Alert posture used by the United States Armed Forces
POPULARITY
Categories
Big thank you to Proton Pass for sponsoring this video. To sign up for Proton Pass, please use the following link https://proton.me/davidbombal to get a 60% discount. Cybersecurity icon Mikko Hyppönen sits down with David Bombal at Black Hat to explain his bold move from antivirus to anti-drone defense after 34 years. He breaks down why mobile operating systems are the biggest security improvement of the past 15 years, how attackers have shifted from device exploits to human scams, and why he believes defenders currently have the edge with AI. They unpack the rise of fiber-tethered drones that evade RF detection, the coming reality of autonomous “killer robots” (not yet here—but inevitable), and the grim state of privacy as everyday IoT devices go online by default—his “internet asbestos” warning. Mikko also reflects on achieving keynote goals at DEF CON, RSA, and Black Hat, and shares career advice: set goals, don't drift. Topics: mobile OS security, social engineering, AI for defense, zero-day research, drone warfare, privacy and encryption policy, IoT risks, career pivot. // Mikko Hypponen's SOCIALS // X: https://x.com/mikko Website: https://mikko.com/ LinkedIn: https://www.linkedin.com/in/hypponen/... // Books REFERENCE // If it's smart it's vulnerable: US: https://amzn.to/41lkSaG UK: https://amzn.to/4oTpOgN // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:56 - Mikko Hyppönen keynote talks 01:51 - Proton Pass sponsored segment 04:09 - Pivoting from cybersecurity to anti-drone 09:28 - Humanoid robots are near 09:54 - How cybersecurity has improved 12:11 - Defenders have the advantage with AI 15:26 - Pros and Cons of the AI revolution 16:57 - Privacy is dying 21:36 - Advice for your future // Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
This week on Above Average FPL, Adam and Baker unpack a brutal Gameweek 3 filled with blanks, benchings, and bonus-point heartbreak. From Salah's continued struggles to Bruno's last-minute redemption, we explore the tactical trends and FPL implications heading into the international break.
CannCon and Ashe in America welcome Phillip Davis, known online as @Mad_Liberals, for a deep-dive into election vulnerabilities exposed at DEFCON. Davis, a veteran software developer with decades in fingerprint identification systems, walks through how voting machines can be accessed and manipulated using readily available technician and poll worker cards. He explains the ease of altering ballots, prompts, and even candidate displays without leaving an audit trail, demonstrating how voters themselves can be unknowingly hacked. The conversation also unpacks the infamous Halderman Report, systemic security failures, and the lack of accountability in election administration. From Goodwill voting machines to encryption keys left in plain sight, Davis reveals how fragile U.S. election infrastructure really is, sparking a raw discussion on trust, oversight, and the future of voting.
The Bad Guy Kenny's Elite Wrestling Organization continues with Def Con One – Part 2 in BookIt!Verse 5!If Part 1 set the tone, Part 2 raises the stakes with bigger matches, shocking twists, and Kenny's signature chaos.
GMOサイバーセキュリティ byイエラエ株式会社は8月26日、同社に所属するホワイトハッカーチーム「GMOイエラエ」が「DEF CON 33」CTFにおける「Cloud Village CTF」で優勝し、3年連続で世界1位を獲得したと発表した。
Alpha Warrior and Josh Reid return for a hard-hitting episode of DEFCON ZERQ, joined by Brad Zerbo to dig into the revelations behind his documentary Codex 9/11. From CIA fingerprints, missing gold, and the forever war model, to the global cabal's use of terror as a money funnel, the discussion exposes the hidden networks fueling America's darkest chapters. The hosts then connect the dots to today, breaking down Pam Bondi's cryptic posts, drops, and what Trump's National Guard deployments really mean. Is the administration preparing for cartel crackdowns, sleeper cell roundups, and a reckoning on 9/11 itself? With deep dives into John Brennan, James Comey, Flynn's quiet advisory role, and looming moves in Venezuela, this episode blends geopolitics, military strategy, and decoding with the unfiltered edge DEFCON ZERQ is known for.
Returning from this year's DEF CON, hear from our Offensive Team Managers, Dowd and Findlay, and Pinky, IR Manager and co-host of The Hackle Box. Hear about new highlights, CTF's, and villages, and reflection from Brad as a Blue Team member navigating past challenges. Have something to say? Contact us at unsecurity@frsecure.com and follow us for more!LinkedIn: frsecure Instagram: frsecureofficialFacebook: frsecureBlueSky: frsecureAbout FRSecure: https://frsecure.com/ FRSecure is a mission-driven information security consultancy headquartered in Minneapolis, MN. Our team of experts is constantly developing solutions and training to assist clients in improving the measurable fundamentals of their information security programs. These fundamentals are lacking in our industry, and while progress is being made, we can't do it alone. Whether you're wondering where to start, or looking for a team of experts to collaborate with you, we are ready to serve.
In this second installment of our DEF CON two-parter, we talked to SocialProof Security CEO Rachel Tobac about how and why people are often the weakest link in so many cybersecurity protocols and how making yourself a harder target will cause most threat actors to move on to an easier mark. Learn more about your ad choices. Visit megaphone.fm/adchoices
Got a question or comment? Message us here!Fresh off the chaos of DEF CON 33, Tanner, Hickman, and Will break down the four-day hacker conference, from the eye-opening hacker villages and mind-bending talks to Hickman's clutch CTF victory and Will's bold dive into the Social Engineering Community's Vishing Competition. No sleep, all signal.Support the showWatch full episodes at youtube.com/@aliascybersecurity.Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.
