Podcasts about hacking back

  • 27PODCASTS
  • 45EPISODES
  • 48mAVG DURATION
  • ?INFREQUENT EPISODES
  • Dec 26, 2024LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about hacking back

Latest podcast episodes about hacking back

Critical Thinking - Bug Bounty Podcast
Episode 103: Getting ANSI about Unicode Normalization

Critical Thinking - Bug Bounty Podcast

Play Episode Listen Later Dec 26, 2024 60:30


Episode 103: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joseph delve into the vulnerabilities associated with ANSI codes and large language models (LLMs), as well as talk through some new research and the value of micro-blogging in general.Follow us on twitter at: @ctbbpodcastWe're new to this podcasting thing, so feel free to send us any feedback here: info@criticalthinkingpodcast.ioShoutout to YTCracker for the awesome intro music!------ Ways to Support CTBBPodcast ------Hop on the CTBB Discord!We offer Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.Check out our new SWAG store!Join our Shift waitlist!Today's Sponsor - ThreatLocker. Check out their Elevation Control! https://www.criticalthinkingpodcast.io/tl-ecResources_json Juggling AttackCross-Site POST Requests Without a Content-Type HeaderWorst FitOrange Tsai on Worst FitHandling Cookies is a MinefieldTerminal DiLLMaXS-Leaking flags with CSS: A CTFd 0dayHacking Back the AI-HackerJohann Computer use demoHow I Became The Most Valuable HackerTimestamps(00:00:00) Introduction(00:01:39) _json Juggling Attack and Cross-Site POST Requests Without a Content-Type Header(00:10:55) Worst Fit and Unicode Mapping(00:20:08) Handling Cookies is a Minefield(00:28:11) Terminal DiLLMa & CTFd 0day(00:41:18) Hacking Back the AI-Hacker(00:47:30) Becoming Most Valuable Hacker

Paul's Security Weekly
SWN #275 - Liquid Robots, Korean Cars, Fortinet, Atlassian, BingBots, & Derek Johnson

Paul's Security Weekly

Play Episode Listen Later Feb 17, 2023 30:31


This week Dr. Doug civilly discusses: a Liquid Robot Death Punch, Korean cars, Fortinet, Frebniis, Atlassian, BingBots, Hacking Back, Derek Johnson covers the National Cyber Strategy documents and more on the Security Weekly News!   Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly   Show Notes: https://securityweekly.com/swn275

Paul's Security Weekly TV
Liquid Robots, Korean Cars, Fortinet, Atlassian, BingBots, & Derek Johnson - SWN #275

Paul's Security Weekly TV

Play Episode Listen Later Feb 17, 2023 30:30


This week Dr. Doug civilly discusses: a Liquid Robot Death Punch, Korean cars, Fortinet, Frebniis, Atlassian, BingBots, Hacking Back, Derek Johnson covers the National Cyber Strategy documents and more on the Security Weekly News!   Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn275

Hack Naked News (Audio)
SWN #275 - Liquid Robots, Korean Cars, Fortinet, Atlassian, BingBots, & Derek Johnson

Hack Naked News (Audio)

Play Episode Listen Later Feb 17, 2023 30:31


This week Dr. Doug civilly discusses: a Liquid Robot Death Punch, Korean cars, Fortinet, Frebniis, Atlassian, BingBots, Hacking Back, Derek Johnson covers the National Cyber Strategy documents and more on the Security Weekly News!   Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly   Show Notes: https://securityweekly.com/swn275

Hack Naked News (Video)
Liquid Robots, Korean Cars, Fortinet, Atlassian, BingBots, & Derek Johnson - SWN #275

Hack Naked News (Video)

Play Episode Listen Later Feb 17, 2023 30:30


This week Dr. Doug civilly discusses: a Liquid Robot Death Punch, Korean cars, Fortinet, Frebniis, Atlassian, BingBots, Hacking Back, Derek Johnson covers the National Cyber Strategy documents and more on the Security Weekly News!   Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn275

Brakeing Down Security Podcast
jon-dimaggio-part2-threat intel-hacking back-analyzing malware

Brakeing Down Security Podcast

Play Episode Listen Later Jun 16, 2022 37:07


Author of the #noStarch book "The Art of Cyberwarfare" (https://nostarch.com/art-cyberwarfare)  Topics: discusses his book,  threat intel as a service,  why people enjoy malware analysis? Should people 'hack back' and what legal issues are around that? How do you soften the messaging if you have an insider threat team? www.infoseccampout.com for more information about our 2022 conference in Seattle, WA on 26-28 August 2022! Our full 90 minute stream with Jon, including 30 minutes of audio you won't get on the audio podcast is available at the $5 USD Patreon level, or via our VOD at our Twitch Broadcast site (https://twitch.tv/brakesec) Twitch VOD Link: https://www.twitch.tv/videos/1308277609 Thank you to our Patreon and Twitch supporters for their generous donations and subs and bits!

