30 min

Episode 75: November 20 2023 Cybersecurity News Byte with Jim Guckin

    • Technology

This week we talk about [00:36] We talk about how some security researchers were able to extract a RSA key from signing errors, [07:27] How a now defunt shadowy hack-for-hire group was behind a bunch of attacks, [15:11] Vulnerabilities in some AL and ML tools should they give you something to think about, [22:59] and an old tactic being used to extract money from those who care and reminder how it's the season for social engineering.

This week we talk about [00:36] We talk about how some security researchers were able to extract a RSA key from signing errors, [07:27] How a now defunt shadowy hack-for-hire group was behind a bunch of attacks, [15:11] Vulnerabilities in some AL and ML tools should they give you something to think about, [22:59] and an old tactic being used to extract money from those who care and reminder how it's the season for social engineering.

30 min

Top Podcasts In Technology

Acquired
Ben Gilbert and David Rosenthal
Lex Fridman Podcast
Lex Fridman
The TED AI Show
TED
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Hard Fork
The New York Times
TED Radio Hour
NPR