Seth and Ken return with a new episode summarizing their experience at DEF CON 33 and all things Las Vegas over the past month. This includes panels, talks, workshops, happy hours, and even corporate (boo) events. This is followed by discussion of a few research items that came out of the conference, including James Kettle's HTTP1.1 Must Die talk. Finally, why AI is infecting Application Security.
Three hosts discuss their recent con visits.
Mesmo sem saber como tudo ia funcionar, Teresa Pereira candidatou-se e foi uma de 14 participantes escolhidos no mundo para a competição de vishing na DEF CON, uma das maiores conferências internacionais de hackers.
Show Notes (contains affiliate links): Huntsville and DefCon Recaps On this week's episode of Ham Radio Crash Course, a podcast roughly based on amateur radio but mostly made up of responding to emails from listeners, hosted by Josh Nass - KI6NAZ and his reluctant wife, Leah - KN6NWZ, we talk about portable SSTV, Huntsville and DefCon recaps and Baba Vanga predictions. Announcements: HRCC Net - https://hrcc.link. Gigaparts Link (get 10% with code JOSH) - https://www.gigaparts.com/nsearch/?lp=JOSH Ham Radio Minute: Fun with Portable SSTV. Ham Radio Test Study with Leah - Extra Exam HamStudy: https://hamstudy.org Support by getting something from Signal Stuff: https://signalstuff.com/?ref=622 Gordon West Ham Radio Test Prep Books with HRCC Links -Technician: https://amzn.to/3AVHGU1 -General: https://amzn.to/4ehQ5zz -Extra: https://amzn.to/4efCqJ2 Free Fastrack to Your Ham Radio License Books on Audible (for new to Audible readers): https://www.amazon.com/hz/audible/mlp/membership/premiumplus?tag=hrccpodcast-20 Join the conversation by leaving a review on Apple Podcast for Ham Radio Crash Course podcast at https://podcasts.apple.com/us/podcast/ham-radio-crash-course/id1400794852 and/or emailing Leah@hamtactical.com. Leaving a review wherever you listen to podcasts will help Ham Radio Crash Course reach more hams and future hams and we appreciate it! Show Topic: Huntsville Hamfest and DefCon Recaps Hog Wild in the Salted Ham Cellar. Sovereign citizen against ham radio licenses. Preparedness Corner - Baba Vanga Predictions for 2026 https://timesofindia.indiatimes.com/astrology/zodiacs-astrology/baba-vanga-predictions-for-2026-will-scare-you-alien-contact-natural-disasters-global-war-and-more/articleshow/123416653.cms Email Correspondent's Tower: We answer emails with ham radio questions, comments on previous podcasts, T-shirt suggestions and everything in between. Links mentioned in the ECT: Doug's Sleepy Hollow Park Video - https://youtu.be/tLFnq2dM-XY HRCC Movie Club Voted and suggested movies here - https://poll.ly/N7Jt2ACU1Epz5PSJmknw CJ's Nifty List of HRCC Movie Club movies here - https://letterboxd.com/roguefoam/list/ham-radio-crash-course-podcast-movie-club/ The 5th Wave 10/30 War of the Worlds (2005) 10.5/30 Hitchhiker's Guide To The Galaxy 11/30 Maximum Overdrive 11/30 The Tomorrow War 11/30 On The Beach (1959) 12/30 The Postman 12/30 Soylent Green 12/30 World War Z 12/30 Waterworld 13/30 San Andreas 13/30 Airplane 14/30 The Day After (1983) 14/30 The Day After Tomorrow 14/30 Z is for Zachariah 14/30 Fall (2022) 14.5/30 Signs 15/30 Deep Impact 15/30 The Birds 15/30 Twisters (2024) 15/30 Armageddon 15.5/30 Sean of the Dead 16/30 Zombieland 16/30 The Book of Eli Ranked: 16.75/30 Love and Monsters 17/30 Frequency 17/30 2012 17/30 Greenland 17/30 12 Monkeys 17.5/30 Threads 18/30 The Survivalist 18/30 Independence Day 18.5/30 Contact (1997) 19/30 The Towering Inferno 19/30 Don't Look Up 19.5/30 Twister 19.5/30 Dante's Peak 19.5/30 Tremors 20/30 The Road 21/30 The Quiet Place 21/30 Red Dawn (1984) 22/30 Wall-E 23/30 Blast From The Past (1999) 23.5/30 28 Days Later 24.5/30 Apollo 13 24.5/30 Contagion 25/30 I Am Legend 25/30 10 Cloverfield Lane 26.5/30 The Martian 27/30 On Hiatus Indefinitely Thank you all for listening to the podcast. We have a lot of fun making it and the fact you listen and send us feedback means a lot to us! Want to send us something? Josh Nass P.O. Box 5101 Cerritos, CA 90703-5101 Support the Ham Radio Crash Course Podcast: Patreon - https://www.patreon.com/hoshnasi Shop HamTactical: http://www.hamtactical.com Shop Our Affiliates: http://hamradiocrashcourse.com/affiliates/ Shop Our Amazon Store: https://www.amazon.com/shop/hamradiocrashcourse As an Amazon Associate I earn from qualifying purchases. Connect with Us: Website...................► http://hamradiocrashcourse.com YouTube..................► https://www.youtube.com/c/HamRadioCrashCourse Podcast...................► https://hamradiocrashcourse.podbean.com/ Discord....................► https://discord.gg/xhJMxDT Facebook................► https://goo.gl/cv5rEQ Twitter......................► https://twitter.com/Hoshnasi Instagram.................► https://instagram.com/hoshnasi (Josh) Instagram.................►https://instagram.com/hamtactical (Leah) Instagram.................►https://instagram.com/nasscorners (Leah)
Alpha Warrior and Josh Reid dig into the mechanics of false flag operations and how they're used to manipulate public perception and justify political agendas. They explore the cyber domain as the new frontline of global conflict, highlighting how governments and shadow networks wage war through digital means. The conversation ties these tactics to shifting global power structures, exposing how narratives are engineered to keep the public distracted while larger moves play out behind the scenes. With sharp analysis and candid discussion, the hosts connect the dots between covert strategy, technological warfare, and the battle for geopolitical dominance.
