It's a simple mantra proclaimed throughout hundreds of episodes. We live it. We breathe it. We invite you to share this simple love for technology.
As the longest running show on RU-vid, these award winning shows serve as a platform to share our passions. Welcome!
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning podcasts, leading pentest gear, and inclusive community - where all hackers belong.
Subscribe and join us on our educational life-long journey through cyber security.
My cybersecurity news also comes from the Risky Business podcast with Patrick Grey (Australian cybersecurity journalist of many years experience) and Adam Boileau (cybersecurity consultant from New Zealand with decades of hacker expertise). The news section at the beginning of the regular main episodes cover the week's international security news, Pat's prior career as a journalist in this area with friends and connections in the business, USA, Australia, UK and elsewhere means it's professionally done, sources are checked; their many years of experience usually brings good insights, and as a techy myself I like that they do talk a little about the techniques and exploitation risks on the more interesting ones without making it a dry technical podcast. They pull a lot from existing sources, highlights from trusted places, but also known well enough/have the connections that they get the odd scoop/will dig deeper in and spot relevant angles that other places might not notice sometimes. No connection to it other than listener.
I've been following you guys off and on for many years. You have helped me and my company a lot, although I'm not near where I need to be in the smarts, I learn something new every time I watch your videos. Thank you so much.
I was hopoing for some info about the dockless terrorists. Supply chain attack right? I'm assuming they made sure the pagers didn't go off on some passenger plane with innocent people or the whole world would be pretty damn mad instead of pumped up.
yes supply chain attack. I've seen photos of cityscape with a couple puffs of smoke rising above buildings in the distance where 2 had gone off in the view.
There were some attempts to move the python package system to the eMaker pattern a decade ago, a pattern that largely isn't vulnerable to either of the python vulns described here. c.f. exocet.
That's why version pinning exists in package definition files. Plus software that lets you know about updated versions, any security vulnerabilities from older ones you have downloaded, and helps manage that process.
If a security company can’t even secure their own files, that says it all to me. Yes we’re all human - But their procedures are clearly lacking. So what else is?
When will software engineers figure out that people really do delete/abandon stuff? And when will they figure out that delete/add is NOT equivalent to rename, for complex data types?