Security Explained
Podcast

Security Explained

53
4

Welcome to Security Explained, where we strive to make the complex realm of cyber security better understood by everyone. Join our three hackers / hosts Christopher Grayson, Drew Porter, and Logan Lamb for approachable conversation and a few laughs on the world of hackers, how to think about privacy and security in today's rapidly changing world, and how to keep yourself and your loved ones safe.

Welcome to Security Explained, where we strive to make the complex realm of cyber security better understood by everyone. Join our three hackers / hosts Christopher Grayson, Drew Porter, and Logan Lamb for approachable conversation and a few laughs on the world of hackers, how to think about privacy and security in today's rapidly changing world, and how to keep yourself and your loved ones safe.

53
4

Are Hack Back Attacks Whack??

In today's episode listen to Chris, Drew, and Logan struggle with the potential ramifications of companies retaliating against hackers by hacking them back! How do you handle attribution? What about collateral damage? Who in the world would actually notify the FBI prior to doing this?? Let's (potentially) find out in today's episode!
Internet and technology 3 years
0
0
0
48:40

Social Engineering Gotchas

Join us as we walk through new and exciting developments in social engineering! FTX/SBF deepfake link below - don't go to ftxcompensation.com https://twitter.com/jason_koebler/status/1594720003923722240  Bonus content: Twilio is put on blast and we lament our AI laden future Happy Holidays everybody!
Internet and technology 3 years
0
0
0
49:28

Best Hacks of 2022

As 2022 comes to an end, lets look at the best hacks, breaches, and just weirdness in the world of security. 
Internet and technology 3 years
0
0
0
54:10

The Twitter Conundrum

Twitter, its been in the news lately, but what does it have to do with Security? In this episode we discuss the most notable items that have been happening along this new Twitter journey and how it is affecting your privacy and security on the platform and if it is going to get better. 
Internet and technology 3 years
0
0
0
47:42

Bots Suck

Telling the difference between a user that's a program and a user that's a real human is a hard problem. It's also a problem that is growing in importance as more and more of our lives are subject to what happens online. We've seen incredibly successful PSYOPS campaigns, service outages, anti-competitive litigation, and myriad other harmful events occur as a direct result of automated abuse. So what is a bot and how can you successfully deal with them? We share some of our best secrets for effectively dealing with these bad internet denizens in today's episode.
Internet and technology 3 years
0
0
0
48:54

Uber FUNK & CISO Trubles

Uber's CISO has been charged with obstruction of justice and is facing up to 8 years in prison.  The question is "What does this mean for CISOs today?" We take a look at that and share what we think it means for CISOs now one has been formally charged.  https://www.justice.gov/usao-ndca/press-release/file/1306781/download
Internet and technology 3 years
0
0
0
46:17

Twitter, the Whistle Blows for Thee

Twitter, the Whistle Blows for Thee
Internet and technology 3 years
0
0
0
52:49

Uber Hack Discussion

After our extended break we are back! In today's episode we talk about the Uber Hack, our DefCon recordings and where they are at, and what we will be talking about next.  We have two episodes being published this week so stay tune as Season 5 of Security Explained is going be the best yet. 
Internet and technology 3 years
0
0
0
47:47

When Confluence and Windows Go Bad

It's the last episode of our fourth season! The security gods were kind to us and gave us a softball with some exploits that are in the news recently; code execution in Confluence and a new ms-msdt code execution exploit in Windows. Lastly, we talk about preparations for DEF CON (we hope to see you there)! We've loved his journey so far and are so thankful to have you all as listeners. Come say hi at DEF CON and grab a beer with us. - Windows ms-msdt PoC - https://gist.github.com/tothi/66290a42896a97920055e50128c9f040 - Confluence OGNL Injection PoC - https://github.com/Nwqda/CVE-2022-26134
Internet and technology 3 years
0
0
0
50:50

Anatomy of a Hack!

