Player FM - Internet Radio Done Right
Checked 2d ago
הוסף לפני five שנים
תוכן מסופק על ידי Breaking Badness. כל תוכן הפודקאסטים כולל פרקים, גרפיקה ותיאורי פודקאסטים מועלים ומסופקים ישירות על ידי Breaking Badness או שותף פלטפורמת הפודקאסט שלהם. אם אתה מאמין שמישהו משתמש ביצירה שלך המוגנת בזכויות יוצרים ללא רשותך, אתה יכול לעקוב אחר התהליך המתואר כאן https://he.player.fm/legal.
Player FM - אפליקציית פודקאסט
התחל במצב לא מקוון עם האפליקציה Player FM !
התחל במצב לא מקוון עם האפליקציה Player FM !
פודקאסטים ששווה להאזין
בחסות
T
The Agile Brand with Greg Kihlström®


1 #669: It's already time to start planning for the holiday shopping season with Carey Cockrum, Cella by Randstad Digital 28:52
28:52
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי28:52
Retailers are facing a rapidly evolving landscape where consumer expectations, AI advancements, and social media platforms like TikTok are redefining engagement. It feels like the holiday shopping season just ended, but when do retailers start planning for the next one, and some retailers already behind the curve for this season? Joining us today is Carey Cockrum, Director of Consulting at Cella by Randstad Digital, where she helps major brands and marketing teams optimize their strategies with data-driven insights, AI-powered content creation, and cutting-edge retail marketing trends. With the holidays just around the corner, she’s here to share what’s next for retail marketing, campaign optimization, and how brands can stay ahead in a hyper-competitive space. ABOUT CAREY COCKRUM Carey has been a part of the Creative Agency space for nearly 30 years. She has served as Designer, Creative Director, Creative Operations Lead and Agency Lead in both internal and external agencies (big and small). Carey has worked directly with C-suite stakeholders to understand organizational strategies that inform effective creative solutions. She is a bit of a data nerd and loves demonstrating results. Brands she’s supported include Fruit of the Loom, Wendy’s and Humana. In her free time, she enjoys going back to her creative roots through painting and drawing. She also spends her time improving upon the house she lives in today in Southern, MI - inside and out. RESOURCES Catch the future of e-commerce at eTail Boston, August 11-14, 2025. Register now: https://bit.ly/etailboston and use code PARTNER20 for 20% off for retailers and brands Don't Miss MAICON 2025, October 14-16 in Cleveland - the event bringing together the brights minds and leading voices in AI. Use Code AGILE150 for $150 off registration. Go here to register: https://bit.ly/agile150 Connect with Greg on LinkedIn: https://www.linkedin.com/in/gregkihlstrom Don't miss a thing: get the latest episodes, sign up for our newsletter and more: https://www.theagilebrand.show Check out The Agile Brand Guide website with articles, insights, and Martechipedia, the wiki for marketing technology: https://www.agilebrandguide.com The Agile Brand podcast is brought to you by TEKsystems. Learn more here: https://www.teksystems.com/versionnextnow The Agile Brand is produced by Missing Link—a Latina-owned strategy-driven, creatively fueled production co-op. From ideation to creation, they craft human connections through intelligent, engaging and informative content. https://www.missinglink.company…
Building a Hacker Conference from Scratch: The Wild Origins of ShmooCon
Manage episode 469829290 series 2609238
תוכן מסופק על ידי Breaking Badness. כל תוכן הפודקאסטים כולל פרקים, גרפיקה ותיאורי פודקאסטים מועלים ומסופקים ישירות על ידי Breaking Badness או שותף פלטפורמת הפודקאסט שלהם. אם אתה מאמין שמישהו משתמש ביצירה שלך המוגנת בזכויות יוצרים ללא רשותך, אתה יכול לעקוב אחר התהליך המתואר כאן https://he.player.fm/legal.
In this episode of Breaking Badness, we sit down with Bruce and Heidi Potter, two of the masterminds behind ShmooCon, the legendary cybersecurity conference that ran for 20 years. They take us behind the scenes, from its hilarious bar-napkin origins to how they built a tight-knit hacker community that thrived for two decades.
…
continue reading
289 פרקים
Manage episode 469829290 series 2609238
תוכן מסופק על ידי Breaking Badness. כל תוכן הפודקאסטים כולל פרקים, גרפיקה ותיאורי פודקאסטים מועלים ומסופקים ישירות על ידי Breaking Badness או שותף פלטפורמת הפודקאסט שלהם. אם אתה מאמין שמישהו משתמש ביצירה שלך המוגנת בזכויות יוצרים ללא רשותך, אתה יכול לעקוב אחר התהליך המתואר כאן https://he.player.fm/legal.
In this episode of Breaking Badness, we sit down with Bruce and Heidi Potter, two of the masterminds behind ShmooCon, the legendary cybersecurity conference that ran for 20 years. They take us behind the scenes, from its hilarious bar-napkin origins to how they built a tight-knit hacker community that thrived for two decades.
…
continue reading
289 פרקים
כל הפרקים
×B
Breaking Badness

