 17, 2025 250:06


Alpha Warrior and Josh Reid bring the fire in this episode of Defcon Zerq, tackling the explosive mix of immigration, political psyops, and cultural collapse. They dive into Trump's warnings about an “invasion” at the southern border, connecting it to cartel violence, Marxist infiltration, and globalist strategies to destabilize America. The hosts call out the hypocrisy of cancel culture as even conservatives flirt with silencing tactics in the wake of Charlie Kirk's assassination, warning that abandoning free speech plays straight into the establishment's hands. From the FBI's shifting story on Tyler Robinson, to media manipulation, to the spiritual dimensions of good versus evil, Alpha and Josh frame today's chaos as both a political and cosmic struggle. Blending raw outrage, sharp analysis, and unapologetic truth-telling, they challenge listeners to see through the lies and stay anchored in principle while fighting back against a corrupt system.

FPL Fortress
GW 4: Definitely Consider DEFCON Defenders

FPL Fortress

Play Episode Listen Later Sep 12, 2025 56:02


Wake up, wake up, the first international break of the season is over! First, we refresh our memories of what happened in Gameweek 3, including Liverpool's tight victory over Arsenal, West Ham's upset over Nottingham Forest, and Manchester United's last-gasp win against Burnley (which contributed to Jiayang's somewhat successful spontaneous Free Hit that featured all three of Bruno, Mbeumo, and Cunha). For our Dilemma Deliberations, we contemplate the viability of Liverpool's attacking options following Isak's arrival, then extensively explore the effect that Defensive Contributions are having on the defender meta. It seems like this new route to points for cheap center backs may enable them to rival—even supplant—cheap attacking fullbacks, which have been a true FPL staple for years—even decades.

The CyberWire
86 reasons to update.

The CyberWire

Play Episode Listen Later Sep 10, 2025 27:59


Patch Tuesday. A data leak sheds light on North Korean APT Kimsuky. Apple introduces Memory Integrity Enforcement. Ransomware payments have dropped sharply in the education sector in 2025. A top NCS official warns ICS security lags behind, and a senator calls U.S. cybersecurity a “hellscape”. A Ukrainian national faces federal charges and an $11 million bounty for allegedly running multiple ransomware operations. Our guest is Jake Braun sharing the latest on Project Franklin. WhoFi makes WiFi a new spy. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Jake Braun, longtime DEF CON organizer, former White House official, and lead on DEF CON Franklin, sharing the latest on Project Franklin. Selected Reading Two Zero-Days Among Patch Tuesday CVEs This Month (Infosecurity Magazine) Fortinet, Ivanti, Nvidia Release Security Updates (SecurityWeek) ICS Patch Tuesday: Rockwell Automation Leads With 8 Security Advisories (SecurityWeek) SAP 'wins' Patch Tuesday with worse flaws than Microsoft  (The Register) Adobe Patches Critical ColdFusion and Commerce Vulnerabilities (SecurityWeek) Data leak sheds light on Kimsuky operations (SC Media) Apple Unveils iPhone Memory Protections to Combat Sophisticated Attacks (SecurityWeek) Learn about ChillyHell, a modular Mac backdoor (jamf) Ransomware Payments Plummet in Education Amid Enhanced Resiliency (Infosecurity Magazine) Critical infrastructure security tech needs to be as good as our smartphones, top NSC cyber official says (CyberScoop) Sen. King: Cyber domain is a ‘hellscape' that will be made worse by cuts (The Record) US indicts alleged ransomware boss tied to $18B in damages (The Register)Jeremy Clarkson's pub has been 'swindled' out of £27,000 by hackers (Manchester Evening News) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Badlands Media
DEFCON ZERQ Ep. 008

Badlands Media

Play Episode Listen Later Sep 10, 2025 138:52


A realistic decoding of Q mixed in with geopolitics with Alpha Warrior and Josh Reid.

The FPL Banger Podcast
FPL GW4 PREVIEW | WILDCARD ACTIVE! HAALAND IN?

The FPL Banger Podcast

Play Episode Listen Later Sep 10, 2025 58:34


Yes, this podcast is STILL hosted by the 1st ranked fpl content creator in the whole world (according to FPL Gameweek). So follow our tips and be amazed as you get so many green arrows you'll be tired of them. Siva has activated his Wildcard while Sam hasn't, we discuss why, Haaland, Salah, DEFCON budget gems and much more in a sweet kinda-short enjoyable FPL preview with not a single ad. Just good FPL vibes.

Daily Kos Radio - Kagro in the Morning
Kagro in the Morning - September 9, 2025

Daily Kos Radio - Kagro in the Morning

Play Episode Listen Later Sep 9, 2025 116:58


David Waldman is back to tell it like it is and was. Eee-Ew! The Jeffrey Epstein birthday book has been released, the Trump-Epstein birthday letter has been revealed, and it's real, it's bad, and it sure is icky, much like many of its participants. Donald was certain that we all agreed the issue killed itself in its cell and was long gone and buried by now, but apparently that isn't the case. The Trump Supreme Court lifted restrictions on roving patrols and racial profiling on immigration stops, but you better believe they weren't talking about people wearing lederhosen and alpine hats. The Supreme Court also allowed Trump to fire the FTC commissioner, which of course goes against precedent. It would go against precedent to shut the whole place down and walk away, but here we are. Gops take their tit for tat for tit with Dems to Defcon 2 on Monday. Chuck Schumer tells them they might rue the day that they go Defcon 1… RUE He tells ya! Want to know more about “Discharge Petition No. 9”? Discharge procedure in the House? The travails and tribulations of House Resolution 581? Don't ask me! David knows about all that stuff. One thing that David did not know is that Missouri Democrats are holding a sit-in to protest a special session to redraw their congressional map. Now we all do!

CISO Tradecraft
#249 - Unveiling AI and Crypto Threats with Microsoft's Tomas Roccia

CISO Tradecraft

Play Episode Listen Later Sep 8, 2025 43:08 Transcription Available


In this episode of CISO Tradecraft, host G Mark Hardy sits down with Tomas Roccia, a senior threat researcher at Microsoft, to delve into the evolving landscape of AI and cybersecurity. From AI-enhanced threat detection to the complexities of tracking cryptocurrency used in cybercrime, Tomas shares his extensive experience and insights. Discover how AI is transforming both defensive and offensive strategies in cybersecurity, learn about innovative tools like Nova for adversarial prompt detection, and explore the sophisticated techniques used by cybercriminals in high-profile crypto heists. This episode is packed with valuable information for cybersecurity professionals looking to stay ahead in a rapidly changing field. Defcon presentation: Where is my crypto Dude? https://media.defcon.org/DEF%20CON%2033/DEF%20CON%2033%20presentations/Thomas%20Roccia%20-%20Where%E2%80%99s%20My%20Crypto%2C%20Dude%20The%20Ultimate%20Guide%20to%20Crypto%20Money%20Laundering%20%28and%20How%20to%20Track%20It%29.pdf  GenAI Breaches Generative AI Breaches: Threats, Investigations, and Response - Speaker Deck https://speakerdeck.com/fr0gger/generative-ai-breaches-threats-investigations-and-response  Transcripts: https://docs.google.com/document/d/1ZPkJ9P7Cm7D_JdgfgNGMH8O_2oPAbnlc Chapters 00:00 Introduction to AI and Cryptocurrencies 00:27 Welcome to CISO Tradecraft 00:55 Guest Introduction: Tomas Roccia 01:06 Tomas Roccia's Background and Career 02:51 AI in Cybersecurity: Defensive Approaches 03:19 The Democratization of AI: Risks and Opportunities 06:09 AI Tools for Cyber Defense 08:09 Challenges and Limitations of AI in Cybersecurity 09:20 Microsoft's AI Tools for Defenders 12:13 Open Source AI Security: Project Nova 18:37 Community Contributions and Open Source Projects 19:30 Case Study: Babit Crypto Hack 22:12 Money Laundering Techniques in Cryptocurrency 23:01 AI in Tracking Cryptocurrency Transactions 26:09 Sophisticated Attacks and Money Laundering 33:50 Future of AI and Cryptocurrency 38:17 Final Thoughts and Advice for Security Executives 41:28 Conclusion and Farewell

TrustedSec Security Podcast
8.1 - Hacker Summer Camp

TrustedSec Security Podcast

Play Episode Listen Later Sep 8, 2025 27:03


Security Noise is back for its 8th season! The weather is getting cooler but we are still chatting about our experiences in Las Vegas for "Hacker Summer Camp." In this episode, Geoff and Skyler speak with Senior Security Consultants David Boyd and Whitney Phillips about their experiences at DEFCON 33 and Black Hat 2025. We discuss the evolution of DEFCON, the challenges of navigating large conferences, and tips for making the most of your experience. About this podcast: Security Noise, a TrustedSec Podcast hosted by Geoff Walton and Producer/Contributor Skyler Tuter, features our cybersecurity experts in conversation about the infosec topics that interest them the most. Find more cybersecurity resources on our website at https://trustedsec.com/resources.

Just Above The Average FPL
Free Hit or Wildcard GW4?

Just Above The Average FPL

Play Episode Listen Later Sep 7, 2025 93:33


Adam and Baker are joined by Ivan for an early-season check-in that's anything but average. With Free Hits flying and Wildcards tempting, the trio unpack the tactical and emotional rollercoaster of early-season FPL. Ivan shares his unique approach to playing without checking rank, while the crew debate the impact of DefCon, chip timing, and the transfer window's ripple effect. Key Talking Points: • Ivan's Free Hit strategy and chip sequencing • The rise of DefCon: Are defenders now OP? • Premium dilemmas: Salah, Haaland, and the midfield shuffle • Rank blindness: Ivan's philosophy and its impact • Transfer chaos and tactical uncertainty • Wildcard timing Support the Show • Become a patron: https://patreon.com/aboveaveragefpl • Rate & review on Spotify, Apple Podcasts, or your favourite platform • Join our Discord for 24/7 FPL banter Learn more about your ad choices. Visit podcastchoices.com/adchoices

Badlands Media
DEFCON ZERQ Ep. 007: Flynn, Signals, and the Venezuela Strike

Badlands Media

Play Episode Listen Later Sep 3, 2025 171:25


Alpha Warrior and Josh Reid deliver one of their most explosive episodes yet, connecting the dots between General Flynn's cryptic posts, Trump's drop confirmations, and a dramatic U.S. military strike on narco-terrorists in Venezuela. They break down Flynn's “third arc of American history” message, Trump's sharp Truth Social posts calling out China and Big Pharma, and the deeper meaning behind Chuck Grassley's “first Q, 10, Butler 7” post. The hosts dive into drops, military intelligence operations, cartel wars, and the shifting rules of engagement marked by the first Hellfire missile strike on a cartel speedboat. With analysis stretching from the Darien Gap to Arabella Advisors' dark money, Bill Gates' White House meeting, CDC purges, and Microsoft's compromised DoD program, this episode ties together global corruption, psyops, and the unraveling of the deep state. Reid and Alpha argue we are in the final phase of a full-scale military operation, urging listeners to pay attention as comms fly and history unfolds in real time.

To The Point - Cybersecurity
Exploring Rowhammer, ECC, and the Future of Secure Data Storage with JB Baker

To The Point - Cybersecurity

Play Episode Listen Later Sep 2, 2025 43:13


Welcome to a brand new episode of To The Point Cybersecurity, brought to you by Forcepoint! This week, hosts Rachael Lyon and Jonathan Knepher dive into a side of cybersecurity that doesn't often get the spotlight: the ever-evolving world of memory, storage, and hardware security. They're joined by JB Baker, Vice President of Marketing and Product Management at ScaleFlux—a seasoned expert with more than 20 years of experience at top companies like Intel, Seagate, and LSI. Coming fresh off the buzz of DEF CON and Black Hat, Rachael and Jonathan kick things off discussing grassroots cyber initiatives, before shifting gears to critical threats like Rowhammer attacks and new vulnerabilities emerging as AI transforms our approach to data and memory architecture. JB unpacks the complexities of error-correcting codes (ECC), new approaches to memory protection, and how open-source, community-driven projects are reshaping data center security. From quantum computing's impact on the encryption landscape to the ongoing power challenges facing data centers, this episode is packed with insights, real-world examples, and a look at how the future of hardware security will shape everything from AI to edge computing. Whether you're a cybersecurity professional, hardware enthusiast, or just curious about the unseen backbone powering our digital world, you won't want to miss this conversation! For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e348

David Bombal
#507: He Quit Cybersecurity After 34 Years — Here's Why

David Bombal

Play Episode Listen Later Sep 1, 2025 22:23


Big thank you to Proton Pass for sponsoring this video. To sign up for Proton Pass, please use the following link https://proton.me/davidbombal to get a 60% discount. Cybersecurity icon Mikko Hyppönen sits down with David Bombal at Black Hat to explain his bold move from antivirus to anti-drone defense after 34 years. He breaks down why mobile operating systems are the biggest security improvement of the past 15 years, how attackers have shifted from device exploits to human scams, and why he believes defenders currently have the edge with AI. They unpack the rise of fiber-tethered drones that evade RF detection, the coming reality of autonomous “killer robots” (not yet here—but inevitable), and the grim state of privacy as everyday IoT devices go online by default—his “internet asbestos” warning. Mikko also reflects on achieving keynote goals at DEF CON, RSA, and Black Hat, and shares career advice: set goals, don't drift. Topics: mobile OS security, social engineering, AI for defense, zero-day research, drone warfare, privacy and encryption policy, IoT risks, career pivot. // Mikko Hypponen's SOCIALS // X: https://x.com/mikko Website: https://mikko.com/ LinkedIn: https://www.linkedin.com/in/hypponen/... // Books REFERENCE // If it's smart it's vulnerable: US: https://amzn.to/41lkSaG UK: https://amzn.to/4oTpOgN // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:56 - Mikko Hyppönen keynote talks 01:51 - Proton Pass sponsored segment 04:09 - Pivoting from cybersecurity to anti-drone 09:28 - Humanoid robots are near 09:54 - How cybersecurity has improved 12:11 - Defenders have the advantage with AI 15:26 - Pros and Cons of the AI revolution 16:57 - Privacy is dying 21:36 - Advice for your future // Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.

