A look back at Black Hat and Def Con. Sometimes failures that look like accidents are accidents. Russia wants better content suppression from Google. Notes on intelligence services.

A look back at Black Hat and Def Con. Sometim...

Up next

Christian Lees: It's not always textbook. [CTO] [Career Notes]

Please enjoy this encore of Career Notes. Christian Lees, CTO at Resecurity, shares his story and insight on coming into the cybersecurity world. He considers himself a late bloomer because he did not go to college until he was 23. He wasn’t sure of what he wanted to do, and a fa ...  Show more

Your AI sidekick might be a spy. [Research Saturday]

This week, we are joined by Or Eshed, Co-Founder and CEO from LayerX Security, discussing their work on "How We Discovered A Campaign of 16 Malicious Extensions Built to Steal ChatGPT Accounts." Researchers uncovered a coordinated campaign of 16 malicious browser extensions posin ...  Show more

Recommended Episodes

The Story Behind The SolarWinds Cyberattack
Consider This from NPR

Last year, hackers believed to be directed by the Russian intelligence service, the SVR, slipped a malicious code into a routine software update from a Texas- based company called SolarWinds. They then used it as a vehicle for a massive cyberattack against America and successfull ...  Show more

Судя по всему, Роскомнадзор прямо сейчас репетирует блокировку YouTube. Когда и по какому сценарию это произойдет? И как можно будет обойти запрет?
Что случилось

4 сентября в России произошел сбой в работе видеохостинга YouTube.

По <a href="https://downradar.ru/ne-rab ...

  Show more

Asaf Lubin on Cyber Espionage and International Law
The Lawfare Podcast

On June 16, the U.S. State Department discovered unauthorized access to its Exchange Online email services and reported it to Microsoft. Almost a month later, on July 11, Microsoft disclosed the attack, and attributed it to a China-based threat actor, which they call Storm-055 ...

  Show more

Cyberguerre: des conflits invisibles aux conséquences bien réelles
Le monde devant soi

Aucun coup n'est tiré, mais les dégâts peuvent être considérables et les conséquences, dramatiques. Souvent silencieuses, parfois spectaculaires, les cyberattaques se multiplient –qu'elles soient le fait de simples criminels, d'États souverains ou d'une collaboration des deux. ...

  Show more