
Critical Thinking - Bug Bounty Podcast
Episode 98: Team 82 Sharon Brizinov - The Live Hacking Polymath
Nov 21, 2024
Sharon Brizinov, a leading IoT/ICS security researcher at Claroty, shares his captivating journey from iOS development to cybersecurity. He dives into the contrasting worlds of Pwn2Own and HackerOne, revealing their unique exploit ecosystems. The discussion explores the challenges of SCADA protocols and hacking vulnerabilities in critical infrastructure systems. Sharon also touches on the intricacies of IoT firmware and the importance of security in device communication, all while emphasizing the creativity essential for mastering the bug bounty landscape.
01:43:57
Episode guests
AI Summary
AI Chapters
Episode notes
Podcast summary created with Snipd AI
Quick takeaways
- Sharon Brizinov's journey from iOS development to leading a research team underscores the importance of passion in cybersecurity careers.
- The transition from exploiting obscure attack surfaces to established platforms like HackerOne highlights the need for adaptability in bug hunting.
Deep dives
The Importance of Internal Network Security
Many companies are neglecting their internal network security, which can lead to significant vulnerabilities once an attacker penetrates the external attack surface. After gaining access to a network, security professionals often notice numerous accessible shares and ports, making it easy for an intruder to exploit exposed services. To counter this problem, effective internal network control measures need to be in place, and one potential solution is ThreatLocker's Network Control product. This tool simplifies the management of what ports are exposed on various hosts, facilitating better security and control over network access.
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.