This is the story of how a researcher turns commercial and commonly used EDRs and Cloud-based backup systems into wipers against the very data they’re designed to protect. Or Yair, security research team lead at…
Category: Episode
Could ChatGPT be used to perform side channel attacks on real hardware? Witold Waligora, CEO of CloudVA, talks about his Black Hat Europe 2023 presentation that shows how and when it can be used in…
You might think that internet-connected cameras would be limited in use by a bad actor. Actually such devices can be an entry point into an organization, providing yet another means of accessing the internal network.…
There’s a fake news report about three million internet-enabled toothbrushes contributing to a botnet. Unfortunately the mainstream media ran with the story before questioning its basic assumptions. This is a story about IoT devices and…
Ransomware groups have bifurcated with doing pure ransomware and others going straight to extortion; it’s whether the data is ransomed on your network or theirs. Nick Biasini from Cisco Talos talks about the threats he’s…
The Purdue Model used in OT is essentially network security from the 1990s. New threats and new tech however required us to rethink that on the network side so how do we bring that new…
Flaws within the chips in our laptops, in our homes, and in our critical infrastructure could become the access one needs to steal data if not just shut down an assembly line, or hold up…
Can your OT function if the IT system goes down? OT self-sufficiency is critical for infrastructure such as rail systems. Chris Warner, from GuidePoint Security, discusses how this infrastructure continuity is important not only for…
Quantum computers will change and even break the cryptography we have today. To defeat a “Harvest Now, Decrypt Later” strategy by bad actors (even nation states), Denis Mandich, CTO and co-founder of Qrypt, is proposing…