Rob Allen joins us to discuss the importance of security research teams, and some cool stuff they've worked on. Then, in the Security News:
Flipper Zero, unlocking cars: The saga continues The one w…Published on 2 months, 1 week ago
This segment is sponsored by Flashpoint. Visit https://securityweekly.com/flashpoint to learn more about them!
Recent leaks tied to LockBit and Black Basta have exposed the inner workings of two of t…
Published on 2 months, 2 weeks ago
We kick things off with a deep dive into the Hackberry PI and how to build one. Then in the security news:
Will Perplexity buy Chrome? ESP32 Bus Pirates Poisoned telemetry Docker image security Full…Published on 2 months, 3 weeks ago
Why should hate AI When firmware attacks The 300 second breach Old ways still work, AI might help And so begins the crawler wars Turn off your SonicWall VPN Your Pie may be wrapped in PII Attackers …
Published on 2 months, 4 weeks ago
In the security news:
Hacking washing machines, good clean fun! Hacking cars via Bluetooth More Bluetooth hacking with Breaktooth Making old vulnerabilities great again: exploiting abandoned hardwar…Published on 3 months ago
We chat with Material Security about protecting G Suite and MS365. How else are you monitoring the most commonly used cloud environments and applications?
In the security news:
Google Sues Badbox op…Published on 3 months, 1 week ago
In the security news:
The train is leaving the station, or is it? The hypervisor will protect you, maybe The best thing about Flippers are the clones Also, the Flipper Zero as an interrogation tool …Published on 3 months, 2 weeks ago
This week in the security news:
Citrixbleed 2 and so many failures Ruckus leads the way on how not to handle vulnerabilities When you have no egress Applocker bypass So you bought earbuds from TikTo…Published on 3 months, 3 weeks ago
This week, we dive into the world of Meshtastic and LoRa—two technologies empowering secure, long-range, and infrastructure-free communication. We'll talk about the origins of Meshtastic, how LoRa ra…
Published on 4 months ago
This conversation explores the intersection of cybersecurity and emerging technologies, focusing on innovative hacking techniques, the evolution of vulnerability management, and the critical importan…
Published on 4 months, 1 week ago
If you like Podbriefly.com, please consider donating to support the ongoing development.
Donate