Just Above The Average FPL
Is Joao Pedro The Best Striker In The League? | GW4 First Look

Just Above The Average FPL

Play Episode Listen Later Aug 31, 2025 105:46


This week on Above Average FPL, Adam and Baker unpack a brutal Gameweek 3 filled with blanks, benchings, and bonus-point heartbreak. From Salah's continued struggles to Bruno's last-minute redemption, we explore the tactical trends and FPL implications heading into the international break.

Badlands Media
Why We Vote Ep. 139: Exposing Election Vulnerabilities w/ Phillip Davis

Badlands Media

Play Episode Listen Later Aug 30, 2025 90:12


CannCon and Ashe in America welcome Phillip Davis, known online as @Mad_Liberals, for a deep-dive into election vulnerabilities exposed at DEFCON. Davis, a veteran software developer with decades in fingerprint identification systems, walks through how voting machines can be accessed and manipulated using readily available technician and poll worker cards. He explains the ease of altering ballots, prompts, and even candidate displays without leaving an audit trail, demonstrating how voters themselves can be unknowingly hacked. The conversation also unpacks the infamous Halderman Report, systemic security failures, and the lack of accountability in election administration. From Goodwill voting machines to encryption keys left in plain sight, Davis reveals how fragile U.S. election infrastructure really is, sparking a raw discussion on trust, oversight, and the future of voting.

Book It! A Wrestling Podcast
Episode 302-EWO: Def Con One – Part 2 (BookIt!Verse 5)

Book It! A Wrestling Podcast

Play Episode Listen Later Aug 30, 2025 76:58


The Bad Guy Kenny's Elite Wrestling Organization continues with Def Con One – Part 2 in BookIt!Verse 5!If Part 1 set the tone, Part 2 raises the stakes with bigger matches, shocking twists, and Kenny's signature chaos.

@BEERISAC: CPS/ICS Security Podcast Playlist
S2 E2: Securing the Grid: Substation Security

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Aug 30, 2025 22:30


Podcast: Simply ICS CyberEpisode: S2 E2: Securing the Grid: Substation SecurityPub date: 2025-08-27Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of Simply ICS Cyber, Don C. Weber and Tom VanNorman sit down with Chris Sistrunk to dive into the challenges and realities of Substation Security.  Chris, now a Technical Leader at ⁨Mandiant⁩ & Google Cloud Security, brings years of experience from his time at Entergy, where he specialized in Transmission & Distribution SCADA systems and cybersecurity labs. He's a recognized leader in ICS/OT security and an active contributor to the community through events like DEF CON's ⁨ICS Village⁩ and BEER-ISAC.  Join us as we discuss securing critical infrastructure, modern threats to substations, and what defenders need to know to stay ahead.  Tune in to get expert insights into protecting the grid.  Connect with Chris on LinkedIn: https://www.linkedin.com/in/chrissistrunk Episode Links: https://cloud.google.com/blog/topics/threat-intelligence/securing-protection-relays-modern-substations https://techcrunch.com/2025/07/14/mark-zuckerberg-says-meta-is-building-a-5gw-ai-data-center/ Connect with your hosts on LinkedIn:- Don https://linkedin.com/in/cutaway- Tom https://linkedin.com/in/thomasvannorman=========================Simply Cyber empowers people who want a rewarding cybersecurity career=========================Presented by Simply Cyber Media Group=========================All the ways to connect with Simply Cyberhttps://SimplyCyber.io/SocialsThe podcast and artwork embedded on this page are from Simply Cyber Media Group, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Badlands Media
DEFCON ZERQ Ep. 006: Codex 9/11, Flynn's Role, and Trump's War on the Cartels

Badlands Media

Play Episode Listen Later Aug 27, 2025 129:46


Alpha Warrior and Josh Reid return for a hard-hitting episode of DEFCON ZERQ, joined by Brad Zerbo to dig into the revelations behind his documentary Codex 9/11. From CIA fingerprints, missing gold, and the forever war model, to the global cabal's use of terror as a money funnel, the discussion exposes the hidden networks fueling America's darkest chapters. The hosts then connect the dots to today, breaking down Pam Bondi's cryptic posts, drops, and what Trump's National Guard deployments really mean. Is the administration preparing for cartel crackdowns, sleeper cell roundups, and a reckoning on 9/11 itself? With deep dives into John Brennan, James Comey, Flynn's quiet advisory role, and looming moves in Venezuela, this episode blends geopolitics, military strategy, and decoding with the unfiltered edge DEFCON ZERQ is known for.

UNSECURITY: Information Security Podcast
Unsecurity Episode 245: DEF CON Recap w/ Matt Dowd, Matt Findlay, Pinky Thompson

UNSECURITY: Information Security Podcast

Play Episode Listen Later Aug 27, 2025 30:35


Returning from this year's DEF CON, hear from our Offensive Team Managers, Dowd and Findlay, and Pinky, IR Manager and co-host of The Hackle Box. Hear about new highlights, CTF's, and villages, and reflection from Brad as a Blue Team member navigating past challenges. Have something to say? Contact us at unsecurity@frsecure.com and follow us for more!LinkedIn: frsecure Instagram: frsecureofficialFacebook: frsecureBlueSky: frsecureAbout FRSecure: https://frsecure.com/ FRSecure is a mission-driven information security consultancy headquartered in Minneapolis, MN. Our team of experts is constantly developing solutions and training to assist clients in improving the measurable fundamentals of their information security programs. These fundamentals are lacking in our industry, and while progress is being made, we can't do it alone. Whether you're wondering where to start, or looking for a team of experts to collaborate with you, we are ready to serve.

What the Hack with Adam Levin
Episode 214: DEF CON Redux with Rachel Tobac!

What the Hack with Adam Levin

Play Episode Listen Later Aug 26, 2025 34:44


In this second installment of our DEF CON two-parter, we talked to SocialProof Security CEO Rachel Tobac about how and why people are often the weakest link in so many cybersecurity protocols and how making yourself a harder target will cause most threat actors to move on to an easier mark. Learn more about your ad choices. Visit megaphone.fm/adchoices

SECURE AF
DEF CON 33 Debrief

SECURE AF

Play Episode Listen Later Aug 26, 2025 48:45


Got a question or comment? Message us here!Fresh off the chaos of DEF CON 33, Tanner, Hickman, and Will break down the four-day hacker conference, from the eye-opening hacker villages and mind-bending talks to Hickman's clutch CTF victory and Will's bold dive into the Social Engineering Community's Vishing Competition. No sleep, all signal.Support the showWatch full episodes at youtube.com/@aliascybersecurity.Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.

