207: Cyber biowarfare, giant ladybugs, and strippers
Play • 1 hr 13 min

Fears are raised about cyber bioterrorists, there's a widespread blackout for IoT devices caused by a cloud cock-up, and what role do strippers play in a revamp of the United States's computer crime laws?

All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Mark Stockley.

And don't miss our featured interview with Steve Salinas of Deep Instinct, discussing ransomware.

Visit https://www.smashingsecurity.com/207 to check out this episode’s show notes and episode links.

Follow the show on Twitter at @SmashinSecurity, or on the Smashing Security subreddit, or visit our website for more episodes.

Remember: Subscribe on Apple Podcasts, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!

Warning: This podcast may contain nuts, adult themes, and rude language.

Theme tune: "Vinyl Memories" by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.

Special Guests: Mark Stockley and Steve Salinas.

Sponsored By:

Support Smashing Security

Links:

Hacker Valley Studio
Hacker Valley Studio
Hacker Valley Media
Episode 114 - The Good, Bad, and Ugly of Threat Intelligence with Patrick Coughlin
In this episode of the Hacker Valley Studio podcast, hosts Ron and Chris interview Patrick Coughlin, Co-Founder and CEO of TruSTAR. Patrick began his career as a security analyst in Washington D.C. and the middle east. By working with government contractors, multinational corporations, and counter-terrorism units, Patrick learned that the biggest challenge that security analysts have is retrieving the needed information from disparate data sources. This discovery led Patrick to founding TruStar. Patrick’s focus is to help organizations automate the collection and curation of threat intelligence data. Patrick’s analytical prowess originated from working at Booz Allen Hamilton where he learned a fundamental skill that all cybersecurity analysts should have - how to put together a slide deck. This skill helped Patrick articulate the importance of threat intelligence to leaders in the government and private sector. As the episode progresses, Patrick details the differences between threat intelligence requirements for national security and enterprise. For enterprise threat intelligence programs, the goal is to accelerate automation of detection and rarely attribution. Patrick also mentions automation is only as effective as the data is cleaned, normalized, and prioritized. What about the good, bad, and ugly of threat intelligence? Patrick describes that an organization can thrive by leveraging internal intelligence. This can be overlooked when organizations are fixated on buying threat data feeds and subscribing to ISAC feeds. Most enterprise organizations have a detection and response stack that is constantly providing information about threats relevant to their organization - which serves as great threat intelligence data. Chris and Ron ask Patrick about the science vs art aspects of cybersecurity and threat intelligence. Patrick describes that there is room for both art and science in threat intelligence. While new concepts are being discovered, there is art in finding the needle in the haystack. However, at some point, intuition can be described into steps that a machine can repeat. For example, after years of analytical practice an analyst can describe how and why they are tagging threat intelligence related data in such a way that can be repeated by other analysts or automation. This episode covers an abundance of tactics and techniques for threat intelligence analysts. Patrick describes the best place to begin automating threat intelligence is detection. An analyst can ask the question, “How do I get sources of known bad indicators into my detection stack so that I could drive high fidelity detections?”. As false positives decrease, your mean time to detection (MTTD) and resolution (MTTR) decrease which makes your threat intelligence and security operation team members more effective. 0:00 - Intro 1:53 - This episode features Patrick Coughlin, Co-Founder and CEO of TruSTAR 2:30 - Patrick’s background and start as a security analyst 5:19 - How to automate threat intelligence while reducing analyst fatigue 7:05 - How Patrick cultivated his analyst prowess 8:43 - Articulating threat intelligence to government and enterprise organizations 11:09 - Can a threat intelligence program be automated? 17:21 - Patrick’s experience of “good” and “bad” threat intelligence programs 20:31 - Logic vs Intuition in threat intelligence 27:04 - Artificial Intelligence and Machine Learning to make threat intelligence decisions 28:42 - Where to start when automating threat intelligence 30:02 - How to stay in touch with Patrick Coughlin Links: Connect with Patrick Coughlin on LinkedIn Link to Patrick’s company TruSTAR Learn more about Hacker Valley Studio. Support Hacker Valley Studio on Patreon. Follow Hacker Valley Studio on Twitter. Follow hosts Ron Eddings and Chris Cochran on Twitter. Learn more about our sponsor ByteChek. Take our FREE course for building threat intelligence programs by visiting www.hackervalley.com/easy
