T1SP: Episode 29

T1SP: Episode 29



[ Subscribe to the Podcast: iTunes | Android | RSS ]

News


* [ ] Apple calls out FBI on iPhone decryption case
* [ ] Trump calls for a boycott of Apple, from an iPhone
* [ ] Judge Rules FBI Must Reveal Malware It Used to Hack Over 1,000 Computers
* [ ] Wow. Someone hacked @linuxmint’s website and replaced ISOs with backdoored version today http://blog.linuxmint.com/?p=2994
* [ ] This affects a universally used library (glibc) at a universally used protocol (DNS). Generic tools that we didn’t even know had network surface (sudo) are thus exposed, as is software written in programming languages designed explicitly to be safe. ~ Dan Kaminsky
* [ ] Mint Forum Hacked, website compromised, fake downloads posted
* [ ] TeslaCrypt now targeting Joomla sites as well as WordPress
* [ ] Hollywood Hospital pays 17K to decrypt files; hope they cleaned up afterwards otherwise they’ll be paying rent
* [ ] Patch your vServer; RCE flaw
* [ ] Power grid honeypot by MalCrawler


Ideas, updates, and discussion


* [ ] The San Bernadino health department changed the iCloud password (at the FBI’s request) after having the device for just a few hours
* [ ] The FBI didn’t have the other two phones, which were destroyed
* [ ] The implications for data security if US companies are told the government must be able to get in is that US citizens will soon be told that they cannot create, purchase, or use tech that is locked down in this way
* [ ] There’s another way to the iPhone data: https://threatpost.com/delicate-hardware-hacks-could-unlock-shooters-iphone/116388/ via @IOActive


Tools, talks, and projects


* [ ] Bitquark is releasing some subdomain research; will be added to SecLists
* [ ] Log.io web interface for looking at log files | http://www.tecmint.com/linux-server-log-monitoring-with-log-io/
* [ ] Lobotomy: Automate Android assessment and reversing | https://n0where.net/android-security-toolkit-lobotomy/
* [ ] SSLyze: https://n0where.net/fast-and-full-featured-ssl-scanner-sslyze/
* [ ] SELKS: Full NSM with Suricate and rule manager | https://www.stamus-networks.com/downloads/


Announcements


* [ ] I’ll be at the IOAsis at RSA next week; come by and say hello


Miscellaneous


* [ ] War-games movie prompted Reagan to take cybersecurity action | http://www.nytimes.com/2016/02/21/movies/wargames-and-cybersecuritys-debt-to-a-hollywood-hack.html


[ Subscribe to the Podcast: iTunes | Android | RSS ]

Notes


* The intro track is from one of my favorite EDM artists: Zomby. The song is ‘Orion’, and it’s from the ‘With Love’ album. Highly recommended if you like chill EDM.

Become a Member: https://danielmiessler.com/upgrade

See omnystudio.com/listener for privacy information.

Tämä jakso on lisätty Podme-palveluun avoimen RSS-syötteen kautta eikä se ole Podmen omaa tuotantoa. Siksi jakso saattaa sisältää mainontaa.

Jaksot(541)

The 4 AAAAs of the AI ECOSYSTEM: Assistants, APIs, Agents, and Augmented Reality

The 4 AAAAs of the AI ECOSYSTEM: Assistants, APIs, Agents, and Augmented Reality

In this episode, I break down what I believe is the emerging structure of the AI-powered world we're all building—consciously or not. I call it the “Four A’s”: Assistants, APIs, Agents, and Augmented ...

22 Huhti 202527min

Using the Smartest AI to Rate Other AI

Using the Smartest AI to Rate Other AI

In this episode, I walk through a Fabric Pattern that assesses how well a given model does on a task relative to humans. This system uses your smartest AI model to evaluate the performance of other AI...

19 Huhti 20259min

A Conversation with Patrick Duffy from Material Security

A Conversation with Patrick Duffy from Material Security

➡ Secure what your business is made of with Martial Security: https://material.security/ In this episode, I speak with Patrick Duffy from Material Security about modern approaches to email and cloud w...

15 Huhti 202526min

AICAD: Artificial Intelligence Capabilities For Attack & Defense

AICAD: Artificial Intelligence Capabilities For Attack & Defense

AI is changing cybersecurity at a fundamental level—but how do we decide what to build, and when? In this episode, I outline a structured way to think about AI for security: from foundational ideas to...

12 Huhti 202542min

A Possible Path to ASI

A Possible Path to ASI

The conversation around AGI and ASI is louder than ever—but the definitions are often abstract, technical, and disconnected from what actually matters. In this episode, I break down a human-centered w...

8 Huhti 202510min

A Conversation With Matt Muller From Tines

A Conversation With Matt Muller From Tines

➡ Build, run, and monitor workflows with Tines at: tines.com In this episode, I speak with Matt Muller, Field CSCO at Tines, about how automation and AI are transforming security operations at scale. ...

1 Huhti 202539min

UL NO. 474 | Signal OPSEC, White-box Red-teaming LLMs, Unified Company Context (UCC), New Book Recommendations, Single Apple Note Technique, and much more...

UL NO. 474 | Signal OPSEC, White-box Red-teaming LLMs, Unified Company Context (UCC), New Book Recommendations, Single Apple Note Technique, and much more...

STANDARD EDITION: Signal OPSEC, White-box Red-teaming LLMs, Unified Company Context (UCC), New Book Recommendations, Single Apple Note Technique, and much more... You are currently listening to the St...

31 Maalis 202518min

A Conversation With Slava Konstantinov From ThreatLocker

A Conversation With Slava Konstantinov From ThreatLocker

➡ Allow what you need, block everything else with ThreatLocker: threatlocker.com In this episode, I speak with Slava Konstantinov, ThreatLocker's MacOS Lead Architect, about their zero-trust approach ...

18 Maalis 202533min