Absolute AppSec
Episode 295 - DEF CON 33 Recap, Crocs and Socks (and Bots)

Absolute AppSec

Play Episode Listen Later Aug 26, 2025


Seth and Ken return with a new episode summarizing their experience at DEF CON 33 and all things Las Vegas over the past month. This includes panels, talks, workshops, happy hours, and even corporate (boo) events. This is followed by discussion of a few research items that came out of the conference, including James Kettle's HTTP1.1 Must Die talk. Finally, why AI is infecting Application Security.

Pebkac Podcast
433 - DEFCON No More?

Pebkac Podcast

Play Episode Listen Later Aug 26, 2025 64:16


Three hosts discuss their recent con visits.

Ham Radio Crash Course
Huntsville and DefCon Recaps

Ham Radio Crash Course

Play Episode Listen Later Aug 23, 2025 195:00


Show Notes (contains affiliate links): Huntsville and DefCon Recaps    On this week's episode of Ham Radio Crash Course, a podcast roughly based on amateur radio but mostly made up of responding to emails from listeners, hosted by Josh Nass - KI6NAZ and his reluctant wife, Leah - KN6NWZ, we talk about portable SSTV, Huntsville and DefCon recaps and Baba Vanga predictions.    Announcements: HRCC Net - https://hrcc.link.   Gigaparts Link (get 10% with code JOSH) - https://www.gigaparts.com/nsearch/?lp=JOSH   Ham Radio Minute: Fun with Portable SSTV.   Ham Radio Test Study with Leah - Extra Exam HamStudy: https://hamstudy.org Support by getting something from Signal Stuff: https://signalstuff.com/?ref=622   Gordon West Ham Radio Test Prep Books with HRCC Links  -Technician: https://amzn.to/3AVHGU1 -General: https://amzn.to/4ehQ5zz -Extra: https://amzn.to/4efCqJ2   Free Fastrack to Your Ham Radio License Books on Audible (for new to Audible readers): https://www.amazon.com/hz/audible/mlp/membership/premiumplus?tag=hrccpodcast-20   Join the conversation by leaving a review on Apple Podcast for Ham Radio Crash Course podcast at https://podcasts.apple.com/us/podcast/ham-radio-crash-course/id1400794852 and/or emailing Leah@hamtactical.com. Leaving a review wherever you listen to podcasts will help Ham Radio Crash Course reach more hams and future hams and we appreciate it!   Show Topic: Huntsville Hamfest and DefCon Recaps   Hog Wild in the Salted Ham Cellar. Sovereign citizen against ham radio licenses.   Preparedness Corner - Baba Vanga Predictions for 2026 https://timesofindia.indiatimes.com/astrology/zodiacs-astrology/baba-vanga-predictions-for-2026-will-scare-you-alien-contact-natural-disasters-global-war-and-more/articleshow/123416653.cms   Email Correspondent's Tower: We answer emails with ham radio questions, comments on previous podcasts, T-shirt suggestions and everything in between.   Links mentioned in the ECT: Doug's Sleepy Hollow Park Video -  https://youtu.be/tLFnq2dM-XY HRCC Movie Club    Voted and suggested movies here - https://poll.ly/N7Jt2ACU1Epz5PSJmknw   CJ's Nifty List of HRCC Movie Club movies here - https://letterboxd.com/roguefoam/list/ham-radio-crash-course-podcast-movie-club/   The 5th Wave 10/30 War of the Worlds (2005) 10.5/30 Hitchhiker's Guide To The Galaxy 11/30 Maximum Overdrive 11/30  The Tomorrow War 11/30 On The Beach (1959) 12/30 The Postman 12/30 Soylent Green 12/30 World War Z 12/30 Waterworld 13/30 San Andreas 13/30 Airplane 14/30 The Day After (1983) 14/30 The Day After Tomorrow 14/30 Z is for Zachariah 14/30 Fall (2022) 14.5/30 Signs 15/30 Deep Impact 15/30  The Birds 15/30 Twisters (2024) 15/30  Armageddon 15.5/30 Sean of the Dead 16/30 Zombieland 16/30 The Book of Eli Ranked: 16.75/30 Love and Monsters 17/30 Frequency 17/30 2012 17/30 Greenland 17/30 12 Monkeys 17.5/30  Threads 18/30 The Survivalist 18/30 Independence Day 18.5/30 Contact (1997) 19/30 The Towering Inferno 19/30 Don't Look Up 19.5/30 Twister  19.5/30 Dante's Peak 19.5/30 Tremors 20/30 The Road 21/30 The Quiet Place 21/30 Red Dawn (1984) 22/30 Wall-E 23/30 Blast From The Past (1999) 23.5/30 28 Days Later 24.5/30 Apollo 13 24.5/30 Contagion 25/30 I Am Legend 25/30 10 Cloverfield Lane 26.5/30 The Martian 27/30   On Hiatus Indefinitely    Thank you all for listening to the podcast.  We have a lot of fun making it and the fact you listen and send us feedback means a lot to us!   Want to send us something? Josh Nass  P.O. Box 5101 Cerritos, CA 90703-5101 Support the Ham Radio Crash Course Podcast: Patreon - https://www.patreon.com/hoshnasi Shop HamTactical: http://www.hamtactical.com Shop Our Affiliates: http://hamradiocrashcourse.com/affiliates/ Shop Our Amazon Store: https://www.amazon.com/shop/hamradiocrashcourse As an Amazon Associate I earn from qualifying purchases.   Connect with Us: Website...................► http://hamradiocrashcourse.com YouTube..................► https://www.youtube.com/c/HamRadioCrashCourse Podcast...................► https://hamradiocrashcourse.podbean.com/ Discord....................► https://discord.gg/xhJMxDT Facebook................► https://goo.gl/cv5rEQ Twitter......................► https://twitter.com/Hoshnasi Instagram.................► https://instagram.com/hoshnasi (Josh) Instagram.................►https://instagram.com/hamtactical (Leah) Instagram.................►https://instagram.com/nasscorners (Leah)

Badlands Media
DEFCON ZERO Ep. 005: False Flags, Cyber Fronts & Global Power Plays

Badlands Media

Play Episode Listen Later Aug 20, 2025 138:12 Transcription Available


Alpha Warrior and Josh Reid dig into the mechanics of false flag operations and how they're used to manipulate public perception and justify political agendas. They explore the cyber domain as the new frontline of global conflict, highlighting how governments and shadow networks wage war through digital means. The conversation ties these tactics to shifting global power structures, exposing how narratives are engineered to keep the public distracted while larger moves play out behind the scenes. With sharp analysis and candid discussion, the hosts connect the dots between covert strategy, technological warfare, and the battle for geopolitical dominance.