Serious Haaland FOMO on this one as we discuss what we learned from Gameweek 1 and discuss the early bandwagons ━━━━━━━━━━━━━
At DEF CON's Social Engineering Village, contestants have 22 minutes to charm real employees at real companies into revealing real details that could lead to a breach. We step inside the booth to see how persuasion, improv, and psychology fuel both ethical hacking and the rise of cybercrime worldwide. Learn more about your ad choices. Visit megaphone.fm/adchoices
The annual “security summer camp” that is made up of the Black Hat and DefCon conferences is just past and the security analyst team, Scott Crawford, Dan Kennedy, Justin Lam and Mark Ehr, join host Eric Hanselman to examine what they saw and discuss the implications. Despite the heat of a Las Vegas summer, it's become bigger than the two main conferences, with a number of side events, like B-Sides, there's a lot going on. AI conversations are evolving and maturing. We've mostly moved beyond blaming user foibles for breaches, but AI is expanding the attack surface with new and more complex tactics for user manipulation. AI is lowering the barriers for attackers. The days of script kiddies have morphed into Claude Code-fueled attack development. The larger question is how security vendors are responding to AI risks. Claims that tier 1 security analysts should start looking for another job just seem irresponsible in the current environment. AI augmentation can reduce toil and digest the masses of events that security teams struggle to deal with today. At the same time, AI is scaling attack volumes. It's the constant hegemony that's always played out at the core of security. More S&P Global Content: RSAC Conference 2025: Breaking records at the threshold of uncertainty AI for security: Agentic AI will be a focus for security operations in 2025 Next in Tech | Ep. 215: RSA Conference Preview Deep Pocket Inspection: RSAC Innovation Sandbox Retrospective & Perspective Next in Tech | Ep. 227: Managed Security Services Next in Tech | Ep. 225: Security for MCP For S&P Global Subscribers: Use of GenAI security solutions has spiked, continued uptake projected – Highlights from VotE: Information Security Infosec spending projected to rise 27% on average in 2025 – Highlights from VotE: Information Security CNAPP in focus after large infosec acquisition – Highlights from VotE: Information Security Data Insight: Data security market to top $26B in 2029 Data Security Market Monitor & Forecast CNAPP matures into full-spectrum security solution Credits: Host/Author: Eric Hanselman Guests: Scott Crawford, Dan Kennedy, Justin Lam, Mark Ehr Producer/Editor: Adam Kovalsky Published With Assistance From: Sophie Carr, Feranmi Adeoshun, Kyra Smith
Dive deeper with Snow Goat — the free hands-on lab that inspired this video. https://hubs.ly/Q03CSkb80 Plus, check out the Varonis blog for real-world cybersecurity insights https://hubs.ly/Q03CShBG0DEF CON isn't just a hacker conference — it's a chaotic, creative, overwhelming, and wildly inspiring deep dive into everything cybersecurity. From packed villages and surprise CTFs to some of the most welcoming communities I've ever seen… this year completely changed how I think about tech conferences.In this video, I'm breaking down what caught me off guard, what I loved most, and what you need to know if you're thinking about going.Check out the Noob Village Discord: https://discord.gg/FGzPh4Upeh The GingerHacker YouTube: @GingerHacker Kevtech IT YouTube: @KevtechITSupport InfoSecPat YouTUbe: @InfosecEdu
Torkel tar en kjapp oppsummering av nøkkelpunktene fra GW1. Tung start for både Jon og Torkel, men ingen grunn til panikk. Eller må Reijnders, Semenyo og co på fort som fy? Tar også en gjennomgang av hvilke spillere som nådde DefCon-grensa.
Youtube Video of podcast Shownotes and Links In this episode, which seems to be an annual tradition, adamd and Zardus report LIVE from DEF CON 33 about the AIxCC results, first alone then together with Andrew Carney and Perri Adams, the key people involved in creating and running the AIxCC. Links AIxCC @ DEF CON 33 Open-source AIxCC Systems
The Bad Guy Kenny makes his BookIt!Verse 5 debut with the launch of the Elite Wrestling Organization (EWO).The first show, Def Con One – Part 1, sets the tone with shocking twists, high-stakes matches, and Kenny's signature brand of chaos.
