POPULARITY
In our second iteration of our mini-series, we'll speak with Ben April of Maltego and Allan Liska of Recorded Future. We'll cover topics such as AI, the LockBit ransomware gang, cybersecurity comic books, and more!
We're back on the road at RSA 2024 talking with thought leaders in the infosecurity space! Be sure to check in weekly as we share nine interviews with folks from Recorded Future, Gutsy, Maltego, Aembit, MITRE, EmberOT, Optery, Rubrik, and NINJIO.
While customer education is still in its early stages, it shouldn't be an afterthought. If businesses want to succeed, they need to make customer education a clear priority for everyone.“Customer education does need to be viewed as something that touches every part of the customer life cycle and the customer journey. There needs to be a conscious effort to ensure that all parts of an organization are working together to incorporate customer education into what they do,” says Joe Ryan, Training Program Manager at Maltego & Founder of Customer Education Newsletter.In this episode, Joe dives deep on how customer education can benefit a company's different departments and the future of the industry. Along the way, we also touch on the transition from free to paid services and fitting customer education in sales processes.In this episode, you will gain insights into:- Incorporating customer education successfully depends on an organization's maturity- Relegating customer education as a last-ditch effort for customer retention wastes its potential- Growing the customer education industry and community requires professionals to be more vocal about how it fits into an organization's structureCheck this episode out on your favorite podcast app to discover how customer education can bring massive value to your company.Resources:- Joe Ryan- Maltego- Customer Education Newsletter- Ted Blosser- WorkRamp
A passionate professor with recognized expertise in OSINT, Jezer Ferreira has made significant contributions to the field. He was pivotal in the inception of the Cyber Hunter Group, which subsequently led to the founding of the Osintomático Conference, which is the largest OSINT and Social Engineering event in Europe. Recognizing the synergy between OSINT and social engineering, he underscores their combined potential. He serves as the Coordinator of Cyber Intelligence trainings at the Cyber Hunter Academy and is also a distinguished professor of OSINT and CySA in the Master of Cybersecurity and Cyber Defense program at the University of Santiago de Compostela, Spain. He was honored with "The Holy Guardian Angels - Friends of the National Police" medal in recognition of his collaborative efforts with the police to combat cyberterrorism. In this episode, we journey through Jezer's beginnings in the OSINT realm, discuss the dynamic evolution of the discipline and its interconnected fields, and examine the generational changes in social media engagement. Beyond insights for OSINT and cybersecurity professionals, Jezer also offers valuable advice on how everyone can confidently navigate the internet by building safe habits. 00:00 Introduction 05:22 How did your career in OSINT start? 16:08 How are the OSINT discipline and its related areas evolving? 33:15 What have been the changes in the use of social media by different generations? 40:30 What are your recommendations for someone starting in the sector? 50:48 What role does Maltego play as a community and development tool? ■ About The Pivot Brought to you by Maltego, The Pivot deep dives into topics pivoting from information security to the criminal underground. Each episode features interviews with experts from the industry and research fields and explores how they connect the dots. ■ About Maltego Used by investigators worldwide, Maltego is a graphical link analysis tool that allows users to mine, merge, and map data from OSINT and third-party data integrations for all sorts of investigations—cybersecurity, person of interest, fraud, and more. The podcast streams free on Spotify. You can also watch it all go down on YouTube. Don't forget to subscribe to our Twitter, LinkedIn, and Mastodon to stay on top of our latest updates, tutorials, webinars, and deep dives. For more information about Maltego, visit our website.
Daniel is a seasoned technology and cybersecurity professional who has worked with organizations globally to help protect, detect, and respond to cyber threats. He is active in the UK cyber community, serving on the UK Government Cyber Security Advisory Board. You can usually find him online conducting innovative research and seeking new ways to combat cybercrime. In this episode, we draw upon Daniel's extensive experience and expertise as we delve into the world of cybersecurity together. We discuss some of the challenges posed by laws, the lack of understanding or misunderstanding from the public, as well as the collaboration between companies and cybersecurity professionals. During our conversation, Daniel also shares some commonly practiced security methodologies and examines the issues from personal, organizational, and global perspectives, calling for greater focus on global cyber defense. 0:00 Welcome! 01:15 How are you today? 03:15 What makes you come to the internet intelligence gathering mission? 08:24 Where do you get the list of websites to scan and what do you do with these websites? 14:45 How do you report the scanning results at such a broad scale? 16:48 Is it legal to scan domains in the UK? 24:07 The visibility gap from people's understanding of crime search 25:01 Security practice that most organizations overlook and the misunderstanding people have for cybersecurity 28:18 Tell us some commonly employed security methodologies within companies! 33:01 The lack of security practices and education on a personal level 42:18 Enabling humans to be the greatest strength for cybersecurity within companies and for society 51:33 The lack of focus on global cyber defense 59:17 Where did you start and how did you get into the cybersecurity world? 63:36 What are the three must-have attributes for people wanting to enter the industry? 67:44 The importance of asking questions in the field of cybersecurity 70:58 Looking at the attack from the national and worldwide perspective 75:55 Looking at the attack from the cybersecurity professional's perspective 79:42 Looking at the attack from the business side 87:40 The challenge cybersecurity professionals face when working with organizations 96:16 Closing ■ About The Pivot Brought to you by Maltego, The Pivot deep dives into topics pivoting from information security to the criminal underground. Each episode features interviews with experts from the industry and research fields and explores how they connect the dots. ■ About Maltego Used by investigators worldwide, Maltego is a graphical link analysis tool that allows users to mine, merge, and map data from OSINT and third-party data integrations for all sorts of investigations—cybersecurity, person of interest, fraud, and more. The podcast streams free on Spotify. You can also watch it all go down on YouTube. Don't forget to subscribe to our Twitter and LinkedIn to stay on top of our latest updates, tutorials, webinars, and deep dives. For more information about Maltego, visit our website.
Jane is a tech entrepreneur, book author, international speaker, and passionate women's change agent. She is the founder of the IN Security Movement and the author of In Security: Why a Failure to Attract and Retain Women in Cybersecurity is Making Us All Less Safe. With more than 25 years of experience in the field, Jane has built her own penetration company and held senior executive roles at information technology organizations. Today she is represented by The London Speaking Bureau and is committed to establishing women in security as a standard, not an exception, through her consulting services, training programs, media appearances, speaking engagements, and the Women in Cybersecurity Podcast. In this episode, Jane dives deep into the current landscape of the cyber world, elaborating on the challenges and presenting potential solutions. She discusses the 'enabler' knowledge gap between people in cybersecurity and company shareholders, the obstacles that women face when trying to get their foot in the door of the industry, and many more. 0:00 Welcome! 1:31 Tell us about yourself! 4:58 Tell us a bit about your work! 14:07 What got you into cyber world? 18:20 How to make the shareholders aware that people in cyber are 'enablers' in business? 24:19 The problem of the misleading and big requirements in the job specs 30:24 What is it like to expose and grow people in the industry? 38:22 What has it been like to empower women in cyber? 40:46 Why and how do women face more challenges in the industry? 49:34 Is woman empowerment in cyber more of a flipside analogy? 53:27 The importance of the diversity in workplace 56:05 Why do you think the gender risk analysis happens and how to fix it? 1:01:31 Tell us the top 3 attributes you would advise the newcomers to possess! ■ About The Pivot Brought to you by Maltego, The Pivot deep dives into topics pivoting from information security to the criminal underground. Each episode features interviews with experts from the industry and research fields and explores how they connect the dots. ■ About Maltego Used by investigators worldwide, Maltego is a graphical link analysis tool that allows users to mine, merge, and map data from OSINT and third-party data integrations for all sorts of investigations—cybersecurity, person of interest, fraud, and more. The podcast streams free on Spotify. You can also watch it all go down on YouTube. Don't forget to subscribe to our Twitter and LinkedIn to stay on top of our latest updates, tutorials, webinars, and deep dives. For more information about Maltego, visit our website.
