• Risky Business #759 – Why Iran's hack and leak will amount to naught

  • Aug 14 2024
  • Duración: 1 h y 5 m
  • Podcast

Risky Business #759 – Why Iran's hack and leak will amount to naught

  • Resumen

  • On this week’s show, Patrick Gray and Adam Boileau discuss the week’s security news and recap the best research presented at Black Hat and DEF CON in Las Vegas last week. They cover: Iran tries an election hack’n’leak like its still 2016Crowdstrike takes home the Pwnie for Epic Fail at DEF CONUK healthcare SaaS faces six million pound fine for lack of MFAUS circuit courts disagree on geofence warrantsOur roundup of juicy Blackhat/DEF CON researchAnd much, much more. This week’s episode is sponsored by Trail of Bits. CEO Dan Guido is fresh back from the DARPA AI Cyber Challenge at DEF CON, where the Trail of Bits team moved through into the finals. Dan talks through the challenge of finding, reporting and fixing bugs with AI systems. You can also watch this week’s show on Youtube. Show notes Trump campaign points finger at Iranian hackers for documents leakFBI says it's investigating efforts to hack Trump and Biden-Harris campaignsIranian hackers ramping up US election interference, Microsoft warnsState Dept puts $10 million bounty on IRGC-CEC hackersCrowdStrike snafu was a ‘dress rehearsal’ for critical infrastructure disruptions, CISA director says | Cybersecurity DiveDominic White 👾 on X: "CrowdStrike accepting the @PwnieAwards for “most epic fail” at @defcon. Class act. https://t.co/e7IgYosHAE" / XRussia's Kursk region suffers 'massive' DDoS attack amid Ukraine offensiveElon Musk on X: "@markpinc Yeah" / XProgress Software says SEC declines to pursue action related to MOVEit exploitation spree | Cybersecurity DiveNHS software supplier Advanced faces £6m fine over ransomware attack failingsSecurity bugs in ransomware leak sites helped save six companies from paying hefty ransoms | TechCrunch5th Circuit rules geofence warrants illegal in win for phone users’ privacy | Ars TechnicaCustoms and Border Protection agents need a warrant to search your phone - The VergeHackers could spy on cell phone users by abusing 5G baseband flaws, researchers say | TechCrunch‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections | WIREDDowngrade Attacks Using Windows Updates | SafeBreachListen to the whispers: web timing attacks that actually work | PortSwigger ResearchBucket Monopoly: Breaching AWS Accounts Through Shadow ResourcesConfusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server! | DEVCORETrail of Bits Advances to AIxCC Finals | Trail of Bits Blog
    Más Menos

Lo que los oyentes dicen sobre Risky Business #759 – Why Iran's hack and leak will amount to naught

Calificaciones medias de los clientes

Reseñas - Selecciona las pestañas a continuación para cambiar el origen de las reseñas.