1 Inside Morphing Meerkat and Proton66: How Cybercrime Is Getting Easier 39:39
39:39
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי39:39
In this episode of Breaking Badness, the crew investigates two escalating threats in the cybercrime ecosystem: the cleverly named phishing-as-a-service platform Morphing Meerkat, and the bulletproof hosting provider Proton66, a favorite among amateur cybercriminals. First, they dig into how Morphing Meerkat uses DNS-over-HTTPS (DoH) and clever phishing kits to evade detection. Then, they shift focus to Proton66, a Russian-based bulletproof host that shelters a new generation of low-skill attackers, including a threat actor known as "Coquettte" with ties to the Horrid Hacking group.…
B
Breaking Badness

1 DFIR Foundations: Real-World Lessons in Containment, Eradication, and Recovery 54:45
54:45
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי54:45
In this powerful continuation of our DFIR series, cybersecurity experts Daniel Schwalbe, David Bianco, Lesley Carhart, and Sarah Sabotka dissect the heart of effective incident response, containment, eradication, recovery, and lessons learned. Packed with firsthand war stories, sharp tactical advice, and honest debates, this episode is a must-listen for anyone building or refining their digital forensics and incident response capabilities. Tune in to learn why planning matters, what to do (and not do) during a breach, and how to make the adversary's job harder, one containment plan at a time.…
B
Breaking Badness

1 DFIRside Chat: Lessons from the Frontlines of Incident Response 42:36
42:36
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי42:36
In Part 1 of this special two-part panel, the Breaking Badness podcast gathers leading cybersecurity experts to explore the foundations of DFIR - Digital Forensics and Incident Response. Featuring Daniel Schwalbe (DomainTools), Lesley Carhart (Dragos), David Bianco (Splunk), and Sarah Sabotka (Proofpoint), the panel dives into what makes an effective incident response program, why preparation is often overlooked, and how to bring technical and human elements together during high-stakes security events.…
B
Breaking Badness

1 How Russian Disinformation Campaigns Exploit Domain Registrars and AI 38:57
38:57
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי38:57
In this episode of Breaking Badness, host Kali Fencl is joined by DomainTools' Daniel Schwabe and disinformation expert Scot Terban to uncover how modern Russian disinformation campaigns are using domain registrars, homoglyph attacks, and generative AI to mimic legitimate news outlets and manipulate public perception. From the eerie sophistication of Doppelganger operations to the exploitation of domain infrastructure, this episode sheds light on how truth is being weaponized in the digital era. We also explore how AI is accelerating the speed and scale of these attacks, and the limited levers defenders have to push back.…
B
Breaking Badness

1 DNS Masterclass: Attacks, Defenses, and the Day the Internet Was Saved 41:17
41:17
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי41:17
In this special DNS Masterclass episode of Breaking Badness, hosts Kali Fencl, Tim Helming, and Taylor Wilkes-Pierce take a deep dive into the Domain Name System often dubbed the backbone and battleground of the internet. From its humble beginnings with host files to its critical role in modern security, the episode unpacks DNS’s evolution, vulnerabilities, and impact on InfoSec.…
B
Breaking Badness