Join host James Maude for a candid conversation with Matthew Toussaint - founder of Open Security and mastermind behind the legendary Subterfuge framework that once forced Starbucks to overhaul its Wi-Fi security. From his unexpected path as an aspiring Air Force lawyer to becoming a renowned cybersecurity educator, Matthew shares a lifetime of stories: a physical pen test that went spectacularly wrong at a franchise location, a medical clinic investigation that exposed an insider threat with international stakes, and how the MGM breach proved the devastating power of old-school phone-based social engineering.They dive into why AI is about to make help desk social engineering terrifyingly scalable, how a nervous 21-year-old's DefCon talk reshaped network security, and why, despite decades of warnings, the industry is still failing at the basics while attackers rapidly scale with artificial intelligence.
Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — Wading Through Woods06:06 - DEF CON RECAP - Talkin' Bout [infosec] News 2025-08-1109:16 - Story # 1: It's time to acknowledge HTTP/1.1 is insecure12:36 - Story # 2: Research reveals possible privacy gaps in Apple Intelligence's data handling17:51 - Story # 3: Federal court filing system hit in sweeping hack21:09 - Story # 4: Cisco discloses data breach impacting Cisco.com user accounts32:17 - Story # 5: Google says its AI-based bug hunter found 20 security vulnerabilities34:20 - Story # 6: Automate security reviews with Claude Code39:01 - Story # 7: Flipper Zero ‘DarkWeb' Firmware Bypasses Rolling Code Security on Major Vehicle Brands44:44 - Story # 7b: OnStar assists CHP in stopping fleeing SUV with toddler inside47:12 - Story # 7c: That viral video of a ‘deactivated' Tesla Cybertruck is a fake49:37 - Story # 8: LegalPwn Attack Tricks GenAI Tools Into Misclassifying Malware as Safe Code50:53 - Story # 9: Microsoft Launches Project Ire to Autonomously Classify Malware Using AI Tools53:08 - Story # 10: A Single Poisoned Document Could Leak ‘Secret' Data Via ChatGPT58:10 - Story # 11: Millions of Dell Laptops Vulnerable to Device Takeover and Persistent Malware Attacks
Episode 135: In this episode of Critical Thinking - Bug Bounty Podcast Justin sits down with Ryan Barnett for a deep dive on WAFs. We also recap his Exploiting Unicode Normalization talk from DEFCON, and get his perspective on bug hunting from his time at Akamai. Follow us on twitter at: https://x.com/ctbbpodcastGot any ideas and suggestions? Feel free to send us any feedback here: info@criticalthinkingpodcast.ioShoutout to YTCracker for the awesome intro music!====== Links ======Follow your hosts Rhynorater and Rez0 on Twitter: https://x.com/Rhynoraterhttps://x.com/rez0__====== Ways to Support CTBBPodcast ======Hop on the CTBB Discord at https://ctbb.show/discord!We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.You can also find some hacker swag at https://ctbb.show/merch!Today's Sponsor - ThreatLocker. Checkout ThreatLocker Detect! https://www.criticalthinkingpodcast.io/tl-detectToday's Guest: https://x.com/ryancbarnett====== Resources ======Accidental Stored XSS Flaw in Zemanta 'Related Posts' Plugin for TypePadhttps://webappdefender.blogspot.com/2013/04/accidental-stored-xss-flaw-in-zemanta.htmlXSS Street-Fighthttps://media.blackhat.com/bh-dc-11/Barnett/BlackHat_DC_2011_Barnett_XSS%20Streetfight-Slides.pdfBlackhat USA 2025 - Lost in Translation: Exploiting Unicode Normalizationhttps://www.blackhat.com/us-25/briefings/schedule/#lost-in-translation-exploiting-unicode-normalization-44923====== Timestamps ======(00:00:00) Introduction(00:02:49) Accidental Stored XSS in Typepad Plugin (00:06:34) Chatscatter & Abusing third party Analytics(00:11:42) Ryan Barnett Introduction(00:21:11) Virtual Patching & WAF Challenges(00:40:39) AWS API Gateways & Whitelisting Bug Hunter Traffic(00:49:59) Lost in Translation: Exploiting Unicode Normalization(01:11:29) CSPs at the WAF level & 'Bounties for Bypass'
Join Automox CISO and SVP of Product Jason Kikta for a recap of Black Hat and DEF CON 2025. In this episode, Jason shares his take on the conversation around AI in cybersecurity shifting from hype to practical tools for defenders. Hear why integrating AI into your CI/CD pipeline, alert triage, and vulnerability management could be a game changer, plus thoughts on choosing the right security events for your personality and goals. Whether you're a conference veteran or a curious first-timer, this episode offers insights, humor, and encouragement to get more involved in the security community.
The AI makeover of everything is well underway and we're at the point where the most obvious problems are becoming more obvious amidst the hype. This week's vibe is partially informed by Kristine's annual visits to the Blackhat and DEF CON conferences where Kristine came across AdHacks by the Russian Mob, ways to subvert Gemini using popular Google apps like Gmail and Calendar, and how hackers can now prompt inject using AI agents without their victim taking an unfortunate action. Meanwhile, OpenAI is building a browser that will be agentically controlled, Grok is still weirdly obsessed with Taylor Swift, Leaked Meta documents show rules where chatbots can have adult chats with children, Perplexity offers Goolge $34.5billion for Chrome, Google confirms it wants AI generated content to be edited by humans, Gary Illyes reminds us why Google needs to control the signals it looks at, Microsoft wants to know how often your conversions come from AI driven clicks, and Google might be using generic undocumented crawlers.Support this podcast at — https://redcircle.com/webcology/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy
In this episode of Cybersecurity Today, host David Shipley covers critical security updates and vulnerabilities affecting Microsoft Exchange, Citrix NetScaler, and Fortinet SSL VPNs. With over 29,000 unpatched Exchange servers posing a risk for admin escalation and potential full domain compromise, urgent action is needed. Citrix Bleed 2 is actively being exploited, with significant incidents reported in the Netherlands and thousands of devices still unpatched globally. Fortinet SSL VPNs are experiencing a spike in brute force attacks, hinting at a possible new vulnerability on the horizon. Lastly, Shipley highlights notable moments from DEFCON 33, including innovative security hacks and sobering realities of the hacker community. Tune in for detailed breakdowns and insights on how to stay vigilant against these threats. 00:00 Introduction and Overview 00:32 Microsoft Exchange Vulnerability 02:54 Citrix Bleed Two Exploits 05:21 Fortinet SSL VPN Brute Force Attacks 07:39 Insights from DEFCON 33 13:46 Conclusion and Final Thoughts
The Personal Computer Show Wednesday August 13th 2025 www.PRN.live - Streaming on the Internet 6:00 PM Eastern Time In the News • Trump Calls on Intel CEO to Resign ‘Immediately' • Taiwan Detains TSMC Staff for Alleged Theft of Key Technology Trade Secrets • Report from DEF CON 33 in Las Vegas • Amazon Restructures its Podcast Business • Apple Wants to Reclaim its Place in the AI Development Race. • Apple's China Reality Check • Big Tech's AI Spending Spree – Is AI Demand Finally Catching Up? ITPro Series with Benjamin Rockwell • All of Us at Every Level Need to be Looking to AI to Improve Our Skills and Jobs From the Tech Corner • Phone Cameras are Evolving Fast, but Photography as an Art is Dying Quietly Technology Chatter - (Benjamin Rockwell and Marty Winston) • Three Kinds of Meeting Monsters
Wes performs a 2 a.m. rescue at DEFCON, and Chris attempts to build a Linux desktop using nothing but vibes.Sponsored By:Managed Nebula: Meet Managed Nebula from Defined Networking. A decentralized VPN built on the open-source Nebula platform that we love. 1Password Extended Access Management: 1Password Extended Access Management is a device trust solution for companies with Okta, and they ensure that if a device isn't trusted and secure, it can't log into your cloud apps. Unraid: A powerful, easy operating system for servers and storage. Maximize your hardware with unmatched flexibility. Support LINUX UnpluggedLinks:
When security becomes more than a checkbox, the conversation shifts from “how much” to “how well.” At Black Hat USA 2025, Sean Martin, CISSP, Co-Founder of ITSPmagazine, and Viktor Petersson, Founder of an SBOM artifact platform, unpack how regulatory forces, cultural change, and AI innovation are reshaping how organizations think about security.Viktor points to the growing role of Software Bill of Materials (SBOMs) as not just a best practice, but a likely requirement in future compliance frameworks. The shift, he notes, is driven largely by regulation—especially in Europe—where security is no longer a “nice to have” but a mandated operational function. Sean connects this to a market reality: companies increasingly see transparent security practices as a competitive differentiator, though the industry still struggles with the hollow claim of simply being “secure.”AI naturally dominates discussions, but the focus is nuanced. Rather than chasing hype, both stress the need for strong guardrails before scaling AI-driven development. Viktor envisions engineers supervising fleets of specialized AI agents—handling tasks from UX to code auditing—while Sean sees AI as a way to rethink entire operational models. Yet both caution that without foundational security practices, AI only amplifies existing risks.The conversation extends to IoT and supply chain security, where market failures allow insecure, end-of-life devices to persist in critical environments. The infamous “smart fish tank” hack in a Las Vegas casino serves as a reminder: the weakest link often isn't the target itself, but the entry point it provides.DEFCON, Viktor notes, offers a playground for challenging assumptions—whether it's lock-picking to illustrate perceived versus actual security, or examining the human factor in breaches. For both hosts, events like Black Hat and DEFCON aren't just about the latest vulnerabilities or flashy demos—they're about the human exchange of ideas, the reframing of problems, and the collaboration that fuels more resilient security strategies.___________Guest:Viktor Petersson, Founder, sbomify | On LinkedIn: https://www.linkedin.com/in/vpetersson/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974BlackCloak: https://itspm.ag/itspbcwebAkamai: https://itspm.ag/akamailbwcDropzoneAI: https://itspm.ag/dropzoneai-641Stellar Cyber: https://itspm.ag/stellar-9dj3___________ResourcesLearn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25ITSPmagazine Webinar: What's Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year's Hacker Conference — An ITSPmagazine Thought Leadership Webinar | https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conferenceCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More