Kevin Limonier is an expert in geopolitics. He holds the position of an associate professor in Geography and Slavic Studies at the French Institute of Geopolitics (Paris 8 University), serves as the deputy director of GEODE, and is a founding partner of Cassini, a company specializing in cartography and territorial intelligence. Previously, he worked as a lecturer at the Russian State University of Humanities (RGGU, Moscow) for several years. As a specialist in the Russian-speaking internet and territorial innovation policies in the USSR and contemporary Russia, Kevin's geopolitical research focuses on developing new methods of mapping cyberspace, particularly in the post-Soviet context. His research Beyond “hybrid warfare”: a digital exploration of Russia's entrepreneurs of influence is available online and accessible to the public. He is also interested in the methodology and epistemology of geopolitics. In this episode, we delve into a variety of topics ranging from the meaning of OSINT within the field of geopolitics, the current limitations of OSINT, and some emerging challenges as the world and the internet rapidly evolve. We also discuss how authoritarian states, such as Russia, control their internet and its evolution over the years. 01:06 How do you envision OSINT in the context of geopolitics? 03:30 Tell us about your work and how you use OSINT! 07:11 How would the states employ and insert OSINT in a global geopolitical context 16:07 What are some of the limits of OSINT? 22:56 How does Russia control its internet and how has this control evolved over the years? 32:38 What's the difference between Russian Internet and Russian-speaking Internet? 38:09 What will happen to the countries using Russian internet services once Russia separates its internet from the world? 43:09 What is an entrepreneur of influence? 46:58 How does the system of entrepreneur of influence work? 55:51 What methodology did you use to track them down in Africa? ■ About The Pivot Brought to you by Maltego, The Pivot deep dives into topics pivoting from information security to the criminal underground. Each episode features interviews with experts from the industry and research fields and explores how they connect the dots. ■ About Maltego Used by investigators worldwide, Maltego is a graphical link analysis tool that allows users to mine, merge, and map data from OSINT and third-party data integrations for all sorts of investigations—cybersecurity, person of interest, fraud, and more. The podcast streams free on Spotify. You can also watch it all go down on YouTube. Don't forget to subscribe to our Twitter and LinkedIn to stay on top of our latest updates, tutorials, webinars, and deep dives. For more information about Maltego, visit our website.
Henri Beek has more than 13 years of professional experience working in the Open-Source Intelligence (OSINT) space. Within his career, he has used OSINT for different types of investigations, ranging from fraud and employment screening to family protection, red teaming and cyber threat intelligence. Henri currently works at a company where he provides OSINT training and consultancy to law enforcement and related entities throughout Europe. In this episode, we peek into OSINT investigations from back in 2008, when it was still called "desk research" and conducted with plenty of paperwork. Extending the topic, Henri also brings up the access problems such as the takedown of Facebook Graph. He also points out that investigators should be more mindful of the information they are sharing online and be keen on examining the source and reliability of the contents. 0:00 Welcome! 1:23 What got you into OSINT? 2:31 Where did you start doing OSINT? 6:36 Have you encountered access problems while researching? In which sphere? 17:18 What's the definition of Red Team and its exercises? 20:29 Tell us the hallmark investigation of yours! 25:01 What are the tools you use for investigations? 31:41 Do you think we are oversharing OSINT resources? 35:51 What is stifiling the access to the information? 48:09 How does one start off one of the OSINT branches? ■ About The Pivot Brought to you by Maltego, The Pivot deep dives into topics pivoting from information security to the criminal underground. Each episode features interviews with experts from the industry and research fields and explores how they connect the dots. ■ About Maltego Used by investigators worldwide, Maltego is a graphical link analysis tool that allows users to mine, merge, and map data from OSINT and third-party data integrations for all sorts of investigations—cybersecurity, person of interest, fraud, and more. The podcast streams free on Spotify. You can also watch it all go down on YouTube. Don't forget to subscribe to our Twitter and LinkedIn to stay on top of our latest updates, tutorials, webinars, and deep dives. For more information about Maltego, visit our website.
We've made it to the third installment of our Stronger Together Mini Series! In this episode we're joined by researchers, threat analysts, and C-Suites including Katie Nickels from Red Canary and the SANS Institute, Don Jeter from Torq, Ben April from Maltego, Lesley Carhart from Dragos, and Jeff Stout from Akamai. We have some great discussions on the pros and cons of AI, protecting industrial control systems, imposter syndrome, and more.
Nico Dekens, known as the Dutch_OsintGuy online, is an All Source Analyst specializing in Open Source Intelligence (OSINT), online Human Intelligence (HUMINT) and Online investigations. He has over 20 years of experience as an all source Intelligence Analyst at Dutch Law Enforcement. Nico eats, sleeps, and lives everything which has to do with OSINT, online investigations, Intelligence gathering and Analysis. He is very active within the OSINT community, being the Co-founder of the OSINTCurio.us project and a SANS Institute instructor. Currently, Nico is working as the Director of Intelligence, Collection Innovation at ShadowDragon. In this episode, Nico provides valuable insights into his investigations on the decentralized web, experiences of saving people from the ongoing Ukrainian war, as well as concerns for the polarized-bound world. He also touches a bit on Vicarious Trauma with himself as an example and offers a few prevention tips in the end. 0:00 Welcome! 01:08 Tell us a bit about yourself! 10:35 What was it like running threads of investigations years ago? 16:26 Have you done any investigations revolving around the DAO or decentralized web? 20:25 What are the tools you use for investigations? 26:14 Have you seen people hindered by only using specific tools? 30:05 As an investigator, what's your biggest concern with the world changing drastically now? 43:38 How does saving lives make you feel? 48:59 Where will people start if they want to do what you are doing now? 49:09 What are the three things you would say to someone getting into this field? 52:36 Tell us about Vicarious Trauma! 56:09 Does Vicarious Trauma also cover people being numb to horrific materials? ■ About The Pivot Brought to you by Maltego, The Pivot deep dives into topics pivoting from information security to the criminal underground. Each episode features interviews with experts from the industry and research fields and explores how they connect the dots. ■ About Maltego Used by investigators worldwide, Maltego is a graphical link analysis tool that allows users to mine, merge, and map data from OSINT and third-party data integrations for all sorts of investigations—cybersecurity, person of interest, fraud, and more. The podcast streams free on Spotify. You can also watch it all go down on YouTube. Don't forget to subscribe to our Twitter and LinkedIn to stay on top of our latest updates, tutorials, webinars, and deep dives. For more information about Maltego, visit our website.
Discuss observations and trends across the venture capital ecosystem as it pertains to cybersecurity. This will include a re-cap in how 2022 ended, what we saw in Q12023, and what we expect from an investing standpoint. Segment Resources: https://forgepointcap.com/ With over 1 billion records exposed in just the top 35 breaches, over $2.6 billion stolen in the top nine cryptocurrency breaches, and over $2.7 billion in fines levied to the top 35 violators, lessons abound for security teams. We will walk through some of the biggest trends in last year's data breaches and privacy violations, and we'll talk about what security leaders can learn from these events. Segment Resources: https://www.forrester.com/blogs/2022-breaches-and-fines-offer-lessons-to-security-leaders In the Enterprise Security News, Lots of funding announcements and new companies, Private Equity acquires Maltego, Cinven acquires RSA Archer Comcast launches a security product, Zscaler has beef with Gartner, CISA releases updated Zero Trust Model, Amazon jumps into the AI LLM fray, AutoGPT stretches the imagination and potential use cases, The Ever Changing API security market, New security books just released, Zombie birds! Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/esw314
In the Enterprise Security News, Lots of funding announcements and new companies, Private Equity acquires Maltego, Cinven acquires RSA Archer Comcast launches a security product, Zscaler has beef with Gartner, CISA releases updated Zero Trust Model, Amazon jumps into the AI LLM fray, AutoGPT stretches the imagination and potential use cases, The Ever Changing API security market, New security books just released, Zombie birds! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw314
In the Enterprise Security News, Lots of funding announcements and new companies, Private Equity acquires Maltego, Cinven acquires RSA Archer Comcast launches a security product, Zscaler has beef with Gartner, CISA releases updated Zero Trust Model, Amazon jumps into the AI LLM fray, AutoGPT stretches the imagination and potential use cases, The Ever Changing API security market, New security books just released, Zombie birds! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw314
Discuss observations and trends across the venture capital ecosystem as it pertains to cybersecurity. This will include a re-cap in how 2022 ended, what we saw in Q12023, and what we expect from an investing standpoint. Segment Resources: https://forgepointcap.com/ With over 1 billion records exposed in just the top 35 breaches, over $2.6 billion stolen in the top nine cryptocurrency breaches, and over $2.7 billion in fines levied to the top 35 violators, lessons abound for security teams. We will walk through some of the biggest trends in last year's data breaches and privacy violations, and we'll talk about what security leaders can learn from these events. Segment Resources: https://www.forrester.com/blogs/2022-breaches-and-fines-offer-lessons-to-security-leaders In the Enterprise Security News, Lots of funding announcements and new companies, Private Equity acquires Maltego, Cinven acquires RSA Archer Comcast launches a security product, Zscaler has beef with Gartner, CISA releases updated Zero Trust Model, Amazon jumps into the AI LLM fray, AutoGPT stretches the imagination and potential use cases, The Ever Changing API security market, New security books just released, Zombie birds! Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/esw314
Hakan Tanriverdi is a reporter at the German public broadcaster, Bayerischer Rundfunk. He covers information and cybersecurity, mainly focusing on hacking groups and who they're working for. The investigations tend to be more on the technical side and are assisted by scripts, scrapers, and databases. He is also the producer of the podcast series, Der Mann in Merkels Rechner - Jagd auf Putins Hacker (The Man In Merkel's Computer – Hunting Down Putin's Hackers), uncovering the German parliament hack, which went viral later. In this episode, Hakan elaborates on how he unfolds the world of OSINT and hacking and his thoughts on how Snowden leaks and Panama Papers changed how reporters investigate. He also touches on the production of Der Mann in Merkels Rechner – Jagd auf Putins Hacker podcast series, explaining how he came to record the podcast and the whole story of the hack. 0:00 Welcome! 0:50 Tell us a bit about yourself! 4:08 What got you into OSINT? 12:11 Tell us about the exciting conferences you've attended! 15:17 What was the Snowden Leaks like for you as an experience? 17:26 How do you think the Snowden Leaks and Panama Papers were handled? 21:44 Tell us about the investigation of the German parliament hack! 32:26 What motivates you to dive into cybercrimes? 38:10 Tell us your passion projects other than hacking! 42:31 What are the three pieces of advice you would give to novices? ■ About The Pivot Brought to you by Maltego, The Pivot deep dives into topics pivoting from information security to the criminal underground. Each episode features interviews with experts from the industry and research fields and explores how they connect the dots. ■ About Maltego Used by investigators worldwide, Maltego is a graphical link analysis tool that allows users to mine, merge, and map data from OSINT and third-party data integrations for all sorts of investigations—cybersecurity, person of interest, fraud, and more.