1 From ValleyRAT to Silver Fox: How Graph-Based Threat Intel is Changing the Game 57:53
57:53
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי57:53
In this episode of Breaking Badness, host Kali Fencl welcomes Wes Young of CSIRT Gadgets and Daniel Schwalbe, CISO and head of investigations at DomainTools, dive into a recent DomainTools Investigations (DTI) analysis involving ValleyRAT and Silver Fox, and how new tools are enabling faster, more accessible analysis for junior and seasoned analysts alike. Whether you're a threat intel veteran or an aspiring analyst, this episode is packed with hard-earned lessons, technical insights, and future-forward thinking. They also unpack the evolution of threat intelligence from early higher-ed days of wiki-scraped snort rules to today’s graph-powered AI analysis. Wes shares the origin story behind his platform AlphaHunt, how it's being used to automate and enhance threat detection, and why community sharing remains essential even in an era of advanced tooling.…
B
Breaking Badness

1 APT 41’s VPN Exploits & The Great Firewall’s Leaky Secrets 31:17
31:17
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי31:17
In this episode of Breaking Badness, we dive into two major cybersecurity stories: the exploitation of a VPN vulnerability by Chinese APT 41 and the newly discovered “Wall Bleed” flaw in the Great Firewall of China. APT 41 has been using a critical VPN vulnerability to infiltrate operational technology (OT) organizations, targeting industries like aerospace and defense. Meanwhile, researchers have uncovered a flaw in China's DNS injection system, which inadvertently leaks internal data—an ironic twist for a government known for its strict internet censorship. Join us as we break down these exploits, their impact on cybersecurity, and what they reveal about modern cyber espionage. We also discuss best practices for securing VPNs, firewall vulnerabilities, and the ethical implications of studying censorship technologies.…
B
Breaking Badness

1 Hacked Chats & Telecom Takedowns: Black Basta & Salt Typhoon 43:23
43:23
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי43:23
Episode 202 of Breaking Badness takes a deep dive into two of the biggest cybersecurity stories of the year (so far): ● Black Basta’s Leaked Chats – A major data leak has exposed internal conversations from this notorious ransomware gang, revealing their internal struggles, ransom negotiations, and even workplace drama. ● Salt Typhoon’s Cyber Espionage – A sophisticated Chinese threat group has been caught infiltrating major U.S. telecommunications providers, raising serious concerns about national security.…
B
Breaking Badness

1 Building a Hacker Conference from Scratch: The Wild Origins of ShmooCon 44:32
44:32
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי44:32
In this episode of Breaking Badness, we sit down with Bruce and Heidi Potter, two of the masterminds behind ShmooCon, the legendary cybersecurity conference that ran for 20 years. They take us behind the scenes, from its hilarious bar-napkin origins to how they built a tight-knit hacker community that thrived for two decades.…
B
Breaking Badness

1 Takeovers, DeepSeek Deceptions & the Cloud’s Dirty Laundry 40:14
40:14
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי40:14
In this episode of Breaking Badness, we dive into two major cybersecurity concerns: the risks of abandoned S3 buckets and a wave of phishing attacks impersonating DeepSeek. Watchtowr Labs uncovers how forgotten AWS storage can be hijacked for malicious purposes, potentially compromising military, government, and enterprise systems. Meanwhile, attackers exploit DeepSeek’s rising popularity to create lookalike sites, tricking unsuspecting users into downloading malware or exposing credentials. Join hosts Kali Fencl, Tim Helming, and Taylor Wilkes-Pierce as they break down these findings with humor, deep insights, and even a few pop culture references. Plus, we rate the severity of these threats on our infamous Hoodie Scale and wrap up with Gold, Guidance & Grievances.…
B
Breaking Badness

