logo
episode-header-image
Feb 2023
19m 45s

Knocking down the legs of the industrial...

N2K Networks
About this episode
Pascal Ackerman, OT Security Strategist from Guidepoint Security, joins Dave to discuss his work on discovering a vulnerability in the integrity of common HMI client-server protocol. This research is a Proof of Concept (PoC) attack on the integrity of data flowing across the industrial network with the intention of intercepting, viewing, and even manipulatin ... Show More
Up next
Today
A QRazy clever scam. [Research Saturday]
This week, we are joined by Juliana Testa, Senior Security Engineer from 7AI, sharing their work on "Quish Splash - When the QR Code Is the Weapon: A Multi-Wave Phishing Campaign That Slipped Past Every Filter." A large-scale “quishing” campaign used QR codes embedded in image at ... Show More
18m 53s
Yesterday
A digital battlefield in practice.
Locked Shields wraps another year. Open models challenge Mythos. CISA tracks FIRESTARTER inside a federal agency. The White House targets foreign AI model extraction. Microsoft lets admins remove Copilot. Treasury sanctions a Cambodian scam-compound senator. Breeze Cache rushes a ... Show More
26m 9s
Apr 23
Your signal is showing.
Researchers expose covert telecom surveillance campaigns. Lawmakers push new national privacy rules. China-linked actors hide inside compromised device networks. A ransomware forum leak reveals a criminal marketplace. GopherWhisper blends into cloud services for espionage. Attack ... Show More
27m 21s
Recommended Episodes
Oct 2023
SE Radio 584: Charles Weir on Ruthless Security for Busy Developers
<p data-pm-slice="1 1 []"><strong>Charles Weir</strong>—developer, security researcher, and Research Fellow at Security Lancaster—joins host <a href= "https://www.se-radio.net/team/giovanni-asproni/">Giovanni Asproni</a> to discuss an approach that development teams can use to cr ... Show More
1 h
Aug 2023
2465: Imperva: Navigating the Data Breach Landscape
<p><span data-preserver-spaces="true">In today's digitized world, the security of our data is paramount. Understanding the complexity of data breaches and developing robust security strategies can often be a challenging task for businesses. To shed light on this critical issue, I ... Show More
40m 46s
Dec 2023
2723: Navigating Workplace Surveillance With 1E
In today's episode of Tech Talks Daily, I'm tackling a topic that sits at the intersection of technology, privacy, and workplace ethics – workplace surveillance tools. I'm joined by Ian van Reenen, CTO of 1E, a company at the forefront of digital employee experience (DEX) monitor ... Show More
24m 19s
Jul 2021
Analyzing the Impact of A.I. and Technology on Society and Cybersecurity
<p>Technology is advancing at pace never seen before and the newest tech, applications and widgets are being widely adopted at an even quicker rate. </p><p>Just look at A.I. and machine learning tools,which are now used to identify things once thought unimaginable — whether it's ... Show More
49m 58s
Mar 2024
2820: The Cyber Insurance Equation: Risk, Responsibility, and Readiness
In today's digital landscape, the role of cybersecurity within organizations is more critical than ever. As businesses navigate the complexities of protecting their data and infrastructure, the Chief Information Security Officer (CISO) stands at the forefront of this evolving bat ... Show More
36m 29s
Jan 2024
2787: Navigating the Evolving Landscape of Application Security With Checkmarx
<p>In this compelling episode, we delve into the strategic importance of application security as businesses undergo digital transformation. Sandeep Johri, with his rich experience at Checkmarx, sheds light on this domain's multifaceted challenges and opportunities. We discuss how ... Show More
25m 34s
Dec 2021
Keeping Security Simple with Johanna Baum, the CEO and Founder of S3 (Strategic Security Solutions)
<p>There is a lot of conversation among IT security leaders about engaging the workforce in order to mitigate threats. But how do security professionals actually win people over to their side? Many employees are willing to comply but what can be done to really get through to thos ... Show More
41 m