39 afleveringen

Pwned is a weekly information security podcast addressing real-world cybersecurity and information security challenges. Each week we cover a new topic from cybersecurity, to information security, to best practices, to security technology, and how-to's. All topics are from Security professionals, and CISOs and security stories from the field.

Pwned: The Information Security Podcast Justin Fimlaid

    • Zaken en persoonlijke financiën

Pwned is a weekly information security podcast addressing real-world cybersecurity and information security challenges. Each week we cover a new topic from cybersecurity, to information security, to best practices, to security technology, and how-to's. All topics are from Security professionals, and CISOs and security stories from the field.

    Exim Server Vulnerabilities and Exploits

    Exim Server Vulnerabilities and Exploits

    Sponsor: https://www.nuharborsecurity.com



    Contact Me: https://justinfimlaid.com/contact-me/



    Twitter: @justinfimlaid



    LinkedIn: https://www.linkedin.com/in/jfimlaid/



    All the notes: https://www.nuharborsecurity.com/exim-server-vulnerabilities/



    Interesting Tid-bits:







    Known C&C: http://173[.]212.214.137/s



    Firewall Addresses:



    https://an7kmd2wp4xo7hpr.tor2web.su

    https://an7kmd2wp4xo7hpr.tor2web.io

    https://an7kmd2wp4xo7hpr.onion.sh

    • 6 min.
    AppSec Authentication Requirements

    AppSec Authentication Requirements

    Sponsor: https://www.nuharborsecurity.com



    Contact Me: https://justinfimlaid.com/contact-me/



    Twitter: @justinfimlaid



    LinkedIn: https://www.linkedin.com/in/jfimlaid/

    • 8 min.
    Winnti Malware for Linux

    Winnti Malware for Linux

    Sponsor: https://www.nuharborsecurity.com



    Contact Me: https://justinfimlaid.com/contact-me/



    Twitter: @justinfimlaid



    LinkedIn: https://www.linkedin.com/in/jfimlaid/

    • 4 min.
    APT10 Update

    APT10 Update

    Sponsor: https://www.nuharborsecurity.com



    Contact Me: https://justinfimlaid.com/contact-me/



    Twitter: @justinfimlaid



    LinkedIn: https://www.linkedin.com/in/jfimlaid/



    IOCs: APT10/Operation Cloud Hopper - Indicators of Compromise v3.csv



     

    • 5 min.
    Ohio’s Data Protection Act

    Ohio’s Data Protection Act

    Important Links:



    More Info: https://www.nuharborsecurity.com/4-things-to-know-about-the-ohio-data-protection-act/



    State of Ohio Data Protection Act Law Text: https://www.legislature.ohio.gov/legislation/legislation-documents?id=GA132-SB-220



    IAPP Analysis (by Katelyn Burgess): https://iapp.org/news/a/analysis-ohios-data-protection-act/



    What is the Ohio Data Protection Law (by Jenna Kersten): https://kirkpatrickprice.com/blog/what-is-the-ohio-data-protection-act/



    Sponsor: https://www.nuharborsecurity.com



    Contact Me: https://justinfimlaid.com/contact-me/



    Twitter: @justinfimlaid



    LinkedIn: https://www.linkedin.com/in/jfimlaid/

    • 8 min.
    SHA-1 Collision Attacks Explained

    SHA-1 Collision Attacks Explained

    Important Links:







    SHA-1 Collision Explanation Page: https://shattered.io/

    Malicious Hashing: Eve’s Variant of SHA-1 https://link.springer.com/content/pdf/10.1007%2F978-3-319-13051-4_1.pdf

    Finding SHA-1 Characteristics: General Results and Applications: https://link.springer.com/chapter/10.1007%2F11935230_1











    Sponsor: https://www.nuharborsecurity.com







    Contact Me: https://justinfimlaid.com/contact-me/







    Twitter: @justinfimlaid







    LinkedIn: https://www.linkedin.com/in/jfimlaid/

    • 14 min.

Top-podcasts in Zaken en persoonlijke financiën

Luisteraars hebben zich ook geabonneerd op