Podcast Episodes

Back to Search
Exploring AI in Firmware Analysis

Exploring AI in Firmware Analysis


Episode 65


Summary

In this episode, special guest Matt Brown joins us to discuss the integration of AI in firmware analysis, exploring its benefits and challenges. We delve into the transition from traditional …


Published on 1 day, 3 hours ago

Patching, Evil AI, Supply Chain Breaches

Patching, Evil AI, Supply Chain Breaches


Episode 64


Summary

In this episode, the hosts discuss various cybersecurity topics, including recent vulnerabilities in Fortinet products, the implications of supply chain breaches, the evolving role of AI in c…


Published on 3 weeks, 1 day ago

F5 Breach, Linux Malware, and Hacking Banks

F5 Breach, Linux Malware, and Hacking Banks


Episode 63


Summary

 

In this episode of Below the Surface, Paul Asadoorian and Chase Snyder delve into various cybersecurity topics, including the use of Raspberry Pi in cyber attacks, the implications of the F…


Published on 1 month, 2 weeks ago

Unpacking the F5 Breach, Framework UEFI Shells

Unpacking the F5 Breach, Framework UEFI Shells


Episode 62


In this episode, the hosts discuss the recent F5 breach, exploring the implications of the attack, the tactics used by threat actors, and the importance of vulnerability disclosure. They delve into t…


Published on 1 month, 3 weeks ago

Red November, Cisco Vulnerabilities, and Supply Chain Security

Red November, Cisco Vulnerabilities, and Supply Chain Security


Episode 61


In this episode of Below the Surface, the hosts discuss various cybersecurity topics, including the Red November campaign targeting network edge devices, the implications of the Cisco SNMP vulnerabil…


Published on 2 months, 1 week ago

HybridPetya and UEFI Threats

HybridPetya and UEFI Threats


Episode 60


In this episode of Below the Surface, the hosts discuss various cybersecurity topics, including the evolution of malware with a focus on Hybrid Petya, the implications of UEFI vulnerabilities, and th…


Published on 2 months, 3 weeks ago

Exploit Marketplaces

Exploit Marketplaces


Episode 59


In this episode of Below the Surface, host Paul Asadoorian speaks with Evan Dornbush, CEO of Desired Effect, about the evolving landscape of exploit marketplaces and vulnerability research. They disc…


Published on 3 months ago

UEFI Vulnerabilities and Hardware Risks

UEFI Vulnerabilities and Hardware Risks


Episode 58


In this episode, the hosts discuss various cybersecurity topics, focusing on hardware vulnerabilities, UEFI attack vectors, and the implications of new regulations on device security. They explore th…


Published on 3 months, 1 week ago

Interview with Brian Mullen from AMI

Interview with Brian Mullen from AMI


Episode 57


In this episode of Below the Surface, host Paul Asadoorian is joined by Brian Mullen, head of SSDLC at AMI, to discuss the complexities of supply chain and firmware security. They explore the challen…


Published on 4 months ago

Vulnerabilities & Backdoors In IT Infrastructure

Vulnerabilities & Backdoors In IT Infrastructure


Episode 56


In this episode, the hosts discuss various cybersecurity topics, focusing on Nvidia vulnerabilities, the implications of backdoors in technology, and the importance of secure boot and certificate man…


Published on 4 months, 1 week ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate