Podcasts about white hat hacker

  • 61PODCASTS
  • 76EPISODES
  • 49mAVG DURATION
  • ?INFREQUENT EPISODES
  • Mar 19, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about white hat hacker

Latest podcast episodes about white hat hacker

The Agenda Podcast: Decoding Crypto
Lazarus Group's $1.4B Bybit hack is just the beginning (feat. CertiK)

The Agenda Podcast: Decoding Crypto

Play Episode Listen Later Mar 19, 2025 35:07


CertiK chief business officer Jason Jiang shares the nitty gritty on how North Korea's Lazarus Group stole $1.4 billion in ETH-related tokens from Bybit, who is ultimately at fault, and what the crypto industry and investors can do to protect themselves against the next major hack. (00:00) Introduction to The Agenda podcast and this week's episode(02:17) How Lazarus Group hacked Bybit (07:17) Are hard wallets and cold wallets safe from hacks?(09:19) How AI and quantum computing could compromise blockchains(12:24) Who is most at fault for the Bybit hack?(16:05) Is THORChain facilitating crime or abiding by the rules of decentralization?(18:46) How smart contract audits work(23:31) Securing AI and planning for the quantum computing Cambrian explosion(26:02) Is there a white hat hacker shortage?(30:34) The future of onchain securityThe Agenda is brought to you by Cointelegraph and hosted/produced by Ray Salmond and Jonathan DeYoung, with post-production by Elena Volkova (Hatch Up). Follow Cointelegraph on X (Twitter) at @Cointelegraph, Jonathan at @maddopemadic and Ray at @HorusHughes. Jonathan is also on Instagram at @maddopemadic, and he made the music for the podcast — hear more at madic.art.Check out Cointelegraph at cointelegraph.com.If you like what you heard, rate us and leave a review!The views, thoughts and opinions expressed in this podcast are its participants' alone and do not necessarily reflect or represent the views and opinions of Cointelegraph. This podcast (and any related content) is for entertainment purposes only and does not constitute financial advice, nor should it be taken as such. Everyone must do their own research and make their own decisions. The podcast's participants may or may not own any of the assets mentioned.

No Password Required
No Password Required Podcast Episode 54 — Dr. Sunny Wear

No Password Required

Play Episode Listen Later Dec 10, 2024 51:24


summaryIn this episode, the conversation begins with a significant data breach at Star Health Insurance, affecting over 31 million individuals. The discussion delves into the complexities of insider threats, particularly focusing on the alleged involvement of the company's CISO. The episode transitions to an introduction of Dr. Sunny Ware, a web application penetration tester, who shares her journey from software development to cybersecurity. Dr. Sunny discusses her role in penetration testing, the importance of understanding application logic, and the use of AI in her work. The episode concludes with a lifestyle polygraph segment, where Dr. Sunny shares personal insights and experiences, emphasizing the importance of mentorship in cybersecurity.  takeawaysStar Health Insurance experienced a major data breach affecting millions.Insider threats are predicted to be a significant risk in 2025.Dr. Sunny Ware transitioned from software development to cybersecurity.Understanding application logic is crucial in penetration testing.AI can be a valuable tool in penetration testing.Bug bounty programs offer focused opportunities for security testing.Mentorship is important for the next generation of cybersecurity professionals.Dr. Sunny emphasizes the creativity involved in coding and security.Vulnerability disclosure programs differ from bug bounty programs.Dr. Sunny's passion for teaching and sharing knowledge is evident.titlesThe Star Health Insurance Data Breach: A Deep DiveInsider Threats: The New Face of Cybersecurity RisksMeet Dr. Sunny Ware: A Cybersecurity TrailblazerThe Art of Penetration Testing with Dr. SunnyExploring AI's Role in Cybersecuritysound bites"Star Health Insurance suffered a significant data security incident.""There's a hacker and then there's this kind of cool insider twist.""The alleged hackers claimed that Star Health's CISO facilitated the breach.""Insider threats are going to be the risk to prepare for in 2025.""I came from very humble beginnings.""I think coding is like making a painting on a blank canvas.""I want to capitalize on the experience I already have in web API.""I use AI almost every day on every pen test.""I actively do bug hunting.""I want to make sure that if there's anything I can share to help."chapters00:00 Data Breach at Star Health Insurance06:06 Insider Threats and Whistleblowers07:05 Introduction to Dr. Sunny Ware30:14 Dr. Sunny's Career Path and Penetration Testing37:00 Lifestyle Polygraph with Dr. Sunny48:55 Key Takeaways and Closing Thoughts

No Password Required
No Password Required Podcast Episode 53 — Confidence Staveley

No Password Required

Play Episode Listen Later Oct 24, 2024 35:14


SummaryIn this episode, the hosts discuss the importance of representation in cybersecurity, highlighting a documentary that showcases the experiences of women and underrepresented groups in the industry. They are joined by Confidence Stavely, founder of the CyberSafe Foundation, who shares her personal journey from a victim of cybercrime to a leader in promoting digital safety and inclusion in Africa. The conversation explores themes of overcoming challenges, the significance of passion in career choices, and the responsibilities of leadership in creating opportunities for others. Confidence also discusses her creative approach to making complex topics accessible through her YouTube series, API Kitchen, and emphasizes the importance of mobilizing resources to empower the next generation in tech.TakeawaysThe documentary highlights the importance of representation in cybersecurity.There are solutions to the challenges faced by underrepresented groups.Personal experiences can drive a passion for change in the industry.Education is a key factor in overcoming barriers to entry in tech.Leadership should focus on values and empowering team members.Creativity can be a powerful tool in communicating complex ideas.API Kitchen was created as a response to gender stereotypes in tech.Cybersecurity skills can significantly change lives and communities.It's essential to hold the door open for others in the industry.Passion is a driving force behind career success.Chapters00:00 The Impact of Representation in Cybersecurity05:47 Confidence Stavely's Journey and CyberSafe Foundation12:00 Overcoming Challenges and Pursuing Passion18:00 Leadership and Responsibility in Cybersecurity24:12 Creativity and Communication in Tech29:46 Personal Growth and Future Aspirations

Trust Issues
EP 64 - Identity Reinvention: Insights From the World's First Augmented Ethical Hacker

Trust Issues

Play Episode Listen Later Oct 23, 2024 50:00


In this episode of the Trust Issues Podcast, host David Puner sits down with CyberArk's resident technical evangelist, white hat hacker and transhuman, Len Noe. They dive into Len's singular journey from a black hat hacker to an ethical hacker, exploring his identity reinvention and the fascinating world of subdermal microchip implants and offensive security. Len shares insights from his new book, "Human Hacked: My Life and Lessons as the World's First Augmented Ethical Hacker," which releases on October 29. They also discuss the relevance of Len's transhuman identity to his work in identity security.

The Money Jar
#208: Learn about Warren Buffett; Dialysis Technician Jameson Futter

The Money Jar

Play Episode Listen Later Jul 24, 2024 22:33


In this episode, we'll learn about Warren Buffett, one of the most successful investors in history; we'll talk with Jameson Futter about his career as a dialysis technician; and we'll find out what a white hat hacker is. 

What's Up Next Podcast
542. Lessons From a White Hat Hacker w/ Garrett Gee

What's Up Next Podcast

Play Episode Listen Later Jul 15, 2024 45:44


Garrett Gee was pulled out of high school to go work for a governmental agency to crack cybersecurity systems. Today, we discuss his book, The Hacker Mindset, and how we can bring a better understanding of systems into winning at every day life. Listen as he describes how we can all get ahead. Learn more about your ad choices. Visit megaphone.fm/adchoices

Digitale Optimisten: Perspektiven aus dem Silicon Valley
Unicorn Ideas: ChatGPT & das Marshmallow Experiment, Content für die Schweiz und Geschäftsideen mit Wissenschaft und Solar

Digitale Optimisten: Perspektiven aus dem Silicon Valley

Play Episode Listen Later Jun 30, 2024 58:01


Welche Funktion von ChatGPT uns in dieser Woche beeindruckt hat, Fundstück der Woche, Exklusiver Content für die Schweiz und Post für Optimisten. Alles drin in dieser Folge! Mehr Geschäftsideen im Newsletter: ⁠digitaleoptimisten.de/newsletter⁠ Fundstück der Woche: Synthflow Die Themen: (01:14) Intro (02:25) ChatGPT4o = Mind Blown (10:46) Fundstück der Woche: Synthflow (14:18) Content für die Schweiz: Mitarbeiterbindung durch White-Hat-Hacker (26:34) Post von Optimisten Herausforderungen beim Aufbau eines Zweitmarkts für Elektroauto-Batterien (38:30) Geschäftsidee von Samuel: SolarFloat (45:37) Geschäftsidee von Alex: Follow Science Noch mehr Kontext: Wir sprechen über die Nutzung von KI in der Kommunikation, die Bedeutung von Audioinhalten, die Verwendung von AI-Call-Agenten und die Idee der Mitarbeiterbindung durch White-Hat-Hacker. Es werden auch einige persönliche Erfahrungen und Meinungen zu diesen Themen geteilt. In diesem Teil des Gesprächs diskutieren Alex und Samuel über ihre persönlichen Erfahrungen mit Aktieninvestitionen. Samuel erzählt von seinen Erfolgen und Misserfolgen beim Kauf von Aktien von Unternehmen wie Nvidia und Rivian. Sie diskutieren auch die Zukunft der Elektromobilität und die Herausforderungen beim Aufbau eines Zweitmarkts für Elektroauto-Batterien. Darüber hinaus teilen sie Ideen für eine Geschäftsidee, die Kindern beibringt, wie man Geld spart und investiert, sowie Tipps für die Wiederbelebung von Online-Marketingkampagnen. In diesem Teil der Unterhaltung werden zwei Geschäftsideen diskutiert: Solar Float und Follow Science. Solar Float bezieht sich auf die Idee, Solarpanels auf ungenutzten Oberflächen von Stauseen zu installieren, um Solarenergie effizient zu nutzen. Follow Science ist ein Software-Tool, das Wissenschaftlern hilft, einen Social-Media-Auftritt mit verständlichem wissenschaftlichem Inhalt aufzubauen. Es scannt wissenschaftliche Journale und liefert snackable Inhalte, die auf den Interessen der Nutzer basieren. Beide Ideen werden diskutiert und ihre Potenziale sowie Herausforderungen werden erörtert. Die Themen in dieser Folge stellen keine Anlageberatung dar. Informiert euch selbst! --- Send in a voice message: https://podcasters.spotify.com/pod/show/alex2459/message

Computer und Kommunikation Beiträge - Deutschlandfunk
Rollenverständnis: Sind White Hat Hacker wirklich die guten Hacker?

Computer und Kommunikation Beiträge - Deutschlandfunk

Play Episode Listen Later Jun 22, 2024 10:26


Schönherr, Maximilian www.deutschlandfunk.de, Computer und Kommunikation

TechCrunch Startups – Spoken Edition
Bugcrowd, the crowdsourced white-hat hacker platform, acquires Informer to ramp up its security chops

TechCrunch Startups – Spoken Edition

Play Episode Listen Later May 27, 2024 4:39


On the heels of raising $102 million earlier this year, Bugcrowd is making good on its promise to use some of that funding to make acquisitions to strengthen its security chops. Learn more about your ad choices. Visit podcastchoices.com/adchoices

Trust Issues
EP 50 - Adversarial AI's Advance

Trust Issues

Play Episode Listen Later Apr 17, 2024 40:01


In the 50th episode of the Trust Issues podcast, host David Puner interviews Justin Hutchens, an innovation principal at Trace3 and co-host of the Cyber Cognition podcast (along with CyberArk's resident Technical Evangelist, White Hat Hacker and Transhuman Len Noe). They discuss the emergence and potential misuse of generative AI, especially natural language processing, for social engineering and adversarial hacking. Hutchens shares his insights on how AI can learn, reason – and even infer human emotions – and how it can be used to manipulate people into disclosing information or performing actions that compromise their security. They also talk about the role of identity in threat monitoring and detection, and the challenges and opportunities AI presents organizations in defending against evolving threats and how we can harness its power for the greater good. Tune in to learn more about the fascinating and ever-changing landscape of adversarial AI and identity security.

The Legacy Leaders Show With Izabela Lundberg
Securing Future Today: On the Frontlines of Cybersecurity with Len Noe

The Legacy Leaders Show With Izabela Lundberg

Play Episode Listen Later Mar 4, 2024 58:54


In the upcoming episode of the "Legacy Leaders Show," we are thrilled to welcome Len Noe, a renowned CyberArk Technical Evangelist, distinguished White Hat Hacker, and an avowed Transhuman and Futurist.In a world where the lines between technology and humanity increasingly blur, Len brings his unique insights into the inevitability of our convergence with technology. Drawing on his extensive experience in cybersecurity and his forward-thinking perspectives on transhumanism, Len will delve into the provocative notion that "resistance is futile, we are already Borg." This episode promises to challenge our perceptions of identity, security, and the future of human evolution. Join us as we explore the cutting-edge of technology and discuss the ethical, philosophical, and practical implications of becoming more integrated with the digital world. Don't miss this compelling conversation with one of the most visionary minds in the field of cybersecurity and futurism.

The Legacy Leaders Show With Izabela Lundberg
Securing Future Today: On the Frontlines of Cybersecurity with Len Noe

The Legacy Leaders Show With Izabela Lundberg

Play Episode Listen Later Mar 4, 2024 58:53


In the upcoming episode of the "Legacy Leaders Show," we are thrilled to welcome Len Noe, a renowned CyberArk Technical Evangelist, distinguished White Hat Hacker, and an avowed Transhuman and Futurist. In a world where the lines between technology and humanity increasingly blur, Len brings his unique insights into the inevitability of our convergence with technology. Drawing on his extensive experience in cybersecurity and his forward-thinking perspectives on transhumanism, Len will delve into the provocative notion that "resistance is futile, we are already Borg." This episode promises to challenge our perceptions of identity, security, and the future of human evolution. Join us as we explore the cutting-edge of technology and discuss the ethical, philosophical, and practical implications of becoming more integrated with the digital world. Don't miss this compelling conversation with one of the most visionary minds in the field of cybersecurity and futurism.

Late Confirmation by CoinDesk
UNCHAINED: Famed White Hat Hacker Samczsun on How to Improve Crypto Security

Late Confirmation by CoinDesk

Play Episode Listen Later Feb 28, 2024 44:28


He's formed a new group, the Security Alliance, to improve the overall security posture of the crypto community.Listen to the episode on Apple Podcasts, Spotify, Fountain, Overcast, Podcast Addict, Pocket Casts, Pandora, Castbox, Google Podcasts, Amazon Music, or on your favorite podcast platform.Well-known white hat hacker and head of security at Paradigm Samczsun recently took the wraps off a new security organization called the Security Alliance (SEAL) that offers a 911 hotline for immediate response to security threats, runs war games to simulate potential security incidents, and provides a safe harbor agreement to protect white hat hackers from legal liabilities.He joined Unchained to discuss why he and his fellow white hat hackers decided to start the Security Alliance and how it operates, how the safe harbor agreement works, the measures he takes to maintain his anonymity and why, the top security measures people in crypto should take to protect themselves, and what attack areas in crypto Sam still considers “scary.” Show highlights:How samczsun got into white hat hackingThe most memorable saves and rescues Sam was able to perform Whether there's a reason why Sam is so good at noticing bugs in cryptoThe origin of his samczsun handleWhat the Security Alliance is and why it was formedHow SEAL would approach a bug or a hackWhether black hat hackers are trying to exploit open groupsWhy the work in the group is volunteered, not paid, and whether that's sustainableHow the SEAL War Games help in training on how to respond to an incident in Web3What the Safe Harbor Agreement is and what it aims to accomplish for white hat hackersHow sam protects his identity and whether his coworkers know what he looks likeThe top security measures people working in crypto should takeHow projects should approach the audit for their smart contracts given it's an expensive endeavor What attack vectors still scare samWhat is ‘White Hat Hacking'?White hat hacking, often referred to as ethical hacking, is a cybersecurity practice where skilled computer experts use their knowledge for good, employing the same methods as malicious hackers (black hat hackers) but with a significant difference: they do so with permission and for a constructive purpose. These ethical hackers identify vulnerabilities in computer systems, networks, or applications before malicious attackers can exploit them. By detecting and resolving these security weaknesses, white hat hackers help organizations strengthen their defenses against cyber threats. Thank you to our sponsors! Popcorn Network | PolkadotGuest:Samczsun, CEO of Security Alliance (SEAL) and Head of Security at ParadigmPrevious appearances on Unchained: The Chopping Block: Top White Hat Hacker Samczsun Discusses the State of Crypto SecurityLinksIntroducing the Security AllianceBloomberg: Paradigm's Famed ‘White-Hat' Hacker Unites Peers Against Crypto Attacks, White Hat Safe Harbor [Github]Chainalysis: Funds Stolen from Crypto Platforms Fall More Than 50% in 2023, but Hacking Remains a Significant Threat as Number of Incidents Risessam's tweet on security practices Halborn: Explained: The Nomad Hack (August 2022)-Unchained Podcast is Produced by Laura Shin Media, LLC. Distributed by CoinDesk. Senior Producer is Michele Musso and Executive Producer is Jared Schwartz. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Unchained
Famed White Hat Hacker Samczsun on How to Improve Crypto Security - Ep. 613

Unchained

Play Episode Listen Later Feb 27, 2024 60:49


Listen to the episode on Apple Podcasts, Spotify, Fountain, Overcast, Podcast Addict, Pocket Casts, Pandora, Castbox, Google Podcasts, Amazon Music, or on your favorite podcast platform. Well-known white hat hacker and head of security at Paradigm samczsun recently took the wraps off a new security organization called the Security Alliance (SEAL) that offers a 911 hotline for immediate response to security threats, runs war games to simulate potential security incidents, and provides a safe harbor agreement to protect white hat hackers from legal liabilities. He joined Unchained to discuss why he and his fellow white hat hackers decided to start the Security Alliance and how it operates, how the safe harbor agreement works, the measures he takes to maintain his anonymity and why, the top security measures people in crypto should take to protect themselves, and what attack areas in crypto Sam still considers “scary.”    Show highlights: How samczsun got into white hat hacking The most memorable saves and rescues sam was able to perform  Whether there's a reason why sam is so good at noticing bugs in crypto The origin of his samczsun handle What the Security Alliance is and why it was formed How SEAL would approach a bug or a hack Whether black hat hackers are trying to exploit open groups Why the work in the group is volunteered, not paid, and whether that's sustainable How the SEAL War Games help in training on how to respond to an incident in Web3 What the Safe Harbor Agreement is and what it aims to accomplish for white hat hackers How sam protects his identity and whether his coworkers know what he looks like The top security measures people working in crypto should take How projects should approach the audit for their smart contracts given it's an expensive endeavor  What attack vectors still scare sam What is ‘White Hat Hacking'? White hat hacking, often referred to as ethical hacking, is a cybersecurity practice where skilled computer experts use their knowledge for good, employing the same methods as malicious hackers (black hat hackers) but with a significant difference: they do so with permission and for a constructive purpose. These ethical hackers identify vulnerabilities in computer systems, networks, or applications before malicious attackers can exploit them. By detecting and resolving these security weaknesses, white hat hackers help organizations strengthen their defenses against cyber threats.  Thank you to our sponsors! Popcorn Network Polkadot Guest: Samczsun, CEO of Security Alliance (SEAL) and Head of Security at Paradigm Previous appearances on Unchained: The Chopping Block: Top White Hat Hacker Samczsun Discusses the State of Crypto Security Links Introducing the Security Alliance Bloomberg: Paradigm's Famed ‘White-Hat' Hacker Unites Peers Against Crypto Attacks,  White Hat Safe Harbor [Github] Chainalysis: Funds Stolen from Crypto Platforms Fall More Than 50% in 2023, but Hacking Remains a Significant Threat as Number of Incidents Rises sam's tweet on security practices  Halborn: Explained: The Nomad Hack (August 2022) Learn more about your ad choices. Visit megaphone.fm/adchoices

Unchained
Famed White Hat Hacker Samczsun on How to Improve Crypto Security - Ep. 613

Unchained

Play Episode Listen Later Feb 27, 2024 60:49


Listen to the episode on Apple Podcasts, Spotify, Fountain, Overcast, Podcast Addict, Pocket Casts, Pandora, Castbox, Google Podcasts, Amazon Music, or on your favorite podcast platform. Well-known white hat hacker and head of security at Paradigm samczsun recently took the wraps off a new security organization called the Security Alliance (SEAL) that offers a 911 hotline for immediate response to security threats, runs war games to simulate potential security incidents, and provides a safe harbor agreement to protect white hat hackers from legal liabilities. He joined Unchained to discuss why he and his fellow white hat hackers decided to start the Security Alliance and how it operates, how the safe harbor agreement works, the measures he takes to maintain his anonymity and why, the top security measures people in crypto should take to protect themselves, and what attack areas in crypto Sam still considers “scary.”    Show highlights: How samczsun got into white hat hacking The most memorable saves and rescues sam was able to perform  Whether there's a reason why sam is so good at noticing bugs in crypto The origin of his samczsun handle What the Security Alliance is and why it was formed How SEAL would approach a bug or a hack Whether black hat hackers are trying to exploit open groups Why the work in the group is volunteered, not paid, and whether that's sustainable How the SEAL War Games help in training on how to respond to an incident in Web3 What the Safe Harbor Agreement is and what it aims to accomplish for white hat hackers How sam protects his identity and whether his coworkers know what he looks like The top security measures people working in crypto should take How projects should approach the audit for their smart contracts given it's an expensive endeavor  What attack vectors still scare sam What is ‘White Hat Hacking'? White hat hacking, often referred to as ethical hacking, is a cybersecurity practice where skilled computer experts use their knowledge for good, employing the same methods as malicious hackers (black hat hackers) but with a significant difference: they do so with permission and for a constructive purpose. These ethical hackers identify vulnerabilities in computer systems, networks, or applications before malicious attackers can exploit them. By detecting and resolving these security weaknesses, white hat hackers help organizations strengthen their defenses against cyber threats.  Thank you to our sponsors! Popcorn Network Polkadot Guest: Samczsun, CEO of Security Alliance (SEAL) and Head of Security at Paradigm Previous appearances on Unchained: The Chopping Block: Top White Hat Hacker Samczsun Discusses the State of Crypto Security Links Introducing the Security Alliance Bloomberg: Paradigm's Famed ‘White-Hat' Hacker Unites Peers Against Crypto Attacks,  White Hat Safe Harbor [Github] Chainalysis: Funds Stolen from Crypto Platforms Fall More Than 50% in 2023, but Hacking Remains a Significant Threat as Number of Incidents Rises sam's tweet on security practices  Halborn: Explained: The Nomad Hack (August 2022) Learn more about your ad choices. Visit megaphone.fm/adchoices

Trust Issues
EP 44 - The Rise of Prompt Engineering: How AI Fuels Script Kiddies

Trust Issues

Play Episode Listen Later Jan 25, 2024 33:23


In this episode of Trust Issues, CyberArk's resident Technical Evangelist, White Hat Hacker and Transhuman Len Noe joins host David Puner for a discussion about the emerging threat of AI kiddies, a term that describes novice attackers using large language models (LLMs) and chatbots to launch cyberattacks without any coding skills. Noe explains how these AI kiddies use prompt engineering to circumvent the built-in protections of LLMs like ChatGPT and get them to generate malicious code, commands and information. He also shares his insights on how organizations can protect themselves from these AI-enabled attacks by applying the principles of Zero Trust, identity security and multi-layered defense. All this and a dollop of transhumanism … Don't be a bot – check it out! 