The FPL Wire
Gameweek 2 Pod FPL 2025 | The FPL Wire | Fantasy Premier League Tips 2025/26

The FPL Wire

Play Episode Listen Later Aug 20, 2025 91:49


Serious Haaland FOMO on this one as we discuss what we learned from Gameweek 1 and discuss the early bandwagons ━━━━━━━━━━━━━

What the Hack with Adam Levin
Episode 213: Inside DEF CON's Social Engineering Village

What the Hack with Adam Levin

Play Episode Listen Later Aug 19, 2025 41:34


At DEF CON's Social Engineering Village, contestants have 22 minutes to charm real employees at real companies into revealing real details that could lead to a breach. We step inside the booth to see how persuasion, improv, and psychology fuel both ethical hacking and the rise of cybercrime worldwide. Learn more about your ad choices. Visit megaphone.fm/adchoices

Next in Tech
Black Hat and DefCon

Next in Tech

Play Episode Listen Later Aug 19, 2025 30:12 Transcription Available


The annual “security summer camp” that is made up of the Black Hat and DefCon conferences is just past and the security analyst team, Scott Crawford, Dan Kennedy, Justin Lam and Mark Ehr, join host Eric Hanselman to examine what they saw and discuss the implications. Despite the heat of a Las Vegas summer, it's become bigger than the two main conferences, with a number of side events, like B-Sides, there's a lot going on. AI conversations are evolving and maturing. We've mostly moved beyond blaming user foibles for breaches, but AI is expanding the attack surface with new and more complex tactics for user manipulation. AI is lowering the barriers for attackers. The days of script kiddies have morphed into Claude Code-fueled attack development. The larger question is how security vendors are responding to AI risks. Claims that tier 1 security analysts should start looking for another job just seem irresponsible in the current environment. AI augmentation can reduce toil and digest the masses of events that security teams struggle to deal with today. At the same time, AI is scaling attack volumes. It's the constant hegemony that's always played out at the core of security. More S&P Global Content: RSAC Conference 2025: Breaking records at the threshold of uncertainty AI for security: Agentic AI will be a focus for security operations in 2025 Next in Tech | Ep. 215: RSA Conference Preview Deep Pocket Inspection: RSAC Innovation Sandbox Retrospective & Perspective Next in Tech | Ep. 227: Managed Security Services Next in Tech | Ep. 225: Security for MCP For S&P Global Subscribers: Use of GenAI security solutions has spiked, continued uptake projected – Highlights from VotE: Information Security Infosec spending projected to rise 27% on average in 2025 – Highlights from VotE: Information Security CNAPP in focus after large infosec acquisition – Highlights from VotE: Information Security Data Insight: Data security market to top $26B in 2029 Data Security Market Monitor & Forecast CNAPP matures into full-spectrum security solution Credits: Host/Author: Eric Hanselman Guests: Scott Crawford, Dan Kennedy, Justin Lam, Mark Ehr Producer/Editor: Adam Kovalsky Published With Assistance From: Sophie Carr, Feranmi Adeoshun, Kyra Smith

The I.T. Career Podcast
Bonus: What They Don't Tell You About DEFCON

The I.T. Career Podcast

Play Episode Listen Later Aug 19, 2025 9:10


Dive deeper with Snow Goat — the free hands-on lab that inspired this video. https://hubs.ly/Q03CSkb80 Plus, check out the Varonis blog for real-world cybersecurity insights https://hubs.ly/Q03CShBG0DEF CON isn't just a hacker conference — it's a chaotic, creative, overwhelming, and wildly inspiring deep dive into everything cybersecurity. From packed villages and surprise CTFs to some of the most welcoming communities I've ever seen… this year completely changed how I think about tech conferences.In this video, I'm breaking down what caught me off guard, what I loved most, and what you need to know if you're thinking about going.Check out the Noob Village Discord: https://discord.gg/FGzPh4Upeh  The GingerHacker YouTube: @GingerHacker Kevtech IT YouTube: @KevtechITSupport InfoSecPat YouTUbe: @InfosecEdu

CTF Radiooo
021 - Live from DEF CON 33 with Andrew and Perri

CTF Radiooo

Play Episode Listen Later Aug 18, 2025 43:05


Youtube Video of podcast Shownotes and Links In this episode, which seems to be an annual tradition, adamd and Zardus report LIVE from DEF CON 33 about the AIxCC results, first alone then together with Andrew Carney and Perri Adams, the key people involved in creating and running the AIxCC. Links AIxCC @ DEF CON 33 Open-source AIxCC Systems

Book It! A Wrestling Podcast
Episode 301- EWO: Def Con One – Part 1 (BookIt!Verse 5)

Book It! A Wrestling Podcast

Play Episode Listen Later Aug 16, 2025 83:39


The Bad Guy Kenny makes his BookIt!Verse 5 debut with the launch of the Elite Wrestling Organization (EWO).The first show, Def Con One – Part 1, sets the tone with shocking twists, high-stakes matches, and Kenny's signature brand of chaos.

Adventures of Alice & Bob
Ep. 85 - The MGM Help Desk Heist // Matthew Toussain

Adventures of Alice & Bob

Play Episode Listen Later Aug 15, 2025 48:51


Join host James Maude for a candid conversation with Matthew Toussaint - founder of Open Security and mastermind behind the legendary Subterfuge framework that once forced Starbucks to overhaul its Wi-Fi security. From his unexpected path as an aspiring Air Force lawyer to becoming a renowned cybersecurity educator, Matthew shares a lifetime of stories: a physical pen test that went spectacularly wrong at a franchise location, a medical clinic investigation that exposed an insider threat with international stakes, and how the MGM breach proved the devastating power of old-school phone-based social engineering.They dive into why AI is about to make help desk social engineering terrifyingly scalable, how a nervous 21-year-old's DefCon talk reshaped network security, and why, despite decades of warnings, the industry is still failing at the basics while attackers rapidly scale with artificial intelligence.

Black Hills Information Security
DEF CON RECAP – 2025-08-11

Black Hills Information Security

Play Episode Listen Later Aug 14, 2025 59:54


Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — Wading Through Woods06:06 - DEF CON RECAP - Talkin' Bout [infosec] News 2025-08-1109:16 - Story # 1: It's time to acknowledge HTTP/1.1 is insecure12:36 - Story # 2: Research reveals possible privacy gaps in Apple Intelligence's data handling17:51 - Story # 3: Federal court filing system hit in sweeping hack21:09 - Story # 4: Cisco discloses data breach impacting Cisco.com user accounts32:17 - Story # 5: Google says its AI-based bug hunter found 20 security vulnerabilities34:20 - Story # 6: Automate security reviews with Claude Code39:01 - Story # 7: Flipper Zero ‘DarkWeb' Firmware Bypasses Rolling Code Security on Major Vehicle Brands44:44 - Story # 7b: OnStar assists CHP in stopping fleeing SUV with toddler inside47:12 - Story # 7c: That viral video of a ‘deactivated' Tesla Cybertruck is a fake49:37 - Story # 8: LegalPwn Attack Tricks GenAI Tools Into Misclassifying Malware as Safe Code50:53 - Story # 9: Microsoft Launches Project Ire to Autonomously Classify Malware Using AI Tools53:08 - Story # 10: A Single Poisoned Document Could Leak ‘Secret' Data Via ChatGPT58:10 - Story # 11: Millions of Dell Laptops Vulnerable to Device Takeover and Persistent Malware Attacks