Zaid Sabih is an ethical hacker, a computer scientist, and the founder and CEO of zSecurity. He has valuable & tremendous experience in the field of ethical hacking. In 2013, he started teaching his first network hacking course, which led him to publish a number of online ethical hacking courses, each focusing on a specific topic, all of which are dominating ethical hacking. Now, Zaid has more than 800,000 students worldwide. In this episode, Zaid sits down with Maltego host Bradley Taylor, recalling what led him into cybersecurity and infosec, later establishing his own company, zSecurity. He also talks about his opinoin on the term "hacking" and CTF platforms, providing 3 tips for becoming a successful bug bounty hunter in the end. 0:00 Welcome! 0:40 How's everything in Dublin? 2:25 Tell us a bit about yourself! 4:06 What got you into cybersecurity and infosec? 9:28 How old were you when establishing zSecurity? 11:14 What is it like to be a full-scale pentest teacher? 13:15 Do you do motivation topics with your students? 14:59 Any hobbies besides hacking? 16:06 Tell us about your investigations with Maltego! 18:51 Tell us about zSecurity's bug bounty platform! 22:16 What are the specific scoping requirements? 23:55 What are your thoughts on the CTF platforms? 32:02 What are your thoughts on the term 'hacking'? 37:29 What is your opinion on live hacking interviews? 39:18 Share with us 3 tips to become a successful bug bounty hunter! ■ About The Pivot Brought to you by Maltego, The Pivot deep dives into topics pivoting from information security to the criminal underground. Each episode features interviews with experts from the industry and research fields and explores how they connect the dots. ■ About Maltego Used by investigators worldwide, Maltego is a graphical link analysis tool that allows users to mine, merge, and map data from OSINT and third-party data integrations for all sorts of investigations—cybersecurity, person of interest, fraud, and more. The podcast streams free on Spotify, Apple Podcasts, and Google Podcasts. You can also watch it all go down on YouTube. Don't forget to subscribe to our Twitter and LinkedIn to stay on top of our latest updates, tutorials, webinars, and deep dives. For more information about Maltego, visit our website.
Palenath is an OSINT & hacking enthusiast and a speaker at Barbhack, UnlockYourBrain, Stack Overflow, Barbhack as well as Lehack. He coded several OSINT software and published them on GitHub. He also proactively participated in several OSINT CTFs, winning competitions held by Trace Labs, Maltego, and UnlockYourBrain. In this episode, Palenath walks us through his journey on how he comes to program OSINT tools as well as his own experience of getting support from OSINT community, recommending websites and communities for beginners. He also shares with us his opinions on OPSEC and provides basic hygiene guidelines for researchers to protect their privacy while conducting investigations. 0:00 Welcome! 0:39 Tell us a bit about yourself! 1:11 Are there any particular fields you are interested in? 2:05 Tell us about the OSINT tools you program! 3:10 Do you have a GitHub? 4:16 Give us an example of the support from OSINT community! 6:11 Is it a good idea to make OSINT tools available to the public? 11:37 Have you ever worked with journalists? 14:36 How did you get started in OSINT? 17:26 Any recommendations for beginners, such as communities or websites? 19:06 What makes you cautious about privacy? 21:33 What are the basic hygiene OPSEC procedures for researchers? 26:08 Do you recommend using another phone to activate an account? 29:45 Share with us any OPSEC fails you've heard! 32:14 What is EPIEOS.com? 33:56 How you came to create OSINT tools? 37:49 Are there any OSINT tools you admire? 40:49 What do you think about tools like AI black box? 42:08 Any other communities you would like to mention? ■ About The Pivot Brought to you by Maltego, The Pivot deep dives into topics pivoting from information security to the criminal underground. Each episode features interviews with experts from the industry and research fields and explores how they connect the dots. ■ About Maltego Used by investigators worldwide, Maltego is a graphical link analysis tool that allows users to mine, merge, and map data from OSINT and third-party data integrations for all sorts of investigations—cybersecurity, person of interest, fraud, and more. The podcast streams free on Spotify, Apple Podcasts, and Google Podcasts. You can also watch it all go down on YouTube. Don't forget to subscribe to our Twitter and LinkedIn to stay on top of our latest updates, tutorials, webinars, and deep dives. For more information about Maltego, visit our website.
Teresa Walsh leads the FS-ISAC's Global Intelligence Office (GIO) to protect the financial sector against cyber threats by delivering actionable strategic, operational, and tactical intelligence products. Based in the United Kingdom, she oversees FS-ISAC's global member-sharing operations and a team of regional intelligence officers and analysts who monitor emerging threats. Teresa began her career as a civilian intelligence analyst with the US Naval Criminal Investigative Service (NCIS) and holds a master's in political science with a focus on international relations from the University of Missouri-Columbia. In this interview, Teresa shares with us her work as a GIO and provides insights into the differences between traditional intelligence and cyber intelligence as well as which industry adjusts swiftly in alleviating risks than others. Last but not least, she also offers advice to those who would like to become an intelligence practitioner. 0:00 Welcome! 01:45 Tell us a bit about yourself! 02:54 What is it like to wake up with information coming from worldwide? 05:18 What is it like to work in the intelligence industry? 07:52 What is the biggest challenge for getting the traditional SOC team to think differently about the intelligence and use it versus jamming millions of IPs into a tip? 14:47 How much intelligence is derived/propagated from OSINT? 18:41 Are there any industries evolving faster in mitigating risks than the others? 20:51 Do you use any specific tools to gather intel? 23:03 Where to start in the intelligence industry? 31:40 Tell us about an unforgettable investigation! 37:31 How's the house renovation going? 45:49 Tell us 3 most important advice for intelligence partitioner wannabes! ■ About The Pivot Brought to you by Maltego, The Pivot deep dives into topics pivoting from information security to the criminal underground. Each episode features interviews with experts from the industry and research fields and explores how they connect the dots. ■ About Maltego Used by investigators worldwide, Maltego is a graphical link analysis tool that allows users to mine, merge, and map data from OSINT and third-party data integrations for all sorts of investigations—cybersecurity, person of interest, fraud, and more. The podcast streams free on Spotify, Apple Podcasts, and Google Podcasts. You can also watch it all go down on YouTube. Don't forget to subscribe to our Twitter and LinkedIn to stay on top of our latest updates, tutorials, webinars, and deep dives. For more information about Maltego, visit our website.