Trust Issues
EP 42 - Year in Review 2023: Unleashing AI, Securing Identities

Trust Issues

Play Episode Listen Later Dec 27, 2023 35:22


In this year-end Trust Issues podcast episode, host David Puner takes listeners on a retrospective jaunt through some of the show's 2023 highlights. The episode features insightful snippets from various cybersecurity experts and thought leaders, each discussing crucial aspects of the ever-evolving cyber landscape. From discussions on the dynamic nature of threat actors and the need for agile security approaches to insights on identity security challenges in the cloud and the intricacies of safeguarding data, the episode encapsulates a wealth of knowledge shared by industry professionals. With diverse perspectives on generative AI, risk management, cloud security, DevSecOps – and even a personal bear wrestling story – Trust Issues' 2023 cannon delivers an engaging compilation for both cybersecurity enthusiasts and industry practitioners. As the podcast looks back on the year's diverse lineup of guests, it serves as a valuable resource for anyone seeking to stay informed about the latest cybersecurity trends, strategies and challenges. The episode emphasizes the importance of adapting to the rapidly changing threat landscape, adopting innovative security practices and fostering collaboration to address the multifaceted nature of cyber risks in the modern digital era. Clips featured in this episode from the following guests:Eran Shimony, Principal Security Researcher, CyberArk LabsAndy Thompson, Offensive Security Research Evangelist, CyberArk LabsEric O'Neill, Former FBI Counterintelligence Operative & Current National Security Strategist Shay Nahari, VP of Red Team Services, CyberArkDiana Kelley, CISO, Protect AI Len Noe, Technical Evangelist, White Hat Hacker & Biohacker, CyberArkTheresa Payton, Former White House CIO, Founder & CEO of Fortalice SolutionsLarry Lidz, VP & CISO, Cisco CX CloudMatt Cohen, CEO, CyberArkCharles Chu, GM of Cloud Security, CyberArkBrad Jones, CISO & VP of Information Security, Seagate TechnologyDusty Anderson, Managing Director, Global Digital Identity, ProtivitiPhilip Wylie, Offensive Security Professional, Evangelist & Ethical Hacker

Unchained
The Chopping Block: Top White Hat Hacker Samczsun Discusses the State of Crypto Security - Ep. 579

Unchained

Play Episode Listen Later Dec 7, 2023 59:00


Welcome to The Chopping Block – where crypto insiders Haseeb Qureshi, Tom Schmidt, Tarun Chitra, and Robert Leshner chop it up about the latest news. This week, they are joined by Samczsun, an anonymous security researcher at Paradigm, who delves into the intricacies of crypto security, ethical hacking and the shifting landscape of smart contract vulnerabilities. He also discusses his strong feelings about the “Code Is Law” philosophy and gives tips on how people in crypto can best protect their online security.  Listen to the episode on Apple Podcasts, Spotify, Overcast, Podcast Addict, Pocket Casts, Pandora, Castbox, Google Podcasts, TuneIn, Amazon Music, or on your favorite podcast platform. Show highlights:  what led Sam to a career in crypto security and his current role at Paradigm how Sam uncovered one of crypto's most legendary vulnerabilities why security experts like Sam choose the path of white hat hackers over black hats The craziness of the KyberSwap hacker's proposal parallels that Robert draws between this case and Avi Eisenberg's Mango Markets exploit what advice Sam has for the KyberSwap hacker  whether Sam, as a security expert, trusts storing his money on-chain how the Platypus hack ruling by a French judge challenges the 'Code Is Law' philosophy what the Security Alliance aims to achieve and its impact on the industry how Sam suggests individuals should practice personal crypto security, including the importance of using password managers and hardware wallets, and avoiding SMS two-factor authentication Hosts Haseeb Qureshi, managing partner at Dragonfly  Robert Leshner, founder of Compound and Superstate Tom Schmidt, general partner at Dragonfly  Disclosures Guest:  Samczsun, security researcher at Paradigm Links Hacks Episode with Ogle: The Chopping Block: How This DeFi Hack Negotiator Gets Hackers to Return Stolen Money Unchained: $48 Million Drained from KyberSwap in Hack  Kyberswap hacker's latest message Cointelegraph:  KyberSwap hacker offers $4.6M bounty for return of $46M loot Platypus exploiters walk free after claiming to be ‘ethical hackers' Code is law: The Chopping Block: ‘Code Is Law' Is ‘Obviously Not How Anything Works Ever' Unchained: The Mango Markets Attacker on Whether His 'Trade' Was Ethical or Not Thread by Gabriel Shapiro on the topic and Vy Le's response Learn more about your ad choices. Visit megaphone.fm/adchoices

Unchained
The Chopping Block: Top White Hat Hacker Samczsun Discusses the State of Crypto Security - Ep. 579

Unchained

Play Episode Listen Later Dec 7, 2023 59:00


Welcome to The Chopping Block – where crypto insiders Haseeb Qureshi, Tom Schmidt, Tarun Chitra, and Robert Leshner chop it up about the latest news. This week, they are joined by Samczsun, an anonymous security researcher at Paradigm, who delves into the intricacies of crypto security, ethical hacking and the shifting landscape of smart contract vulnerabilities. He also discusses his strong feelings about the “Code Is Law” philosophy and gives tips on how people in crypto can best protect their online security.  Listen to the episode on Apple Podcasts, Spotify, Overcast, Podcast Addict, Pocket Casts, Pandora, Castbox, Google Podcasts, TuneIn, Amazon Music, or on your favorite podcast platform. Show highlights:  what led Sam to a career in crypto security and his current role at Paradigm how Sam uncovered one of crypto's most legendary vulnerabilities why security experts like Sam choose the path of white hat hackers over black hats The craziness of the KyberSwap hacker's proposal parallels that Robert draws between this case and Avi Eisenberg's Mango Markets exploit what advice Sam has for the KyberSwap hacker  whether Sam, as a security expert, trusts storing his money on-chain how the Platypus hack ruling by a French judge challenges the 'Code Is Law' philosophy what the Security Alliance aims to achieve and its impact on the industry how Sam suggests individuals should practice personal crypto security, including the importance of using password managers and hardware wallets, and avoiding SMS two-factor authentication Hosts Haseeb Qureshi, managing partner at Dragonfly  Robert Leshner, founder of Compound and Superstate Tom Schmidt, general partner at Dragonfly  Disclosures Guest:  Samczsun, security researcher at Paradigm Links Hacks Episode with Ogle: The Chopping Block: How This DeFi Hack Negotiator Gets Hackers to Return Stolen Money Unchained: $48 Million Drained from KyberSwap in Hack  Kyberswap hacker's latest message Cointelegraph:  KyberSwap hacker offers $4.6M bounty for return of $46M loot Platypus exploiters walk free after claiming to be ‘ethical hackers' Code is law: The Chopping Block: ‘Code Is Law' Is ‘Obviously Not How Anything Works Ever' Unchained: The Mango Markets Attacker on Whether His 'Trade' Was Ethical or Not Thread by Gabriel Shapiro on the topic and Vy Le's response Learn more about your ad choices. Visit megaphone.fm/adchoices

Digitale Vorreiter - Vodafone Business Cases
Gegen alle Cyberangriffe existiert ein Gegengift - mit Immanuel Bär & Manuel Hable

Digitale Vorreiter - Vodafone Business Cases

Play Episode Listen Later Nov 24, 2023 91:03


Die Welt ist so vernetzt wie nie, wir sprechen täglich mit Siri, überweisen Geld und teilen Storys. Wir arbeiten in Clouds, kommunizieren via Videochat und schreiben Mails. Und das alles online, auf der Spielwiese für Cyberkriminelle. In der zweiten Folge “Insight Talk” hat Digitale Vorreiter:innen Host Christoph Burseg zwei Experten zu Gast, die es sich auf der einen Seite zur Aufgabe gemacht haben, präventiv gegen Cyberangriffe vorzugehen, auf der anderen Seite aber auch genau dann einzugreifen, wenn es eigentlich schon zu spät ist und nichts mehr geht. Manuel Hable, Managing Director bei RiskWorkers und Immanuel Bär, White Hat Hacker bei ProSec haben nicht nur wertvolle und direkt umsetzbare Takeaways dabei, sondern erklären auch, welche Bereiche unterschätzt werden und warum Cyberangriffe keine Frage des “ob”, sondern des “wann” sind. Wie müssen sich Unternehmen aufstellen, um möglichst abgesichert zu sein? Wie sehen die aktuellen Trends in der Cybersecurity aus? Ist Awareness der Schlüssel für eine sichere Arbeitsumgebung? Und wie hört es sich eigentlich an, wenn live im Podcast gehackt wird?

The Bitcoin Podcast
Jordi Baylina of Polygon zkEVM | Zero Knowledge, Privacy, Scalability and Building Useful Technology

The Bitcoin Podcast

Play Episode Listen Later Nov 8, 2023 64:03


This is a special episode with someone who has been involved in the Ethereum ecosystem for many years. Jordi, a white hat hacker, has been building common good infrastructure and protecting people on the internet during that time. Topics Covered in this episode: 1. Dapp Node, Giveth, Catalan Independence Movement, and useful technology 2. Technical implementations and tradeoffs in zero knowledge technology3. Staying current in the rapidly evolving blockchain industry 4. What excites Jordi in the short term and long term JOIN THE COMMUNITY Network State Press - https://twitter.com/NetStatePress Hashing it Out Discord - https://discord.com/invite/eCwSWRyzam Logos Discord - https://discord.gg/logosnetwork  RESOURCES: Jordi X - https://twitter.com/jbaylina TIMESTAMPS: 00:00 Introduction 03:10: Dapp Node, Giveth, Catalan Independence Movement, and useful technology 06:14: Infrastructure decentralization connection to the internet 06:55: ISP's and Spanish government censor voting in the Catalan Independence Movement 08:38: What does it mean for technology to work appropriately? 11:10: My mission 12:00: Why is zk technology so important right now 14:50: Zero knowledge is not only privacy. Also for validity and scalability 17:35: Tradeoffs between privacy and compression in zero knowledge proofs 19:20 Recursion, aggregation, and trees of proofs 21:00: What are the downfalls of current implementation of zkEVMs building on Ethereum 22:45: Is privacy a requirement to working? 23:40: Efficient aggregation of proofs in the context data storage systems 28:10: Speeding up msn operations and speed requirements 31:00 Keeping up with the pace of research 34:00 Building proficient teams 38:25: Speeding up the learning curve 40:00: Scaling Ethereum, liquid democracy, anonymous voting, data privacy and other goals 44:14: Scalability, usability and challenges facing utility 45:10: Prioritizing features, work, and releases 49:20: Risk assessment in the ecosystem 51:40: Define zk in 10 words or less 52:40: Is what you do hard? 54:40: Follow up roundtable with Corey, D, and Jesse

Datenschutz Plaudereien
DAT152 Klimakleber und White-Hat-Hacker (Ethical Hacking, Teil 3)

Datenschutz Plaudereien

Play Episode Listen Later Jul 26, 2023 8:57


Das Nationale Testinstitut für Cybersicherheit (NTC) in der Schweiz sucht dort nach Sicherheitslücken, wo andere nicht hinschauen. Wo liegt die Grenze zur Strafbarkeit bei diesem ethischen Hacking? In drei Podcast-Episoden führt Martin Steiger eine spannende Diskussion mit den Spezialgästen Gina Moll und Tobias Castana über die rechtlichen Aspekte von ethischem Hacking. Gina Moll, Rechtsanwältin bei Walder Wyss in Zürich, hat für das NTC ein Rechtsgutachten über Ethical Hacking mitverfasst. Tobias Castana, Leiter Test-Team beim NTC, kennt White-Hat-Hacking aus erster Hand.