In today's episode of Cybersecurity Today, host David Shipley covers critical updates on recent cyber attacks and breaches impacting the US Federal judiciary's case management systems, and SonicWall firewall compromises. He also discusses researchers' new jailbreak method against GPT-5, which bypasses ethical guardrails to produce harmful instructions. Shipley shares insights and standout sessions from Hacker Summer Camp 2025, including BSides Las Vegas, the I Am the Cavalry track, and Defcon, highlighting ongoing efforts and challenges in the cybersecurity landscape. Stay informed, stay secure, and join the conversation in this detailed overview of current cybersecurity issues and innovations. 00:00 Introduction and Headlines 00:31 US Federal Judiciary Cyber Attack 02:29 SonicWall Ransomware Attacks 04:14 AI Jailbreak Techniques 07:44 Hacker Summer Camp 2025 Highlights 08:10 BSides Las Vegas and Community Insights 09:29 Healthcare Cybersecurity and Crash Cart Project 12:11 Defcon Reflections and Final Thoughts 13:45 Conclusion and Listener Engagement
PEBCAK Podcast: Information Security News by Some All Around Good People
Welcome to this week's episode of the PEBCAK Podcast! We've got some amazing stories this week so sit back, relax, and keep being awesome! Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast Please share this podcast with someone you know! It helps us grow the podcast and we really appreciate it! Tourism drop in Las Vegas https://www.roadsideamerica.com/story/12552 https://www.foxnews.com/travel/las-vegas-tourism-drops-sharply-some-visitors-claim-casinos-empty-amid-rising-costs Dad Joke of the Week (DJOW) Find the hosts on LinkedIn: Chris - https://www.linkedin.com/in/chlouie/ Brian - https://www.linkedin.com/in/briandeitch-sase/ Glenn - https://www.linkedin.com/in/glennmedina/ Tyson - https://www.linkedin.com/in/tyson-kindler-910658101/ Koby - https://www.linkedin.com/in/koby-caputo-117358145/
The Army will be creating a marketplace to better match drones with units based on their requirements. With so many vendors providing a variety of unmanned aerial systems, it can be difficult for formations to determine if certain systems will in fact meet their needs. Col. Danielle Medaglia, project manager for UAS at program executive office for aviation, shared details about the new initiative during a recent teleconference, saying it is meant to ensure drones products do what they advertise they can do, along with confirming NDAA compliance and other specs. The forthcoming marketplace is part of the drone revolution occurring within the Pentagon. Secretary of Defense Pete Hegseth issued a directive last month on “Unleashing U.S. Military Drone Dominance,” which sought to improve how the department develops and employs small UAS. That directive calls for every squad to be equipped with low-cost, expendable drones by the end of 2026. Army offiicals called the new marketplace and approach a “fundamental shift” in how traditional acquisition is conducted. The goal is to get systems into the hands of troops as quickly as possible. The Pentagon's two-year public competition to spur the development of cyber-reasoning systems that use large language models to autonomously find and patch vulnerabilities in open-source software concluded Friday with $8.5 million awarded to three teams of security specialists at DEF CON. The Defense Advanced Research Project Agency's AI Cyber Challenge seeks to address a persistent bottleneck in cybersecurity — patching vulnerabilities before they are discovered or exploited by would-be attackers. DARPA Director Stephen Winchell said: “We're living in a world right now that has ancient digital scaffolding that's holding everything up. A lot of the code bases, a lot of the languages, a lot of the ways we do business, and everything we've built on top of it has all incurred huge technical debt… It is a problem that is beyond human scale.” The seven semifinalists that earned their spot out of 90 teams convened at last year's DEF CON were scored against their models' ability to quickly, accurately and successfully identify and generate patches for synthetic vulnerabilities across 54 million lines of code. The models discovered 77% of the vulnerabilities presented in the final scoring round and patched 61% of those synthetic defects at an average speed of 45 minutes, the competition organizers said. The models also discovered 18 real zero-day vulnerabilities, including six in the C programming language and 12 in Java codebases. The teams' models patched none of the C codebase zero-days, but automatically patched 11 of the Java zero-days, according to the final results shared Friday. Team Atlanta took the first-place prize of $4 million, Trail of Bits won second place and $3 million in prize money, and Theori ranked third, taking home $1.5 million. The competition's organizers allocated an additional $1.4 million in prize money for participants who can demonstrate when their technology is deployed into critical infrastructure. The Daily Scoop Podcast is available every Monday-Friday afternoon. If you want to hear more of the latest from Washington, subscribe to The Daily Scoop Podcast on Apple Podcasts, Soundcloud, Spotify and YouTube.
Join us for an insightful conversation at DEF CON 33 as we sit down with Veronika, a passionate cybersecurity enthusiast who has been immersed in the field since middle school. She shares her journey into cybersecurity, her experiences with Capture The Flag (CTF) competitions, and more.Veronika discusses the importance of mentorship and she offers valuable advice for anyone feeling out of place in the field and stresses the importance of staying true to oneself.
