Certified Vulnerable: How Certificates Can Be Exploited

Certified Vulnerable: How Certificates Can Be Exploited

A discussion with ITAL members Eric Brown and Scott Rysdahl with Micah Kryzer. Micah is a pentester by day but also works alongside the ITAL team. In this episode the crew overviews certificates, a big topic that transcends any one vendor or environment. Certificates are like an electronic passport meant to uniquely identify a person, computer or application on a network. This specific family of vulnerabilities discussed affects the Microsoft Active Directory certificate services, which is Mi...

Tämä jakso on lisätty Podme-palveluun avoimen RSS-syötteen kautta eikä se ole Podmen omaa tuotantoa. Siksi jakso saattaa sisältää mainontaa.

Jaksot(92)

Tabletop Exercises 2.0: How OpsBook Is Changing the Game

Tabletop Exercises 2.0: How OpsBook Is Changing the Game

What happens when your carefully crafted incident response playbook becomes worthless? Cody Sullivan from OpsBook reveals the brutal truth about tabletop exercises: most organizations are practicing w...

30 Kesä 202538min

The Invisible Threats: OT Meets IT in Modern Manufacturing

The Invisible Threats: OT Meets IT in Modern Manufacturing

Think you can manage industrial systems like your IT infrastructure? Think again. In this episode of The Audit, Dino Busalachi unpacks the high-stakes complexity of OT-IT convergence—and why your trus...

16 Kesä 202539min

Pwnagotchi: The AI Pet That Hunts Your Network Credentials

Pwnagotchi: The AI Pet That Hunts Your Network Credentials

What happens when you cross a Tamagotchi with a Wi-Fi hacking tool? You get the Pwnagotchi—a pocket-sized device that "feeds" on Wi-Fi handshakes and learns from its environment. In this episode, Jayd...

2 Kesä 202535min

Pi-hole: The Open Source DNS Firewall Revolutionizing Network Security

Pi-hole: The Open Source DNS Firewall Revolutionizing Network Security

Your network is talking behind your back—but Pi-hole is listening. Join The Audit as Pi-hole co-founders Dan Schaper and Adam Warner reveal how their open-source DNS sinkhole technology has become the...

12 Touko 202539min

Cybersecurity News: E-Z Pass Scam, Dead Internet Theory & $16.6B FBI Report

Cybersecurity News: E-Z Pass Scam, Dead Internet Theory & $16.6B FBI Report

Join The Audit for a news-packed episode as cybersecurity expert Matt Starland recounts a chilling near-miss with an E-Z Pass phishing scam—received just minutes after renting a car in Florida. His cl...

5 Touko 202542min

Inside InfraGard: How FBI Partnerships Attack Risks to Critical Infrastructure

Inside InfraGard: How FBI Partnerships Attack Risks to Critical Infrastructure

Join The Audit as we dive into the high-stakes intersection of critical infrastructure and cybersecurity with Tim Herman, President of InfraGard Minnesota. InfraGard is a unique public-private partner...

21 Huhti 202533min

The Future of Quantum: Majorana Particles, Encryption, AI, and Parallel Universes

The Future of Quantum: Majorana Particles, Encryption, AI, and Parallel Universes

Join The Audit as we explore the cutting-edge world of quantum computing with information security architect, Bill Harris. Quantum technology is advancing at breakneck speed, pushing the boundaries of...

7 Huhti 202536min

Eco-Security: The Intersection of Recycling and Technology

Eco-Security: The Intersection of Recycling and Technology

What Really Happens to Your Trash? Inside Modern Waste Management Is your trash really being recycled, or is it ending up in a landfill? In this episode of The Audit, we sit down with Trista Martinson...

24 Maalis 202522min