Saturday, June 25, 2022

Lethal Weapwn with Frankie McRae

Frankie McRae is a storied former US Army Special Forces soldier and assault team leader. Since his retirement, Frankie has developed Range 37PSR, founded Raidon Tactics (a premiere training organization), deployed all over the world as a contractor to...

Threat Hunter Girl with Nicole Hoffman

Experienced Intelligence Analyst and creator of the Cognitive Stairways of Analysis Framework, Nicole Hoffman has a passion for developing the analytic tradecraft. Her work, research, and presentations have inspired and educated others around the international analytic community.  For someone...

Shred with George Gerchow

For those unfamiliar with the snowboarding slang term Shred, it means “to ride with exceptional speed, ability, or enthusiasm, especially in difficult terrain and conditions”.Sumo Logic’s CSO, George Gerchow, applies this methodology whether it’s by way of Board, or...

Unanimous AI with Louis Rosenberg, PhD

Louis Rosenberg, PhD is a technology pioneer in fields of virtual reality (AR), augmented reality (AR) and artificial intelligence (AI). He founded Unanimous AI to amplify the intelligence of networked human groups using the biological principle of Swarm Intelligence combined...

YinYang with Jeremy Miller

The YinYang philosophy says that the universe is composed of competing and complementary forces governed by a cosmic duality, sets of two opposing and complementing principles or energies that can be observed in nature.Similarly, the nature of offensive security...

Legal Robbery with Matt Barnett

Matt Barnett is a nationally recognized expert on physical and cybersecurity, incident response, identity theft, and digital forensics. His expertise is backed by decades of combined information security and law enforcement experience. As a certified forensic analyst, Matt conducts...

Hacker DNA with Gummo

Gummo is a former blackhat hacker and reverse engineer turned whitehat who has been breaking shit since '86. His success has been attributed to a unique gift we discuss as well as his extensive knowledge of defeating secure networks...

In The Shadows with Jim Tiller

Jim Tiller is a security executive with over two decades of information security experience, leadership, a history of outstanding performance and growth, business turnarounds, and global recognition for innovation in security strategies and execution. He currently serves as the...

Proceed Into Independence with Adi Elliott

Adi Elliott is the Chief Revenue Officer at Canopy, Data Breach Response Software. He has extensive experience building and leading high-performance marketing, sales, product, and strategy teams. He’s also held leadership roles at three companies with $100M+ liquidity events,...

Rethinking Compliance with Igor Volovich

Igor Volovich has built a career as a global CISO, strategist, advisor, author, speaker, and global cybersecurity leader with 20+ years of service to the world’s largest private and public-sector entities, Fortune 100 firms, and US policy, legislative, and...

Escape from the Echo Chamber with Regina Bluman

Regina Bluman is an infosec professional who previously worked in IT Marketing for almost a decade, before leaving the dark side and moving across! She is an experienced panelist, guest author, podcast guest, and was recently nominated as ‘Technical...

Responsible Cyber with Magda Chelly

Dr. Magda Chelly is a keynote speaker, serial entrepreneur and a senior security expert.She is a strong activist for women in security, and founded Women on Cyber in Singapore, which is focused on supporting female professionals in the industry.She’s...

Alien Invasion with Sherri Davidoff

The US government and military have recently confirmed investigations and sightings of UFOs, reigniting the phenomenon of aliens among us. Ironically, an unidentified spaceship descends into BarCode, and official contact is made.Sherri Davidoff is the CEO of LMG Security...

Virtual Pickpocket with Timur Yunusov

In recent years, there has been significant consumer demand for instant payments through their mobile phones. Unfortunately, the security aspect of mobile NFC payments has been ignored and mobile wallet theft is real threat.Timur Yunusov is a Security Expert...

Cyber Crisis with Dr. Eric Cole (REVISITED)

At this moment, more than 70% of us are currently compromised by cybersecurity attacks that we underplay, ignore, or simply aren’t aware of because of their hyper-stealthy and invisible nature. In fact, most individuals and businesses will have been...
Security Affairs

Oracle spent 6 months to fix ‘Mega’ flaws in the Fusion Middleware

Researchers disclose technical details of a critical flaw in Fusion Middleware, tracked as CVE-2022–21445, that Oracle took six months to patch. Security researchers have published technical details of a critical Fusion Middleware vulnerability, tracked as CVE-2022–21445, that was reported to...
Security Affairs

Multiple malicious packages in PyPI repository found stealing AWS secrets

Researchers discovered multiple malicious Python packages in the official PyPI repository stealing AWS credentials and other info. Sonatype researchers discovered multiple Python packages in the official PyPI repository that have been developed to steal secrets (i.e. AWS credentials and environment...

The Post-Roe Privacy Nightmare Has Arrived

Plus: Microsoft details Russia’s Ukraine hacking campaign, Meta’s election integrity efforts dwindle, and more.

How to Move Your WhatsApp Chats Across Devices and Apps

It's never been easier to switch between iPhone and Android—and to get your messages out of the Meta ecosystem entirely.
The Register

We’re now truly in the era of ransomware as pure extortion without the encryption

Why screw around with cryptography and keys when just stealing the info is good enough Feature  US and European cops, prosecutors, and NGOs recently convened a two-day workshop in the Hague to discuss how to respond to the growing...