Brakeing Down Security Podcast
Jon DiMaggio_Art-of-cyberwarfare_hacking_back-insider-threat-messaging_P1

Brakeing Down Security Podcast

Play Episode Listen Later Jun 9, 2022 41:25


Author of the #noStarch book "The Art of Cyberwarfare" (https://nostarch.com/art-cyberwarfare)  Topics: discusses his book,  threat intel as a service,  why people enjoy malware analysis? Should people 'hack back' and what legal issues are around that? How do you soften the messaging if you have an insider threat team? www.infoseccampout.com for more information about our 2022 conference in Seattle, WA on 26-28 August 2022! Our full 90 minute stream with Jon, including 30 minutes of audio you won't get on the audio podcast is available at the $5 USD Patreon level, or via our VOD at our Twitch Broadcast site (https://twitch.tv/brakesec) Twitch VOD Link: https://www.twitch.tv/videos/1308277609 Thank you to our Patreon and Twitch supporters for their generous donations and subs and bits!

ITSPmagazine | Technology. Cybersecurity. Society
RSA Conference 2022 | A BlackCloak Story About Supply Chain Security, Hacking Back, And MySpace With Dr Chris Pierson

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 23, 2022 36:21


Dr Chris Pierson has held many roles and has been a regular speaker at RSA Conference over the years. What's he up to this year as the event goes back to in-person engagements?As the CEO of BlackCloak, Chris Pierson is looking forward to connecting with peers, partners, customers, and prospects as the world of executive cybersecurity heats up. In addition to seeing friends old and new, Dr Pierson has two sessions in which he will be participating. He shares some insights into both of these sessions. Here's a snippet for each:Collateral Damage: Prepping Your Organization for a Supply Chain AttackSupply chain risks can allow a backdoor into a company. This learning lab will focus on a fast moving scenario that examines risks to a company from hardware and software and will focus on the (1) risk assessment, (2) governance, and (3) response and isolation phases. This session will follow Chatham House Rule to allow for free exchange of information and learning. We look forward to participants actively engaging in the discussion and remind attendees that no comment attribution or recording of any sort should take place. This is a capacity-controlled session. If added to your schedule and your availability changes, please remove this session from your schedule to allow others to participate. A Learning Lab with James Shreve, Partner and Cybersecurity Chair, Thompson Coburn LLPHacking Back – To Be or Not to Be?Are there options to hack back for ransomware attacks? Without deterrence for ransomware attacks it is unlikely there will be changes to the risk equation that hackers think through. We'll discuss legal, ethical, operational, and security issues surrounding hacking back and give some insight into potential pitfalls for getting attribution incorrect or causing collateral damage. A law track session with Giorgi Gurgenidze, Founder, GSI Partners and James Shreve, Partner and Cybersecurity Chair, Thompson Coburn LLP.Chris has some other things up his sleeve as well. Can you say MySpace?

Redefining CyberSecurity
RSA Conference 2022 | A BlackCloak Brand Story About Supply Chain Security, Hacking Back, And MySpace With Dr Chris Pierson

Redefining CyberSecurity

Play Episode Listen Later May 23, 2022 36:21


Dr Chris Pierson has held many roles and has been a regular speaker at RSA Conference over the years. What's he up to this year as the event goes back to in-person engagements?As the CEO of BlackCloak, Chris Pierson is looking forward to connecting with peers, partners, customers, and prospects as the world of executive cybersecurity heats up. In addition to seeing friends old and new, Dr Pierson has two sessions in which he will be participating. He shares some insights into both of these sessions. Here's a snippet for each:Collateral Damage: Prepping Your Organization for a Supply Chain AttackSupply chain risks can allow a backdoor into a company. This learning lab will focus on a fast moving scenario that examines risks to a company from hardware and software and will focus on the (1) risk assessment, (2) governance, and (3) response and isolation phases. This session will follow Chatham House Rule to allow for free exchange of information and learning. We look forward to participants actively engaging in the discussion and remind attendees that no comment attribution or recording of any sort should take place. This is a capacity-controlled session. If added to your schedule and your availability changes, please remove this session from your schedule to allow others to participate. A Learning Lab with James Shreve, Partner and Cybersecurity Chair, Thompson Coburn LLPHacking Back – To Be or Not to Be?Are there options to hack back for ransomware attacks? Without deterrence for ransomware attacks it is unlikely there will be changes to the risk equation that hackers think through. We'll discuss legal, ethical, operational, and security issues surrounding hacking back and give some insight into potential pitfalls for getting attribution incorrect or causing collateral damage. A law track session with Giorgi Gurgenidze, Founder, GSI Partners and James Shreve, Partner and Cybersecurity Chair, Thompson Coburn LLP.Chris has some other things up his sleeve as well. Can you say MySpace?

The CyberWire
Killnet hits Italian targets. Access restored to RuTube. Hacktivism in the hybrid war. Emotet surges. NPM dependency confusion attacks were pentesting. Cybercrime and punishment.

The CyberWire

Play Episode Listen Later May 12, 2022 26:11


Killnet hits Italian targets. Access to RuTube is restored. Hacktivism in the hybrid war. Emotet surges. Clearing up the confusion of NPM dependency confusion attacks. Tim Eades from Cyber Mentor Fund on finding the right investors. Our guest is Michael DeBolt of Intel 471 on the growing interest in Biometrics in the criminal underground. And cybercrime and punishment, Florida-man edition. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/92 Selected reading. Ukraine maps reveal how much territory Russia has lost in just a few days (Newsweek)  Pro-Russian hackers target Italy institutional websites -ANSA news agency (Reuters)  Russian cyber experts restore RuTube access after three-day outage (Reuters)  They Fled Ukraine to Keep Their Cyber Startup Alive. Now, They're Hacking Back. (Wall Street Journal) Ukraine hacktivism 'problematic' for security teams says NSA cyber chief (Tech Monitor) HP Wolf Security Threat Insights Report Q1 2022 | HP Wolf Security (HP Wolf Security) npm supply chain attack targets Germany-based companies with dangerous backdoor malware (JFrog) SaaS App Vanity URLs Can Be Spoofed for Phishing, Social Engineerin (SecurityWeek) Trio Of Cybercriminals Sentenced For Conspiracy To Commit Fraud And Aggravated Identity Theft (US Attorney for the Middle District of Florida)

CyberSide Chats by Epiq
Season 2, Episode 3: Everyone wants to be Batman. Hacking Back & Cybersecurity Law

CyberSide Chats by Epiq

Play Episode Listen Later Apr 29, 2022 47:44


Professor, Attorney and Expert in Cybersecurity Policy & Governance, Kevin Powers joins Jerich Beason & Whitney McCollum to discuss where the law stands on “Hacking Back”. Everyone at some point wants to be Batman. During this Cyberside Chat they will answer questions such as: Is it ok to do whatever it takes to protect data or is it like breaking back into a thief's house to steal your items back? What could go wrong? How does the Computer Fraud & Abuse Act apply? What are the civil and criminal ramifications to the company executives and board of directors? How do you advise as internal counsel or outside counsel on corporate vigilantism? Where should law and regulation go in regard to the ever-changing landscape of cyber threats? Kevin Powers also speaks about the need for legal professionals to learn cybersecurity law, the programs available, and how you can add CLE's on the subject.Articles & Links for Reference:https://www.justice.gov/jm/jm-9-48000-computer-fraudhttps://blog.malwarebytes.com/ransomware/2022/03/nvidia-the-ransomware-breach-with-some-plot-twists/https://www.wired.com/story/north-korea-hacker-internet-outage/Note: “The statements of the guest speakers and hosts in this podcast should not be construed as legal advice.  They represent their views only and not those of Epiq or their respective employers.”BIOGRAPHYProfessor Kevin R. Powers, J.D., Founder and Director, Master of Science in Cybersecurity Policy and Governance Programs, Boston College  Kevin is the founder and director of the Master of Science in Cybersecurity Policy and Governance Programs at Boston College, and an Assistant Professor of the Practice at Boston College Law School and in Boston College's Carroll School of Management's Business Law and Society Department. Along with his teaching at Boston College, Kevin is a Cybersecurity Research Affiliate at the MIT Sloan School of Management, and he has taught courses at the U.S. Naval Academy, where he was also the Deputy General Counsel to the Superintendent.   With over 20 years of combined cybersecurity, data privacy, business, law enforcement, military, national security, higher education, and teaching experience, he has worked as an analyst and an attorney for the U.S. Department of Justice, U.S. Navy, U.S. Department of Defense, law firms in Boston and Washington, D.C., and as the general counsel for an international software company based in Seattle, Washington. Kevin also is an expert witness and consultant with the Analysis Group and serves as a Director for the Board of Reading Cooperative Bank, a Trustee for the Board of Boston College High School, an Advisory Board Member for HYCU, Inc. (Backed by Bain Capital Ventures) and CyberSaint Security, and as a Member of the Boston College Law School Business Advisory Council. From 2016-2017, he was the Panel Lead for the Collegiate Working Group for the U.S. Department of Homeland Security's National Initiative for Cybersecurity Education (NICE). Kevin, a Navy Veteran, regularly provides expert commentary regarding cybersecurity and national security concerns for varying local, national, and international media outlets.Find us on LinkedIn or email us at cyberside@epiqglobal.com.