Gisela is a a human rights lawyer, an open source researcher at Berkeley Law's Human Rights Center Investigations Lab, and a trainer at Amnesty International's Digital Verification Corps, a global network of volunteers who fact-checks social media posts about war crimes and human rights violations. She reports on extremism and other topics for the Investigative Reporting Program with a focus on digital forensics and network analysis. She is also cybersecurity expert and a digital safety trainer with PEN America. In this interview, Gisela talks about the knowledge she gained from several OSINT investigations, which later led to her multi-career journey in journalism, investigative reporting, and OSINT investigations. By sharing her experiences as an OSINTer, she answers questions on how to deal with mental distress when faced with threats and the top 3 must-have tools for her investigations. 0:00 Welcome! 1:10 Tell us a bit about yourself! 4:25 What gets you into intelligence and investigations? 9:08 How do you balance and keep going with multiple careers? 15:31 Tell us the craziest experience you have! 20:12 Has your perosnal safety been threatened when investigating? 25:00 How do you deal with mental distress? 31:39 What was it like winning a team Polk Award with «American Insurrection»? 34:52 What are the top 3 tools you cannot live without? 40:06 What advice would you give to inspire the listeners? ■ About The Pivot Brought to you by Maltego, The Pivot deep dives into topics pivoting from information security to the criminal underground. Each episode features interviews with experts from the industry and research fields and explores how they connect the dots. ■ About Maltego Used by investigators worldwide, Maltego is a graphical link analysis tool that allows users to mine, merge, and map data from OSINT and third-party data integrations for all sorts of investigations—cybersecurity, person of interest, fraud, and more. The podcast streams free on Spotify. You can also watch it all go down on YouTube. Don't forget to subscribe to our Twitter and LinkedIn to stay on top of our latest updates, tutorials, webinars, and deep dives. For more information about Maltego, visit our website.
Léa is an investigator at Graphika, specializing in online investigations, state influence operations, and European extremist groups. She was a known part of the team that exposed Secondary Infection as well as the recent competing Russian and French influence operations in the Central African Republic. Léa holds a dual Master's degree in Geopolitics of the post-Soviet space from the French Institute of Geopolitics and the Russian State University for the Humanities. In this episode, Léa elaborates on the projects she has done with Graphika, including how she conducts internet mapping and recognizes state operations. She also shares with us the ethics in OSINT investigations with her own redline as an example and digs into the ongoing war in Ukraine and the upcoming French presidential election. ■ About The Pivot Brought to you by Maltego, The Pivot deep dives into topics pivoting from information security to the criminal underground. Each episode features interviews with experts from the industry and research fields and explores how they connect the dots. ■ About Maltego Used by investigators worldwide, Maltego is a graphical link analysis tool that allows users to mine, merge, and map data from OSINT and third-party data integrations for all sorts of investigations—cybersecurity, person of interest, fraud, and more. The podcast streams free on Spotify. You can also watch it all go down on YouTube. Don't forget to subscribe to our Twitter and LinkedIn to stay on top of our latest updates, tutorials, webinars, and deep dives. For more information about Maltego, visit our website.
Vicente Diaz is a specialist in Threat Intelligence and Threat Hunting. He works in the VirusTotal team in Google as Threat Intelligence Strategist and holds a degree in Computer Science and an MSc in Artificial Intelligence. On the latest The Pivot episode, Vicente shares his threat hunting journey and what threat intelligence means to him. By introducing us to his work in VirusTotal and his role within the company, Vicente shares some of his most interesting and relevant investigations, the toolkits he uses the most, and how anyone can get started with threat hunting. Vicente also gives some tips and tricks into how anyone, people and corporates, can protect themselves from the current crises surrounding privacy and threat intelligence. ■ About The Pivot Brought to you by Maltego, The Pivot deep dives into topics pivoting from information security to the the criminal underground. Each episode features interviews with experts from the industry and research fields and explores how they connect the dots. ■ About Maltego Used by investigators worldwide, Maltego is an graphical link analysis tool that allows users to mine, merge, and map data from OSINT and third-party data integrations for all sorts of investigations—cybersecurity, person of interest, fraud, and more. The podcast streams free on Spotify. You can also watch it all go down on YouTube. Don't forget to subscribe to our Twitter and LinkedIn to stay on top of our latest updates, tutorials, webinars, and deep dives. For more information about Maltego, visit our website.
After spending more than 15 years as a graphic designer, Rae Baker decided that it was time for a career change. Now, she is passionate about corporate reconnaissance as well as scam/fraud tracking and currently works as a Senior Open Source Intelligence Analyst for a large consulting firm. As an OSINT Curious Advisory Board member, Rae also works closely with other OSINT practitioners in the field to educate and inspire those within the OSINT community. Additionally, she is the Open Source Intelligence team lead with Operation Safe Escape, which is a 501(c)(3) non-profit comprising of security professionals tasked with keeping domestic violence victims hidden from their abusers, a volunteer with Innocent Lives Foundation, as well as a Trace Labs Black Badge winner. In this interview, we will dive into her experiences as someone starting in OSINT from scratch and becoming a well-known OSINT blogger, researcher, and advocate and her tips and recommendations for those who are on the same path. ■ About The Pivot Brought to you by Maltego, The Pivot deep dives into topics pivoting from information security to the the criminal underground. Each episode features interviews with experts from the industry and research fields and explores how they connect the dots. ■ About Maltego Used by investigators worldwide, Maltego is an graphical link analysis tool that allows users to mine, merge, and map data from OSINT and third-party data integrations for all sorts of investigations—cybersecurity, person of interest, fraud, and more. The podcast streams free on Spotify. You can also watch it all go down on YouTube. Don't forget to subscribe to our Twitter and LinkedIn to stay on top of our latest updates, tutorials, webinars, and deep dives. For more information about Maltego, visit our website.
Eddy der InfoSec Frosch - Der kinderleichte Cyber Awareness Podcast
Eddy und Sebastian sind verliebt in Maltego. Dies ist ein Open Source Intelligence (OSINT) Tool, mit dem du ungeahnte Dinge über dich und andere erfahren kannst. Sie erklären dir wie du deine persönlichen Daten besser schützen kannst und sie entwickeln Theorien, was es mit einer Nachricht von MGM über deren Netzwerksicherheit auf sich haben könnte. Schalte ein beim CyberAwareness Podcast mit dem Frosch! Eddys Tipps von Montag bis Freitag auf Twitter und jeden Sonntag als Podcast. Eddy auf Twitter: https://twitter.com/eddy_infosec infoeddy.de
Dr. Katie Paxton-Fear is a Cybersecurity Lecturer at Manchester Metropolitan University and Technical Community Manager at Bugcrowd, but she's probably most well known for her hobby: In her free time, she's a hacker and a YouTube educator. Since 2019, she has found more than 30 vulnerabilities in real software in production, when she first got into hacking “accidentally.” She got her start in security thanks to a mentorship at a HackerOne live hacking event in 2019 where she found her first two bugs in Uber, despite it being her first-time hacking. After being invited as a mentee again in Vegas during DEFCON, she realized the privilege she had and once she got home, she started making videos teaching others how to get into hacking. Since then, she has made more than 50 educational videos on a range of topics, explaining beginner vulnerabilities, tools, APIs, note-taking, and mobile hacking. She is interested in the intersection of data and web application vulnerabilities and developing understanding from noise. In this interview, we will dive into: Katie's journey and experience of being a bug bounty hunter How OSINT plays a role in Kaite's projects Katie's aspiration of teaching and creating educational content Three of the most important things that helped Katie become who she is ■ About The Pivot Brought to you by Maltego, The Pivot deep dives into topics pivoting from information security to the the criminal underground. Each episode features interviews with experts from the industry and research fields and explores how they connect the dots. ■ About Maltego Used by investigators worldwide, Maltego is an graphical link analysis tool that allows users to mine, merge, and map data from OSINT and third-party data integrations for all sorts of investigations—cybersecurity, person of interest, fraud, and more. The podcast streams free on Spotify. You can also watch it all go down on YouTube. Don't forget to subscribe to our Twitter and LinkedIn to stay on top of our latest updates, tutorials, webinars, and deep dives. For more information about Maltego, visit our website.
After working as a police detective, undercover operator, and behavioral and geographic profiler for 10 years, Julie Jones enters the intelligence unit and develops her passion for technology by using the internet to investigate crimes. As an Intelligence Specialist, Julie uses all-source intelligence with a focus on online OSINT, social media intelligence, and ethical and proportionate practices for covert and undercover investigations to solve complex problems for corporations, governments, law enforcement and non-profits worldwide. In this episode, Julie shares what leads her into internet investigations, how she keeps up with the curve, her experiences in international investigations, the topics she is passionate about, the definition of coercive control as well as her work around cults. In this episode, Julie talks about: Tips/techniques to stay on top of the curve What is it like to engage in international crimes investigations and how she navigates it Why she is passionate about humanitarian investigations What is coercive control Her work around cults What should we focus on to improve as investigators ■ About The Pivot Brought to you by Maltego, The Pivot deep dives into topics pivoting from information security to the the criminal underground. Each episode features interviews with experts from the industry and research fields and explores how they connect the dots. ■ About Maltego Used by investigators worldwide, Maltego is an graphical link analysis tool that allows users to mine, merge, and map data from OSINT and third-party data integrations for all sorts of investigations—cybersecurity, person of interest, fraud, and more. The podcast streams free on Spotify. You can also watch it all go down on YouTube. Don't forget to subscribe to our Twitter and LinkedIn to stay on top of our latest updates, tutorials, webinars, and deep dives. For more information about Maltego, visit our website.
