UL NO. 399: Wisdom Extraction From Any Text, Vegas Gets Cyber Jesus, AI Creativity Performance, Pentagon Cyber Strategy…
This week we talk about how I extract manual-quality wisdom from any text/transcript, what I learn from biographies, 25 lessons in 17 years of infosec, and tons of new tools and projects.
📢Sponsored by Vanta.com - scales with your business,...
UL NO. 398: Storm Vuln Stacking, CloudRecon, The S-Tier Guide to AI Whispering, Full-body MRIs…
Explore the explosive separation of society into the Thriving 10% vs. the Suffering 90%, how AI is becoming an integral part of our brains, and how to defend your family's privacy
📢Sponsored by Vanta
Building a SaaS business? Get ready for...
UL NO. 397: Propaganda in a Box, Glacier-like Security, AGI by 2028?, Ancient Wisdom via AI, and Newsletter Differentiation
🎥 Embracing Short-Form Video Creation🔬 Piping into Portscanner: A Guide📚 Long/Slow Content: The UL Book of the Month🛡️ Defensive Security: A Glacier's Pace🧠 Predicting AGI Attainment by 2025-2028📜 Timeless Concepts from Ancient Myths📰 Russian Impersonation Disinformation Exposed🤖 AI Disinformation:...
No. 396 – Elon’s Doxxing FSD, ATHI AI Threat Modeling Framework, Cardboard Drones, and GPT Enterprise…
In this episode:
🤔 Thoughts on the Eliezer vs. Hotz AI Safety Debate🎥 Musk's FSD and Privacy Demo🔒 Duolingo Data Breach💥 MOVEit Mass Hack🔎 Putin Critics' Fate🚨 Leaseweb Security Breach🔬 Lazarus's New Malware🚁 Cardboard Drones in Combat🕵️ Taiwan Espionage Alert🔐...
What I’m Doing and How It’s Going
How I went from a $350K FTE to $700K+ doing my own thing. This is the first time I've ever shared anything about what I'm doing and how I make money. It covers:
Why I got out of the corporate...
NO. 395 — How I Make Money as an Independent, Tesla’s Insider Data Breach, Bots Beating CAPTCHAs, and Escaping the Maze…
In this episode:
🎙️ "What I’m Doing And How It’s Going" 🔐 Tesla's Data Breach: An Inside Job🔍 Example’s Matter: Canary's Domain Name Issue🚨 NetScaler Instances Hacked: CVE-2023-3519 Exploited🤖 Bots Outperform Humans at Solving CAPTCHAs🔒 Infrastructure Security Boost: Israel-US Collaboration🔎...
NO. 394 — Vegas Recap, CISA MS Alert, China/US AI Fight, Deceased Kid AI, Following vs. Leading…
In this episode:
🎰 Back from Vegas: Event Recap🔬 Covid Testing: Importance of Correct Method🔥 Burnout and Addiction: Shared Root Cause🪳 Vulnerabilities🎩 Black Hat Highlights: Tool Releases👥 Lapsus$ Tactics: Simple Techniques, Big Breaches🤖 AI Cyber Challenge: DARPA's Call to Arms🔒...
No. 393 – Hacker Week, Deleting Google Info, And Creating High-Entropy Content
In this episode:
🎉 HackerCon Week: BSides, Blackhat, DEFCON🔒 Google's Privacy Update: Control Your Data🤖 AI Vulnerability: Adversarial Attacks on Chatbots🛡️ NIST CSF Changes: Are You Ready?📊 Breach Disclosure Rules: SEC's New Mandate🔧 Tech Giants' Security Fixes: Apple, Google, Microsoft📚...
NO. 392 — Trail of Bits Testing Handbook, Startups Freefall, and Chinese Propaganda Escalation…
In this episode:
💡 Burnout and Addiction: A New Perspective🚦 UL RSS Live: Stay Updated🔍 Security News: Testing Handbook, IDOR Vulnerability, Lazarus Hacks📈 Technology News: Startup Decline, iPhone Dominance, AI Girlfriends🌍 Human News: Longevity Habits, Unemployment Rates, Math Crisis💭 Ideas...
NO. 391 — AI Manipulation Defenders, .MIL Leak, And The NPC Phenomenon
In this episode:
🤖 How AI Will Defenders Protect Us📈 AI's Role in K-Shaped Recovery📧 Military Email Leak🔐 VirusTotal Data Leak🇨🇳 Great Firewall Expansion🍏 Apple vs UK Surveillance🚗 TikTok Theft Tutorials👁️ AI Surveillance Expansion🔧 Tech Scam Evolution🤖 OpenAI's Persistent Context🍏...
NO. 390 — Voice Scams, FrontView Mirrors, and Idea Molecules
In this episode:
🚨 VoiceFake Scams on the Rise🔑 FrontView Mirror, 2024 Edition: Trends and Preparations🎙️ AI and Content Creation: A Discussion on The Phillip Wylie Show🔒 Chinese Email Hack: A Sophisticated Espionage Effort🌐 Transatlantic Data Flow: A New EU-US...
NO. 389 — The Creativity Friction Coefficient, Lockbit v TSMC, and Detecting Smart Errors
📚 The Real Internet of Things: A Look into the Future of Technology🔒 Pentera's Unique Approach to Automated Security Validation🌐 AI and the Reduction of the Creativity Friction Coefficient🔐 LockBit vs. TSMC: A Tale of Ransomware and Supply Chain...
Sponsored Interview: Pentera
Alright, in this Sponsored Interview I’m talking about Aviv Cohen. Aviv is an engineer turned Chief Marketing Officer with Pentera, so if he sounds more technical than most CMOs, that’s why.
We talk about Pentera’s automated Security Validation platform, which...
NO. 388 — Context Reflections, Critical Thinking, China's Decline, and NFC
In this episode:
📚 Using Reflections to Compress LLM Context Data 🎧 My Appearance on the Critical Thinking Podcast 🍏 Apple's Critical Security Updates ⌚ Suspicious Smartwatches Targeting Military Personnel 🔥 Databricks Acquires Generative AI Company 🌐 Cloudflare's Observatory Performance...
NO. 387 — Modern Parenting and Narcissism?, New Russian Hacking Unit, McKinsey AI Predictions, and more…
In this episode:
🧠 Is modern parenting creating narcissists?🔒 Top cybersecurity official warns of Chinese hackers🇷🇺 New Russian hacking unit identified🚀 NVIDIA's AI red team philosophy📈 McKinsey says AI will massively boost productivity💊 MDMA helps white supremacist move away from...