31 min
The Social-Engineer Podcast
The Social-Engineer Podcast
Social-Engineer, LLC
Ep. 137 – Human Hacking With Chris Hadnagy
In this special episode, Chris Hadnagy joins Maxie Reynolds to talk about the amazing stories and useful lessons contained in Chris’s new book: “Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You”. Listen as Chris delves into the process of making “Human Hacking” and shares the awesome story behind its inception. Maxie and Chris also discuss the importance of empathy especially when it comes to hacking humans. Chris a global security expert and master hacker. He is the founder and CEO of Social-Engineer, LLC, the creator of the popular Social Engineer Podcast, website, and newsletter, and designed “Advanced Practical Social Engineering,” the first hands-on social engineering training course and certification for law enforcement, military, and private sector professionals. 00:09 – Introduction to Maxie Reynolds 02:13 – Introduction to Christopher Hadnagy’s brand-new book: “Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You” 02:51 – Human-hacking is a skill that can be used in everyday life by everyday people 04:19 – What it means to “Leave Them Better Off for Having Met You” 05:50 – “The martial art of the mind” and how a malicious person could use it for harm 07:39 – Empathy and why it is so important when hacking humans 09:21 – Showing empathy while amygdala hijacked 11:40 – Empathy is more than just putting yourself in someone else’s shoes 14:15 – Empathy is often hierarchical 16:33 – The power of “I’m sorry” 18:02 – Why understanding the meaning behind someone’s actions is so important 21:48 – Accuracy of the stories told in the book 24:15 – The process of co-authoring the book with Seth Schulman 26:43 – The amazing story of how the book came to be 31:16 – How to fight the isolation and social awkwardness brought by technology and, more recently, COVID-19. 34:46 – Giving your feedback on the book 36:20 – A distillation of the “Advanced Practical Social Engineering” course, made applicable to everyone 40:50 – Socially engineering the world’s best rock band 43:51 - “Quick Fire Questions”: 44:04 – Chris's favorite story in the book 45:04 – Is there a stage in child development where less empathy is shown? 46:10 – Would the new book have helped teenage Chris? 48:01 – Is it as nicer to feel empathy yourself or receive it from someone else? 49:49 – Balance is required when teaching empathy. 51:19 – How we can all better our communities by learning to “Win Friends, Influence People, and Leave Them Better Off for Having Met You” 53:35 – Chris's book recommendations Without Conscience: The Disturbing World of the Psychopaths Among Us Antifragile: Things That Gain from Disorder The Dictionary of Body Language: A Field Guide to Human Behavior 54:56 – Outro Human Hacking Book Website Human Hacking Book Amazon Maxie on Twitter Chris on Twitter Social-Engineer on Twitter SEVillage: The Human Hacking Conference Social-Engineer.org Social-Engineer.com The Innocent Lives Foundation Clutch
58 min
Our Ludicrous Future
Our Ludicrous Future
Joe Scott, Tim Dodd and Ben Sullins
Model Y 7-seaterish, Starship SN9 triple static fire, Bio Data storage using CRISPR - Ep 116
Joe, Tim, and Ben talk about the long awaited Model Y 7-seater, SpaceX Starship SN9 triple static fire, and scientists using CRISPR to store binary data in DNA Read more from the articles we referenced: Model Y 5 Star Saftey - https://www.tesla.com/blog/model-y-achieves-5-star-overall-safety-rating-nhtsa Model Y Crash Videos - https://twitter.com/Tesla/status/1349572805122113540 Model Y 7 Seater - https://insideevs.com/features/465979/video-tesla-model-y-seven-seat-buying-advice/ SN9 does a triple header static fire! - https://youtu.be/swL4xrmmLCk Earth's Future - https://phys.org/news/2021-01-earth-future-outlook-worse-scientists.amp New Shepard launches their 14th New Shepard - https://www.youtube.com/watch?v=g9oTZu2HP8U #whydonttheyjust by @Metaphoriumino1 - https://twitter.com/Metaphoriumino1/status/1349774839368790019 Lebron gets a Hummer EV, maybe - https://www.yahoo.com/amphtml/lifestyle/bad-girl-watch-lebron-james-230000984.html CRISPR DNA data storage - https://www.newscientist.com/article/2264383-crispr-gene-editing-used-to-store-data-in-dna-inside-living-cells/ Insight loses MOLE - https://twitter.com/NASAInSight/status/1349760462854909957?s=20 https://mars.nasa.gov/insight/spacecraft/about-the-lander/ --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app --- Send in a voice message: https://anchor.fm/olfpod/message
1 hr 27 min
More episodes
Search
Clear search
Close search
Google apps
Main menu