We directly address the question of how hacking actually works by going through some of the underlying issues that contribute to a hack, tell hacking stories, then wrap up with a very brief explanation of the differences with state sponsored hacking! https://xkcd.com/327/ - Little Bobby Tables https://www.saleae.com/ - Example Logic Analyzer
Internet and technology 3 years
0
0
0
50:45

Security In The News May 2022

We cover 3 security related news events as well as 1 space related news event in this weeks episode.  From ransomware to NASA sending nudes into space, get your download of news that sparked our interest in this episode. 
Internet and technology 3 years
0
0
0
41:30

Radio Security & Ukraine

Join us as we discuss the black magic of radio communications! What is a radio? Why do phones have so many of them? After covering the basics of radio  we delve into radio security (confidentiality/availability/integrity) and its implications with the war in Ukraine.
Internet and technology 3 years
0
0
0
01:03:09

Privacy Rights and Legislation (CCPA & GDPR)

How inclined are you to use tobacco? What were your salaries at your previous jobs? Your family and friends may not know, but data brokers sure do! Join us as we discuss CCPA and GDPR, two foundational privacy laws which lay the groundwork for taking back our privacy. We discuss actions citizens of California and EU can take to exercise the rights afforded to them under their respective laws. Later in the conversation we discuss privacy as a human right, the impact of surveillance capitalism on our everyday actions, and possible ways of unwinding the assimilation of your private data into large machine learning models. Links from the show: https://www.wired.com/story/verizon-user-privacy-settings/ https://www.oag.ca.gov/privacy/ccpa https://gdpr.eu/
Internet and technology 3 years
0
0
0
52:38

Oofta - The Okta Breach

It's been a bit over a week since some troublesome photos were posted to Twitter that appeared to show a breach of Okta's administrative portal. In the days since there have been a number of statements from Okta that leave us... disappointed to say the least. When you're such a critical part of modern digital infrastructure (and a security product to boot) one would hope that a breach and the remediation process would be handled with diligence and care. That doesn't seem to be the case here. Join us as we talk about Oofta, our new tag line for the Okta breach. - Okta "We Made a Mistake" - https://www.bleepingcomputer.com/news/security/okta-we-made-a-mistake-delaying-the-lapsus-hack-disclosure/ - Okta Breach FAQ - https://support.okta.com/help/s/article/Frequently-Asked-Questions-Regarding-January-2022-Compromise?language=en_US - Mandiant Forensic Report for Okta Breach - https://twitter.com/BillDemirkapi/status/1508527487655067660 - KrebsOnSecurity A Closer Look at the LAPSUS Group - https://krebsonsecurity.com/2022/03/a-closer-look-at-the-lapsus-data-extortion-group/
Internet and technology 3 years
0
0
0
57:30

Electronic Warfare

It's been a few weeks since the start of the Russian invasion of Ukraine. Throughout the war we have seen repeated examples of what it means to be engaged in a 21st century war. In this episode we dive in to some of the electronic warfare that we've observed so far coming from both sides of the conflict. It's no exaggeration to say that there have been a number of surprises in a short amount of time. Links from the show: - Generations of Warfare - https://en.wikipedia.org/wiki/Generations_of_warfare - Network Battalion 65 Twitter - https://twitter.com/xxnb65 - Live UA Map - https://liveuamap.com/
Internet and technology 3 years
0
0
0
59:59

Crypto Market Hacks with Royal Riviera

Today we have the pleasure of speaking with Royal Riviera, CCO of HAAS Online.  We will be talking about some major hacks and cases around the Crypto space.  HAAS Online https://www.haasonline.com/ 4.5 Billion of Stolen Crypto  https://www.justice.gov/opa/pr/two-arrested-alleged-conspiracy-launder-45-billion-stolen-cryptocurrency Open Seas Social Engineering Hack https://threatpost.com/nft-investors-lose-1-7m-in-opensea-phishing-attack/178558/ Bitfinex Exchange Hack in Hong Kong https://fortune.com/2016/08/03/bitcoin-stolen-bitfinex-hack-hong-kong/ SOL Wormhole Hack https://www.cnbc.com/2022/02/02/320-million-stolen-from-wormhole-bridge-linking-solana-and-ethereum.html Crypto CEOs testify before lawmakers on digital assets — 12/8/21 https://www.youtube.com/watch?v=F_kZELcynKQ Rap video from 4.5 Billion Dollars Defendent (NSFW, and terrible) https://www.youtube.com/watch?v=7jlSHGAem6g
Internet and technology 3 years
0
0
0
01:02:45

