POPULARITY
What if you could have a conversation with yourself—years into the future? Or leave behind an AI-powered avatar that understands your thoughts, philosophies, and even your voice? In this episode, we explore the mind-blowing potential of AI and its impact on cybersecurity, productivity, and even legacy. Pedram Amini, Chief Scientist at OPSWAT, joins Ron Eddings to discuss his journey from bootstrapped startups to AI-driven innovation. Together they cover topics like the role of AI in cybersecurity, the rise of fake identities in hiring, the ethics of AI-generated content, and why mastering AI tools is no longer optional—it's essential. Pedram shares his workflow for superhuman productivity, his thoughts on deepfakes, and how AI is reshaping how we work and communicate. Impactful Moments: 00:00 - Introduction 02:00 - Meet Pedram Amini, cyber innovator 03:07 - The $17M North Korea insider threat case 06:00 - Fake job candidates and AI hiring scams 09:28 - Deepfakes and AI-driven deception 14:00 - Future of AI-powered personal assistants 20:49 - The reality of bootstrapping vs. VC funding 26:00 - AI in cybersecurity: risk or revolution? 31:00 - “AI isn't taking your job—someone using AI is” 35:00 - The ultimate AI-powered legacy project Links: Connect with our guest, Pedram Amini: https://www.linkedin.com/in/pedramamini/ Check out the entire article about the $17M North Korea insider threat case here: https://www.theregister.com/2025/02/12/arizona_woman_laptop_farm_guilty/ Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
The Chief Technology Officer of Inquest, Pedram Amini joins host George Rettas on Episode #192 of Task Force Radio to talk about the recent high profile ransomware attacks, why ransomware attacks are so successful, both from an attacker perspective and the practitioner's perspective, and he also breaks down what companies can do to harden then security postures against these types of the attacks. Amini also broke down the Trystero Project and his passion for research and development into the most recent malware tactics the bad guys are using. All this and much, much more on Episode #192 of Task Force 7 Radio.
The Chief Technology Officer of Inquest, Pedram Amini joins host George Rettas on Episode #192 of Task Force Radio to talk about the recent high profile ransomware attacks, why ransomware attacks are so successful, both from an attacker perspective and the practitioner's perspective, and he also breaks down what companies can do to harden then security postures against these types of the attacks. Amini also broke down the Trystero Project and his passion for research and development into the most recent malware tactics the bad guys are using. All this and much, much more on Episode #192 of Task Force 7 Radio.
The Chief Technology Officer of Inquest, Pedram Amini joins host George Rettas on Episode #192 of Task Force Radio to talk about the recent high profile ransomware attacks, why ransomware attacks are so successful, both from an attacker perspective and the practitioner's perspective, and he also breaks down what companies can do to harden then security postures against these types of the attacks. Amini also broke down the Trystero Project and his passion for research and development into the most recent malware tactics the bad guys are using. All this and much, much more on Episode #192 of Task Force 7 Radio.
The Chief Technology Officer of Inquest, Pedram Amini joins host George Rettas on Episode #192 of Task Force Radio to talk about the recent high profile ransomware attacks, why ransomware attacks are so successful, both from an attacker perspective and the practitioner's perspective, and he also breaks down what companies can do to harden then security postures against these types of the attacks. Amini also broke down the Trystero Project and his passion for research and development into the most recent malware tactics the bad guys are using. All this and much, much more on Episode #192 of Task Force 7 Radio.
The Chief Technology Officer of Inquest, Pedram Amini joins host George Rettas on Episode #192 of Task Force Radio to talk about the recent high profile ransomware attacks, why ransomware attacks are so successful, both from an attacker perspective and the practitioner's perspective, and he also breaks down what companies can do to harden then security postures against these types of the attacks. Amini also broke down the Trystero Project and his passion for research and development into the most recent malware tactics the bad guys are using. All this and much, much more on Episode #192 of Task Force 7 Radio.
The Chief Technology Officer of Inquest, Pedram Amini joins host George Rettas on Episode #192 of Task Force Radio to talk about the recent high profile ransomware attacks, why ransomware attacks are so successful, both from an attacker perspective and the practitioner's perspective, and he also breaks down what companies can do to harden then security postures against these types of the attacks. Amini also broke down the Trystero Project and his passion for research and development into the most recent malware tactics the bad guys are using. All this and much, much more on Episode #192 of Task Force 7 Radio.
The Chief Technology Officer of Inquest, Pedram Amini joins host George Rettas on Episode #192 of Task Force Radio to talk about the recent high profile ransomware attacks, why ransomware attacks are so successful, both from an attacker perspective and the practitioner's perspective, and he also breaks down what companies can do to harden then security postures against these types of the attacks. Amini also broke down the Trystero Project and his passion for research and development into the most recent malware tactics the bad guys are using. All this and much, much more on Episode #192 of Task Force 7 Radio.
In this episode of Hack Chat, we dive deep into finding bugs, fuzzing and how Pedram Amini started ZDI while also discussing how he’s bootstrapped two companies. Pedram is a security researcher, published author, founder, investor, advisor, and hacker of all things. He has a strong background in reverse engineering and creative problem-solving skills. He has presented a variety of research at security conferences such as BlackHat, DefCon, RECon, Ekoparty, Microsoft Bluehat, ShmooCon, ToorCon, Virus Bulletin; and taught numerous sold-out courses on reverse engineering. Learn more about Hack Chat: https://www.sentinelone.com/lp/hackchat Learn more about SentinelOne: https://www.sentinelone.com
The Chief Technology Officer for InQuest, Pedram Amini breaks down why email security is still a huge issue for most businesses, what types of email attacks are prevalent in the market today, and how corporations can defend themselves against these resilient attacks. Amini also unpacks the email technologies provided by Microsoft and Google, which one of them have more effective email security, and the projects and technologies he has developed to fight the good fight against one of the biggest attack vectors used by Cyber Organized Criminals today.
The Chief Technology Officer for InQuest, Pedram Amini breaks down why email security is still a huge issue for most businesses, what types of email attacks are prevalent in the market today, and how corporations can defend themselves against these resilient attacks. Amini also unpacks the email technologies provided by Microsoft and Google, which one of them have more effective email security, and the projects and technologies he has developed to fight the good fight against one of the biggest attack vectors used by Cyber Organized Criminals today.
NCSC and CISA issue a joint warning on cyber threats during the COVID-19 pandemic. India’s government seeks to limit disinformation in social media. Zoom works on privacy issues, and government contact-tracking apps face their own problems. A new DDoS botnet, “dark_nexus,” is out. BGP hijack questions persist. Is a front company facilitating Chinese government RATs? Spies and spyware. And a biometric advance leads from the rear. Joe Carrigan from JHU ISI on how COVID-19 is reinforcing TLS 1.0, guest is Pedram Amini from InQuest on winning the Cyber Tank contest. For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_08.html
Pedram Amini, the Chief Technology Officer of InQuest, appears on Episode no 97 of Task Force 7 Radio to give listeners an inside view of the world of a hacker. Amini starts off by defining a hacker, a vulnerability, an exploit, reverse engineering and fuzzing to give the audience a common foundation for the discussion. In the second and third segments of the show, he gets into specifics regarding the economics of the underground vulnerability markets, what are the hardest and easiest platforms to compromise, how he successfully launched and exited his startup Jumpshot, and what his job at InQuest entails today. Amini wrapped up the dialogue by providing insight into the risks associated with emerging technologies like self driving cars, the dangers of Cyber Warfare and capabilities of Nation State Actors in the world, and the ever so important topic of election security.
Pedram Amini, creator of the Zero Day Initiative, talks about how phishing has changed — and stayed the same — over recent years.
Black Hat Briefings, USA 2007 [Video] Presentations from the security conference.
Face it, fuzzing sucks. Even the most expensive commercial fuzzing suites leave much to be desired by way of automation. Perhaps the reason for this is that even the most rudimentary fuzzers are surprisingly effective. None the less, if you are serious about fuzz testing in as much a scientific process as possible than you have no doubt been disappointed with the current state of affairs. Until now. This talk is about Sulley. An open source, freely available, full featured and extensible fuzzing framework being released at Black Hat US 2007. Modern day fuzzers are, for the most part, solely focused on data generation. Sulley does this better and more. Sulley watches the network and methodically maintains records. Sulley instruments and monitors the health of the target, capable of reverting to a good state using multiple methods. Sulley detects, tracks and categorizes detected faults. Sulley can fuzz in parallel, significantly increasing test speed. Sulley can automatically determine what unique sequence of test cases trigger faults. Sulley does all this, and more, automatically and without attendance
Black Hat Briefings, USA 2007 [Audio] Presentations from the security conference.
Face it, fuzzing sucks. Even the most expensive commercial fuzzing suites leave much to be desired by way of automation. Perhaps the reason for this is that even the most rudimentary fuzzers are surprisingly effective. None the less, if you are serious about fuzz testing in as much a scientific process as possible than you have no doubt been disappointed with the current state of affairs. Until now. This talk is about Sulley. An open source, freely available, full featured and extensible fuzzing framework being released at Black Hat US 2007. Modern day fuzzers are, for the most part, solely focused on data generation. Sulley does this better and more. Sulley watches the network and methodically maintains records. Sulley instruments and monitors the health of the target, capable of reverting to a good state using multiple methods. Sulley detects, tracks and categorizes detected faults. Sulley can fuzz in parallel, significantly increasing test speed. Sulley can automatically determine what unique sequence of test cases trigger faults. Sulley does all this, and more, automatically and without attendance