1 Cybersecurity’s Evolution, 200 Puns Later! 44:36
44:36
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי44:36
Welcome to the 200th episode of Breaking Badness! 🎉 In this special milestone edition, we take a nostalgic stroll down memory lane, discuss the evolution of cybersecurity, and explore how the podcast—and the security landscape—has changed since 2019. In this special milestone episode, hosts Kali Fencl, Tim Helming, and Taylor Wilkes-Pierce are joined by longtime friend of the show, Allan Liska, to reflect on how both the podcast and cybersecurity world have evolved over the past six years. Let’s take a stroll down memory lane and explore how Breaking Badness went from an experimental idea to a trusted, pun-filled source of cybersecurity insights.…
B
Breaking Badness

1 Zero Trust, Secure Coding & Developer Incentives: Tanya Janca on AppSec’s Biggest Challenges 36:49
36:49
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי36:49
In this episode of Breaking Badness, we welcome back Tanya Janca, aka SheHacksPurple, to discuss her latest book, Alice and Bob Learn Secure Coding. Tanya dives deep into the fundamental principles of secure software development, the psychology behind developer incentives, and the often-overlooked importance of zero trust security.…
B
Breaking Badness

1 DNS Errors and Malware Builders Turning on Attackers 35:10
35:10
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי35:10
In this episode of Breaking Badness, we analyze two fascinating cybersecurity incidents that expose both corporate misconfigurations and hacker missteps. Security researcher Philippe Caturegli discovered a typo in MasterCard’s DNS records, which left the company open to traffic hijacking and data exposure. This long-overlooked flaw, dating back years, could have been exploited by attackers to redirect users, intercept data, and manipulate services. The Script Kiddie Trap: In a turn of events that underscores the “no honor among thieves” trope, a threat actor baited low-skilled hackers (script kiddies) with a fake malware builder. Instead of gaining hacking capabilities, they unwittingly installed a backdoor on their own machines, allowing the original attacker to steal their data and take control of their systems.…
B
Breaking Badness

1 Leveling Up Mental Health: Tackling Gaming Toxicity and Cybersecurity Burnout 35:46
35:46
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי35:46
In this episode of Breaking Badness, Tricia Howard of Akamai joins Kali Fencl and Ian Campbell to dive deep into the intersection of gaming culture, mental health, and cybersecurity. Tricia shares her journey from theater arts to cybersecurity research, her love for gaming, and her experiences tackling emotional toxicity in digital spaces. The episode covers the concept of "mind patches," the role of community in digital wellness, and how gaming and workspaces mirror each other in their challenges with mental health and collaboration. Tune in to hear her thoughts on reducing stigma, creating safe digital spaces, and embracing vulnerability for a healthier cybersecurity community.…
B
Breaking Badness

1 Spring Cleaning Your Digital Life: APT Threats, Third-Party Breaches, and Chat Risks 31:06
31:06
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי31:06
In this episode of Breaking Badness, we dive into the cybersecurity headlines making waves in 2025. We discuss the U.S. Treasury breach, allegedly orchestrated by Chinese hackers using third-party access. Learn about how lingering chat histories can expose sensitive data and the importance of digital spring cleaning.…
B
Breaking Badness

1 Tanya Janca on Secure Coding, AppSec, and Breaking Barriers in Cybersecurity 47:28
47:28
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי47:28
In this episode of Breaking Badness, we sit down with Tanya Janca, aka SheHacksPurple, a cybersecurity educator, and author of the best-selling book Alice and Bob Learn Application Security. Tanya shares her journey from software developer to AppSec expert, dives into the unique challenges of teaching secure coding, and discusses the impact of cybersecurity breaches on industries and individuals. From her creative teaching methods to her advocacy for change in university curriculums, Tanya offers insights that resonate with developers, educators, and security professionals alike. Discover how Tanya is paving the way for accessible AppSec education, the role of AI in secure coding, and her mission to teach security as a fundamental skill for every developer.…
B
Breaking Badness

1 Cybersecurity Tales: Espionage, Ransomware, and the Stories Behind the Threats 34:03
34:03
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי34:03
Welcome to this special episode of the Breaking Badness Cybersecurity Podcast! We’re turning the spotlight on the books that have shaped the world of cybersecurity and inspired professionals in the field. As part of our ongoing book club series, this episode is a journey into storytelling, research, and the unique perspectives that make cybersecurity literature so compelling. From Ransomware Diaries to the geopolitics of cyber warfare, this discussion is packed with insights and actionable takeaways for anyone working in Infosec.…
B
Breaking Badness

