Security Noise
A podcast by TrustedSec - Fridays
Categories:
132 Episodes
-
2.14 – Zip Slip Slip and split it up to the hip hip hip!
Published: 6/7/2018 -
2.13 (lucky 13) – Let’s talk about facebook! Plaintext Passwords and More!
Published: 4/13/2018 -
2.12 - Is that CryptoMiner or a Utility? Wildcards for the Masses, Look-a-Likes, and More CPU Vulnerabilities
Published: 3/16/2018 -
2.10 - Is your keyboard listening? A different type of jailbreak, Grinch Bots Stealing Christmas? Chrome, and Red Team Architecture!
Published: 12/7/2017 -
2.9 - OWASP Top 10 2017, OSX Root login bypass, Uber Hacked, who are the shadow brokers, ROCA!
Published: 12/4/2017 -
2.8 – NSA and Exploit Tools, Petya, Russia, and Ransomware, systemd, Deathstar, and Office persistence methods
Published: 7/3/2017 -
2.7 - Tavis breaks the Internet, Executive Orders, Diskless Persistence Methods, and more!
Published: 5/11/2017 -
2.6 – Special Guest Jayson E. Street, Shadow Brokers, Google OAuth, and more!
Published: 5/5/2017 -
2.5 – Krebs on Mirai, Rudy Cyber head, ransomware, and more!
Published: 1/20/2017 -
2.4 – Law Firm Hacks, Voting Systems and Russia Hacking, 5 signs to better security, Wire, CobaltStrike and more!
Published: 12/29/2016 -
2.3 – Flash Exploits, PowerShell Hacking, Investigating the Elections, Expedia Hacker, Android Malware, and Shutting down the Note 7. TT: Ruler, MailSniper
Published: 12/9/2016 -
2.2 – Shamoon creeps out again in Saudi, Android Malware steals Google accounts, FBI jurisdiction, and 2017 predictions
Published: 12/1/2016
In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the information that truly matters. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, an end-to-end cybersecurity consulting company using our expertise, technical skills, and ethical character to secure what's important and achieve what matters.