GOTO - Today, Tomorrow and the Future
Hack Like a Pro: Bug Bounties, Web Vulnerabilities & More! • Ben Sadeghipour (NahamSec) & Julian Wood

GOTO - Today, Tomorrow and the Future

Play Episode Listen Later Jul 7, 2023 33:55 Transcription Available


This interview was recorded for GOTO Unscripted at GOTO Copenhagen.gotopia.techRead the full transcription of this interview hereBen Sadeghipour - VP of Research at Hadrian SecurityJulian Wood - Developer Advocate at AWS @julian_wood  RESOURCEStryhackme.comhackthebox.compentesterlab.comctfchallenge.combugbountyhunter.comportswigger.net/burpBennahamsec.com@nahamsectwitch.tv/nahamsecinstagram.com/nahamsecJulian@julian_woodwooditwork.comlinkedin.com/in/julianrwoodDESCRIPTIONJoin us for an engaging conversation between Ben Sadegiphour, VP of Research at Hadrian Security, and Julian Wood, Developer Advocate at AWS. In this conversation, we will explore a range of captivating topics, such as: Bug bounties, ethical hacking, Skills, Resources, tips and much more.Whether you're an aspiring ethical hacker or simply interested in the fascinating world of cybersecurity, this video is packed with knowledge and practical advice. Get ready to hack like a pro and join us on this exciting journey!RECOMMENDED BOOKSPeter Yaworski • Real-World Bug HuntingVickie Li • Bug Bounty BootcamCarlos A. Lozano & Shahmeer Amir • Bug Bounty Hunting EssentialSanjib Sinha • Bug Bounty Hunting for Web SecurityJim Manico & August Detlefsen • Iron-Clad JavaLiz Rice • Container SecurityAaron Parecki • OAuth 2.0 SimplifiedAaron Parecki • OAuth 2.0 ServersErdal Ozkaya • Cybersecurity: The Beginner's GuideTwitterLinkedInFacebookLooking for a unique learning experience?Attend the next GOTO conference near you! Get your ticket: gotopia.techSUBSCRIBE TO OUR YOUTUBE CHANNEL - new videos posted almost daily

Trust Issues
EP 29 - Synthetic Identity: Unmasking a New AI-Fueled Cyber Threat

Trust Issues

Play Episode Listen Later Jun 7, 2023 24:54


Scattered across the internet are jigsaw puzzle pieces containing your personal information. If reassembled by an attacker, these puzzle pieces could easily compromise your identity. Our returning guest today is Len Noe, CyberArk's resident transhuman (a.k.a. cyborg), whose official titles these days are Technical Evangelist, White Hat Hacker and Biohacker. Noe joins host David Puner to shed light on the concept of synthetic identity, which involves gathering publicly available, unprotected data and then using AI chatbots and platforms like ChatGPT along with predictive analytics to correlate the data and generate deep digital portraits of individuals. Then, thinking like an attacker, Noe dives into how this new digital clairvoyance has the potential to up threat actors' games and what organizations and individuals should be doing to combat it. Noe also shares his POV on the implications for cybersecurity and his concerns about sharing personal and proprietary information with AI chatbots and platforms. 

Düsseldorfer Wirtschaft
124: Live vom „Düsseldorfer Arbeitgebertag"

Düsseldorfer Wirtschaft

Play Episode Listen Later May 16, 2023 58:54


Herzlich Willkommen zur neuen Podcastfolge der "Düsseldorfer Wirtschaft". In dieser Folge (Nr. 124 am 17. Mai 2023) geht es um das Thema Cyber-Security und Hacker. Dabei werden wir uns genauer anschauen, welche Bedrohungen durch Hacker existieren und wie Unternehmen sich davor schützen können. Außerdem sprechen wir über den „Düsseldorfer Arbeitgebertag 2023“ und stellen den Gewinner des Rheinischen Innovationspreis 2023 vor.Zunächst einmal: Was ist Cyber-Security? Cyber-Security bezeichnet den Schutz von IT-Systemen vor unautorisiertem Zugriff, Datenverlust oder -diebstahl sowie vor Viren und anderen Schadprogrammen. Der Schutz der digitalen Infrastruktur ist gerade für Unternehmen unerlässlich, da sie immer stärker von digitalen Prozessen abhängig sind.Hacker sind eine ernsthafte Bedrohung für die Cyber-Security von Unternehmen. Sie versuchen, in IT-Systeme einzudringen und dort Schaden anzurichten. Dabei gibt es unterschiedliche Arten von Hackern: Zum einen gibt es sogenannte "White-Hat-Hacker", die von Unternehmen beauftragt werden, um Schwachstellen in deren IT-Systemen aufzudecken. Zum anderen gibt es jedoch auch "Black-Hat-Hacker", die ohne Genehmigung in fremde Systeme eindringen und dort Schaden anrichten.Um sich vor Hackern zu schützen, gibt es verschiedene Maßnahmen, die Unternehmen ergreifen können. Eine wichtige Maßnahme ist die Implementierung von Firewalls, die den Zugriff auf das IT-System kontrollieren. Zudem sollten regelmäßige Updates und Patches durchgeführt werden, um Sicherheitslücken zu schließen. Auch Schulungen für Mitarbeiter können dazu beitragen, das Bewusstsein für die Gefahren von Hackerangriffen zu schärfen.Insgesamt zeigt sich, dass Cyber-Security ein sehr komplexes und vielschichtiges Thema ist, das Unternehmen nicht unterschätzen sollten. Ein erfolgreicher Hackerangriff kann nicht nur finanzielle Schäden verursachen, sondern auch das Vertrauen der Kunden in das Unternehmen nachhaltig schädigen. Deshalb sollten Unternehmen sich intensiv mit dem Thema Cyber-Security auseinandersetzen und entsprechende Maßnahmen ergreifen, um sich vor den Bedrohungen durch Hacker zu schützen.Unser Podcastfolge hören Sie in Ihrer Lieblings-APP. Bitte, empfehlen Sie uns gerne weiter in Ihren beruflichen und persönlichen Netzwerken.

Nisdeg Tavag Podcast
#70 - Мэдээллийн аюулгүй байдал - Н.Буянтогтох /Infosec Plus , WH hacker/

Nisdeg Tavag Podcast

Play Episode Listen Later Mar 13, 2023 134:25


Эээй, за сайн уу манайхаан? Ашгүй нэг өвөл өнгөрлөө шүү тэ? Энэхүү дугаараар маш сонирхолтой хүн буюу White Hat Hacker Н.Буянтогтох орлоо. Бид дан ганц IT салбар дахь мэдээллийн аюулгүй байдал биш өдөр тутмын амьдралд мэдээллийн аюулгүй байдал хэрхэн чухал байдаг, мөн мэдлэг, боловсрол, хүний алдаа, гэх зэрэг сэдвүүдээр ярилцсан болноо. Түүнээс гадна энэ дугаарыг TEST4UB.org ивээн тэтгэсэн болно. Test4UB.org нь бэлгийн цөөнх эрчүүдийг ХДХВ-ийн халдвараас урьдчилан сэргийлэхийг дэмждэг бөгөөд ХДХВ-ийн халдвараас урьдчилан сэргийлэх нь бидний нийгэмд бүхэлдээ хэрхэн ач холбогдолтой болохыг ярилцсан. За ингээд 70 дахь дугаараа хүлээн авна уу. Эрүүл байцгаая! https://test4ub.org/

The James Altucher Show
Inside the Mind of a Cybercriminal: The Original Internet Godfather Shares His Story | Brett Johnson

The James Altucher Show

Play Episode Listen Later Jan 31, 2023 98:49


Brett Johnson committed tax fraud and credit card fraud from a desk inside the FBI offices for almost a year before going on a cross-country crime spree, stealing $600,000 in four months, making the US Most Wanted list, going to Disney World, getting sent to prison AND THEN ESCAPING! But let's back up…In today's episode of The James Altucher Show, we sit down with Brett Johnson, a man who has lived a double life. Once the leader of ShadowCrew & Counterfeit Library - precursors to the modern dark web - he's now a sought-after cybersecurity expert and consultant, using his insider knowledge of the criminal underworld to help organizations defend themselves against cyber threats.Brett takes us on a wild ride through his upbringing at the hands of manipulative criminal parents, his rise through the burgeoning world of cybercrime and social engineering beginning with mid-'90s eBay fraud, and how his yearning for love and acceptance concluded with his arrest by federal law enforcement.Instead of continuing down the path of criminal activity, Brett has found a way to use his expertise to make the digital world a safer place for all of us. Redemption is possible. No matter what mistakes you've made in the past, it's never too late to turn your life around and use your skills for good.------------Visit Notepd.com to read our idea lists & sign up to create your own!My new book Skip the Line is out! Make sure you get a copy wherever books are sold!Join the You Should Run for President 2.0 Facebook Group, where we discuss why you should run for President.I write about all my podcasts! Check out the full post and learn what I learned at jamesaltucher.com/podcast.------------Thank you so much for listening! If you like this episode, please rate, review, and subscribe  to “The James Altucher Show” wherever you get your podcasts: Apple PodcastsStitcheriHeart RadioSpotifyFollow me on Social Media:YouTubeTwitterFacebook

Lessons of Life with Mimi - The 12 Laws of Mind
Neville Goddard - A Spiritual White Hat Hacker

Lessons of Life with Mimi - The 12 Laws of Mind

Play Episode Listen Later Jan 14, 2023 19:25


Why do we love Neville Goddard? He was a white hat hacker and we love the hackers. Blessings to you! --- Support this podcast: https://podcasters.spotify.com/pod/show/rita-cragwall/support

Idiom America
White idioms: White elephant; white knight; white lies; white knuckle; white hat hacker

Idiom America

Play Episode Listen Later Dec 18, 2022 15:08


Trust Issues
EP 11 - Step Away From the QR Code and Listen to This w/ Len Noe, Technical Evangelist & White Hat Hacker at CyberArk

Trust Issues

Play Episode Listen Later Sep 13, 2022 32:49


Len Noe – our favorite cyborg and CyberArk resident technical evangelist and white hat hacker – is back! On today's episode, he's talking with host David Puner about risky QR codes. On first blush it may seem like a simple subject, but attackers are having a field day with them and there seems to be a general lack of awareness about it. Help stop the havoc-wreaking and find out what you can do to protect yourself.

IDG TechTalk | Voice of Digital
#51 | Ethical Hacker

IDG TechTalk | Voice of Digital

Play Episode Listen Later Sep 6, 2022 28:18


Mit Ransomware könnte er in kürzester Zeit mehrere Millionen Euro verdienen. Doch Jean Pereira hat sich dafür entschieden als Ethical Hacker Unternehmen auf ihre Sicherheitslücken aufmerksam zu machen, statt sie damit zu erpressen. In unserer neuen Folge des “IDG Tech Talks” erzählt der bekannte Ethical oder White Hat Hacker, wie er seinen Weg in die IT-Security-Branche gefunden hat und wie er heute Sicherheitslücken für prominente Unternehmen wie Apple, Nokia, Siemens und Microsoft aufdeckt.

The Tech Blog Writer Podcast
2072: CyberArk Biohacker Reveals 3 Ways Any QR Code Can be Spoofed

The Tech Blog Writer Podcast

Play Episode Listen Later Aug 15, 2022 38:48


When the pandemic hit, the need to touch as few things as possible to slow the spread of the virus meant QR codes took off quicker than Netflix stock. Now that we as consumers are programmed to scan them without a second thought, we find ourselves in a vulnerable situation. The FBI has even issued a formal warning about faked QR codes. In his new research, Len Noe, aka 'the Biohacker' and White Hat Hacker at CyberArk, has revealed three ways that any QR code can be spoofed to provide an attack vector. Crucially, Len's research has shown how mobile devices can be taken over and used to provide an attack vector in corporate environments to launch advanced attacks. Len discusses why we should be wary rather than blindly trusting forms. For example, a fake job ad containing a malicious QR code offers a perfect opportunity to send all that personal sign-up information straight to an attacker, not a prospective employer. We also discuss the importance of vigilance when installing new apps from a QR code. Len shares how he spoofed the Google Play Store to gain ultimate access to a user's phone – including reading personal messages and taking pictures with the camera. Finally, he shares how even scanning a rogue QR code to order takeout could result in your details getting phished. In one fell swoop, Len had access to a user's phone, leaving their GPS location and sensitive user information open to play with.