The 443 - Security Simplified
Hacking Back at North Korea

The 443 - Security Simplified

Play Episode Listen Later Feb 7, 2022 45:59


This week on the podcast, we cover the heist of $322 million in cryptocurrency from the distributed exchange Wormhole, including a long discussion on the why it feels like cryptocurrency is still the wild west of technology. After that, give an update on our brief mention in last week's episode about North Korea's internet seemingly being taken offline by cyber attack. We end this week with a quick update on a sophisticated malware attack targeting macOS devices.

The CyberWire
A US broadcaster sustains a ransomware attack. North Korean catphis expelled from Twitter. REvil's Tor sites are hijacked. Hacking back. Prosecution and responsible disclosure?

The CyberWire

Play Episode Listen Later Oct 18, 2021 24:00


The Sinclair Broadcast Group discloses that it sustained a ransomware attack over the weekend. Twitter kicks out two North Korean catphish deployed in a cyberespionage campaign. REvil goes offline, again, perhaps this time for good. Hacking back, at least insofar as you let the hoods know you can see them. Rick Howard previews the newest season of CSO Perspectives. Johannes Ullrich from SANS on Expired Domain Dumpster Diving. And an update on the Missouri disclosure and proposed hacking prosecution. For links to all of today's stories check out our CyberWire daily news briefing: https://www.thecyberwire.com/newsletters/daily-briefing/10/200

Caveat
Hacking back from a policy perspective: a bad idea.

Caveat

Play Episode Listen Later Jul 28, 2021 41:57


Guest Anup Ghosh, CEO of Fidelis Cybersecurity, joins Dave to share his views on the private sector hacking back, Ben digs in to the NSO Group Pegasus spyware controversy, Dave looks at a Catholic Priest being outed through deanonymized mobile device data. While this show covers legal topics, and Ben is a lawyer, the views expressed do not constitute legal advice. For official legal advice on any of the topics we cover, please contact your attorney.  Links to stories: Israeli Spyware Maker Is in Spotlight Amid Reports of Wide Abuses Despite the hype, iPhone security no match for NSO spyware Top U.S. Catholic Church official resigns after cellphone data used to track him on Grindr and to gay bars Got a question you'd like us to answer on our show? You can send your audio file to caveat@thecyberwire.com or simply leave us a message at (410) 618-3720. Hope to hear from you. 

Sophos Podcasts
S3 Ep28.5: Hacking back - is attack an acceptable form of defence?

Sophos Podcasts

Play Episode Listen Later Apr 16, 2021 19:55


Sophos cybersecurity expert Chester Wisniewski provides excellent, topical and timely commentary on the FBI's recent use of a malware-like method to forcibly clean up hundreds of servers still infected in the Hafnium aftermath. With Paul Ducklin and Chester Wisniewski Original music by Edith Mudge Got questions/suggestions/stories to share? Email tips@sophos.com Twitter @NakedSecurity Instagram @NakedSecurity

Sophos Podcasts
S3 Ep28.5: Hacking back - is attack an acceptable form of defence?

Sophos Podcasts

Play Episode Listen Later Apr 16, 2021 19:55


Sophos cybersecurity expert Chester Wisniewski provides excellent, topical and timely commentary on the FBI’s recent use of a malware-like method to forcibly clean up hundreds of servers still infected in the Hafnium aftermath. With Paul Ducklin and Chester Wisniewski https://nakedsecurity.sophos.com/fbi-hacks-into-hundreds-of-infected-us-servers https://nakedsecurity.sophos.com/naked-security-live-hafnium-explained-in-plain-english Original music by Edith Mudge (https://www.edithmudge.com) Got questions/suggestions/stories to share? Email: tips@sophos.com Twitter: NakedSecurity (https://twitter.com/nakedsecurity) Instagram: NakedSecurity (https://instagram.com/nakedsecurity)