Devoting himself in the OSINT world for more than decades, Micah Hoffman is an highly active member of the Cyber Security and OSINT communities. Micah works with federal government, commercial, and internal customers and conducts many different Cyber Security tasks, such as penetration testing, OSINT investigations, and risk accessment. Micah is also the president of The OSINT Curious Project, the Principal Investigator and owner of Spotlight Infosec, the founder of the My OSINT Training, the co-founder of the OSINT Games CTF Experience. In this episode, Micah talks about: How he lands in OSINT Skillsets required for OSINTers Future challenges and suggestions Recommendations for OSINT beginners How The OSINT Curious Project starts Challenges for forming the OSINT community and solutions His professional projects and CTFs His favorite OSINT tools Advice for investigators to protect themselves An interesting investigation he had before Areas OSINTers need to deep dive into His personal goals for the future ■ About The Pivot Brought to you by Maltego, The Pivot deep dives into topics pivoting from information security to the the criminal underground. Each episode features interviews with experts from the industry and research fields and explores how they connect the dots. ■ About Maltego Used by investigators worldwide, Maltego is an graphical link analysis tool that allows users to mine, merge, and map data from OSINT and third-party data integrations for all sorts of investigations—cybersecurity, person of interest, fraud, and more. The podcast streams free on Spotify. You can also watch it all go down on YouTube. Don't forget to subscribe to our Twitter and LinkedIn to stay on top of our latest updates, tutorials, webinars, and deep dives. For more information about Maltego, visit our website.
Homeland Security Investigations (HSI), the investigative unit of Immigration and Customs Enforcement (ICE), announced it initiated 4,224 child exploitation cases during the 2019 fiscal year, which began in October 2018 and concluded at the end of September. Those cases led to a total of 3,771 criminal arrests, and the identification or rescue of 1,066 victims. In this episode, The Pivot hosts and Maltego Subject Matter Experts Joe Ryan and Mario Rojas dive into the alarming topic: Child Sexual Abuse Material (CSAM) and how investigators and organizations can support the fight against it. They touch upon the following topics: 1. What technologies are involved in the production, identification, and detection of CSAM 2. Recent headlines that have to do with CSAM 3. How CSAM is investigated 4. What other types of CSAM are out there and where we can find information or reports about CSAM 5. How to prevent the spread of CSAM or get involved in the fight against CSAM ■ About The Pivot Brought to you by Maltego, The Pivot deep dives into topics pivoting from information security to the criminal underground. Each episode features interviews with experts from the industry and research fields and explores how they connect the dots. ■ About Maltego Used by investigators worldwide, Maltego is an graphical link analysis tool that allows users to mine, merge, and map data from OSINT and third-party data integrations for all sorts of investigations—cybersecurity, person of interest, fraud, and more. The podcast streams free on Spotify. You can also watch it all go down on YouTube. Don't forget to subscribe to our Twitter and LinkedIn to stay on top of our latest updates, tutorials, webinars, and deep dives. For more information about Maltego, visit our website.
Today we're joined by Roelof Temmingh. Roelof is the creator of OSINT tools you've certainly heard of such as Maltego and Vortimo. Roelof recently got to test Vortimo in the context of a Trace Labs CTF and his team placed very well. In this episode we discuss the history/inception of these tools as well as CTFs vs Real World investigations. Vortimo: https://www.vortimo.com/Blog post about competing in the CTF: https://www.vortimo.com/competing-in-the-tracelabs-ctf-26-march-2022/Want to learn more about Open Source Intelligence?Follow us on Twitter: @TraceLabsJoin our Discord server: https://tracelabs.org/discordCheck out the site: https://tracelabs.org
Scalper bots are designed to automatically buy a large amount of an exclusive item such as tickets, sneakers, or GPUs, often to resell them for profit. In this episode, The Pivot host, Bradley Taylor sits down with Maltego Subject Matter Experts Mathieu Gaucheler and Threat Intelligence Analyst Liv Rowley to explore the following aspects of the scalper bot world: How scalper bots work Trends & details of the products targeted by scalper bots Pricing & plans of the bots on the market Ways the bots bypass counter-measures ■ About The Pivot Brought to you by Maltego, The Pivot deep dives into topics pivoting from information security to the criminal underground. Each episode features interviews with experts from the industry and research fields and explores how they connect the dots. ■ About Maltego Used by investigators worldwide, Maltego is an graphical link analysis tool that allows users to mine, merge, and map data from OSINT and third-party data integrations for all sorts of investigations—cybersecurity, person of interest, fraud, and more. The podcast streams free on Spotify. You can also watch it all go down on YouTube. Don't forget to subscribe to our Twitter and LinkedIn to stay on top of our latest updates, tutorials, webinars, and deep dives. For more information about Maltego, visit our website.
Ritu Gill is an Intelligence Analyst with 14 years of experience working in open-source intelligence (OSINT). After a 12-year career with the Royal Canadian Mounted Police (RCMP), Ritu set up a consulting business providing OSINT training and research to law enforcement and related entities across North America. In this episode, Ritu shares her OSINT research, projects, journey, and experiences with The Pivot hosts Bradley Taylor and Maltego Subject Matter Expert Carlos Fragoso. ■ About The Pivot Brought to you by Maltego, The Pivot deep dives into topics pivoting from information security to the criminal underground. Each episode features interviews with experts from the industry and research fields and explores how they connect the dots. ■ About Maltego Used by investigators worldwide, Maltego is an graphical link analysis tool that allows users to mine, merge, and map data from OSINT and third-party data integrations for all sorts of investigations—cybersecurity, person of interest, fraud, and more. The podcast streams free on Spotify. You can also watch it all go down on YouTube. Don't forget to subscribe to our Twitter and LinkedIn to stay on top of our latest updates, tutorials, webinars, and deep dives. For more information about Maltego, visit our website.
George Webb shares his latest research into Steve Bannon's boy Robert Malone. Kris Hunter also jumps on to dig some Maltego dirt up on the Deep State. Buy George Webb Books: https://www.neighborhoodnewsstudio.com/george-webb-library Avenues to Support: George Webb - Venmo: https://venmo.com/GeoWebb N.N.S. Patreon: https://www.patreon.com/neighborhoodnewshour N.N.S. PayPay: https://paypal.me/NeighborhoodNews?locale.x=en_US N.N.S. Venmo: https://account.venmo.com/u/NeighborhoodNews Websites: George Webb: https://sites.google.com/view/neighborhoodnewshour/home Neighborhood News Studio: https://www.neighborhoodnewsstudio.com/ N.N.S. YouTube Channels: Research Road Show (George Webb): https://www.youtube.com/channel/UCG6hZda9_bjsjULKtCb5mhQ Eek Eek Airwaves (N.N.S. Citizen Journalists): https://www.youtube.com/channel/UCDhiz98BTFdDPNYZX-5Sabw McDuff Lives (John OLoughlin): https://www.youtube.com/channel/UCv8-vTnLWMXv32_6kh6xs7Q Twitter Handles: Neighborhood News Studio: https://twitter.com/HoodNewsStudio George Webb: https://twitter.com/RealGeorgeWebb1 Follow N.N.S. on Social Media: Twitter: https://twitter.com/HoodNewsStudio Gab: https://gab.com/NeighborhoodNewsStudio Facebook: https://www.facebook.com/NeighborhoodNewsStudio Instagram: https://www.instagram.com/neighborhoodnewsstudio/ Neighborhood News Studio Audio Only Apps: Apple Podcast App: https://podcasts.apple.com/us/podcast/neighborhood-news-studio/id1494786720 Spotify: https://open.spotify.com/show/76Ci4X5kF5EN5EOO7c2TIA?si=b9MTSXjFQI6Sfbxl6Lndyw iHeart Radio: https://www.iheart.com/podcast/269-neighborhood-news-studio-77350114/ Google Podcasts: https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL05laWdoYm9yaG9vZE5ld3NTdHVkaW8vZmVlZC54bWw Amazon Music: https://music.amazon.com/podcasts/f23ebcc6-a00b-47e7-be1f-c136a0b019fe/Neighborhood-News-Studio Pandora: https://www.pandora.com/podcast/neighborhood-news-studio/PC:46086 Stitcher: https://www.stitcher.com/podcast/liberty-sound-lab More N.N.S. Video Content: BitChute: https://www.bitchute.com/channel/i5lBkJKLR9BG/ Brand New Tube: https://brandnewtube.com/@NeighborhoodNewsHour UGETube: https://ugetube.com/@Neighborhood%20News%20Studio Rumble: https://rumble.com/account/content?type=all Twitch: https://www.twitch.tv/neighborhoodnewsstudios Brighteon: https://www.brighteon.com/channels/neighborhoodnews Communicate with Neighborhood News Studio: E-mail: NeighborhoodNewsStudio@gmail.com Telegram: @NeighborhoodNews