The James Altucher Show
Who Are You?: Joseph Harris: From stealing game accounts to a white hat hacker

The James Altucher Show

Play Episode Listen Later Jun 30, 2022 70:10 Transcription Available


What do people normally do when they were 12 years old? Learning, playing, and maybe surviving?Joseph Harris, a former black hat hacker and now a white hat hacker, and bug bounty hunter, at age of 12 started stealing other people's game accounts, using social engineering to trick the email providers or game companies to hand him the data that he needs to hack and steal other people's account!In this episode, Joseph told the stories of how he went from stealing simple gaming accounts, into sim-swapping, and stealing millions in crypto altcoins, which ultimately resulted in him being in jail.He also recounts all the techniques that he used to hack into people's accounts, exploiting bugs on service providers' websites like Verizon, Gmail, Yahoo, AOL, and more. Make sure you follow Joseph onYouTube: https://www.youtube.com/channel/UCdcuF5Zx6BiYmwnS-CiRAngTwitter: @AkaD0c (https://twitter.com/akad0c)Listen to this episode, and tweet at me @jaltucher and Jay @jay_yow07 if you like this series, and if you or you know someone with interesting stories!If you like this series, please leave a review, likes, and subscribes on any podcast player of your choosing!Follow Brian's journey on Instagram and Bandcamp:IG: @brianlawloredSpotify: Brian LawlorBandcamp: BrianLawlor.bandcamp.comhttps://www.youtube.com/watch?v=usiTyS5bmtwVisit Notepd.com to read more idea lists, or sign up and create your own idea list!My new book Skip The Line is out! Make sure you get a copy wherever you get your new book!Join You Should Run For President 2.0 Facebook Group, and we discuss why should run for president.I write about all my podcasts! Check out the full post and learn what I learned at jamesaltucher.com/podcast.Thanks so much for listening! If you like this episode, please subscribe to "The James Altucher Show" and rate and review wherever you get your podcasts:Apple PodcastsStitcheriHeart RadioSpotify Follow me on Social Media:YouTubeTwitterFacebook ------------What do YOU think of the show? Head to JamesAltucherShow.com/listeners and fill out a short survey that will help us better tailor the podcast to our audience!Are you interested in getting direct answers from James about your question on a podcast? Go to JamesAltucherShow.com/AskAltucher and send in your questions to be answered on the air!------------Visit Notepd.com to read our idea lists & sign up to create your own!My new book, Skip the Line, is out! Make sure you get a copy wherever books are sold!Join the You Should Run for President 2.0 Facebook Group, where we discuss why you should run for President.I write about all my podcasts! Check out the full post and learn what I learned at jamesaltuchershow.com------------Thank you so much for listening! If you like this episode, please rate, review, and subscribe to "The James Altucher Show" wherever you get your podcasts: Apple PodcastsiHeart RadioSpotifyFollow me on social media:YouTubeTwitterFacebookLinkedIn

Will and Lee Show
samczsun (Head of Security, Paradigm VC): The "Batman of Crypto" on How It Feels to be a White Hat Hacker | Will, Lee, & Andrew Learn Web3 #80

Will and Lee Show

Play Episode Listen Later Jun 2, 2022 63:59


Sam is a white hat hacker that has rescued hundreds of millions of dollars in the crypto ecosystem by responsibly disclosing vulnerabilities and publishing educational resources. In one of our previous podcast episodes with Dan Robinson - Dan called Sam the Batman of Crypto. Whenever there are large sums of money at stake in the crypto ecosystem, a bat signal is thrown up, and Sam comes in to help save the day.Sam is currently a Research Partner and the Head of Security at Paradigm - one the most high profile and active crypto native venture firms.Learn more about samczsun:samczsun's Twitter: @samczsunsamczsun's Website: https://samczsun.comIn this episode we discuss:What is a white hat hacker?Why Sam chose to be a white hat hacker.The emotional journey of finding and resolving a vulnerability with millions at stake.Differences between white hat hacking in web3 vs. traditional web2Why Sam decided to join ParadigmTypes of bugs in smart contracts:Only exploitable via the owner of the protocolOnly exploitable if a hacker has a huge amount of capitalWorst bugs: No special permissions or capitalThe story of how Sam saved $9.6m for Lien FinanceRecruiting an Ocean's 11 team to escape the MEV Dark ForestHow Sam found the SushiSwap vulnerability and saved $350MMReverse engineering the $325MM Wormhole HackDesigning the hardest hacking competition in crypto: CTF (Capture the Flag)How Sam put together a CTF that blew every crypto hacker's mindsExploiting an etherscan bug to announce CTF 2022Tell us what you think by DM'ing @wiiichang. If you liked this episode, you can find more episodes at wld.show!

Trust Issues
EP 2 - Transhumanism: Charting the Cybersecurity Frontier w/ Len Noe

Trust Issues

Play Episode Listen Later May 10, 2022 28:46


In our cyber world identities are typically split into two distinct categories: human and machine. But there's one notable intersection: cyborg. On today's episode, host David Puner talks with Len Noe, technical evangelist, white hat hacker – and CyberArk's resident transhuman.

David Bombal
#363: Interview: Hackers Arise to hack Russia // Ukraine Cyberwar

David Bombal

Play Episode Listen Later Mar 28, 2022 75:57


I interview a hacker about the hackers hacking Russia in the current Ukraine cyberwar. He shares his manifesto and why he thinks it's important for you to learn hacking in 2022. Disclaimer: The opinions expressed by Occupy The Web in this interview are his own. Next interview: If you are a hacker based in Russia and want to be interviewed, please contact me and let's try to set up an interview. Is this how the world ends? Another book to look at: "This Is How They Tell Me the World Ends: The Cyberweapons Arms Race" by Nicole Perlroth: https://amzn.to/3JqK1Wp // MENU // 00:00 ▶️ Introduction 00:36 ▶️ Occupy The Web Introduction + background 03:05 ▶️ Hacking Russia 04:09 ▶️ Cyber-war 06:45 ▶️ Hacking accomplishments 09:12 ▶️ DDos Russian websites 10:18 ▶️ Russian "Iron Curtain" 11:27 ▶️ Hackers Arise DDos tutorial 13:45 ▶️ What is a white hat hacker? 16:40 ▶️ Urgency of stopping Putin 17:16 ▶️ Responsibility of hackers 18:00 ▶️ Hackers Arise manuals 19:36 ▶️ Using SDR to jam communications 20:10 ▶️ Ukrainian government asking hackers for help 21:43 ▶️ What Russians think 23:12 ▶️ Risk of being visited by a government agency 25:58 ▶️ Russian back doors 28:23 ▶️ Vulnerable systems in Russia 29:51 ▶️ Russian hackers escalation 33:52 ▶️ Linux basics for hackers book 37:53 ▶️ Opinion about CEH 39:00 ▶️ Advice for young hackers 41:59 ▶️ Opinion on OSCP 42:38 ▶️ Other certs CompTIA Security+ or eJPT 44:40 ▶️ Has the West been asleep 47:26 ▶️ Germany on the frontlines 49:18 ▶️ Russian/Ukraine war escalating cyber-security 53:05 ▶️ How to stay anonymous online 59:17 ▶️ Occupy The Web history 01:01:20 ▶️ Install Linux on hardware? What version of Linux? Kali? 01:05:09 ▶️ "Am I too old for hacking?" 01:09:13 ▶️ Hacker Arise courses 01:12:53 ▶️ Occupy The Web twitter and others 01:14:27 ▶️ Closing thoughts and manifesto // David's SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal // Occupy The Web social // Twitter: https://twitter.com/three_cube // Occupy The Web books // Linux Basics for Hackers: https://amzn.to/3JlAQXe Getting Started Becoming a Master Hacker: https://amzn.to/3qCQbvh // Occupy The Web / Hackers Arise Website // Website: https://www.hackers-arise.com/ What is a White Hat Hacker: hhttps://davidbombal.wiki/whitehatarise Putin's Windows XP Computer: https://davidbombal.wiki/putinxp SDR Signals: https://davidbombal.wiki/SDRSignals Using OSINT to find Yachts: https://davidbombal.wiki/osintyachts // Recommended Twitter Accounts // Lesley Carhart: https://twitter.com/hacks4pancakes Dave Kennedy: https://twitter.com/HackingDave Evacide: https://twitter.com/evacide // In the News // BBC: https://www.bbc.co.uk/news/technology... The Guardian: https://www.theguardian.com/world/202... Reuters: https://www.reuters.com/world/exclusi... // Other books // The Linux Command Line: https://amzn.to/3ihGP3j How Linux Works: https://amzn.to/3qeCHoY // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #ukraine #russia #cyberwar

Cybersecurity and Compliance with Craig Petronella - CMMC, NIST, DFARS, HIPAA, GDPR, ISO27001

In this episode, we discuss the White-Hat Hacker group that has formed to help Ukraine fend off Russia.Host: CraigGuests: Blake, Erin, & BJPlease like, subscribe and visit all of our properties at:YouTube: https://www.youtube.com/channel/UC8Hgyv0SzIqLfKqQ03ch0BgYouTube: https://www.youtube.com/channel/UCa9l3tgOOHMJ6dClNn8BiqQ Podcasts: https://petronellatech.com/podcasts/ Website: https://compliancearmor.comWebsite: https://blockchainsecurity.comLinkedIn: https://www.linkedin.com/in/cybersecurity-compliance/ Please be sure to Call 877-468-2721 or visit https://petronellatech.com

StorySpotlight
Begriffe: Black Hat vs White Hat Hacker und Hack vs Exploit? | Krypto Wissen

StorySpotlight

Play Episode Listen Later Mar 11, 2022 4:37


Krypto Wissen: Was bedeuten die Begriffe Black Hat und White Hat Hacker? Und ist das wirklich so klar unterscheidbar? Warum ist ein Exploit etwas anderes als ein Hack? Ich erkläre es in diesem Video.

The Shift with Shane Hewitt
Hank Fordham, a white hat hacker tells us about the current cyber situation with regards to Russia and the current war in Ukraine. Plus, Eric Alper talks Junos.

The Shift with Shane Hewitt

Play Episode Listen Later Mar 4, 2022 51:53


Music Journalist Eric Alper joins The Shift to breakdown the Juno nominations for 2022 and why people don't seem to have as much interest as they did in previous years. Former Liberal MP Dan Mcteague, from Canadians for affordable energy, joins The Shift to discuss the rise in gas prices nationwide as a result of the war in Ukraine and the sanctions that have been levied on Russia from the west. Hank Fordham, a white coat hacker tells us about the current cyber situation with regards to Russia and the current war in Ukraine.  What kind of threats have occurred and what has been targeted both in Ukraine and Russia. HEY, DO YOU LIKE PODCASTS? Why not subscribe to ours? find it on Apple, Google, Spotify & Curiouscast.ca See omnystudio.com/listener for privacy information.