1 Top Cyber Moments of 2024: Hoodies, Goodies, and Hilarious Puns 39:13
39:13
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי39:13
In this special episode of Breaking Badness, we wrap up 2024 with a countdown of the top episodes, puns, and cybersecurity moments that defined the year. From the hoodiest hacks to the goodiest wins, Kali, Tim, and Taylor reflect on critical insights, industry-changing events, and listener favorites. Tune in for discussions about evolving OT security, DNS mishaps, ransomware trends, and expert predictions for 2025. Featuring special moments like our Hacker Summer Camp interviews and top cybersecurity guests, this episode is both insightful and entertaining.…
B
Breaking Badness

1 2025 Cybersecurity Predictions: AI, Ransomware, and Quantum Threats 59:41
59:41
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי59:41
In this special 2025 Predictions episode of Breaking Badness, host Kali Fencl joins cybersecurity experts Sean McNee, Tim Helming, and Daniel Schwalbe to discuss the future of cyber threats and defense. From ransomware evolution and AI-powered attacks to quantum computing and “synthetic identity fraud,” the group compares their insights with predictions generated by leading AI platforms like ChatGPT, Claude, Copilot, and Meta AI. Will 2025 be the year of AI-compromised models or industrial control system hacks? Are biometric security risks on the rise, and what’s next for ransomware gangs? Tune in for insights, banter, and some predictions you’ll want to track!…
B
Breaking Badness

1 DNS Gone Rogue & DARPA’s Cyber Puzzle: Lessons in Security Innovation 32:26
32:26
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי32:26
In this episode of Breaking Badness, we dive into two fascinating stories shaping the cybersecurity landscape. First, we unpack the case of Gabriel Koo and his surprising acquisition of the domain us-east-1.com, a domain closely tied to AWS’s naming conventions. What insights can this seemingly simple purchase reveal about DNS misconfigurations and AWS security practices? Next, we shift focus to DARPA's ambitious new project aimed at revolutionizing cybersecurity by breaking software into smaller, more secure compartments. With expert analysis and intriguing insights, we explore the intersection of DNS, innovation, and the future of cybersecurity.…
B
Breaking Badness

1 The Rise of Holiday Scams and State-Sponsored Cyber Threats 44:20
44:20
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי44:20
In this episode of Breaking Badness, we delve into the cybersecurity trends shaping the holiday season. We unpack the 60% surge in scam domain registrations targeting holiday shoppers, discuss the tactics of TAG-112, a Chinese state-sponsored threat group, and analyze their use of compromised websites to deliver Cobalt Strike malware. Plus, we share actionable insights on mitigating these threats. Tune in for expert analysis, lighthearted banter, and a few cybersecurity holiday tips to keep you safe this season…
B
Breaking Badness

1 Breaking Down SBOMs: The Secret Weapon in Healthcare Security 31:22
31:22
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי31:22
In this episode of Breaking Badness, we dive into the critical challenges and innovations in healthcare cybersecurity with Ken Zalevsky, CEO of Vigilant Ops. From the vulnerabilities in medical devices to the revolutionary role of Software Bill of Materials (SBOMs), Ken shares his two decades of expertise in safeguarding patient safety and hospital systems against emerging threats. Tune in to learn about shifting cybersecurity left, the complexities of interconnected healthcare systems, and actionable strategies to combat ransomware and legacy vulnerabilities.…
B
Breaking Badness

1 195. From Wingdings to Warfare: Inside the Wildest Cybersecurity Stories 38:58
38:58
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי38:58
In this episode of Breaking Badness, we explore two fascinating cybersecurity stories. First, we delve into the unusual case of an ex-Disney employee who hacked menu systems, creating chaos in the happiest place on Earth. Next, we discuss Sophos' five-year-long battle with a determined group of attackers targeting their firewalls. Tune in as we break down the insider threat at Disney, the lessons learned from Sophos' transparency, and what it all means for the future of cybersecurity. Plus, don't miss our signature Gold, Guidance, and Grievances segment for unique insights and takeaways.…
B
Breaking Badness