OSINT with ShadowDragon & Digital Tools For Modern Investigations
Blake Butler Interview - Intel CTF, Hacking Back, Actor Engagement & Synthetic Identities in the Cognitive Warfare Landscape

OSINT with ShadowDragon & Digital Tools For Modern Investigations

Play Episode Listen Later Apr 29, 2020 79:33


Actor engagement, and physical security intersect when active shooter situations or heightened security threats are targeted against executives or physical locations. Naturally, the topic of hack-back arises but this takes us down the rabbit trails of the roles synthetic identities play in the cognitive landscape, actor engagement and experiences found only in the trenches. Blake Butler from Paypal joins us in exploring very specific topics that are not discussed enough. Topics include: * Using OSINT, and Targeting in Active Shooter or physical security situations. * Hack back or Long Term Investigations * Actor engagement is a must for gleaning better intelligence. This isn't hack back, but to non-technical folks it sounds like hackback. Clarification is needed. * Cognitive Warfare landscape coupled with Synthetic Identities. Special Guest: Blake Butler.

Paul's Security Weekly (Podcast-Only)
Hacking Back - PSW #640

Paul's Security Weekly (Podcast-Only)

Play Episode Listen Later Feb 21, 2020 193:57


This week, we welcome Mike Nichols, Head of Product at Elastic Security, to talk about how Elastic Security is unifying SIEM and Endpoint Security! In our second segment, we welcome Ian Coldwater, Lead Platform Security Engineer at Heroku, to talk bout Kubernetes and Container Security! In the Security News, Iranian Hackers are targeting Dutch Universities, how electrical tape can fool Tesla sensors, Ransomware attack forces 2-day shutdown of a natural gas pipeline, Ring Rolls Out Mandatory 2FA & New Privacy Controls, and 7 Ways to Improve the Security of Mobile Banking Apps!   Show Notes: https://wiki.securityweekly.com/PSWEpisode640 Visit https://www.securityweekly.com/psw for all the latest episodes!   Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Paul's Security Weekly
Hacking Back - PSW #640

Paul's Security Weekly

Play Episode Listen Later Feb 21, 2020 193:57


This week, we welcome Mike Nichols, Head of Product at Elastic Security, to talk about how Elastic Security is unifying SIEM and Endpoint Security! In our second segment, we welcome Ian Coldwater, Lead Platform Security Engineer at Heroku, to talk bout Kubernetes and Container Security! In the Security News, Iranian Hackers are targeting Dutch Universities, how electrical tape can fool Tesla sensors, Ransomware attack forces 2-day shutdown of a natural gas pipeline, Ring Rolls Out Mandatory 2FA & New Privacy Controls, and 7 Ways to Improve the Security of Mobile Banking Apps!   Show Notes: https://wiki.securityweekly.com/PSWEpisode640 Visit https://www.securityweekly.com/psw for all the latest episodes!   Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Hack Naked News (Audio)
Crypto Chaos, Assange Trial, & Turkish RATs - SWN #13

Hack Naked News (Audio)

Play Episode Listen Later Feb 19, 2020 25:10


This week, Quantum Crypto Chaos, IBM Cloud Vulnerabilities in CICS, Crowded Flounder and Hacking Back, Turkish RATs, Israeli soldiers catfished by HAMAS, and the Julian Assange Trial: Australian PMs trying to prevent extradition to the United States!   Show Notes: https://wiki.securityweekly.com/SWNEpisode13 Visit https://www.securityweekly.com/swn for all the latest episodes!   Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Paul's Security Weekly
Crypto Chaos, Assange Trial, & Turkish RATs - SWN #13

Paul's Security Weekly

Play Episode Listen Later Feb 19, 2020 25:10


This week, Quantum Crypto Chaos, IBM Cloud Vulnerabilities in CICS, Crowded Flounder and Hacking Back, Turkish RATs, Israeli soldiers catfished by HAMAS, and the Julian Assange Trial: Australian PMs trying to prevent extradition to the United States!   Show Notes: https://wiki.securityweekly.com/SWNEpisode13 Visit https://www.securityweekly.com/swn for all the latest episodes!   Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Hack Naked News (Video)
Quantum Crypto Chaos, Cloud Vulnerabilities, Turkish RATs and Julian Assange. - SWN #13

Hack Naked News (Video)

Play Episode Listen Later Feb 18, 2020 25:06


Quantum Crypto Chaos, IBM Cloud Vulnerabilities in CICS, Crowded Flounder and Hacking Back, Turkish RATs and Julian Assange. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://wiki.securityweekly.com/SWNEpisode13

The CyberWire
Telegram recovers from DDoS. Fishwrap campaign breaks old news. Ransomware hits ACSO plants. Congress considers hacking back, again. That ol’ devil limbic system.