This week's guest is Emmanuelle Welch (@frenchpi) Emmanuelle Welch is a Licensed Private Investigator, Certified Fraud Examiner, and owner of French Connection Research, a private investigative agency in Brooklyn, NY, licensed in New York and Washington, DC. She specializes in white-collar crime investigations, cross-Atlantic litigation support and OSINT analysis. People in this Episode Nico Dekens (@DutchOSINTGuy) Lorand Bodo (@LorandBodo) Nixintel (@nixintel) Kirby Plessas (@kirbstr) John (@thegumshoo) Rae Baker (@wondersmith_rae) Links to what we discussed Emmanuelle's OSINT tools/resources start.me page for dating apps: https://start.me/p/VRxaj5/dating-apps-and-hook-up-sites-for-investigators Introduction to researching foreign influence in the US: https://osintcurio.us/2020/09/14/introduction-to-researching-foreign-influence-in-the-us/ NEW Twitter Analysis framework by @sowdust: https://github.com/sowdust/tafferugli OSINT Intelligence Cycle by @sinwindie: https://www.secjuice.com/the-osint-intelligence-cycle-part-i-planning-and-direction/ Maltego Transform for Telegram: https://twitter.com/noneprivacy/status/1304357985297346560?s=21 Using R to find stories in financial publicly available data: https://medium.com/@itoufexi/how-i-used-the-companies-house-streaming-api-to-find-a-newsworthy-story-a96d787955b2 How hackers can find sensitive information in your photos: https://medium.com/digital-marketing-lab/subtle-information-hackers-find-in-the-background-of-your-social-media-photos-938ec1876246 Interesting and detailed case study about what can be found with someone's passport number: https://mango.pdf.zone/finding-former-australian-prime-minister-tony-abbotts-passport-number-on-instagram Google Account Finder: https://tools.epieos.com/google-account.php Best investigative podcasts: https://gijn.org/2020/09/09/a-global-tour-of-top-investigative-podcasts-the-2020-edition/ Call for proposals for ConINT (@conint)_io: https://twitter.com/CONINT_io/status/1306676769718706181 Database of industrial designs data: https://twitter.com/navlys_/status/1306333649877504000 How to use industrial designs data for OSINT: https://keyfindings.blog/2020/05/03/using-the-wipo-ip-portal-for-osint/ --- Support this podcast: https://anchor.fm/osintcurious/support
This week's guest is Julia Bayer (@bayer_julia) Julia Bayer is an investigative journalist, innovation manager and trainer at Deutsche Welle. At DW´s Investigative unit she is diving deep online collecting publicly available sources to uncover the (in)visible using OSINT. Before that she researched and verified UGC for (breaking) news at DW´s Social Media Newsroom. People in this Episode Nico Dekens (@DutchOSINTGuy) Matthias Wilson (@mwOsint) Lorand Bodo (@LorandBodo) Nixintel (@nixintel) Sector035 (@sector035) Rae Baker (@wondersmith_rae) Links to what we discussed OSINTCurious blog post by Technisette: https://osintcurio.us/2020/09/28/when-there-is-no-google-earth-or-street-view-what-can-you-do/ Blog by Matthias Wilson: SOCMINT on foreign platforms: https://keyfindings.blog/2020/10/04/social-media-around-the-world/ Updated browser extension by OSINTSupport: https://osint.support/chrome-extensions/2019/09/29/osint-socmint-tooling.html Google dorks to access confidential information: https://benjaminstrick.com/dear-x-your-staff-passwords-numbers-and-confidential-data-is-on-google/ Blog post by Nixintel: https://nixintel.info/osint/do-dns-records-prove-that-jim-watkins-is-q/ Blog post by Rae Baker: https://medium.com/@raebaker/using-foca-for-osint-document-metadata-analysis-6745c8d709fa Search for emojis: https://www.fastemoji.com/ Update by Telegram: https://twitter.com/LorandBodo/status/1311591571498971136 2020 OSINT tools & resources handbook by @i_intelligence: https://i-intelligence.eu/resources/osint-toolkit FREE online investigative training course for journalists: https://twitter.com/KnightCenterUT/status/1312508586216497153 Create your own bookmarks database: https://www.aware-online.com/en/create-your-own-osint-database-with-bookmarks/ Thread on how to investigate websites: https://twitter.com/aware_online/status/1308312883248467975 How discover relationships between websites using Maltego: https://www.maltego.com/blog/tracing-internet-relationships-with-maltego/ --- Support this podcast: https://anchor.fm/osintcurious/support
Vamos falar d OSINT vamos falar de MALTEGO hahaha
Nerds of Law 11 – Der Hacker mit dem weißen Hut Wenn Peter Echer von LemonPi zu Besuch kommt und aus dem Nähkästchen plaudert, ist der “Explicit-Tag” nicht weit. Von der Suche nach geldgierigen Vampiren zu untreuen Ehefrauen und der Frage: Sind Macs wirklich besser als PCs? Wir lernen auch viel über IT Security und was die Ausbildung zum White Hat Hacker mit der Rechtsanwaltsprüfung zu tun hat. LemonPi https://www.lemonpi.at Maltego https://www.maltego.com Kali Linux https://www.kali.org Burp Suite https://portswigger.net/burp Hack 5 https://shop.hak5.org Rubber Duckie https://shop.hak5.org/products/usb-rubber-ducky-deluxe Firefly https://de.wikipedia.org/wiki/Firefly_–_Der_Aufbruch_der_Serenity Serenity https://de.wikipedia.org/wiki/Serenity_–_Flucht_in_neue_Welten Doctor Who https://de.wikipedia.org/wiki/Doctor_Who Salvation (Netflix) https://www.netflix.com/title/80171099 Subscribe to the Podcast RSS Feed https://nerdsoflaw.libsyn.com/rss Apple Podcast https://podcasts.apple.com/de/podcast/nerds-of-law-podcast/id1506472002 SPOTIFY https://open.spotify.com/show/12D6osXfccI1bjAzapWzI4 Google Play Store https://playmusic.app.goo.gl/?ibi=com.google.PlayMusic&isi=691797987&ius=googleplaymusic&apn=com.google.android.music&link=https://play.google.com/music/m/Idvhwrimkmxb2phecnckyzik3qq?t%3DNerds_of_Law_Podcast%26pcampaignid%3DMKT-na-all-co-pr-mu-pod-16 YouTube https://www.youtube.com/playlist?list=PL7rmwzBy-IRGh8JkLCPIjyGMA-nHMtiAC Deezer https://www.deezer.com/de/show/1138852 Nerds of Law http://www.nerdsoflaw.com https://twitter.com/NerdsOfLaw https://www.instagram.com/nerdsoflaw/ https://www.facebook.com/NerdsOfLaw/ Music by Mickbordet www.mickbordet.com
OSINT with ShadowDragon & Digital Tools For Modern Investigations
*A variety of topics are covered in this episode. * * Candor on the Infosec industry. * VC Trends & Startup trends. * Tools vs. Process. * Brian Dykstra, shares some of the high's and low's after doing forensics for the last 24 years. * If you don't have a CSI room while doing forensics, you are totally lame. * Hotness with getting 500g/sec on forensic image acquisition. * Evaluating Sandbox technologies in use. What is hot or not. ThreatGrid, Joe's Sandbox, or bare metal. Dan's Inbox review: * Casemanagement vs. Target centric analysis. * Alternatives to Maltego, pros/cons. Tools mentioned Kaseware, Kivutech, Datawalk, i2, etc. * Vc's falling into "Platform" trap, versus understanding data sales market.
Welcome to the Second episode of The Cybrary Battle Royale Podcast Series lead by Atlantic Data Forensics CEO Brian Dykstra. Speaking with Brian is, John Hall VP at CBRE, Linda Martinez the Director of Security and Privacy at Protiviti, and Philip Mayrhofer the CEO of Maltego. Brian leads this All Star live discussion recoded during an event at RSA about how seeing the smaller companies on the floor can be more beneficial than the larger booths.