Critical Thinking - Bug Bounty Podcast
Episode 135: Akamai's Ryan Barnett on WAFs, Unicode Confusables, and Triage Stories

Critical Thinking - Bug Bounty Podcast

Play Episode Listen Later Aug 14, 2025 86:21


Episode 135: In this episode of Critical Thinking - Bug Bounty Podcast Justin sits down with Ryan Barnett for a deep dive on WAFs. We also recap his Exploiting Unicode Normalization talk from DEFCON, and get his perspective on bug hunting from his time at Akamai. Follow us on twitter at: https://x.com/ctbbpodcastGot any ideas and suggestions? Feel free to send us any feedback here: info@criticalthinkingpodcast.ioShoutout to YTCracker for the awesome intro music!====== Links ======Follow your hosts Rhynorater and Rez0 on Twitter: https://x.com/Rhynoraterhttps://x.com/rez0__====== Ways to Support CTBBPodcast ======Hop on the CTBB Discord at https://ctbb.show/discord!We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.You can also find some hacker swag at https://ctbb.show/merch!Today's Sponsor - ThreatLocker. Checkout ThreatLocker Detect! https://www.criticalthinkingpodcast.io/tl-detectToday's Guest: https://x.com/ryancbarnett====== Resources ======Accidental Stored XSS Flaw in Zemanta 'Related Posts' Plugin for TypePadhttps://webappdefender.blogspot.com/2013/04/accidental-stored-xss-flaw-in-zemanta.htmlXSS Street-Fighthttps://media.blackhat.com/bh-dc-11/Barnett/BlackHat_DC_2011_Barnett_XSS%20Streetfight-Slides.pdfBlackhat USA 2025 - Lost in Translation: Exploiting Unicode Normalizationhttps://www.blackhat.com/us-25/briefings/schedule/#lost-in-translation-exploiting-unicode-normalization-44923====== Timestamps ======(00:00:00) Introduction(00:02:49) Accidental Stored XSS in Typepad Plugin (00:06:34) Chatscatter & Abusing third party Analytics(00:11:42) Ryan Barnett Introduction(00:21:11) Virtual Patching & WAF Challenges(00:40:39) AWS API Gateways & Whitelisting Bug Hunter Traffic(00:49:59) Lost in Translation: Exploiting Unicode Normalization(01:11:29) CSPs at the WAF level & 'Bounties for Bypass'

Autonomous IT
CISO IT — Hacker Summer Camp 2025: A Recap of Black Hat & DEF CON, E19

Autonomous IT

Play Episode Listen Later Aug 14, 2025 6:17


Join Automox CISO and SVP of Product Jason Kikta for a recap of Black Hat and DEF CON 2025. In this episode, Jason shares his take on the conversation around AI in cybersecurity shifting from hype to practical tools for defenders. Hear why integrating AI into your CI/CD pipeline, alert triage, and vulnerability management could be a game changer, plus thoughts on choosing the right security events for your personality and goals. Whether you're a conference veteran or a curious first-timer, this episode offers insights, humor, and encouragement to get more involved in the security community.

Cyber Security Today
Urgent Vulnerabilities: Patching Exchange, Citrix, and Fortinet

Cyber Security Today

Play Episode Listen Later Aug 13, 2025 14:33 Transcription Available


In this episode of Cybersecurity Today, host David Shipley covers critical security updates and vulnerabilities affecting Microsoft Exchange, Citrix NetScaler, and Fortinet SSL VPNs. With over 29,000 unpatched Exchange servers posing a risk for admin escalation and potential full domain compromise, urgent action is needed. Citrix Bleed 2 is actively being exploited, with significant incidents reported in the Netherlands and thousands of devices still unpatched globally. Fortinet SSL VPNs are experiencing a spike in brute force attacks, hinting at a possible new vulnerability on the horizon. Lastly, Shipley highlights notable moments from DEFCON 33, including innovative security hacks and sobering realities of the hacker community. Tune in for detailed breakdowns and insights on how to stay vigilant against these threats. 00:00 Introduction and Overview 00:32 Microsoft Exchange Vulnerability 02:54 Citrix Bleed Two Exploits 05:21 Fortinet SSL VPN Brute Force Attacks 07:39 Insights from DEFCON 33 13:46 Conclusion and Final Thoughts

The Personal Computer Radio Show
The Personal Computer Radio Show 8-13-25

The Personal Computer Radio Show

Play Episode Listen Later Aug 13, 2025 55:19


The Personal Computer Show Wednesday August 13th 2025 www.PRN.live - Streaming on the Internet 6:00 PM Eastern Time In the News • Trump Calls on Intel CEO to Resign ‘Immediately' • Taiwan Detains TSMC Staff for Alleged Theft of Key Technology Trade Secrets • Report from DEF CON 33 in Las Vegas • Amazon Restructures its Podcast Business • Apple Wants to Reclaim its Place in the AI Development Race. • Apple's China Reality Check • Big Tech's AI Spending Spree – Is AI Demand Finally Catching Up? ITPro Series with Benjamin Rockwell • All of Us at Every Level Need to be Looking to AI to Improve Our Skills and Jobs From the Tech Corner • Phone Cameras are Evolving Fast, but Photography as an Art is Dying Quietly Technology Chatter - (Benjamin Rockwell and Marty Winston) • Three Kinds of Meeting Monsters 

LINUX Unplugged
627: The 2 a.m. Rescue

LINUX Unplugged

Play Episode Listen Later Aug 11, 2025 84:38 Transcription Available


Wes performs a 2 a.m. rescue at DEFCON, and Chris attempts to build a Linux desktop using nothing but vibes.Sponsored By:Managed Nebula: Meet Managed Nebula from Defined Networking. A decentralized VPN built on the open-source Nebula platform that we love. 1Password Extended Access Management: 1Password Extended Access Management is a device trust solution for companies with Okta, and they ensure that if a device isn't trusted and secure, it can't log into your cloud apps. Unraid: A powerful, easy operating system for servers and storage. Maximize your hardware with unmatched flexibility. Support LINUX UnpluggedLinks:

ITSPmagazine | Technology. Cybersecurity. Society
From Fish Tanks to AI Agents: Why the Words “We're Secure” Means Nothing Without Proof | A Black Hat USA 2025 Conversation with Viktor Petersson | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 11, 2025 27:02


