Monday, September 25, 2023

Under The Rose with Mike Petrie

Mike Petrie, a pioneer in the fraud investigative industry, discusses his journey into the field and the evolution of investigative techniques. He emphasizes the importance of social media intelligence and the role it plays in uncovering fraud. Mike also...

Infosec Sherpa with Tracy Z. Maleeff

In the unpredictable landscape of the digital mountains, a remarkable group of Sherpas thrives as guides, offering vital information during expeditions. Among them, Tracy Z. Maleeff stands out as a cybersecurity expert, leading and inspiring others on their journey....

The Cheat Code with Colleen Lennox & Jason Brooks

Cybersecurity professionals are essential for keeping organizations safe from potential threats and ensuring business continuity. According to recent studies, the demand for cybersecurity professionals has surged significantly, and this trend is expected to continue. Unfortunately, qualified people are still...

Snake Eyes with Allen Woods

Often, risk and reward collide. Corporate giants and high-stakes gamblers unknowingly walk parallel paths. Their worlds may seem separate to outsiders, although fate has a way of intertwining their destinies. Both are driven by ambition, chasing triumph. But as...

Darkside with Larry Herzog

Embark on a captivating journey as we venture into the enigmatic and clandestine world lurking below the surface of the internet. Prepare to explore the depths of cybercrime, illicit trades, and covert activities that take place in the digital...

Shadow Warrior with Ric Prado

In the covert world of intelligence and espionage, where shadows merge with reality, there exists a select group of individuals who operate on the razor's edge between life and death. Among them is a man named Ric Prado, AKA...

Icon with Phillip Wylie

Philip Wiley, AKA The Hacker Maker, is an experienced pentester, educator, author and speaker. He has been invited to give presentations at countless cons. He currently hosts the top ranked podcast, "Hacker Factory" and his self-titled podcast, "Philip Wiley...

Unmasked with Nelson Santos

Pentera is a company that specializes in automated security testing and vulnerability management. Its platform uses a combination of automated and manual testing techniques to identify and prioritize security vulnerabilities in an organization's infrastructure. By doing so, Pentera helps...

BONUS: BCP LIVE at SecureWorld Philadelphia 2023

SESSION TITLE: CISOs Riff on the Latest in CybersecurityRECORDED: 4/19/23LOCATION: Valley Forge Casino and Event CenterGUESTS: David Lingenfelter (VP, Information Security, PENN Entertainment), Krista Arndt (CISO, United Musculoskeletal Partners) and Bistra Lutz (Director of Global Information Security Operations, Crown...

Freaky Clown with FC

FC has gone through extreme adversity and has come out stronger on the other side.  He grew up in a very negative environment, which unfortunately led to the development of complex PTSD. But from that emerged a unique talent,...

Grit with Andres Andreu

Grit in the context of behavior is defined as “firmness of character; indomitable spirit.” Andres Andreu, a NYC bred leader, has a career built on grit and sheer perseverance with experience spanning from the D.E.A. to corporate America.Co-Host, and...

Sociotechnical Exploitation with Bruce Schneier

The Sociotechnical Theory is an organizational theory that emphasizes the importance of both social and technical factors in designing and managing systems. Sociotechnical systems are deeply embedded within society and prone to "hacking", a term meaning to subvert a...

Eras Of Dialect with John Miller

As a large language model trained by OpenAI, ChatGPT has been designed to understand and generate human-like text based on a massive amount of data. From writing creative stories and poetry to answering complex questions and providing personalized recommendations,...

Harkness with Jason Brooks and Keenan Hale Jr.

The Harkness method is a discussion-based learning style that emphasizes student centric discussion and active participation in a classroom setting. The goal is to create an environment where students can share their thoughts and perspectives, engage in meaningful conversations,...

Adrenaline Rush with Jim Lawler

Jim "Mad Dog" Lawler is a national security consultant, serving as the Senior Partner at MDO Group, which provides HUMINT training to the Intelligence Community and the commercial sector focused on WMD, CI, technical and cyber issues. He served...
Infosecurity Magazine

Researchers Spot Novel “Deadglyph” Backdoor

Malware is linked to UAE-backed spies
Infosecurity Magazine

Almost US 900 Schools Breached Via MOVEit

National Student Clearinghouse reveals more details of incident

Don’t Get Burned by CAPTCHAs: A Recipe for Accurate Bot Protection

Traditional CAPTCHAs, such as reCAPTCHA, no longer protect online businesses adequately. Real users hate them. Bots bypass them. It's time to upgrade.
The Hacker News

New Report Uncovers Three Distinct Clusters of China-Nexus Attacks on Southeast Asian Government

An unnamed Southeast Asian government has been targeted by multiple China-nexus threat actors as part of espionage campaigns targeting the region over extended periods of time. "While this activity occurred around the same time and in some instances even simultaneously...
The Register

T-mobile exposes some customer data – but don’t call it a breach

PLUS: Trojan hidden in PoC; cyber insurance surge; pig butchering's new cuts; and the week's critical vulns Infosec in brief  T-Mobile has had another bad week on the infosec front – this time stemming from a system glitch that...