The CyberWire

Play Episode Listen Later Jun 13, 2019 20:18


Telegram recovers from a distributed denial-of-service attack. No attribution yet, but all the circumstantial evidence points to the Chinese security services. Operation Fishwrap, conducted by parties unknown, is an influence campaign that substitutes olds for news. Aircraft component manufacturer ASCO’s production is hit by ransomware. Hacking back is back, in Congress. Why don’t people patch? And a tip on fact-checking. Ben Yelin from UMD CHHS on NYPD cellphone surveillance. Guest is Dave Aitel from Cyxtera on offense oriented security and the INFILTRATE conference. For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_13.html  Support our show

ON Point with Alex Pierson
Canada Among Targets Of China Hacking Back In 2016

ON Point with Alex Pierson

Play Episode Listen Later Dec 21, 2018 10:23


Alex is joined by David Shipley, President/CEO of Beaucron Security and Global News Radio Cyber Security Expert, to discuss the alleged Chinese hacking campaign. Canada and several of our allies were targeted in an intrusive hacking attack on big corporations. How are we just learning about this two years after the fact? After all of these findings, how is China still in the running to be the backbone of Canada's 5G network?

The CyberWire
Facebook takes down "inauthentic" Russian and Iranian fronts. Twitter blocks Iranian false-flags, and FireEye explains why they think it's Tehran. Triout Android spyware described. Hacking back?

The CyberWire

Play Episode Listen Later Aug 22, 2018 20:00


In today's podcast we hear that Facebook has taken down more inauthentic pages—some are Russian, but others are Iranian. Twitter blocks Iranian accounts for being bogus. Russia denies, again, any involvement in information operations against the US. US Army Cyber Command's boss wonders if his job isn't more "information ops" than "cyber." Bitdefender describes Triout, an Android spyware framework. And some in industry caution the Senate not to expect them to get frisky hacking back. Craig Williams from Cisco’s Talos team, discussing MDM (mobile device management) vulnerabilities. Guest is James Burns from CFC Underwriting on cyber security insurance.  For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_22.html

Computer America
Scott Schober, Author of Hacked Again, Talks FBI Warnings, Hacking Back

Computer America

Play Episode Listen Later May 30, 2018 62:00


First Segment: Scott Schober. Author of Hacked Again, Cyber Security Expert Scott Schober is cybersecurityspeaker, presenter, author and expert with abackground in wireless security product development. Since his audiences depend upon ubiquitous technologies such as Wi-Fi, Bluetooth and 4G LTE communications, Scott expertly parses this technology into easily digestible bites. Scott appears regularly on hundreds of network TV news stations, radio, podcasts and cybersecurity events offering insight on a variety of topics   Today's Topics Include: Why the FBI urgently wants everyone in N.J. to reset their home internet router http://www.nj.com/data/2018/05/why_the_fbi_urgently_wants_everyone_in_nj_to_reset.html Scott Schober announces the Official 2018 Cybersecurity 500 List at the Cyber Investing Summit https://youtu.be/ZPGZK2pc5_8 (Listen at 6:50 … Who is Human & Who is Robot?  -   Google using sub-vocals in their AI https://youtu.be/LSuO3rW9po0

Risk & Repeat
Risk & Repeat: Hacking back, GDPR and more from RSAC

Risk & Repeat

Play Episode Listen Later Apr 26, 2018


In this week's Risk & Repeat podcast, SearchSecurity editors discuss some of the major themes and debates from RSA Conference, from hacking back to GDPR compliance.

Risk & Repeat
Risk & Repeat: Hacking back, GDPR and more from RSAC

Risk & Repeat

Play Episode Listen Later Apr 26, 2018


In this week's Risk & Repeat podcast, SearchSecurity editors discuss some of the major themes and debates from RSA Conference, from hacking back to GDPR compliance.

news risk cybersecurity compliance repeat gdpr data protection rsa conference rsac hacking back searchsecurity healthcare security & compliance
Phil's Podcast
E01 Spine Hacking (Back Surgery Series)

Phil's Podcast

Play Episode Listen Later Apr 2, 2018 15:52


Today I talk about my pre-operative meeting with the doctors covering what I need to know about my spine surgery in two weeks.

spine back surgery hacking back
The CyberWire
Active defense and “hacking back" with Johnathan Braverman from Cymmetria