When security becomes more than a checkbox, the conversation shifts from “how much” to “how well.” At Black Hat USA 2025, Sean Martin, CISSP, Co-Founder of ITSPmagazine, and Viktor Petersson, Founder of an SBOM artifact platform, unpack how regulatory forces, cultural change, and AI innovation are reshaping how organizations think about security.Viktor points to the growing role of Software Bill of Materials (SBOMs) as not just a best practice, but a likely requirement in future compliance frameworks. The shift, he notes, is driven largely by regulation—especially in Europe—where security is no longer a “nice to have” but a mandated operational function. Sean connects this to a market reality: companies increasingly see transparent security practices as a competitive differentiator, though the industry still struggles with the hollow claim of simply being “secure.”AI naturally dominates discussions, but the focus is nuanced. Rather than chasing hype, both stress the need for strong guardrails before scaling AI-driven development. Viktor envisions engineers supervising fleets of specialized AI agents—handling tasks from UX to code auditing—while Sean sees AI as a way to rethink entire operational models. Yet both caution that without foundational security practices, AI only amplifies existing risks.The conversation extends to IoT and supply chain security, where market failures allow insecure, end-of-life devices to persist in critical environments. The infamous “smart fish tank” hack in a Las Vegas casino serves as a reminder: the weakest link often isn't the target itself, but the entry point it provides.DEFCON, Viktor notes, offers a playground for challenging assumptions—whether it's lock-picking to illustrate perceived versus actual security, or examining the human factor in breaches. For both hosts, events like Black Hat and DEFCON aren't just about the latest vulnerabilities or flashy demos—they're about the human exchange of ideas, the reframing of problems, and the collaboration that fuels more resilient security strategies.___________Guest:Viktor Petersson, Founder, sbomify | On LinkedIn: https://www.linkedin.com/in/vpetersson/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974BlackCloak: https://itspm.ag/itspbcwebAkamai: https://itspm.ag/akamailbwcDropzoneAI: https://itspm.ag/dropzoneai-641Stellar Cyber: https://itspm.ag/stellar-9dj3___________ResourcesLearn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25ITSPmagazine Webinar: What's Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year's Hacker Conference — An ITSPmagazine Thought Leadership Webinar | https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conferenceCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

Cyber Security Today
Cyber Attacks, Jailbreaking GPT-5, and Hacker Summer Camp 2025 Highlights

Cyber Security Today

Play Episode Listen Later Aug 11, 2025 14:34 Transcription Available


In today's episode of Cybersecurity Today, host David Shipley covers critical updates on recent cyber attacks and breaches impacting the US Federal judiciary's case management systems, and SonicWall firewall compromises. He also discusses researchers' new jailbreak method against GPT-5, which bypasses ethical guardrails to produce harmful instructions. Shipley shares insights and standout sessions from Hacker Summer Camp 2025, including BSides Las Vegas, the I Am the Cavalry track, and Defcon, highlighting ongoing efforts and challenges in the cybersecurity landscape. Stay informed, stay secure, and join the conversation in this detailed overview of current cybersecurity issues and innovations. 00:00 Introduction and Headlines 00:31 US Federal Judiciary Cyber Attack 02:29 SonicWall Ransomware Attacks 04:14 AI Jailbreak Techniques 07:44 Hacker Summer Camp 2025 Highlights 08:10 BSides Las Vegas and Community Insights 09:29 Healthcare Cybersecurity and Crash Cart Project 12:11 Defcon Reflections and Final Thoughts 13:45 Conclusion and Listener Engagement

PEBCAK Podcast: Information Security News by Some All Around Good People
Episode 220 - Live From Black Hat 2025 and DEFCON 33, Drop In Las Vegas Tourism, Hotel Fees, Agentic AI

PEBCAK Podcast: Information Security News by Some All Around Good People

Play Episode Listen Later Aug 11, 2025 48:00


Welcome to this week's episode of the PEBCAK Podcast!  We've got some amazing stories this week so sit back, relax, and keep being awesome!  Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast   Please share this podcast with someone you know!  It helps us grow the podcast and we really appreciate it!   Tourism drop in Las Vegas https://www.roadsideamerica.com/story/12552 https://www.foxnews.com/travel/las-vegas-tourism-drops-sharply-some-visitors-claim-casinos-empty-amid-rising-costs     Dad Joke of the Week (DJOW)   Find the hosts on LinkedIn: Chris - https://www.linkedin.com/in/chlouie/ Brian - https://www.linkedin.com/in/briandeitch-sase/ Glenn - https://www.linkedin.com/in/glennmedina/ Tyson - https://www.linkedin.com/in/tyson-kindler-910658101/ Koby - https://www.linkedin.com/in/koby-caputo-117358145/

The Daily Scoop Podcast
The Army looks to build a drone marketplace; DARPA's AI Cyber Challenge reveals winning models

The Daily Scoop Podcast

Play Episode Listen Later Aug 11, 2025 5:17


The Army will be creating a marketplace to better match drones with units based on their requirements. With so many vendors providing a variety of unmanned aerial systems, it can be difficult for formations to determine if certain systems will in fact meet their needs. Col. Danielle Medaglia, project manager for UAS at program executive office for aviation, shared details about the new initiative during a recent teleconference, saying it is meant to ensure drones products do what they advertise they can do, along with confirming NDAA compliance and other specs. The forthcoming marketplace is part of the drone revolution occurring within the Pentagon. Secretary of Defense Pete Hegseth issued a directive last month on “Unleashing U.S. Military Drone Dominance,” which sought to improve how the department develops and employs small UAS. That directive calls for every squad to be equipped with low-cost, expendable drones by the end of 2026. Army offiicals called the new marketplace and approach a “fundamental shift” in how traditional acquisition is conducted. The goal is to get systems into the hands of troops as quickly as possible. The Pentagon's two-year public competition to spur the development of cyber-reasoning systems that use large language models to autonomously find and patch vulnerabilities in open-source software concluded Friday with $8.5 million awarded to three teams of security specialists at DEF CON. The Defense Advanced Research Project Agency's AI Cyber Challenge seeks to address a persistent bottleneck in cybersecurity — patching vulnerabilities before they are discovered or exploited by would-be attackers. DARPA Director Stephen Winchell said: “We're living in a world right now that has ancient digital scaffolding that's holding everything up. A lot of the code bases, a lot of the languages, a lot of the ways we do business, and everything we've built on top of it has all incurred huge technical debt… It is a problem that is beyond human scale.” The seven semifinalists that earned their spot out of 90 teams convened at last year's DEF CON were scored against their models' ability to quickly, accurately and successfully identify and generate patches for synthetic vulnerabilities across 54 million lines of code. The models discovered 77% of the vulnerabilities presented in the final scoring round and patched 61% of those synthetic defects at an average speed of 45 minutes, the competition organizers said. The models also discovered 18 real zero-day vulnerabilities, including six in the C programming language and 12 in Java codebases. The teams' models patched none of the C codebase zero-days, but automatically patched 11 of the Java zero-days, according to the final results shared Friday. Team Atlanta took the first-place prize of $4 million, Trail of Bits won second place and $3 million in prize money, and Theori ranked third, taking home $1.5 million. The competition's organizers allocated an additional $1.4 million in prize money for participants who can demonstrate when their technology is deployed into critical infrastructure. The Daily Scoop Podcast is available every Monday-Friday afternoon. If you want to hear more of the latest from Washington, subscribe to The Daily Scoop Podcast  on Apple Podcasts, Soundcloud, Spotify and YouTube.