1 Jason Haddix on Red Team Tactics, CISO Challenges, and the Battle for Gaming Security 44:21
44:21
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי44:21
In this episode of the Breaking Badness Cybersecurity Podcast, Jason Haddix dives into his unique journey from red teaming and pentesting to leading security teams as a CISO in high-profile organizations, including a top gaming company. Jason unpacks the distinct challenges of securing a gaming company, where risks come not only from state actors but also from clout-seeking young hackers. He shares valuable insights on building scalable security programs, secrets management, and the importance of radical transparency in corporate security cultures. Tune in to hear why, in Jason's words, "gaming saved me from a misspent youth," and learn about his latest ventures into offensive security training and AI-driven security solutions.…
B
Breaking Badness

1 194. Locate X Unleashed & APT29’s Latest Gambit: The Battle for Digital Privacy 32:54
32:54
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי32:54
In this week’s episode of Breaking Badness, we dive deep into two major cybersecurity stories that are shaping today’s landscape. First, we explore the alarming capabilities of Locate X, a powerful smartphone tracking tool used by U.S. law enforcement without a warrant. How does it work, what are the privacy implications, and what can individuals do to protect their data? We then shift gears to APT29’s latest campaign as discovered by Amazon, uncovering how this well-known threat actor employed advanced tactics to impersonate AWS infrastructure and target victims. Join Kali Fencl, Tim Helming, and Taylor Wilkes-Pierce as they dissect these stories and share their expert insights. Stick around for the Grim Reaper’s hoodie ratings and our signature segment, Gold, Guidance, and Grievances.…
B
Breaking Badness

1 Inside the Mind of ‘The Gibson’: Ethics, Activism, and the Evolution of Hacking 41:30
41:30
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי41:30
Join Kali Fencl as she dives deep into a conversation with cybersecurity veteran The Gibson. With 25+ years in InfoSec, The Gibson shares his journey from coding as a child to shaping threat intelligence and privacy-first technology today. In this episode, they discuss hacker ethics, the influential hacker groups Loft and Cult of the Dead Cow, the evolution of hacktivism, and the groundbreaking work on privacy-focused projects like Veilid. Tune in for insights on hacking culture, cybersecurity ethics, and the balance between creativity and responsibility in the digital age.…
B
Breaking Badness

1 193. Rogue Hackers and the Internet Archive Breach: 31 Million Accounts Exposed! 44:48
44:48
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי44:48
In this episode of Breaking Badness, Kali, Tim, and Taylor discuss two major stories shaking up the cybersecurity world. First, a researcher has discovered how attackers are exploiting Whois data to grant themselves unprecedented superpowers in the digital space. Second, the Internet Archive suffers a breach possibly exposing 31 million accounts, raising questions about the security of trusted online platforms. Join the team as they break down these complex stories, share lessons learned, and explore how organizations can better protect themselves in similar situations.…
B
Breaking Badness

1 The Future of Endpoint Security: AI, EDR, and SOC Evolution 37:03
37:03
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי37:03
In this episode of Breaking Badness, we dive deep into the evolving world of Endpoint Detection and Response (EDR) and its critical role in modern cybersecurity. With threats advancing and the sheer volume of endpoint data skyrocketing, AI and deep learning are becoming game changers in threat detection and prevention. Join us as Carl Froggett, CIO at Deep Instinct, and Melissa Bischoping, Senior Director of Security at Tanium, discuss the past, present, and future of EDR, the impact of AI on cybersecurity, and how SOC teams are evolving to stay ahead of bad actors. Learn about how generative AI is influencing attacks, the challenge of SOC burnout, and the innovations shaping the future of endpoint security.…
B
Breaking Badness