Dave's Daily Crypto Take
DDCT #112 - 2/14/2022 (White Hat Hacker Protects Coinbase From Danger By Spotting Threat)

Dave's Daily Crypto Take

Play Episode Listen Later Feb 14, 2022 24:31


#Bitcoin #whitehathacker #EthereumClassicI'd like to welcome everyone to my new PODCASTDave's Daily Crypto TakeIn this channel I will be providing you with news on a daily basis about cryptocurrency, bitcoin, blockchain, FIAT. My main purpose is to share UNBIASED news and updates. Ultimately I learn and hopefully you learn while I go on this journey.ARTICLES used in today's video:https://ambcrypto.com/how-far-might-the-ethereum-killer-tag-go-to-benefit-retail-sol-buyers-in-2022/How far might the ‘Ethereum-killer' tag go to benefit retail SOL buyers in 2022The Coronavirus pandemic and paying the gas fee on the Ethereum blockchain are two things that are poles apart. However, the struggle to overcome both problems has been the same. And, that's exactly where Solana enters the picture. In fact, crypto-billionaire Sam Bankman-Fried called Solana, the next big blockchain of 2022.Notably, Solana promises to deliver the best of Ethereum but faster and at a fraction of the cost. However, it is important to note that 2021 saw a significant uptick in meme coins like Dogecoin and Shiba Inu too. While these coins got a lot of attention and coverage, Solana was comparatively quite under the radar.https://news.yahoo.com/gary-vaynerchuk-said-98-nft-131500442.html?guccounter=1&guce_referrer=aHR0cHM6Ly9mbGlwYm9hcmQuY29tLw&guce_referrer_sig=AQAAAL5Q5wRfECQdhevF_0DOyFBCo4O1IgU-UimZFriVz-JLnHxhfxYguY5FDDfNEnOkeNcU1gXYYJuae3KdotVeCqoi2kYIYrlcy34HJN3_H-IN1iUvl_W91-gd2MBQiCeOAK7HeXJs35gFWHy2wV9QO6xGn_9Z0qrvsIJVB_LihVJXGary Vaynerchuk says 98% of NFT projects will fail after the gold rush fades. Here's why 2 experts think he might be right.In an interview with CNBC, Gary Vaynerchuk said 98% of NFT projects will fail.Vaynerchuk is the creator of the popular Vee Friends NFT series, the cheapest of which currently sell for about $41,000.Two experts weighed in on Vaynerchuk's take, and shared their predictions for the nascent Web3 space.https://ambcrypto.com/bitcoins-price-may-be-holding-up-well-but-the-big-picture-is-this/Bitcoin's price may be ‘holding up well,' but the big picture is thisIt's not been a good year for Bitcoin, the world's largest cryptocurrency. Less than three months ago, with BTC trading close to $69,000 on the charts, many expected the crypto to hit $100k soon. Alas, that didn't happen. In fact, Bitcoin dipped and depreciated. And, did so very significantly.While the last 10-14 days have seen BTC recover from its near-term lows close to $32,000, the cryptocurrency is still well away from touching its heights from a few months ago.https://www.tipranks.com/news/article/is-marathon-digital-worth-a-buy-right-now/Is Marathon Digital Worth a Buy Right Now?The crypto sector has been highly volatile as of late. This sector has gone from what many termed a “crypto winter” to somewhat of a spring of late. Crypto prices are rebounding, leading to bullish price appreciation for most crypto miners. Following a big dip earlier this year, Marathon Digital (MARA) now seems to be on the rise.As Bitcoin prices continue to fluctuate, crypto miners are likely to continue to see volatility. However, Marathon's unique business model has fans of crypto-mining acting bullishly.https://bitcoinist.com/white-hat-hacker-saves-coinbase/White Hat Hacker Protects Coinbase From Danger By Spotting ThreatA White Hat hacker's prompt intervention saved Coinbase's sophisticated trading platform from disaster.“Tree of Alpha,” a White Hat Hacker, contacted Coinbase Chief Executive Officer Brian Armstrong to warn him that third-parties could theoretically transfer Coinbase order books at arbitrary rates, which might result in a big payout for criminals.https://alternative.me/crypto/fear-and-greed-index/https://coinmarketcap.com/Please subscribe, like, and share so that more and more people can view this content.DISCLAIMER: I will never give any financial advice. And my channel is not considered official Financial Advice. Please do your research before purchasing any cryptocurrency.Thank you very much DaveSupport this podcast at — https://redcircle.com/daves-daily-crypto-take/donations

Every Town
Homeless White Hat Hacker - Adrian Lamo - Wichita, KS

Every Town

Play Episode Listen Later Feb 11, 2022 32:27


White Hat Hacker Adrian Lamo, broke into several computer networks of high-profile companies and got himself entangled in a controversy involving WikiLeaks. Suddenly, he earned the ire of prominent people and organizations and became a target. Despite having no permanent home he could call his own, perhaps it all became too much of a heavy load for him to carry, that at the young age of 37, he signed out...completely.

Springwald Radio
White-Hat-Hacking

Springwald Radio

Play Episode Listen Later Feb 9, 2022 117:41


Was macht ein White-Hat-Hacker und was unterscheidet ihn von Black Hat und Grey Hat? Was steckt hinter den Begriffen "Reverse Engineering", "Penetration Testing" und "Code-Audits"? In dieser Folge berichtet Thomas von seinem Forschungs-Semester in einer Security-Firma.

Open Loops with Greg Bornstein: Conversations That Bend
Scrypnosis, Double-Encrypted Holy Scrolls, and Creating The Original Metaverse with Mind-Space-Time Matrix Hacker, David Brager

Open Loops with Greg Bornstein: Conversations That Bend

Play Episode Listen Later Feb 3, 2022 192:33


Sign up for a free Hypnosis Discovery Call with Greg at https://calendly.com/gregbornstein/hypnoIf you enjoy this podcast, please rate this show and leave a review! Even a few words can help. Just go to ratethispodcast.com/openloopsFollow Greg on Instagram @thegregbornsteinTo catch Open Loops LIVE, make sure you follow our YouTube Channel: https://www.youtube.com/channel/UClAn8jOF8PDkCxZXhiL3lIg and Facebook page: https://www.facebook.com/OpenLoopsPodThis episode is one of the weirdest yet. But take look at your reality and the news right now, and you tell us anything out here is "normal."  David Brager is a self-proclaimed White Hat Hacker, creator of Scrypnosis, author of "The Future's Toolkit," and an Aquarius. He also has an argument that he's the next King David in the line of Hebrew royalty.  David merged hypnosis with BASIC computer programming and the Commodore 64 in the early 80s, and since that point, he's mapped out the matrix of the human mind, as well as all of space-time.  By merging the imagination with computers in the 80s, he preceded  "virtual reality" and the Metaverse by 38 years and now wants the world to use the tools he's created FOR FREE to save ourselves for the tyrants of humanity stopping us from our full human potential.  He also wants you to smoke pot. Greg wants you to smoke pot while listening to the episode.  Loopers....meet loopiest. David Brager is about to blow your mind open again and again and again.... David's Links- Script to fix PTSD in one session run once:http://tinyurl.com/BasicAllInOneHis book's PDF:https://drive.google.com/file/d/1-396ishwe6X8UUxAbOpERP7wETRjMKTD/view?usp=sharingFront cover art:https://drive.google.com/file/d/1-84PA0Z03X7kUmoKCZIuSdS1vn8cSoJb/view?usp=sharingBack cover art:https://drive.google.com/file/d/1-8A34bERYJyHASqAAktxUDdnrufM2Pra/view?usp=sharingRussian Book Alien Races appendix (Alien Dixit) says there are lines on your planet and asks to follow them. Go to Lat 8 S 108 W at an eye altitude 420 miles. See MR. SPOCK'S SHIN with a ratio of 4 to 1 to the left and 2 to 1 across the top. 42.https://exopolitics.blogs.com/files/russian.secret.alien.races.book.pdfUpgrading Patriotism Article: https://bit.ly/3J4wnrp

AIM Indonesia for Kids
1602 : White Hat Hacker

AIM Indonesia for Kids

Play Episode Listen Later Jan 21, 2022 7:17


Apa lagi ini? Hacker atau peretas topi putih. Di dunia ini ada istilah hacker atau peretas. Apakah kalian tahu? Bahkan peretas termuda di dunia tercatat berumur 13 tahun. Seorang anak dari India. Ayo kita dengarkan berita dan kisahnya sambil kita mendenarkan renungan hari ini.

The CyberWire
Tension in Eastern Europe. A Hong Kong watering hole. US, EU join the Paris Call. Cybermercenaries. CISA's plans for countering disinformation, and for forming a white-hat hacker advisory group.

The CyberWire

Play Episode Listen Later Nov 12, 2021 26:18


Notes on rising international tension in Eastern Europe. A watering-hole campaign in Hong Kong. The US and the EU have joined the Paris Call. NSO Group's prospective CEO resigns his position before formally assuming it. Void Balaur, a cybermercenary group, is active in the Russophone cyber underground. Johannes Ullrich on leaked vaccination cards and Covid tests. Our guest is Carolyn Crandall of Attivo Networks on what organizations should be focused on to protect Active Directory. CISA intends to increase its capacity to work against misinformation and disinformation. CISA also intends to recruit white hat hackers to an advisory board. For links to all of today's stories check out our CyberWire daily news briefing: https://www.thecyberwire.com/newsletters/daily-briefing/10/218

The Josh Boone Show
#10: Jay Smith – Cyber Security, Doxing & The Weaponization of Data

The Josh Boone Show

Play Episode Play 60 sec Highlight Listen Later Oct 13, 2021 100:11 Transcription Available


There's an artist on Instagram called DrFakenstein, and he does weird short meme videos, like having Snoop Doug's face on a little girl. That is known as a deep fake, and while the memes are hilarious, there are much more nefarious uses for this technology.What happens when this is weaponized, and used for extensive PR assassinations, or false flag operations by government agencies around the world?What happens then when the far-left or far-right starts habitually doxxing and attacking people over false accusations?Do we continue to spiral into chaos, or do we sign all digital media with some sort of blockchain certificate of authenticity?And let's say there's massive data breaches, and someone gets access to a celebrity or politician's iCloud account, all there photos and videos – or someone pulls an Edward Snowden and releases tens of thousands of government documents – what if 99% of that is real, but 1% is secretly-doctored and that's what the media runs with?Even if the truth surfaces, the damage is largely done, as the retraction is gonna be buried in the news cycle – and in fact, it'll become a conspiracy theory that the retraction itself is the real fake news.How do we protect ourselves from being hacked, both in our data, and in our world-views?That's some of what we dive into today with our guest Jay Smith. Jay is a Digital Forensic Analyst, Private Investigator, US Army Veteran, and White Hat Hacker based in Louisville, KY – with a degree in psychology from the University of Louisville, and is now an instructor in Digital Forensics and Security at Loyola University.He currently operates Alliance Investigation Group, where he merges private Investigation services with modern cyber security methodologies to offer support, protection and education to individuals, families and small businesses.And that is what fascinated me about Jay is how he operates at the intersection of all of these areas and has a uniquely holistic perspective on the current digital landscape.Some of the topics we dive into are:The threat of deep fakes.TikTok, misinformation, doxing, and open-source intelligence.Anti-doxing legislation and it's implications.The weaponization of Reddit.Gen Z and their relationship to online identity.The long-term effects of social media, echo chambers, and self-referential feedback loops.The threat of social credit scores.Decentralization, blockchain, and dispersing the power of data.Wall Street Bets, Gamestop, and the hypocrisy of the financial institutions.The psychology of social engineering.The 80/20 of online security and what you can do to protect yourself.The illusion of anonymity and permanence of data.The emotional weight of working as a private investigator.Tribalism and the rise of the binary world.And much more.Links from this episode:DrFakenstein on InstagramMail Out OutKevin Rose podcast with founder of ArweaveConnect with Jay:LinkedIn: @jaysmith502Website: AllianceInvestigationGroup.comMusic by Kirby Johnston – check out his band Aldaraia on Spotify

Kurz informiert – die IT-News des Tages von heise online
N26, Epic Games, Kernfusion, White Hat Hacker | Kurz informiert vom 19.08.2021 by heise online

Kurz informiert – die IT-News des Tages von heise online

Play Episode Listen Later Aug 19, 2021


Heute mit: N26, Epic Games, Kernfusion, White Hat Hacker ***SPONSOR-HINWEIS*** Um unsere Podcasts stetig weiter zu verbessern und für euch spannende Themen auswählen zu können, ist Eure Meinung bei unserer Podcast-Umfrage gefragt. Einfach auf https://www.heise.de/podcast-umfrage gehen und mitmachen. Dankeschön ***SPONSOR-HINWEIS ENDE***

TechtalkRadio
EPISODE 310: Blame It On Milli Vanilli

TechtalkRadio

Play Episode Listen Later Aug 15, 2021 55:26


In this week's show, Justin is back from Maui and joins Shawn, Broadway and Andy telling us about his trip and getting stuck in Vegas. How has gaming changed in Vegas; it was a bit of a surprise. Social Media and viral videos are discussed with the talk looking at how some have chosen to take a step back from Facebook, Snapchat, TikTok and other avenues while still finding Reddit a place for connecting. Shawn shares about Apollo and why he uses this. The big takeaway for Shawn that stepped away from Facebook was realizing the goal of creating content should be a fun experience but for the creator not to appease others. The recent news from Apple to help locate exploited children and illegal content on accounts is discussed. The recent film documentary about the late Anthony Bourdain has the guys talk about AI recreating his voice for a segment of the film. Val Kilmer recently connected with a company to recreate his voice, although not used in the documentary Val, it opens the idea of using AI for Instruction by familiar voices. While Broadway somehow seems to be able to bring up Milli Vanilli he does make a point. A recent event involving Poly Network had a hack and theft of nearly $600 Million off the Blockchain. At record time this had just happened and considering the news, reports are the money has been returned by what some are calling a "White Hat Hacker." This has the guys talk about a Crypto Ledger. AMC Theaters announce they are looking at accepting Crypto Currency for the Theater Experience. Roku is continuing to present content they purchased from the Quibi Library. Some great shows and the consumers that own the Roku devices are enjoying the free streaming shows which has Roku looking at more original content. The guys mention other outlets for Free Ad Based programming including Tubi, Crackle, Plex.TV. Connect with Us on social media! Facebook @techtalkers Twitter @TechtalkRadio Instagram techtalkradio Web: TechtalkRadio.Com Subscribe and Like on Spreaker!