Stats On Stats Podcast
Stats on Stats x B.I.C. @ DEF CON 33: Finding Your Village with Veronika

Stats On Stats Podcast

Play Episode Listen Later Aug 11, 2025 5:05


Join us for an insightful conversation at DEF CON 33 as we sit down with Veronika, a passionate cybersecurity enthusiast who has been immersed in the field since middle school. She shares her journey into cybersecurity, her experiences with Capture The Flag (CTF) competitions, and more.Veronika discusses the importance of mentorship and she offers valuable advice for anyone feeling out of place in the field and stresses the importance of staying true to oneself.

Stats On Stats Podcast
Stats on Stats x B.I.C. @ DEF CON 33: Finding Your Village with Leron

Stats On Stats Podcast

Play Episode Listen Later Aug 11, 2025 7:30


Join us for an insightful conversation at DEF CON 33! Tiffiny interviews Leron, live from the Blacks in Cybersecurity Village, as he shares his experience in creating Capture the Flag (CTF) challenges.Discover the mindset behind designing challenges that cater to both beginners and experienced professionals, and get valuable tips for first-time CTF participants. Leron highlights the importance of practice and points to resources like Hack the Box, TryHackMe, and more for newcomers to enhance their skills.Guest ConnectLeron GrayLinkedIn: https://www.linkedin.com/in/leron-gray/Blacks in CybersecurityWebsite: https://www.blacksincyberconf.com/

Stats On Stats Podcast
Stats on Stats x B.I.C. @ DEF CON 33: Finding Your Village with Dietrich

Stats On Stats Podcast

Play Episode Listen Later Aug 11, 2025 7:11


Join us for a conversation with Dietrich at DEF CON 33, live from the Blacks in Cybersecurity Village. Dietrich shares his journey with Respect the Tech and discusses the vital role community plays in cybersecurity.Learn how the collaboration between Respect the Tech and Blacks in Cybersecurity is creating a supportive space for learning, networking, and mentorship. Dietrich also delves into his experiences in blue team operations, the psychology behind cybersecurity, and the challenges of insider threat investigations.Guest ConnectDietrich BempahLinkedIn: https://www.linkedin.com/in/dietrich-bempah/Blacks in CybersecurityWebsite: https://www.blacksincyberconf.com/

All Jupiter Broadcasting Shows
The 2 a.m. Rescue | LINUX Unplugged 627

All Jupiter Broadcasting Shows

Play Episode Listen Later Aug 10, 2025


Wes performs a 2 a.m. rescue at DEFCON, and Chris attempts to build a Linux desktop using nothing but vibes.

The Valenti Show
HOUR 2: Tigers DEFCON Levels

The Valenti Show

Play Episode Listen Later Aug 7, 2025 39:27


Mike and Rico spent the second hour discussing which DEFCON level they are at when it comes to the Tigers. They took plenty of your calls and read your ticket texts throughout the hour.

The Valenti Show
What DEFCON Level Are You At With The Tigers?

The Valenti Show

Play Episode Listen Later Aug 7, 2025 9:54


The guys discuss their concern level with the Tigers right now.

Fantasy Football Scout
The FPL Scout: New Drafts, Def Cons, Promoted Teams!

Fantasy Football Scout

Play Episode Listen Later Aug 6, 2025 78:37


Andy, Hibbo and Nacho discuss their NEW drafts, promoted teams and Def Con points! SPONSERED BY FANTEAM - https://af.fanteam.com/click?o=1&a=14&c=7 New Customer Welcome Offer!

Countdown with Keith Olbermann
TRUMP SUING MURDOCH MEANS THE TRUMPSTEIN STORY WILL NEVER END - 7.21.25

Countdown with Keith Olbermann

Play Episode Listen Later Jul 21, 2025 87:03 Transcription Available


SEASON 3 EPISODE 147: COUNTDOWN WITH KEITH OLBERMANN A-Block (1:45) SPECIAL COMMENT: We have been burying the lede here. Trump. Is. Suing. Murdoch. Trump and Murdoch are at war. Over Jeffrey Epstein. The two worst people in the country, probably the world, at each other's throats, until further notice. Weeks, months, years. Amid rumors Murdoch's people at the Wall Street Journal are upworking ANOTHER Trump-Epstein/Epstein-Trump/Trumpstein story. And that Murdoch is preparing a Defcon scenario in which he turns Fox News against Trump. Because if Trump is stupid enough to try to put Murdoch out of business, Murdoch will have no choice but to try to put Trump out of business. Trump also seems to be doing everything else he can think of to make sure the Trumpstein story never leads the headlines again. Attacks his own people again. Left a paper trail inside the DOJ and FBI of Pam Bondi searching for thousands of Trump references inside an evidence pit the size of The New York Public Library. Changing the story of the latest plot against him for the sixth time in a week. And watching the polls - 17% approve of his handling of the Epstein issue - actually get worse since just last Thursday (89% want everything, not just the almost-meaningless Grand Jury testimony, released). Oh by the way there IS a Trump Client List inside DOJ/FBI. The only part of Trump's claim that there isn't that's true, is that it may not bear that title. There's literally 40 computers, 70 CDs of video, and 300 gigabytes of data. The Trumpstein story will swamp his presidency. For sheer volume it exceeds almost everything else Trump has ever done. It makes Watergate look like the editing out of four words in a 5,000 word document. IT'S WONDERFUL. Trumpstein, Trumpstein, Trumpstein. ALSO: Trump's unpopularity has now reached 1st Term proportions. Tulsi Gabbard is conflating two Russian stories and claiming the one nobody believed (Russia tampered with voting machines) disproves the one Robert Mueller proved (Russia hacked emails and got them to Trump's campaign). How does that work? I'll explain the psychology of morons who want to please their bosses, with the story of Tennessee Ernie Williams. And if you think Trump isn't brain dead he wrote something that must've come directly from a dream about how the Cleveland Guardians (formed 1901, not named "Indians" until 1915) are one of baseball's "six original teams" (Major League Baseball started 30 years earlier; it's HOCKEY with "the original six" and that's wrong too). B-Block (39:15) POSTSCRIPTS TO THE NEWS: I understand this busts the narrative and reduces our ability to suffer as martyrs, but there is one inarguable and unanswerable fact that disproves the almost-universally accepted premise that CBS cancelled Stephen Colbert solely to appease Trump. It's this: If they are silencing him, why have they decided to keep him on TV for THE NEXT TEN MONTHS? This is the Phil Donahue cancellation all over again. It works to CBS's corporate advantage to make it look like they are sucking up to the psycho. Sorry. This is the least of the reasons. C-Block (1:09:10) MONDAYS WITH THURBER: Haven't done any of his priceless stories lately, and with Trump's new permanent Trumpstein Crisis, it's fitting to do James Thurber's stunningly prophetic saga "The Greatest Man In The World."See omnystudio.com/listener for privacy information.