Thursday, June 1, 2023

Shadow Warrior with Ric Prado

In the covert world of intelligence and espionage, where shadows merge with reality, there exists a select group of individuals who operate on the razor's edge between life and death. Among them is a man named Ric Prado, AKA...

Icon with Phillip Wylie

Philip Wiley, AKA The Hacker Maker, is an experienced pentester, educator, author and speaker. He has been invited to give presentations at countless cons. He currently hosts the top ranked podcast, "Hacker Factory" and his self-titled podcast, "Philip Wiley...

Unmasked with Nelson Santos

Pentera is a company that specializes in automated security testing and vulnerability management. Its platform uses a combination of automated and manual testing techniques to identify and prioritize security vulnerabilities in an organization's infrastructure. By doing so, Pentera helps...

BONUS: BCP LIVE at SecureWorld Philadelphia 2023

SESSION TITLE: CISOs Riff on the Latest in CybersecurityRECORDED: 4/19/23LOCATION: Valley Forge Casino and Event CenterGUESTS: David Lingenfelter (VP, Information Security, PENN Entertainment), Krista Arndt (CISO, United Musculoskeletal Partners) and Bistra Lutz (Director of Global Information Security Operations, Crown...

Freaky Clown with FC

FC has gone through extreme adversity and has come out stronger on the other side.  He grew up in a very negative environment, which unfortunately led to the development of complex PTSD. But from that emerged a unique talent,...

Grit with Andres Andreu

Grit in the context of behavior is defined as “firmness of character; indomitable spirit.” Andres Andreu, a NYC bred leader, has a career built on grit and sheer perseverance with experience spanning from the D.E.A. to corporate America.Co-Host, and...

Sociotechnical Exploitation with Bruce Schneier

The Sociotechnical Theory is an organizational theory that emphasizes the importance of both social and technical factors in designing and managing systems. Sociotechnical systems are deeply embedded within society and prone to "hacking", a term meaning to subvert a...

Eras Of Dialect with John Miller

As a large language model trained by OpenAI, ChatGPT has been designed to understand and generate human-like text based on a massive amount of data. From writing creative stories and poetry to answering complex questions and providing personalized recommendations,...

Harkness with Jason Brooks and Keenan Hale Jr.

The Harkness method is a discussion-based learning style that emphasizes student centric discussion and active participation in a classroom setting. The goal is to create an environment where students can share their thoughts and perspectives, engage in meaningful conversations,...

Adrenaline Rush with Jim Lawler

Jim "Mad Dog" Lawler is a national security consultant, serving as the Senior Partner at MDO Group, which provides HUMINT training to the Intelligence Community and the commercial sector focused on WMD, CI, technical and cyber issues. He served...

H4unt3d Hacker with Mike Jones

Mike Jones AKA the H4unt3d hacker, is a security researcher who formerly hacked underGROUND groups. He served in the military for several years within SIGINT operations. Mike started the H4unt3d hacker podcast from scratch, wanting to give people a...

Third Time Lucky with Robert Bateman

Robert Bateman, head of content at GRC World Forums, is a well-respected expert on data protection, privacy, and security law. He built his reputation by producing in-depth reports on legal updates, compliance guidance documents for businesses, and news articles...

The Huntsman with Crane Hassold

Crane Hassold is a threat researcher at Abnormal Security who specializes in discovering and analyzing malicious email campaigns targeting enterprises. He also works closely with law enforcement agencies to help bring these bad actors out into the open. Before...

Visionary with Mikko Hyppönen

Mikko Hyppönen is considered one of the world’s foremost cybersecurity experts. He is known for his work on IoT security, where he coined the term “The Hyppönen law”. Currently he is working as Chief Research Officer at Withsecure and...

Chain of Disruption with Joel Burleson-Davis

As Imprivata’s VP of Worldwide Engineering, Cyber, Joel Burleson-Davis is responsible for overseeing teams in the organization that build and deliver cybersecurity solutions. Prior to joining Imprivata, he was an engineering manager in Sydney, Australia for 6 years. He...
The Register

Ukraine war blurs lines between cyber-crims and state-sponsored attackers

This RomCom is no laughing matter A change in the deployment of the RomCom malware strain has illustrated the blurring distinction between cyberattacks motivated by money and those fueled by geopolitics, in this case Russia's illegal invasion of Ukraine,...
SC Magazine

We need to refine and secure AI, not turn our backs on the technology 

While the potential poisoning of ChatGPT raises some concerns, we need to take this threat as an opportunity to better refine and secure emerging AI models.
The Hacker News

Active Mirai Botnet Variant Exploiting Zyxel Devices for DDoS Attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a recently patched critical security flaw in Zyxel gear to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. Tracked as CVE-2023-28771 (CVSS score: 9.8), the issue relates to a command injection flaw impacting...
The Hacker News

Urgent WordPress Update Fixes Critical Flaw in Jetpack Plugin on Million of Sites

WordPress has issued an automatic update to address a critical flaw in the Jetpack plugin that’s installed on over five million sites. The vulnerability, which was unearthed during an internal security audit, resides in an API present in the plugin since version 2.0,...
The Register

Dark Pink cyber-spies add info stealers to their arsenal, notch up more victims

Not to be confused with K-Pop sensation BLACKPINK, gang pops military, govt and education orgs Dark Pink, a suspected nation-state-sponsored cyber-espionage group, has expanded its list of targeted organizations, both geographically and by sector, and has carried out at...