The CyberWire

Play Episode Listen Later Dec 26, 2017 14:26


Jonathan is Cymmetria's General Counsel. A former trial attorney, Mr. Braverman is an expert in cyber-security law, policy and regulation. He has written policy papers on export controls over cyber technology, active defense and "hacking back."

defense active braverman hacking back cymmetria
Beers with Talos Podcast
This is How the Internet Ends, Not with a Whimper but with Cyber Mercenaries

Beers with Talos Podcast

Play Episode Listen Later Aug 29, 2017 62:00


Off the top: Better late than never? On top of being distributed all around the planet this week, we had some technical issues with our recording platform. Matt’s audio remained a challenge; it is rough this week. Bear with us, the audio quality will be back to what you have come to expect next episode. If you would like to speak to the manager, please hold. The last several years have seen a continuing surge in booters, DDOS, and combined exploit campaigns for-hire coming out of Asia and other regions. What does this tell us about the continued “professionalization” of the cyber criminal enterprise? We also discuss “hacking back” - some say it should be legal. Most people who know what they are talking about seem to think otherwise.

The CyberWire
StoneDrill succeeds Shamoon. Trojanized Android Facebook Lite. Progressive groups threatened with doxing, blackmail. WikiLeaks' Vault 7. Hacking back? Wiretapping?

The CyberWire

Play Episode Listen Later Mar 7, 2017 14:52


In today's podcast we hear about how StoneDrill maybe succeeding Shamoon—it's more evasive and at least as destructive. Malwarebytes advises sticking to Google Play to avoid a new Trojan. Russian hackers—apparently mobsters who've copped some of Cozy Bear's MO—are blackmailing US progressive political groups. The University of Maryland Center for Health and Homeland Security's Ben Yelin explains Amazon Alexa's role in a murder case. Neill Feather from SiteLock describes a Wordpress vulnerability.  Congress considers a bill to allow companies to hack back. WikiLeaks' Vault Seven seems mostly unsurprising. Washington wiretapping allegations prompt recriminations.

The Cyberlaw Podcast
Interview with Jeremy and Ariel Rabkin

The Cyberlaw Podcast

Play Episode Listen Later Jul 19, 2016 65:19


In our 125th episode of the Steptoe Cyberlaw Podcast, Stewart Baker, Michael Vatis, and David Kris discuss: Second Circuit rules against US Government in Microsoft case; DOJ rolls out MLAT reform proposal; LabMD draws law firms, Coke into Tiversa data theft row; DEA needed warrant to track suspect’s phone, judge says; Most ransomware attacks are HIPAA breaches, Feds say; Stealthy cyberespionage malware targets energy companies; Chinese hackers blamed for multiple breaches at US banking agency; Chinese browsers: the perfect reconnaissance tool; and Slow start for cyberwar on ISIS. Our interview is with Jeremy Rabkin and Ariel Rabkin, author of Hacking Back without Cracking Up, published by the Hoover Institution. The views expressed in this podcast are those of the speakers and do not reflect the opinions of the firm.

Paul's Security Weekly TV
Hack Naked TV: December 2, 2015

Paul's Security Weekly TV

Play Episode Listen Later Dec 10, 2015 12:09


Welcome to another episode of Hack Naked TV recorded December 2nd 2015. Today Aaron talks about Dell root certificate fiasco, Hacking Back being reviewed by the government, the LANDesk breach, new tool releases, and more! For a full list of stories visit our wiki here.

china root hacking certificates nsa java bulk fisc wireshark hacking back deserialization landesk hacknaked hack naked tv
Paul's Security Weekly
Hack Naked TV: December 2, 2015

Paul's Security Weekly

Play Episode Listen Later Dec 10, 2015 12:05


Welcome to another episode of Hack Naked TV recorded December 2nd 2015. Today Aaron talks about Dell root certificate fiasco, Hacking Back being reviewed by the government, the LANDesk breach, new tool releases, and more! For a full list of stories, visit our wiki here.

root hacking certificates nsa java bulk fisc wireshark hacking back deserialization landesk hacknaked hack naked tv
Paul's Security Weekly (Video-Only)
Security Weekly News #442 - Failed Windows 3.1 and Hacking Back

Paul's Security Weekly (Video-Only)

Play Episode Listen Later Nov 20, 2015 42:47


Security news this week we talk about the latest iThing, this one brews your coffee. Find out why its a bad idea to run Windows 3.1 in your environment, or Windows NT. Paul goes back in time, talking about OpenVMS. http://wiki.securityweekly.com/wiki/index.php/Episode442#Stories_of_the_Week_-_7:00PM-8:00PM Security Weekly Web Site: http://securityweekly.com Hack Naked Gear: http://shop.securityweekly.com Follow us on Twitter: @securityweekly