Join us for a conversation with Dietrich at DEF CON 33, live from the Blacks in Cybersecurity Village. Dietrich shares his journey with Respect the Tech and discusses the vital role community plays in cybersecurity.Learn how the collaboration between Respect the Tech and Blacks in Cybersecurity is creating a supportive space for learning, networking, and mentorship. Dietrich also delves into his experiences in blue team operations, the psychology behind cybersecurity, and the challenges of insider threat investigations.Guest ConnectDietrich BempahLinkedIn: https://www.linkedin.com/in/dietrich-bempah/Blacks in CybersecurityWebsite: https://www.blacksincyberconf.com/
Join us for an insightful conversation at DEF CON 33! Tiffiny interviews Leron, live from the Blacks in Cybersecurity Village, as he shares his experience in creating Capture the Flag (CTF) challenges.Discover the mindset behind designing challenges that cater to both beginners and experienced professionals, and get valuable tips for first-time CTF participants. Leron highlights the importance of practice and points to resources like Hack the Box, TryHackMe, and more for newcomers to enhance their skills.Guest ConnectLeron GrayLinkedIn: https://www.linkedin.com/in/leron-gray/Blacks in CybersecurityWebsite: https://www.blacksincyberconf.com/
Wes performs a 2 a.m. rescue at DEFCON, and Chris attempts to build a Linux desktop using nothing but vibes.
Join us for a conversation with Rahiem, a dedicated member of the Blacks in Cybersecurity community. With five years of DEF CON experience and a passion for media coverage, photography, and design, Rahiem reflects on his journey into tech and the critical importance of representation in the industry.Guest ConnectRahiem ThompsonLinkedIn: https://www.linkedin.com/in/rahiemthompson/Blacks in CybersecurityWebsite: https://www.blacksincyberconf.com/
Join us for a conversation with Mariah, recorded live at DEF CON 33 in the Blacks in Cybersecurity Village! Mariah shares her unique journey from wedding planning to the world of tech and cybersecurity.Mariah discusses her transition into tech during the pandemic, her experiences in help desk and project management, and how a mentorship program helped her land her first job in cybersecurity. She emphasizes the importance of networking, asking questions, and maintaining a positive mindset throughout the learning process.Whether you're considering a career in tech or just looking for some life advice, Mariah's insights and encouragement will resonate with you. Tune in to hear her valuable tips on resources, networking, and the power of believing in yourself!Guest ConnectMariah HardyLinkedIn: https://www.linkedin.com/in/tylermariahhardy/Blacks in CybersecurityWebsite: https://www.blacksincyberconf.com/
Talking about Toastmasters and taking on the role of District Finance Manager. Also noticed that DefCon is going on this weekend.
Join us for a conversation with Levone Campbell, a seasoned cybersecurity expert with 20 years of experience, live from the Blacks in Cybersecurity Village at DEF CON 33. Levone discusses his journey into tech, his dedication to the BIC community, and the vital role of representation in the industry.Guest ConnectLevone CampbellLinkedIn: https://www.linkedin.com/in/levone-campbell-mba-mps-cissp-3b305234/Blacks in CybersecurityWebsite: https://www.blacksincyberconf.com/
Join us for a conversation with Samantha, a passionate cybersecurity professional and volunteer with Blacks in Cybersecurity (BIC). She shares her inspiring journey from social work to becoming a pen tester, overcoming fears and challenges along the way.Samantha reflects on her transformative experience at DEF CON, where the Blacks in Cybersecurity Village offered a safe and supportive environment. As the leader of the Black Women in Cybersecurity initiative, she is committed to uplifting Black women in the field through mentorship, resources, and community.We dive into the importance of representation in tech, the upcoming Black Women in Cybersecurity cohort, and Samantha's valuable advice for anyone looking to succeed in the tech industry.Blacks in CybersecurityWebsite: https://www.blacksincyberconf.com/
Join us for a conversation with Marc Lawrence and Yassin Sabir, the co-founders of Respect the Tech. They share their DEF CON 33 experience, including hosting their own Capture the Flag (CTF) competitions and a unique AI bank chatbot challenge designed to educate participants on vulnerabilities in AI systems.In this discussion, they highlight the importance of community, particularly within the Blacks in Cybersecurity network, and how it empowers individuals to thrive in tech. Marc and Yassin also preview their upcoming event, Respect Day, where tech professionals can dive into hands-on workshops and challenges.Whether you're a seasoned expert or just starting out, this conversation is filled with valuable insights and advice on breaking into cybersecurity. Don't miss their tips for success and resources for aspiring tech professionals!Guest ConnectMarc LawrenceLinkedIn: https://www.linkedin.com/in/marcanthonylawrence/Yassin SabirLinkedIn: https://www.linkedin.com/in/yassin-sabir-csap-crtp-01b470157/Respect the TechWebsite: https://www.respectthetech.us/Blacks in CybersecurityWebsite: https://www.blacksincyberconf.com/
The guys discuss their concern level with the Tigers right now.
Mike and Rico spent the second hour discussing which DEFCON level they are at when it comes to the Tigers. They took plenty of your calls and read your ticket texts throughout the hour.
In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by Aarti Borkar, Simeon Kakpovi, and Andrew Rapp for a behind-the-scenes look at how Microsoft Threat Intelligence and Microsoft Incident Response teams collaborate as part of a closed-loop system, the emotional toll of breaches, and how organizations of any size can build resilience through preparation and psychological safety. By listening to this segment, you'll get a preview of what this group brought to the main stage of Black Hat this year. Later, Sherrod chats with Snow, co-founder of the Social Engineering Community Village at DEF CON, about her journey from special effects makeup to elite social engineer, and how empathy, creativity, and even a ladder can be powerful tools in physical security testing. In this episode you'll learn: How Microsoft's Digital Crimes Unit uses legal tactics to disrupt threat actors Why rehearsing your incident response plan can save weeks of recovery time How AI is being trained to make social engineering phone calls on its own Some questions we ask: How would you describe the overall health of the global cybersecurity landscape? Why does tailoring AI prompts sometimes feel like social engineering? What is the feedback loop between incident response, intelligence, and product protections? Resources: View Aarti Borkar on LinkedIn View Simeon Kakpovi on LinkedIn View Andrew Rapp on LinkedIn View Sherrod DeGrippo on LinkedIn Microsoft at Black Hat USA 2025 Related Microsoft Podcasts: Afternoon Cyber Tea with Ann Johnson The BlueHat Podcast Uncovering Hidden Risks Discover and follow other Microsoft podcasts at microsoft.com/podcasts Get the latest threat intelligence insights and guidance at Microsoft Security Insider The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network.