People in this Episode: Micah Hoffman (WebBreacher) Dutch_Osintguy Matthias Wilson (MwOsint) Nixintel Sector035 Special Guest: Jeff Lomas (@BleuBloodHound) Links to what we discussed: Jeff Lomas talked about his blog on cell tower info, DFIR and OSINT https://osintcurio.us/2019/08/19/making-sense-of-osint-cell-tower-data-for-dfir/ People being monitored by the geotagged social media trough Echosec https://twitter.com/KarlSwannie/status/1233092121822978048 An semi automated website for lookups on a domain, ip or email. Covers dns, location, whois and more. Opsec! don't know if requests are tracked https://synapsint.com/ OSINT CTF that gives people a chance to practice their skills. It covers a wide range of areas like government databases, social media, archived websites as well as some basic digital forensic and cyber security knowledge. https://ctf.cybersoc.wales/ Vis graphing tool for win, linux and osx in beta. Sort of Maltego alternative made with help of occrp.vis.com https://docs.alephdata.org/guide/vis-desktop Guideline by US DoJ : Legal Considerations when Gathering Online Cyber Threat Intelligence and Purchasing Data from Illicit Sources https://www.justice.gov/criminal-ccips/page/file/1252341/download Useful to manually create charts in your OSINT investigations https://www.draw.io/ Bram (Aware Online) has been on fire this week, posting lots of quick OSINT tips. Might be worth a shout-out https://twitter.com/aware_online Great detailed blog on how to build your own web scraper using Python https://hackernoon.com/how-to-build-a-web-scraper-with-python-step-by-step-guide-jxkp3yum TikTok OSINT thread https://twitter.com/summer__heidi/status/1234308465662627840 The Cyber Intelligence Analyst Cookbook has some good information about CTI and OSINT process and analysis. https://github.com/open-source-rs/The-Cyber-Intelligence-Analyst-Cookbook/ Scrapy: An open source and collaborative framework for extracting the data you need from websites. https://scrapy.org/ Skills Demo: Matthias a.k.a MWOsint – https://keyfindings.blog/2020/03/08/using-the-microsoft-video-indexer-for-osint/ demo Self Promotion: Dutch_OsintGuy added new events to his website for several trainings and workshops https://dutchosintguy.com/events-and-blogs/ Dutch_Osintguy : Workshop understanding Google's search results and advanced searching techniques workshop (Dutch language only) together with Aware Online. March 20th in Amsterdam. https://www.aware-online.com/workshop-google-voor-gevorderden/ Micah (WebBreacher) has multiple SANS SEC487 live classes (https://sans.org/sec487) coming up in the coming months and is looking forward to the GIAC GOSI OSINT certification (https://giac.org/gosi) moving into beta testing in April. --- Support this podcast: https://anchor.fm/osintcurious/support
Check out Maltego: https://www.maltego.com/Maltego Twitter: https://twitter.com/maltegohqCheck out Maltego use cases: https://docs.maltego.com/support/solutions/articles/15000012022-use-cases This podcast is brought to you by Varonis, if you'd like to learn more check out the Cyber Attack Lab at https://www.varonis.com/cyber-workshop/
In questa puntata, ospite Leonida Reitano, che ci racconta cos'è Maltego.
This week's Tools, Tips and Tricks episode goes over a social engineering recon tool. Maltego CE, Community Edition, is the tool of choice for information gathering on websites, companies, people and more. The first step to a penetration test is recon, information gathering, identify all aspects of your target to profile them. The episode goes through Maltego CE and lets you know what you can do with it and why a tool like this is important. NEW LINKS - CE registration: https://www.maltego.com/ce-registration/ Downloads: https://www.maltego.com/downloads/ Be aware, be safe. ------------------------------------ Website - https://www.binaryblogger.com Podcast Page - http://securityinfive.libsyn.com Podcast RSS - http://securityinfive.libsyn.com/rss Twitter @binaryblogger - https://www.twitter.com/binaryblogger iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2 YouTube - https://www.youtube.com/binaryblogger TuneIn Radio - Security In Five Channel Spotify - Security In Five Podcast Page Email - contactme@binaryblogger.com
Today I had an interesting conversation with Ken Westin. Ken is commonly referred to as ‘The Good Hacker’ and has spent the past 15 years working with law enforcement and research teams to analyze current and emerging threats to determine how our everyday products and gadgets can mitigate these threats. He is regularly reached out to as a subject matter expert in the area of security, privacy and surveillance technologies. In our industry people do a lot of talking about how they want to stop cyber security threat, developing technologies they hope will stop threats, but rarely do you actually come in contact with people actually demonstrating a track record of success thwarting, mitigating and bringing people to justice. This episode is sponsored by the CIO Scoreboard What you will learn from this interview: The secret lives of applications that live on our phones. What information are these apps gathering that we’re not aware of and where exactly is that information going? How can this information be used against us and why are these data harvesting protocols not mentioned in the privacy policy or terms of conditions of many apps? Black Hat tools and where to find them to see what your adversary sees about YOU! Questions that Boards should ask about what information that they are tracking about customers The importance of education and security Efficacy and relevance of Cyber Liability Insurance The Cybersecurity elephant in the room: companies tracking and selling our private information Orchestrating threat intelligence by automating and tracking compliance workflows The importance of Data Security Analytics If you are not investing in a product or app then you are the product How to get in touch with Ken: Twitter LinkedIn About me Profile RSA Profile RSA Conference Session – Killing the Kill Chain LinkedIn Published Articles Ken Podcast I enjoyed at Tripwire site BBC article – “I’m a professional cyberstalker” Mobile Privacy articles Defcon Talk: Confessions of a Professional Cyber Stalker Resources Mentioned: USBhacks ID Experts – Radar product – Helps with hi profile breach cleanup cases Kali Linux Distribution Offensive Security Tripwire– Automation of Security Compliance + Workflow OpenDNS Passive Reconnaissance Maltego Tripwire STIX TAXII FS-ISAC Soltra Bill’s interview with Aharon Chernin, CTO of Soltra Summarized Show Notes: How Ken got started in the technology world and different technology he developed to aid in theft recovery Empowering people with technology. Criminals take the fun out of technology, dealing with hackers in particular. Ransomware - impact on business. Consumers are now able to defend themselves in a hostile environment Being knowledgeable about what is possible and raising people’s awareness makes a difference. One of the biggest threats right now is marketing departments that develop spyware and gather information through apps, ad libraries. A lot of information is being harvested from our phones If you’re not paying for the product, you are the product Hackers are not the ones that collected the information from people. So how can we secure the information? We need to ask ourselves - what information do we need to collect in order to do business? Companies are collecting information with immunity. If you are collecting that information - you need to be responsible for what you do with it. Mobile software for tracking stolen devices and camera recovery, there’s always a trace Passive Reconnaissance – it’s amazing how much information you can gather through this without touching the network. Can scan network for vulnerabilities without touching it. Just through DNS records, could map Infrastructure, IP ranges, harvest information through LinkedIn. From there, he could identify the technologies he would run into when inside the network. Hackers involved in the Target breach – they did their homework, they could identify who their business partners were and send phishing emails How can one map the network without touching it, inside the firewall? Identify the IP ranges they are dealing with Through DNS records - identify 3rd party vendors - HR Services, subdomains for special one off projects, marketing projects, Salesforce etc. Trusted business partners and vendors Maltego - tool for open source intelligence gathering and threat intelligence integrations Recommendations for a security beginner trying to understanding an external view Offensive security and penetration testing tools and training resources, videso and tools for open source intelligence gathering Key points: awareness and security training in general In security, we like to learn, that’s why we’re good at what we do and I think everyone in the business needs to take that on. Ignorance is no longer an excuse especially on the business side We’re seeing a lot more boards care about security, investors and startups caring about security Boards asking about cyber liability insurance With cyber liability insurance, there isn’t a lot of data, a lot of it is guessing and with that, a lot of exclusions that get included from these policies and now with the breaches With the recent breaches we’ve seen, between Target and Sony, they’re seeing that the cost of a data breach is higher than originally thought when you start to think about lawsuits and identify theft insurance. Insurance companies are starting to put a cap on how much they’re liable for. Need to secure your infrastructure before you get your cyber liability insurance Marrying real security rules - configuration of compliance and real security. Data Analytics - Security Analytics is key. Being able to correlate the data is the challenge to identify the real threat to the environment. Starting to see more correlation between vendors, more open source for threat intelligence Vendors bringing in data scientists with the data they collect and making it easier on the clients to identify anomalies and the signal to noise ratio How does Ken see the space maturing to a point which is meaningful to a small to medium business? Tools such as Open DNS, taking complexity away from the businesses. But business can leverage the big data and threat intelligence. Larger businesses will have to have their own teams. Make sure to identify what's happening in their own network. STIX/TAXII integration – more and more vendors will start to use this and businesses need to ask their vendors if they are compliant with STIX and TAXII A lot of industry clout with Soltra and FS-ISAC. Mitigate threats and share information. 46:36 The devil's in the data. Being able to make sense of the data. Harvest the data. There is data there telling you a story, just a matter of you finding it. Harvest the data. This episode is sponsored by the CIO Scoreboard All methods of how to access the show are below: Listen on iTunes (for iPhones etc.) Listen to it on Stitcher (This is for Android Phone Users. Download the Stitcher app here) Stream it on Libsyn Listen to it on Soundcloud (This is for listening via PC/Mac Browser) Please subscribe here to Bill Murphy’s Redzone Podcast on iTunes Subscribe to my RSS Feed here LinkedIn blog post Leave a podcast review here How do I leave a review? Bill Murphy is a world renowned IT Security Expert dedicated to your success as an IT Business Leader. Follow Bill on LinkedIn and Twitter.