1 Cracking the Code: API Security, Mobile Myths, and Real-World Threats 39:10
39:10
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי39:10
In this episode of Breaking Badness, we dive deep into the critical world of API security and governance, uncovering key strategies to keep data safe in today’s threat landscape. Special guests Matthias Friedlingsdorf (iVerify), Tristan Kalos (ESCAPE), and Aqsa Taylor (Gutsy) join the conversation to share their experiences with detecting advanced threats like Pegasus, the importance of API governance, and the powerful role bug bounty programs play in identifying critical vulnerabilities. Whether you're an API developer, cybersecurity professional, or someone navigating the risks of mobile device exploits, this episode will arm you with the knowledge to better protect your digital assets.…
B
Breaking Badness

1 Defending Your Digital Domain: AI, Ransomware, and the Power of Reputation 30:29
30:29
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי30:29
In this episode of Breaking Badness, we dive into the rapidly evolving world of cybersecurity with three industry leaders: Raymond Dijkxhoorn, CEO of SURBL; Nabil Hannan, Field CISO at NetSPI; and Jason Mar-Tang, Field CISO at Pentera. They explore the critical role of domain reputation in combating phishing and spam, how AI is reshaping both offensive and defensive cybersecurity strategies, and the growing threat of ransomware in today’s digital landscape. With insights from BlackHat and beyond, we discuss everything from the future of phishing defense to the challenges AI poses in securing sensitive data, as well as how ransomware continues to evolve. Tune in to gain actionable insights on staying ahead of cyber threats and protecting your digital domain.…
B
Breaking Badness

1 Achieving Cyber Resilience through Vulnerability Management and Supply Chain Security 25:39
25:39
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי25:39
In this special Black Hat edition of Breaking Badness, Part 2 of a 5 Part Series, we dive deep into the world of vulnerability management, cyber resilience, and supply chain security. Our expert guests—Jacob Graves, Director of Solution Architecture at Gutsy, Theresa Lanowitz, Chief Evangelist at Level Blue, Pukar Hamal, CEO at SecurityPal, and Vinay Anand, Chief Product Officer at NetSPI discuss the increasing complexity of managing vulnerabilities, the critical importance of reducing mean time to detect (MTTD) and mean time to repair (MTTR), and the emerging strategies for securing the supply chain against growing risks. Learn how vulnerability management isn’t just a technical challenge but an organizational one, and explore the nuanced roles of the CIO, CTO, and CISO in maintaining a resilient cyber infrastructure.…
B
Breaking Badness

1 AI’s Role in Cybersecurity: From EDR Evolution to Generative AI Threats and Supply Chain Risks 22:02
22:02
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי22:02
In this special Black Hat edition of the Breaking Badness Cybersecurity Podcast, Part 1 of a 5 Part Series, we dive deep into how artificial intelligence is transforming the cybersecurity landscape. Our guests—Mark Wojtasiak (VP of Product at Vectra AI), Carl Froggett (CIO at Deep Instinct), Dan Fernandez (Staff Product Manager at Chainguard), and Marcus Ludwig (CEO of Ticura)—join us to explore the evolution of Endpoint Detection and Response (EDR), the growing threats posed by generative AI, and the complexities of securing AI in supply chains. With AI becoming a tool for both attackers and defenders, this episode uncovers the ongoing "AI arms race" and highlights the urgent need for a more preventative approach to cybersecurity.…
B
Breaking Badness

1 Breaking Down Retail Targeted Campaigns: Domain Fraud, Copycats, and Ponzi Schemes 30:35
30:35
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי30:35
In this special research edition of Breaking Badness, hosts Kali Fencl, Tim Helming, Sean McNee, and guest Sasha Angus from Sylla Intel dive deep into the world of cybercriminal campaigns targeting retailers. They explore how bad actors exploit the growing threat landscape, discussing specific fraud tactics, infrastructure reuse, and ways organizations can defend themselves. From pandemic-driven scams to sophisticated brand impersonation schemes, this episode offers valuable insights for both retailers and consumers navigating the complex world of e-commerce security.…
B
Breaking Badness