Daily Crypto Report
"White hat hacker saves the day" July 18, 2021

Daily Crypto Report

Play Episode Listen Later Jul 18, 2021 2:40


Today's blockchain and cryptocurrency news Brought to you by ungrocery.com Bitcoin is down slightly at $31,750 Ethereum is own slightly at $1,963 and Binance Coin is up slightly at $306 Lisk up 19% The Sandbox up 15% White hat hacker saves funds in live battle with bad actor. Taobao's annual maker festival to have NFTs SoftBank is putting $75M in Bullish. Hong Kong authorities shut down money money laundering ring.

Tech Gumbo
What does Block Chain mean to you, and, Who are good hackers?

Tech Gumbo

Play Episode Listen Later Nov 23, 2020 22:12


We talk about Block Chain and what it means to you. What is a White Hat Hacker and what is HackerOne and how does someone become a "Good Hacker"?

HC Universal Network
DnB Ep 296: Ethical Hacking and Fork This Life with Ryan Rutan

HC Universal Network

Play Episode Listen Later Nov 18, 2020 74:52


In this episode of the Dudes n Beer podcast host Christopher Jordan welcomes Ryan Rutan, leader of a group of white hat hackers and digital penetration specialists known as the Synack Red Team and author of the new book Fork This Life: Volume One to the show to discuss the world of the “White Hat Hacker” as well as what led him to begin writing books about the life and world of hackers. “A computer savvy teenage boy is uprooted by his parents' abrupt divorce and forced to relocate from the East Coast to small-town Texas. He traverses his way through high school, relationships and early adulthood in search of his place in a world ensnared by the rise of personal computing, technology and the Internet in the 1990's.” This is the preamble to the book Fork This Life: Volume One. Join the Dudes n Beer podcast as we are joined by author Ryan Rutan to discuss the pros and cons of hacking in a modern day society as well as what brought him to venture into the world of novel writing. The Dudes n Beer podcast is a proud member of the HC Universal Network family of podcasts. Download the FREE Dudes n Beer Podcast app for Android and iDevices or visit our LISTEN LIVE page and join the conversation.

Dudes n Beer Podcast
DnB Ep 296: Ethical Hacking and Fork This Life with Ryan Rutan

Dudes n Beer Podcast

Play Episode Listen Later Nov 18, 2020 74:52


In this episode of the Dudes n Beer podcast host Christopher Jordan welcomes Ryan Rutan, leader of a group of white hat hackers and digital penetration specialists known as the Synack Red Team and author of the new book Fork This Life: Volume One to the show to discuss the world of the “White Hat Hacker” as well as what led him to begin writing books about the life and world of hackers.“A computer savvy teenage boy is uprooted by his parents' abrupt divorce and forced to relocate from the East Coast to small-town Texas. He traverses his way through high school, relationships and early adulthood in search of his place in a world ensnared by the rise of personal computing, technology and the Internet in the 1990's.” This is the preamble to the book Fork This Life: Volume One.Join the Dudes n Beer podcast as we are joined by author Ryan Rutan to discuss the pros and cons of hacking in a modern day society as well as what brought him to venture into the world of novel writing.The Dudes n Beer podcast is a proud member of the HC Universal Network family of podcasts. Download the FREE Dudes n Beer Podcast app for Android and iDevices or visit our LISTEN LIVE page and join the conversation.

HC Universal Network
DnB Ep 296: Ethical Hacking and Fork This Life with Ryan Rutan

HC Universal Network

Play Episode Listen Later Nov 18, 2020 74:52


In this episode of the Dudes n Beer podcast host Christopher Jordan welcomes Ryan Rutan, leader of a group of white hat hackers and digital penetration specialists known as the Synack Red Team and author of the new book Fork This Life: Volume One to the show to discuss the world of the “White Hat Hacker” as well as what led him to begin writing books about the life and world of hackers. “A computer savvy teenage boy is uprooted by his parents’ abrupt divorce and forced to relocate from the East Coast to small-town Texas. He traverses his way through high school, relationships and early adulthood in search of his place in a world ensnared by the rise of personal computing, technology and the Internet in the 1990’s.” This is the preamble to the book Fork This Life: Volume One. Join the Dudes n Beer podcast as we are joined by author Ryan Rutan to discuss the pros and cons of hacking in a modern day society as well as what brought him to venture into the world of novel writing. The Dudes n Beer podcast is a proud member of the HC Universal Network family of podcasts. Download the FREE Dudes n Beer Podcast app for Android and iDevices or visit our LISTEN LIVE page and join the conversation.

HC Universal Network
DnB Ep 296: Ethical Hacking and Fork This Life with Ryan Rutan

HC Universal Network

Play Episode Listen Later Nov 18, 2020 74:52


In this episode of the Dudes n Beer podcast host Christopher Jordan welcomes Ryan Rutan, leader of a group of white hat hackers and digital penetration specialists known as the Synack Red Team and author of the new book Fork This Life: Volume One to the show to discuss the world of the “White Hat Hacker” as well as what led him to begin writing books about the life and world of hackers. “A computer savvy teenage boy is uprooted by his parents’ abrupt divorce and forced to relocate from the East Coast to small-town Texas. He traverses his way through high school, relationships and early adulthood in search of his place in a world ensnared by the rise of personal computing, technology and the Internet in the 1990’s.” This is the preamble to the book Fork This Life: Volume One. Join the Dudes n Beer podcast as we are joined by author Ryan Rutan to discuss the pros and cons of hacking in a modern day society as well as what brought him to venture into the world of novel writing. The Dudes n Beer podcast is a proud member of the HC Universal Network family of podcasts. Download the FREE Dudes n Beer Podcast app for Android and iDevices or visit our LISTEN LIVE page and join the conversation.

ZDNet Security Update
White hat hacker reveals the real job of an infosec pro

ZDNet Security Update

Play Episode Listen Later Aug 7, 2020 14:05


ZDNet Security Update: Danny Palmer talks to Bugcrowd's Anna Westelius about what it takes to work in the field of information security and why more diversity is needed to drive the industry forward. FOLLOW US  - Subscribe to ZDNet on YouTube: http://bit.ly/2HzQmyf - Watch more ZDNet videos: http://zd.net/2Hzw9Zy - Follow ZDNet on Twitter: https://twitter.com/ZDNet - Follow ZDNet on Facebook: https://www.facebook.com/ZDNet - Follow ZDNet on Instagram: https://www.instagram.com/ZDNet_CBSi - Follow ZDNet on LinkedIn: https://www.linkedin.com/company/zdnet-com/ - Follow ZDNet on Snapchat: https://www.snapchat.com/add/zdnet_cbsi Learn more about your ad choices. Visit megaphone.fm/adchoices

Beyond The Perimeter Podcast
Episode 03 - Hacking with a Purpose: Life as a White Hat Hacker

Beyond The Perimeter Podcast

Play Episode Listen Later Aug 3, 2020 27:31


In this edition of the Beyond the Perimeter Podcast, we discussed the Twitter hack which saw many famous celebrity accounts being hijacked which resulted in spreading a cryptocurrency scam. We also interviewed Len Noe who is a white hat hacker and cyber security specialist.

Beyond The Perimeter Podcast
Episode 03 - Hacking with a Purpose: Life as a White Hat Hacker

Beyond The Perimeter Podcast

Play Episode Listen Later Aug 3, 2020 27:31


In this edition of the Beyond the Perimeter Podcast, we discussed the Twitter hack which saw many famous celebrity accounts being hijacked which resulted in spreading a cryptocurrency scam. We also interviewed Len Noe who is a white hat hacker and cyber security specialist.

Something To Think About
90: Are You a White Hat Hacker?

Something To Think About

Play Episode Listen Later Jul 31, 2020 9:24


In cyberland there is a war going on between hackers.  Some, like the black hat hackers, are malicious and out to corrupt a computer system.  Others, like the white hat hackers, are trying to defend and protect their computer system.  Spiritually there is a war going on in the mind.  Satan is like a black hat hacker and we must learn to guard our minds.  Are you a white hat hacker?

Helping You Tech
10 gadgets every white hat hacker needs in their toolkit

Helping You Tech

Play Episode Listen Later Jul 18, 2020 16:48


10 gadgets every white hat hacker needs in their toolkit

Hustleshare
AJ Dumanjug - The Hustle Of A White Hat Hacker

Hustleshare

Play Episode Listen Later Jul 5, 2020 52:56


How did a hacker earn his first million at the age of 19 by exposing websites like Facebook and Medium? In this episode Ronster chats with AJ Dumanjug of Secuna. AJ will share how he became a self-taught white hat hacker and how he made a million by bounty hunting for big websites. He will also share how he improved by joining the hacking community in the Philippines and how he helped UP as a one-man team for their cybersecurity. AJ will also share how he founded his cybersecurity startup Secuna and how he found the perfect co-founder for it. Lastly, he will share amazing tips for businesses on how to prevent any data breaches and for developers to become better at cybersecurity in this episode brought to you by Unionbank Globallinker. For show notes, go to hustleshare.com Hustleshare is a proud affiliate of the Podcast Network Asia