Rolaf&Andrew (Paterva) talk Maltego, Fun with trucks&guns, More Blue Lasers, Tiger Team Rip-off, Trying to take out Bin Laden, Drinking&Writing, and more of the EL you love Intro "Bottom Line" by Swollen Members Outro "Eat Da Poo Poo" by BartBaKer
Rolaf&Andrew (Paterva) talk Maltego, Fun with trucks&guns, More Blue Lasers, Tiger Team Rip-off, Trying to take out Bin Laden, Drinking&Writing, and more of the EL you love Intro "Bottom Line" by Swollen Members Outro "Eat Da Poo Poo" by BartBaKer
Roelof Temmingh and his henchman "Andrew" from Paterva / Maltego discuss penetration testing evolutions, information gathering, drinking, and the latest features in the soon to be released version 3 of Maltego! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian, John Strand, Mick Douglas, Carlos "Dark0perator" Perez
Panelists: Ron Gula, Tenable Network Security Mandeep Khera, Cenzic Martin McKeay, Network Security Podcast Rich Mogull, Network Security Podcast/Securosis Anton Chuvakin, Qualys Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Quench your thirst for knowledge at www.syngress.com and use the discount code to save 20% of all security book titles! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian, John Strand, Mick Douglas Audio Feeds:
Special guest Tom Eston From Security Justice Podcast, SQmap tech segment. Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Quench your thirst for knowledge at www.syngress.com and use the discount code to save 20% of all security book titles! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian, John Strand, Mick Douglas
Special guest Harlan Carvey talks Windows forensics, W3af Part II. Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Quench your thirst for knowledge at www.syngress.com and use the discount code to save 20% of all security book titles! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes "Security Weekly Foresics Exam" Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian, John Strand, Mick Douglas
The Security Weekly crew are over 9 hours into the 12 hour marathon and talking to Stephen Northcutt! We also have a great segment on Google Hacking. This is just the "show" portion of the episode, look for the other segments in the coming weeks. Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Quench your thirst for knowledge at www.syngress.com and use the discount code to save 20% of all security book titles! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian, John Strand, Mick Douglas
The Security Weekly crew drink, hack, and get merry with our new sponsor Cenzic, we teach you about Argus and UPnP Nmap hacking, and announce our 12 Hour podcast! Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian, John Strand
Paul's laptop lives, but the soundboard doesn't, talking shop about MQ series and security FAIL, sniff wireless on all 14 channels AT THE SAME TIME! All brought to you by the fine acoustic sound of the McDonald's drive-thru. Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian, John Strand Email: psw@securityweekly.com Direct Audio Download Audio Feeds:
This week we have special guests from www.i-hacked.com, the show gets hijacked, Paul's laptop gets thirsty, one crazy show! Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian, John Strand
This week we have special guests, Hal Pomeranz and Ed Skoudis will be joining us to talk about the Command Line Kung Fu blog! Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian, John Strand
Paul, Larry, and John welcome special guests, Jonathan Ham, SANS instructor/owner of Jham Corp and Sherri Davidoff, blogger at philosecurity.org/owner of Davidoff Information Security Consulting! Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian, John Strand
Paul, Larry, and John are together in the same room for the first time podcasting live from SANS Orlando 2009! Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian, John Strand
Paul, Larry and John talkin' security and memory dumping with special guest Marcus Carey! Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian, John Strand
Paul, Larry and John talkin' security and WMIC with special guest Mick! Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian, John Strand
Paul, Larry and John rappin' security Special guest Shlomo from Israel! Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian, John Strand
Paul and Larry talk coming at you live from Shmoocon 2009! Special guests include Marcus Carey, Johnny Long, Listener Karl, Mubix, and Matthew Carpenter! Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian, John Strand
Paul and Larry talk security! Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian, John Strand
Paul, Larry, and John talk security! Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian, John Strand
Paul, Larry, and John talk security with Dave Shackleford! Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian, John Strand Email: psw@securityweekly.com Direct Audio Download Audio Feeds:
Paul, Larry, and John talk security! Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian, John Strand
Paul, Larry, and John talk security with Eric Cole! Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian, John Strand
Paul, Larry, and John talk security! Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian, John Strand
Paul, Larry, and John talk security with special guests from Microsoft! Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian, John Strand
Paul, Larry, and John talk security with special guest Dan Hoffman! Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian, John Strand
Paul, Larry, and John talk security! Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian, John Strand
Paul, Larry, and John talk security with special guest Marcus Ranum! Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian, John Strand
Paul & Larry talk security with special guest Andre Dimino! Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian
Paul & Larry talk security with special guest John Strand! Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Astaro, download a free trial of the Astaro Security gateway today! Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian
Paul & Larry discuss security, hash, rubber chickens, religion, politics, and American history (Yes, I'm convinced no one reads what I type here ;) Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Astaro, download a free trial of the Astaro Security gateway today! Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian
In Part II we discuss stories and bring on none other than Josh Wright to talk about some of the latest attacks against TKIP. We are still working on the sound quality problems, swapped out a few cables this week and it helped. The intro to the show is messed up and Larry and I are only on the left channel, this does NOT persist throughout the entire episode. Please bare with us while we work towards better sound quality. Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Astaro, download a free trial of the Astaro Security gateway today! Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian Email: psw@securityweekly.com Direct Audio Download Audio Feeds:
In Part I of this week's episode we are joined by Bill Brenner, talking to us and the listeners about the best ways to sell security to upper management. In Part II we discuss stories and bring on none other than Josh Wright to talk about some of the latest attacks against TKIP. We are still working on the sound quality problems, swapped out a few cables this week and it helped. The intro to the show is messed up and Larry and I are only on the left channel, this does NOT persist throughout the entire episode. Please bare with us while we work towards better sound quality. Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Astaro, download a free trial of the Astaro Security gateway today! Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian
We are still working on the sound quality problems and have yet even more equipment to replace, so next episode we should have it all worked out (I hope). Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Astaro, download a free trial of the Astaro Security gateway today! Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian
Larry does a tech segment, and we discuss the stories for the week. Again, apologize for the sound quality. Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Astaro, download a free trial of the Astaro Security gateway today! Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian
We are joined by two special guests, Larry does a tech segment, and we discuss the stories for the week. I do apologize for the sound quality, we are still working some of the kinks out of our new system. We will be replacing the recording laptop for next week, which seems to have been the cause of the background noise. Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Astaro, download a free trial of the Astaro Security gateway today! Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian
Paul and Larry are in the studio with special guest Ed Skoudis! Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Astaro, download a free trial of the Astaro Security gateway today! Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian
Paul and Larry are in the studio with special guest Ed Skoudis! Simcard Forensics, An Adventure in Information Gathering Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Astaro, download a free trial of the Astaro Security gateway today! Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian
Live from SANS Las Vegas! Be certain to download Larry's presentation that is associated with this episode: Simcard Forensics, An Adventure in Information Gathering Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Astaro, download a free trial of the Astaro Security gateway today! Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian
Paul & Larry continue penetration testing discussions with Core and discuss the stories for the week! Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program and sign up for SEC535 - Network Security Projects Using Hacked Wireless Routers Today! Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Sponsored by Astaro, download a free trial of the Astaro Security gateway today! Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian
Paul talks Metasploit and Core comes on the show to talk shop! Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program and sign up for SEC535 - Network Security Projects Using Hacked Wireless Routers Today! Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Sponsored by Astaro, download a free trial of the Astaro Security gateway today! Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian
Paul & Larry interview Fyodor (Part II), Fyodor critiques Paul's Nmap Foo, and we discuss stories... Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program and sign up for SEC535 - Network Security Projects Using Hacked Wireless Routers Today! Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Sponsored by Astaro, download a free trial of the Astaro Security gateway today! Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian
Paul & Larry interview Fyodor, author of Nmap! Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program and sign up for SEC535 - Network Security Projects Using Hacked Wireless Routers Today! Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Sponsored by Astaro, download a free trial of the Astaro Security gateway today! Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian
Paul & Larry interview Jay "MF" Beale, get a visitor from Kalamazoo, and much more! Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program and sign up for SEC535 - Network Security Projects Using Hacked Wireless Routers Today! Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Sponsored by Astaro, download a free trial of the Astaro Security gateway today! Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian
Paul & Larry discuss stories with the visitor from Kalamazoo, and much more! Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program and sign up for SEC535 - Network Security Projects Using Hacked Wireless Routers Today! Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Sponsored by Astaro, download a free trial of the Astaro Security gateway today! Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian