Category Archives: Podcast

Defensive Security Podcast Episode 131

http://www.bizjournals.com/atlanta/blog/atlantech/2015/09/atlantas-bitpay-got-hacked-for-1-8-million-in.html

http://www.securityweek.com/excellus-data-breach-impacts-10-million

http://www.databreachtoday.com/attacks-on-insurers-lessons-learned-a-8530

http://federalnewsradio.com/cybersecurity/2015/09/us-certs-dos-and-donts-for-after-the-cyber-hack/

http://www.theguardian.com/technology/2015/sep/10/cyber-threat-data-manipulation-us-intelligence-chief

http://www.csoonline.com/article/2984543/vulnerabilities/as-containers-take-off-so-do-security-concerns.html

Defensive Security Podcast Episode 130

http://www.theregister.co.uk/2015/09/04/mozilla_firefox_bugzilla_leak/

http://darkmatters.norsecorp.com/2015/09/03/four-non-technical-measures-for-mitigating-insidious-insiders/

http://arstechnica.com/tech-policy/2015/08/ftc-can-sue-companies-with-poor-information-security-appeals-court-says/

https://nakedsecurity.sophos.com/2015/09/02/microsoft-word-intruder-revealed-inside-a-malware-construction-kit/

http://www.securityweek.com/executive-it-security-problem-lessons-learned-hillary-clinton

Defensive Security Podcast Episode 129

http://www.tripwire.com/state-of-security/risk-based-security-for-executives/connecting-security-to-the-business/security-reverse-engineering-and-eulas/

http://arstechnica.com/security/2015/08/my-browser-visited-drudgereport-and-all-i-got-was-this-lousy-malware/

http://arstechnica.com/security/2015/08/attackers-actively-exploit-windows-bug-that-uses-usb-sticks-to-infect-pcs/

http://arstechnica.com/information-technology/2015/08/lenovo-used-windows-anti-theft-feature-to-install-persistent-crapware/

http://socialmedia.umich.edu/blog/hacked/

Defensive Security Podcast Episode 126

http://fortune.com/2015/07/29/crowdstrike-cybersecurity-george-kurtz/

http://www.tripwire.com/state-of-security/security-data-protection/cyber-security/phishing-up-74-in-q2-2015-reveals-infoblox-dns-threat-index/

http://blog.trendmicro.com/trendlabs-security-intelligence/angler-exploit-kit-used-to-find-and-infect-pos-systems/

http://www.welivesecurity.com/2015/07/28/new-report-explains-gulf-security-experts-non-experts/

Defensive Security Podcast Episode 125

http://krebsonsecurity.com/2015/07/online-cheating-site-ashleymadison-hacked/

http://www.mcafee.com/us/resources/reports/rp-aspen-holding-line-cyberthreats.pdf

http://arstechnica.com/tech-policy/2015/07/obama-administration-decides-not-to-blame-china-publicly-for-opm-hack/

http://blog.trendmicro.com/trendlabs-security-intelligence/hacking-team-rcsandroid-spying-tool-listens-to-calls-roots-devices-to-get-in/

Defensive Security Podcast Episode 124

http://arstechnica.com/tech-policy/2015/07/hacking-teams-surveillance-software-sold-to-kgb-successor/

http://arstechnica.com/security/2015/07/hackingteams-evil-android-app-had-code-to-bypass-google-play-screening/

http://www.scmagazine.com/ios-devices-dont-have-to-be-jailbroken-for-spyware-sold-by-hacking-team-to-be-installed/article/426137/

https://krebsonsecurity.com/2015/07/hacking-team-used-spammer-tricks-to-resurrect-spy-network/

http://www.scmagazine.com/fireeye-intern-morgan-culbertson-arrested-in-darkode-bust/article/427139/2/

http://erpscan.com/wp-content/themes/supercms/Publications/Chinese_attack_on_USIS_using_SAP_vulnerability_Detailed_review_and_comments.pdf

Defensive Security Podcast Episode 123

http://labs.bromium.com/2015/07/10/government-grade-malware-a-look-at-hackingteams-rat/
http://www.theregister.co.uk/2015/07/12/adobe_flash_zero_day_cve_2015_5122/
https://www.tenable.com/blog/lessons-to-learn-from-the-opm-breach
http://arstechnica.com/tech-policy/2015/07/opm-director-resigns-after-news-that-hack-affected-21-5-million-people/
http://www.ffiec.gov/cyberassessmenttool.htm

Defensive Security Podcast Episode 122

http://arstechnica.com/security/2015/07/massive-leak-reveals-hacking-teams-most-private-moments-in-messy-detail/ & http://www.csoonline.com/article/2945200/vulnerabilities/adobe-to-patch-flash-0-day-created-by-hacking-team.html
http://securityaffairs.co/wordpress/38372/cyber-crime/kins-malware-builder-leaked.html

Cyber UL Could Become Reality Under Leadership of Hacker Mudge


http://www.federaltimes.com/story/government/omr/opm-cyber-report/2015/06/23/keypoint-usis-opm-breach/28977277/