Paul's Security Weekly (Audio)

PSW #759 - Ismael Valenzuela

Oct 13, 2022
Ask episode
Chapters
Transcript
Episode notes
1
Introduction
00:00 • 5min
2
How Did You Become a Consultant in Spain?
04:42 • 2min
3
How Did You Get Into the Security Industry?
07:04 • 5min
4
Is Instant Response the Front Line to a Threat Research Team?
11:52 • 2min
5
Is Conti Still Playing the Role of the Conti Group?
14:12 • 3min
6
The Blackberry Team, Anuj and Ryan
16:48 • 6min
7
Mitre Defend
22:42 • 4min
8
Are We at a Better Spot?
26:29 • 2min
9
Doing Threat Research at Scale?
28:26 • 5min
10
Ismael, Is It a Stealth or Persistence Attack?
33:20 • 5min
11
Do You Think We're at a Precipice?
38:07 • 3min
12
Is There a Trend in Ransomware?
41:35 • 2min
13
Ransomware Victims Should Back Up Encrypted Files
43:09 • 5min
14
ESX VMware Horizon Connection Broker
47:54 • 5min
15
Is There a Higher Level of Privilege?
52:25 • 5min
16
Security Weekly - Two Paul's Security Weekly
57:18 • 2min
17
Security Weekly - On Demand Webcasting Technical Trainings
59:38 • 2min
18
Is There a Future for PowerPC?
01:01:54 • 2min
19
Is Power Macintosh PowerBook?
01:03:44 • 2min
20
I'm Not Losing It. Is It a Cross-Platform Malware?
01:05:41 • 2min
21
Including Support Contracts on PDP 11s
01:07:37 • 4min
22
Drones - What's That, Mindy?
01:11:25 • 2min
23
Is the Matrix 600 a Threat Model?
01:13:08 • 2min
24
Is It a Drone Attack or a Wi-Fi Attack?
01:14:56 • 4min
25
How Do You Control the Spread of Light Outside of Your Building?
01:19:11 • 2min
26
The Race to Native Code Execution in PLC
01:21:17 • 2min
27
The S7 1200 1500
01:22:54 • 2min
28
Is There Anybody Near Sam That Can Smack Him?
01:24:27 • 2min
29
Intel's Alder Lake BIOS Leaked
01:26:50 • 3min
30
EFI Secure Boot, BIOS Guard and Boot Guard - What's the Difference?
01:30:01 • 2min
31
Is That a Key Manifest Signing Key?
01:31:46 • 2min
32
Is the Supply Chain Really a Hot Mess?
01:33:25 • 2min
33
Is Intel Going to Release an Update?
01:35:50 • 4min
34
Is There a Plan to Improve Cyber Security?
01:39:34 • 3min
35
Is There a Label for Smart Devices?
01:42:56 • 2min
36
IOT Security Advisory Board for the Federal Government
01:45:00 • 3min
37
Is the Wi-Fi Alliance a Vulnerability Check?
01:48:16 • 2min
38
How Long Will I Get Firmware Updates From This?
01:50:41 • 2min
39
Windows Defender - Bring Your Own Vulnerable Driver
01:52:39 • 4min
40
Is Secure Boot Enabled?
01:56:25 • 2min
41
Can EDR Solution Scan for a Vulnerable Driver?
01:58:53 • 4min
42
The Sam Story Number Three - North Korea's Crypto Hackers
02:02:35 • 2min
43
Is Most Software Poorly Written?
02:04:29 • 4min
44
Google Pixel Buds Pro Don't Get Great Reviews
02:08:51 • 2min
45
The Hidden DNS Resolver Insecurity Creates a Widespread Website Host Risk
02:10:43 • 4min
46
Microsoft Exchange
02:14:40 • 2min
47
I Don't Have Enough Hands
02:16:32 • 2min
48
VMware vCenter Server Bug Disclosed Is Still Not Patched
02:18:06 • 2min
49
Is Active Directory Over LDAP Small S or Active Directory Authentication for vSphere Seven?
02:19:38 • 3min
50
Is There Such a Division at Ikea?
02:22:47 • 2min
51
What Is the Security Problem?
02:24:30 • 2min
52
Using a Drone to Deliver a Zigbee Attack
02:26:02 • 2min
53
The Philips Hue Chain Attack
02:27:42 • 2min
54
Is There a CVE for a Spy Flash?
02:30:05 • 3min
55
Philips Hue
02:32:54 • 2min
56
Is There a Light Switch?
02:34:29 • 2min
57
The Zero Day Dilemma
02:36:28 • 3min
58
Detecting the Unknown
02:39:06 • 4min
59
What's the Difference Between Log for J and Solar Winds?
02:43:04 • 3min
60
Is There a CVE Identified?
02:45:51 • 3min
61
Fortinet CVE
02:49:14 • 3min
62
Thermos Cure - How to Crack 16 Character Passwords
02:52:16 • 2min
63
How to Crack a Two Digit Password?
02:54:28 • 2min
64
Is It Safe to Use a Stylus?
02:56:40 • 2min
65
How to Use eBPF in a Defensive Linux System
02:58:18 • 5min
66
I've Been Using Linux for 20 Years and I'm Still Learning
03:03:06 • 2min
67
Do You Want to Cover One More Story Before We Close Out?
03:04:37 • 4min
68
Is TikTok a Tik Tok?
03:08:26 • 2min
69
Security Cryptography Podcast - Part Two With Nate Lawson
03:10:09 • 2min
70
Ima Tett - The Cyber Criminal Supply Chain Report
03:12:02 • 2min
71
The VMware Threat Analysis Unit Could Be a Great Use Case for Learning About Malware
03:13:49 • 3min