Paul's Security Weekly TV
Security Weekly News #442 - Failed Windows 3.1 and Hacking Back

Paul's Security Weekly TV

Play Episode Listen Later Nov 20, 2015 42:47


Security news this week we talk about the latest iThing, this one brews your coffee. Find out why its a bad idea to run Windows 3.1 in your environment, or Windows NT. Paul goes back in time, talking about OpenVMS. http://wiki.securityweekly.com/wiki/index.php/Episode442#Stories_of_the_Week_-_7:00PM-8:00PM Security Weekly Web Site: http://securityweekly.com Hack Naked Gear: http://shop.securityweekly.com Follow us on Twitter: @securityweekly

Bill Murphy's  RedZone Podcast | World Class IT Security
How Do You Keep Your Job if Breached? |Pinball Machines|Geo Fencing| Targeted attack vs Apt|Leadership| bulletproof hosting report| Dark Web

Bill Murphy's RedZone Podcast | World Class IT Security

Play Episode Listen Later Aug 19, 2015 55:56


Hacking-Back vs Attribution| APT Attack vs Targeted Attacks| Mobility and Virtualization| Leadership and Team Innovation| Ethics and the Selling of Vulnerabilities| The Best Zero Day definition Ever| Options of How to Avoid Poisoning Your Phone| Geo fencing| The One Question that you need to ask to Prevent Losing Your Job after a Breach Incident| Who has the Worse Cyber Criminals China or Russia?| Pinball Machines and Teaching Kids How Things Work Versus Consuming Things

Paul's Security Weekly TV
Episode 350: Active Defense

Paul's Security Weekly TV

Play Episode Listen Later Nov 7, 2013 54:00


We've all heard the term "Hacking Back". We all have mixed feelings about this term. Lets be clear, its not about feelings! The revenge-based "hacking back" was doomed for failure from the beginning. On the flip side, we're losing the battle against attackers on many fronts. What can we do? Setting traps, tracking attackers, luring them into areas of the network and systems deemed "honeypots" is on the table, or is it? What are the legal ramifications to this activity?

defense active hacking back
Paul's Security Weekly
Support Wounded Warriors, Active Defense: Taking The Fight To Attackers: Should We? - Episode 350, Part 1 - October 25, 2013

Paul's Security Weekly

Play Episode Listen Later Oct 31, 2013 76:44


Welcome to our very special episode 350! We have a very special episode, all in support of wounded veterans in our armed services. Please take the time to donate using the links above. We've got an epic day in store for you, including contests, panel discussions, technical segments and more! Active Defense: Taking The Fight To Attackers: Should We? We've all heard the term "Hacking Back". We all have mixed feelings about this term. Lets be clear, its not about feelings! The revenge-based "hacking back" was doomed for failure from the beginning. On the flip side, we're losing the battle against attackers on many fronts. What can we do? Setting traps, tracking attackers, luring them into areas of the network and systems deemed "honeypots" is on the table, or is it? What are the legal ramifications to this activity? Benjamin Wright is the author of several technology law books, including Business Law and Computer Security, published by the SANS Institute. With over 25 years in private law practice, he has advised many organizations, large and small, private sector and public sector, on privacy, computer security, e-mail discovery, outsourcing contracts and records management. Nothing Mr. Wright says in public is legal advice for your particular situation. If you need legal advice or a legal opinion, you should retain a lawyer. Joshua Corman is the Director of Security Intelligence for Akamai. Mr. Corman’s cross-domain research highlights adversaries, game theory and motivational structures. His analysis cuts across sectors to the core security challenges plaguing the IT industry, and helps to drive evolutionary strategies toward emerging technologies and shifting incentives. Dave Dittrich is an Affiliated Research Scientist with the Office of the Chief Information Security Officer at the University of Washington. He is also a member of the Honeynet Project and Seattle's "Agora" computer security group. Robert Graham is the co-founder and CTO of Errata Security, a firm specializing in cybersecurity consulting and product verification. Mr. Graham learned hacking as a toddler from his grandfather, a WW-II codebreaker. His first IDS was written more than 10 years ago designed to catch Morris-worm copycats.

Big Ideas (Audio)
Ron Deibert on Hacking Back: The Battle for Human Rights Online

Big Ideas (Audio)

Play Episode Listen Later Nov 22, 2008 53:58


Political science professor Ron Deibert looks at the issue of internet censorship and surveillance around the world.