Nerds of Law Podcast
Nerds of Law 11 – Der Hacker mit dem weißen Hut

Nerds of Law Podcast

Play Episode Listen Later Jun 19, 2020 49:09


Nerds of Law 11 – Der Hacker mit dem weißen Hut Wenn Peter Echer von LemonPi zu Besuch kommt und aus dem Nähkästchen plaudert, ist der “Explicit-Tag” nicht weit. Von der Suche nach geldgierigen Vampiren zu untreuen Ehefrauen und der Frage: Sind Macs wirklich besser als PCs? Wir lernen auch viel über IT Security und was die Ausbildung zum White Hat Hacker mit der Rechtsanwaltsprüfung zu tun hat. LemonPi https://www.lemonpi.at Maltego https://www.maltego.com Kali Linux https://www.kali.org Burp Suite https://portswigger.net/burp Hack 5 https://shop.hak5.org Rubber Duckie https://shop.hak5.org/products/usb-rubber-ducky-deluxe Firefly https://de.wikipedia.org/wiki/Firefly_–_Der_Aufbruch_der_Serenity Serenity https://de.wikipedia.org/wiki/Serenity_–_Flucht_in_neue_Welten Doctor Who https://de.wikipedia.org/wiki/Doctor_Who Salvation (Netflix) https://www.netflix.com/title/80171099 Subscribe to the Podcast RSS Feed https://nerdsoflaw.libsyn.com/rss Apple Podcast https://podcasts.apple.com/de/podcast/nerds-of-law-podcast/id1506472002 SPOTIFY https://open.spotify.com/show/12D6osXfccI1bjAzapWzI4 Google Play Store https://playmusic.app.goo.gl/?ibi=com.google.PlayMusic&isi=691797987&ius=googleplaymusic&apn=com.google.android.music&link=https://play.google.com/music/m/Idvhwrimkmxb2phecnckyzik3qq?t%3DNerds_of_Law_Podcast%26pcampaignid%3DMKT-na-all-co-pr-mu-pod-16 YouTube https://www.youtube.com/playlist?list=PL7rmwzBy-IRGh8JkLCPIjyGMA-nHMtiAC Deezer https://www.deezer.com/de/show/1138852 Nerds of Law http://www.nerdsoflaw.com https://twitter.com/NerdsOfLaw https://www.instagram.com/nerdsoflaw/ https://www.facebook.com/NerdsOfLaw/ Music by Mickbordet www.mickbordet.com

Kim Komando Today
Cybersecurity tips from a white hat hacker

Kim Komando Today

Play Episode Listen Later Apr 7, 2020 20:43


Coronavirus scams are spreading at an alarming rate. To make matters worse, the junk email and bogus texts that normally flood our inboxes and phones become a lot harder to weed out when we're desperate for information. Kim talks to IBM social engineer Stephanie Carruthers, aka _sn0ww, about the surge in spam capitalizing on our fears and confusion. Learn about the biggest spam campaigns making the rounds right now and how you can stay safe online. Learn more about your ad choices. Visit megaphone.fm/adchoices

Komando On Demand
Cybersecurity tips from a white hat hacker

Komando On Demand

Play Episode Listen Later Apr 7, 2020 20:37


Coronavirus scams are spreading at an alarming rate. To make matters worse, the junk email and bogus texts that normally flood our inboxes and phones become a lot harder to weed out when we're desperate for information. Kim talks to IBM social engineer Stephanie Carruthers, aka _sn0ww, about the surge in spam capitalizing on our fears and confusion. Learn about the biggest spam campaigns making the rounds right now and how you can stay safe online.

Day[0] - Zero Days for Day Zero
A Dark White-Hat hacker? and various vulns ft. Cisco, Periscope, NordVPN and Tesla/EyeQ

Day[0] - Zero Days for Day Zero

Play Episode Listen Later Feb 25, 2020 120:52


Keeping up our streak, we talk about some vulnerabilities in Cisco, NordVPN and Tesla, and about SlickWraps being hacked by a very dark, white-hat. [00:02:32] Humble Book Bundle: Cybersecurity 2020 by Wiley [00:11:31] Google Summer of Code 2020 https://radare.org/gsoc/2020/ [00:23:01] Critical Issue In ThemeGrill Demo Importer [00:28:48] Cisco Security Advisory: Cisco Smart Software Manager On-Prem Static Default Credential Vulnerability [00:32:19] nordvpn Linux Desktop executable application does not use pie / no ASLR [00:40:57] Race condition (TOCTOU) in NordVPN can result in local privilege escalation [00:49:17] Periscope android app deeplink leads to CSRF in follow action [00:54:01] I hacked SlickWraps. This is how. - Lynx0x00 - Medium https://files.catbox.moe/fxn9r2.pdf [01:10:23] Model Hacking ADAS to Pave Safer Roads for Autonomous Vehicles [01:18:31] Edge CVE-2020-0767 RCE POC [01:22:02] GadgetProbe: Exploiting Deserialization to Brute-Force the Remote Classpath [01:28:37] CopyCat: Controlled Instruction-Level Attacks on Enclaves for Maximal Key Extraction [01:37:31] MEUZZ: Smart Seed Scheduling for Hybrid Fuzzing [01:49:36] pwn.college BETA [01:53:17] Microcontroller Readback Protection: Bypasses and Defenses [01:54:00] Libxml2 Tutorial | AFLplusplus [01:56:06] Booting iOS on QEMU Research Slides https://github.com/alephsecurity/confs/blob/master/OFFENSIVE20/offensive-20-ios-qemu.pdfhttps://github.com/alephsecurity/xnu-qemu-arm64 Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST) Or the video archive on Youtube (@DAY[0])

Podcast: vyčníWAY
Jobsession: #3 Etičtí hackeři hesla nekradou, vysvětluje Marek Jílek, white hat hacker z Deloitte

Podcast: vyčníWAY

Play Episode Listen Later Nov 12, 2019 44:25


Když se řekne hacker, minimálně lidem, jejichž profesní život závisí na jednom nezálohovaném počítači, se naježí chlupy. Když ale někdo do placu hodí slovo white hat hacker, většina lidí znejistí. Jenže hackerů existuje víc a ne všichni jsou na temné straně. Marek Jílek, který hackuje ve firmě Deloitte, je zrovna ten hodný, doslova etický hacker. ***Jobsession: Třeba tě to celý život táhne do strojírenství, možná se vidíš jako art director v reklamce. A nebo zatím vůbec netušíš, kam se po škole vydat. Cest je dneska tolik, že tě z toho možná dohání rozhodovací paralýza. Jaký obor je pro tebe ten nejvhodnější a co práce v konkrétním odvětví obnáší? Kuba Ouvín, jeho hosté a nejzajímavější možnosti v českém pracovním rybníčku.

Crazy Careers to Consider

For the most part, the movies have portrayed hackers as a socially awkward person, living in a basement wearing a hoodie stealing money from bank computers. While there may be some truth to that stereotype (heck we don’t know) we definitely know that there are ethical hackers, or white hat hackers who hack into computers for good. Intrigued? Find out more in this week’s podcast!

Zero Knowledge
Episode 29: The DAO, the white hat hacker group & Giveth with Griff

Zero Knowledge

Play Episode Listen Later Jun 13, 2018 51:48


In this episode, Griff Green shares his experience of working through The DAO hack, the white hat hacker group & Giveth. Through his telling of this story, we are given a front row seat to one of the most exciting events in ethereum and general blockchain history. These events also set the stage for a lot of the decisions, attitudes, rifts and relationships that have since taken hold - from the emergence of the white hat hacker group, the currency split, to the attitude towards governance and immutibility and the community's attitude towards the very concept of a DAO. The story leads us to Griff's latest project Giveth, an ethereum-based project that aims to bring back some of the most inspiring ideas from the era of the DAO, and applies them towards charitable giving. To get involved with Giveth check out their Riot Channel (https://giveth.io/join/) To hear a bit more about Griff's work check out this video (https://www.youtube.com/watch?v=1QrlSJRLh-4) or follow him on twitter HERE (https://twitter.com/thegrifft)

BITCAST
BitCast 014 – Criptografia, Segurança, Futuro do Bitcoin, Blockchain e mais (parte 2)

BITCAST

Play Episode Listen Later Nov 20, 2017 60:30


Continuação do EP 013, com a nossa entrevista de um White Hat Hacker, especialista em segurança e criptografia. Falamos sobre o Futuro do Bitcoin, a Tecnologia Blockchain, e bananas… Ficou curioso? Ouça agora.

BITCAST
BitCast 013 – Criptografia, Segurança, Mineração e Forks (Parte 1)

BITCAST

Play Episode Listen Later Nov 12, 2017 72:10


Trouxemos um Hacker para conversar com a gente sobre Criptografia, Segurança, Mineração e Forks! Como assim? Trata-se de um “Hacker do bem”, ou também conhecido também como “White Hat Hacker”. O Gwin é responsável pela segurança de várias exchanges no mundo, incluindo Brasil e até Rússia e deu uma aula sobre Bitcoin!

Hackerfunk
HF-112 - Hackerethik

Hackerfunk

Play Episode Listen Later Mar 23, 2017 147:20


In dieser Folge diskutieren Axel und Venty über die Hackerethik und stellen dabei fest, dass es da nur schon bei zwei Leuten einen ziemlich grossen Interpretationsspielraum gibt. Fast währen sich die beiden in die Haare geraten, aber dann haben sie es einfach ausdiskutiert, am Radio, wie sich das gehört. :) Und abgeschwoffen sind sie dabei auch. Trackliste Wird noch nachgereicht… Hackerethik :: Die CCC Hackerethik Hackerethik :: Die Hackerethik bei Wikipedia White Hat :: White Hat Hacker Black Hat :: Black Hat Hacker Hackers :: Steven Levy's Hackers Buch Phrack Magazine :: The Conscience of a Hacker soda.camp :: School of Data in Switzerland Andy Warhol :: Andy Warhol's Amiga Werke Bilder in Musik :: 11 Hidden Images Embedded Into Songs S2 Protein Translation :: The Shamen - S2 Translation (Album: Arbor Bona - Arbor Mala) Voyager 1 :: Voyager 1 Probe Captures Sounds of Interstellar Space File Download (147:20 min / 148 MB)

Hackerfunk
HF-112 - Hackerethik

Hackerfunk

Play Episode Listen Later Mar 22, 2017 147:20


In dieser Folge diskutieren Axel und Venty über die Hackerethik und stellen dabei fest, dass es da nur schon bei zwei Leuten einen ziemlich grossen Interpretationsspielraum gibt. Fast währen sich die beiden in die Haare geraten, aber dann haben sie es einfach ausdiskutiert, am Radio, wie sich das gehört. :) Und abgeschwoffen sind sie dabei auch. Trackliste Wird noch nachgereicht… Hackerethik :: Die CCC Hackerethik Hackerethik :: Die Hackerethik bei Wikipedia White Hat :: White Hat Hacker Black Hat :: Black Hat Hacker Hackers :: Steven Levy's Hackers Buch Phrack Magazine :: The Conscience of a Hacker soda.camp :: School of Data in Switzerland Andy Warhol :: Andy Warhol's Amiga Werke Bilder in Musik :: 11 Hidden Images Embedded Into Songs S2 Protein Translation :: The Shamen - S2 Translation (Album: Arbor Bona - Arbor Mala) Voyager 1 :: Voyager 1 Probe Captures Sounds of Interstellar Space File Download (147:20 min / 148 MB)

Tech Talker's Quick and Dirty Tips to Navigate the Digital World

In this week’s episode I’m going to give you a brief syllabus on how to become a white hat hacker. I’ll cover the skills you need, where to learn, and best of all how to start your career. Read the full transcript here: http://bit.ly/2cv0AzT

No Prisoners, No Mercy
No Prisoners, No Mercy - Show 164

No Prisoners, No Mercy

Play Episode Listen Later Sep 16, 2015 78:57


Welcome to Show 164! This time out Fran, Julie, Chris and Steve site down and talk about the following subjects (see below).  Next time we welcome Adam Cogan from Sparkplug Games, who will talk to us about their upcoming game “Firefly Online”.   See you online, Fran, Julie, Chris and Steve   1.   The Smed, Zeekill and the “White Hat Hacker” – did Sony provoke attacks? 2. White hat hackers 3. Video game movies. Keven Smith and “The Hollywood Formula” 4.  Xbox One, Fallout 4, Bethesda , Ubisoft learns their lesson, Assassins Creed Syndicate (and finally a female protagonist!), Square Enix finally gives in and remakes Final Fantasy 7.   5. Square Enix and the best and worst of the Final Fantasy Series (on and offline)

CareerGuysnGals
Hacked by White HAt Hacker

CareerGuysnGals

Play Episode Listen Later Aug 13, 2013 9:34


Hacked By Not Matter who am i i am white Hat Hacker please update your wordpress

Crawfordville UMC » Sermons
Hacked by White HAt Hacker

Crawfordville UMC » Sermons

Play Episode Listen Later Jul 24, 2012 0:01


Hacked By Not Matter who am i i am white Hat Hacker please update your wordpress read on →