Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71
Introduction
00:00 • 5min
How Did You Become a Consultant in Spain?
04:42 • 2min
How Did You Get Into the Security Industry?
07:04 • 5min
Is Instant Response the Front Line to a Threat Research Team?
11:52 • 2min
Is Conti Still Playing the Role of the Conti Group?
14:12 • 3min
The Blackberry Team, Anuj and Ryan
16:48 • 6min
Mitre Defend
22:42 • 4min
Are We at a Better Spot?
26:29 • 2min
Doing Threat Research at Scale?
28:26 • 5min
Ismael, Is It a Stealth or Persistence Attack?
33:20 • 5min
Do You Think We're at a Precipice?
38:07 • 3min
Is There a Trend in Ransomware?
41:35 • 2min
Ransomware Victims Should Back Up Encrypted Files
43:09 • 5min
ESX VMware Horizon Connection Broker
47:54 • 5min
Is There a Higher Level of Privilege?
52:25 • 5min
Security Weekly - Two Paul's Security Weekly
57:18 • 2min
Security Weekly - On Demand Webcasting Technical Trainings
59:38 • 2min
Is There a Future for PowerPC?
01:01:54 • 2min
Is Power Macintosh PowerBook?
01:03:44 • 2min
I'm Not Losing It. Is It a Cross-Platform Malware?
01:05:41 • 2min
Including Support Contracts on PDP 11s
01:07:37 • 4min
Drones - What's That, Mindy?
01:11:25 • 2min
Is the Matrix 600 a Threat Model?
01:13:08 • 2min
Is It a Drone Attack or a Wi-Fi Attack?
01:14:56 • 4min
How Do You Control the Spread of Light Outside of Your Building?
01:19:11 • 2min
The Race to Native Code Execution in PLC
01:21:17 • 2min
The S7 1200 1500
01:22:54 • 2min
Is There Anybody Near Sam That Can Smack Him?
01:24:27 • 2min
Intel's Alder Lake BIOS Leaked
01:26:50 • 3min
EFI Secure Boot, BIOS Guard and Boot Guard - What's the Difference?
01:30:01 • 2min
Is That a Key Manifest Signing Key?
01:31:46 • 2min
Is the Supply Chain Really a Hot Mess?
01:33:25 • 2min
Is Intel Going to Release an Update?
01:35:50 • 4min
Is There a Plan to Improve Cyber Security?
01:39:34 • 3min
Is There a Label for Smart Devices?
01:42:56 • 2min
IOT Security Advisory Board for the Federal Government
01:45:00 • 3min
Is the Wi-Fi Alliance a Vulnerability Check?
01:48:16 • 2min
How Long Will I Get Firmware Updates From This?
01:50:41 • 2min
Windows Defender - Bring Your Own Vulnerable Driver
01:52:39 • 4min
Is Secure Boot Enabled?
01:56:25 • 2min
Can EDR Solution Scan for a Vulnerable Driver?
01:58:53 • 4min
The Sam Story Number Three - North Korea's Crypto Hackers
02:02:35 • 2min
Is Most Software Poorly Written?
02:04:29 • 4min
Google Pixel Buds Pro Don't Get Great Reviews
02:08:51 • 2min
The Hidden DNS Resolver Insecurity Creates a Widespread Website Host Risk
02:10:43 • 4min
Microsoft Exchange
02:14:40 • 2min
I Don't Have Enough Hands
02:16:32 • 2min
VMware vCenter Server Bug Disclosed Is Still Not Patched
02:18:06 • 2min
Is Active Directory Over LDAP Small S or Active Directory Authentication for vSphere Seven?
02:19:38 • 3min
Is There Such a Division at Ikea?
02:22:47 • 2min
What Is the Security Problem?
02:24:30 • 2min
Using a Drone to Deliver a Zigbee Attack
02:26:02 • 2min
The Philips Hue Chain Attack
02:27:42 • 2min
Is There a CVE for a Spy Flash?
02:30:05 • 3min
Philips Hue
02:32:54 • 2min
Is There a Light Switch?
02:34:29 • 2min
The Zero Day Dilemma
02:36:28 • 3min
Detecting the Unknown
02:39:06 • 4min
What's the Difference Between Log for J and Solar Winds?
02:43:04 • 3min
Is There a CVE Identified?
02:45:51 • 3min
Fortinet CVE
02:49:14 • 3min
Thermos Cure - How to Crack 16 Character Passwords
02:52:16 • 2min
How to Crack a Two Digit Password?
02:54:28 • 2min
Is It Safe to Use a Stylus?
02:56:40 • 2min
How to Use eBPF in a Defensive Linux System
02:58:18 • 5min
I've Been Using Linux for 20 Years and I'm Still Learning
03:03:06 • 2min
Do You Want to Cover One More Story Before We Close Out?
03:04:37 • 4min
Is TikTok a Tik Tok?
03:08:26 • 2min
Security Cryptography Podcast - Part Two With Nate Lawson
03:10:09 • 2min
Ima Tett - The Cyber Criminal Supply Chain Report
03:12:02 • 2min
The VMware Threat Analysis Unit Could Be a Great Use Case for Learning About Malware
03:13:49 • 3min