Andy, Hibbo and Nacho discuss their NEW drafts, promoted teams and Def Con points! SPONSERED BY FANTEAM - https://af.fanteam.com/click?o=1&a=14&c=7 New Customer Welcome Offer!
In Episode 004 of DEFCON ZERQ, Alpha Warrior and Josh Reid dissect the return of high-signal drops, drawing connections between Scavino's posts, Trump's recent statements, and coordinated comms pointing to a broader information offensive. The hosts analyze what these patterns suggest about timing, messaging, and the psychological battlefield ahead. They also dig into Soros's positioning, global narratives around controlled opposition, and the lasting significance of the Durham Report, not as a dead-end, but as a marker in the ongoing exposure of institutional corruption. With a focus on decoding the signals, not the noise, this episode challenges listeners to zoom out, connect the timelines, and prepare for what's next.
Day 2 of Correspondent Week opens with the Championship titles winners as James is joined be Ed Salinger to discuss all things Leeds United and there are some interesting FPL options to consider. One such, is Joel Piroe, 5.5, talisman forward and on pens. But is it that straightforward? There's discussion on all the new additions, a considered debate on two 4.0 defender options, if Karl Darlow remains an option, and if there may be a hidden DEFCON magnet from the midfield enablers. Follow Ed on Twitter/x: https://x.com/fplrhinos Next on Correspondent Week: ep.6 with Lewis James on Fulham Later today on Correspondent Week: Neil Grover on Bournemouth and Tom Medd on Brentford Tonight on Patreon: The Debrief with Suj on today's four Podcasts (IT+) and After The Podcast with today's Correspondents (AT) Want to become a member of our FPL community and support the Podcast? Join us on Patreon: https://www.patreon.com/planetfpl Follow James on Twitter/x: https://twitter.com/PlanetFPLPod Follow Suj on Twitter/x: https://twitter.com/sujanshah Follow Clayton on Twitter/x: https://twitter.com/claytsAFC Follow Nico on Twitter/x: https://twitter.com/nico_semedo Subscribe to our YouTube channel: https://www.youtube.com/@PlanetFPL Like us on Facebook: https://www.facebook.com/planetfpl Follow us on Instagram: https://www.instagram.com/planetfpl #FantasyPremierLeague #FPL #LUFC Learn more about your ad choices. Visit podcastchoices.com/adchoices
At Black Hat USA 2025, Jennifer Granick—Surveillance and Cybersecurity Counsel at the American Civil Liberties Union—takes the keynote stage to make a bold case: we are long overdue for a new threat model, one that sees government surveillance not as a background risk, but as a primary threat to constitutional privacy.Granick draws from decades of experience defending hackers, fighting surveillance overreach, and engaging with the security community since DEFCON 3. She challenges the audience to reconsider outdated assumptions about how the Fourth Amendment is interpreted and applied. While technology has made it easier than ever for governments to collect data, the legal system hasn't kept pace—and in many cases, fails to recognize the sheer scope and sensitivity of personal information exposed through modern services.Her talk doesn't just raise alarm; it calls for action. Granick suggests that while legal reform is sluggish—stymied by a lack of political will and lobbying power—there's an urgent opportunity for the technical community to step up. From encryption to data minimization and anonymization, technologists have the tools to protect civil liberties even when the law falls short.The session promises to be a wake-up call for engineers, designers, policymakers, and privacy advocates. Granick wants attendees to leave not only more informed, but motivated to build systems that limit the unnecessary collection, retention, and exposure of personal data.Her keynote also surfaces a critical cultural shift: from the “Spot the Fed” days of DEFCON to a more nuanced understanding of government roles—welcoming collaboration where it serves the public good, but not at the expense of unchecked surveillance.This conversation reframes privacy as a design problem as much as a legal one—and one that requires collective effort to address. If the law can't fix it, the question becomes: will the technology community rise to the challenge?___________Guest:Jennifer Granick, Surveillance and Cybersecurity Counsel at American Civil Liberties Union | On LinkedIn: https://www.linkedin.com/in/jennifergranick/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974BlackCloak: https://itspm.ag/itspbcwebAkamai: https://itspm.ag/akamailbwcDropzoneAI: https://itspm.ag/dropzoneai-641Stellar Cyber: https://itspm.ag/stellar-9dj3___________ResourcesKeynote: Threat Modeling and Constitutional Law: https://www.blackhat.com/us-25/briefings/schedule/index.html#keynote-threat-modeling-and-constitutional-law-48276Learn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25ITSPmagazine Webinar: What's Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year's Hacker Conference — An ITSPmagazine Thought Leadership Webinar | https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conferenceCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More