Lockpicking, Covert Entry, & TOOOL with Deviant Ollam

Today we have Covert Entry expert Deviant Ollam to talk about physical security, how he got into the industry, his stories from in the field as a Red Teamer, and how he is looking to change a phrase that many have adopted in the industry.  https://deviating.net/   YouTube: https://www.youtube.com/user/DeviantOllam    Twitter: https://twitter.com/deviantollam   Instagram: https://instagram.com/deviantollam   GitHub: https://github.com/deviantollam   Trainings: https://www.redteamalliance.com/RTCG.html
Internet and technology 4 years
0
0
0
45:55

A Journey in Infosec w/ Samy Kamkar

Hello and welcome back! It's been a bit of a hiatus for us here at Security Explained, but we're BACK in action and kicking things off with a casual conversation with our good friend Samy Kamkar. Samy has been a staple in the infosec community for years and even has a worm named after him (the Samy Worm!). He's got a list of wild projects longer than most resumes and has recently been part of an acquisition in his role at OpenPath. Join us for a fun conversation with one of the sharpest hackers you're likely to meet! Samy Kamkar https://samy.pl https://www.openpath.com/ https://twitter.com/samykamkar
Internet and technology 4 years
0
0
0
56:32

Log4j Holiday Special!

We're currently on an extended break between seasons 3 and 4 but LO AND BEHOLD the Internet has given us an early Christmas (non)gift . Log4j has been all over the news recently as one of the most impactful vulnerabilities disclosed in recent memory. From AWS to GCP, Cloudflare to DigitalOcean, the Log4shell vulnerability is forcing all manners of security teams to stay up late patching their systems. Join us in this impromptu dive into what is arguably the most impactful vulnerability of the last decade!
Internet and technology 4 years
0
0
0
50:54

Security Research v I - IPv666, Ubuntu Phones, and OpenBTS OH MY!

In this final episode of our third season we take the time to chat about a topic near and dear to our hearts - security research! We each picked one of our favorite projects to discuss, ranging from enumerating IPv6 addresses on the Internet to hacking the fledgling Ubuntu mobile phone to Drew's mischievous habits spinning up his own cellular base stations. We've mentioned security research time and again on the show, but this is the first time that we're diving into specific research that has played a significant role in our respective lives and careers. Thank you so much for joining us on our journey thus far and we can't wait to come back in season 4 with even better tips and tricks!
Internet and technology 4 years
0
0
0
59:02
You may also like View more
TISKRA Podcast sobre tecnología de consumo y software. Análisis estratégico del mundo Apple, Google, Microsoft, Tesla y Amazon así como de todos aquellos productos de entretenimiento y su posible impacto económico y social. Conducido por @JordiLlatzer Updated
Pioneros For Life Bienvenido al único videopódcast grabado a bordo del Volvo EX90, el coche más seguro del mundo. Un espacio íntimo, elegante y acondicionado acústicamente, donde las buenas ideas se sientan al lado del conductor y las conversaciones arrancan sin rodeos. Aquí no hablamos del futuro: hablamos de cómo vivir mejor ahora. Con calma. Con intención. Con estilo. En cada episodio, Juanma Ortega recibe a personas que viven con intención: creadores, científicos, chefs, tecnólogos, músicos, emprendedores… Gente brillante que te inspira sin ruido, con historias reales y visión de futuro aplicada al presente. Aquí la tecnología no se presume: se pone al servicio de una vida más equilibrada, más consciente, más libre. Porque vivir bien hoy significa elegir con criterio —desde lo que conduces hasta lo que escuchas—. 🟢 Bienestar real 🟢 Cultura con fondo 🟢 Tecnología útil y humana 🟢 Sostenibilidad sin discurso 🟢 Y una experiencia premium que no presume Pioneros For Life. Porque vivir mejor no empieza con más, sino con mejor. Updated
xHUB.AI En la era de la Inteligencia Artificial, la aplicación en cualquier escenario supone el mayor debate y más importante para el ser humano y su futuro.En el podcast de xHUB.AI hablamos sobre inteligencia artificial y otras ciencias transversales, su aplicación a diferentes sectores y soluciones, con los mejores speakers y especialistas.La Inteligencia Artificial cambiará el mundo y nosotros queremos contartelo.Te lo vas a perder? Updated
Go to Internet and technology