1 Industrial Cybersecurity Explained with Lesley Carhart 25:16
25:16
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי25:16
Kali Fencl and Daniel Schwalbe sat down with Lesley Carhart, a seasoned incident responder specializing in Operational Technology (OT) cybersecurity at Dragos, in person at BlackHat USA 2024. Lesley shares their journey, from their unique background in avionics and electronics to becoming a leading expert in the field. We explore the evolving landscape of OT cybersecurity, the challenges of protecting legacy systems, and the critical importance of building strong relationships between cybersecurity teams and operational engineers. Lesley also discusses the realities of incident response in industrial environments, the misconceptions surrounding OT security, and the human-centric approach needed to tackle these complex issues. Tune in to learn about the delicate balance between innovation and safety in protecting the critical infrastructure that powers our world.…
B
Breaking Badness

Kali Fencl, Daniel Schwalbe, and Tim Helming discuss Brian Krebs’ article on namespace collisions and the risks associated with new generic TLDs (gTLDs) along with facial recognition and privacy concerns at major sporting events
B
Breaking Badness

1 191. Hacker Summer Camp Retrospective 52:32
52:32
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי52:32
Kali Fencl, Daniel Schwalbe, and Malachi Walker discuss all things Hacker Summer Camp. What sessions were their favorites? How did they beat the heat? Listen to the episode and find out!
B
Breaking Badness

1 190. The Weak Security Default in Our Stars 51:42
51:42
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי51:42
This week we compromised domains targeting DeFi protocols along with the JFrog research team's findings regarding a leaked access token with admin access to Python repositories
B
Breaking Badness

1 Voices from Infosec: Tanya Janca 1:02:49
1:02:49
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי1:02:49
We're thrilled Tanya Janca (aka SheHacksPurple) joined us this week on the podcast! She and Kali Fencl discuss secure guardrails, Semgrep Academy, the process of writing two books, gardening, and so much more.
B
Breaking Badness

1 189. Malware the Wild Things Are 46:56
46:56
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי46:56
In this episode of the Breaking Badness Cybersecurity Podcast, Kali Fencl, Tim Helming, and Taylor Wilkes-Pierce discuss vulnerabilities impacting your phone's 5G connection along with the new owner of the popular Polyfill JS project injecting malware into more than 100,000 sites.
B
Breaking Badness

1 Voices from Infosec: Jake Bernardes 38:15
38:15
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי38:15
Jake Bernardes, Field CISO of Anecdotes, joins the Breaking Badness Cybersecurity Podcast in this week’s episode! We’re sharing Jake’s background and path within infosec along with what’s intriguing him about the industry currently, how conferences and in-person events can still play a role in community involvement, and we’ll touch briefly on American history.…
B
Breaking Badness

This week Kali Fencl, Tim Helming, and Taylor Wilkes-Pierce discuss vishing attacks against CISA along with a threat campaign targeting Snowflake customer database instances.
B
Breaking Badness

1 [Mini Series] The Art of the Possible: Aqsa Taylor 29:52
29:52
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי29:52
It is the final episode of our mini-series from RSAC 2024! Join Kali as she speaks with Aqsa Taylor, Director of Product Management at Gutsy! They'll discuss Aqsa's path to infosec, the importance of governance strategy and how to achieve a cleaner security posture, women in cybersecurity, and how to break into the field.…
B
Breaking Badness

1 [Mini Series] The Art of the Possible: Zack Schuler and Lawrence Gentilello 42:21
42:21
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי42:21
It's the penultimate episode of our RSAC mini series! We're speaking with Zack Schuler of NINJIO in the first half of the episode and in the second, we speak with Lawrence Gentilello of Optery.
B
Breaking Badness

1 [Mini Series] The Art of the Possible: Joe Slowik and David Goldschlag 50:02
50:02
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי50:02
We're halfway through our RSAC mini series! We're speaking with Joe Slowik of MITRE in the first half of the episode and in the second, Kali is joined by Daniel Schwalbe to speak with David Goldschlag of Aembit.
B
Breaking Badness

1 [Mini Series] The Art of the Possible: Ben April and Allan Liska 52:53
52:53
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי52:53
In our second iteration of our mini-series, we'll speak with Ben April of Maltego and Allan Liska of Recorded Future. We'll cover topics such as AI, the LockBit ransomware gang, cybersecurity comic books, and more!
ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.