Security In Arabic | Check out this podcast featuring Ehab Hussein, IOActive Principal Artificial Intelligence Engineer, discussing ‘AI for Offensive Security, and What is Next.’
Article Categories: PODCAST
CTRL, ALT, HACKED Podcast: “Sinkclose” Bug Impacting AMD Chips & Gamers. Krzysztof Okupski, IOActive.
Cybercrime Magazine Podcast | CTRL, ALT, HACKED | Check out this recent CTRL, ALT, HACKED podcast featuring research from IOActive Principal Security Consultants, Krzysztof Okupski and Enrique Nissim, on a vulnerability in AMD chips called Sinkclose.
“The “Sinkclose” bug is a critical vulnerability impacting AMD chips across hundreds of millions of PCs and servers, and – as a result – possibly gamers. In this episode, Krzysztof Okupski, Principal Security Consultant at IOActive, joins host Paul John Spaulding to discuss.”
Error Code Podcast: Performing Security Assessments on ICS systems
Error Code Podcast | Check out this Error Code Podcast featuring Don Weber, IOActive Senior Principal Security Consultant, sharing his experience with industrial control systems (ICS), suggestions on improvements to keep ICS safe, and why to follow the SANS best practices for ICS security.
Fallout When the Chips Are Down
Information Week | Check out Information Week’s podcast ‘That DOS Won’t Hurt,’ featuring Tony Moor’s, senior director of silicon lab services with IOActive, and Shane Snider’s, senior writer with InformationWeek, discussion on our reliance on semiconductor chips.
Flight fiasco: UK Defence Minister’s jet faces GPS jamming
the CyberWire | CyberWire Daily Podcast featuring: N2K President Simone Petrella discusses the shortage of ethical hackers against the rise of AI with IOActive’s CTO Gunter Ollmann. The FTC fines notorious tech support scammers.
Brook Schoenfield Discusses Threat Modeling and Secure Design
Techspective – Brook Schoenfield, Master Security Architect and Director of Advisory Services for IOActive, joins the Inner Circle Podcast for its most recent episode. The episode focuses on vulnerability management and incident response, and why that reactive approach may not be the most effective way to address security issues. Brook talks about the importance of threat modeling and secure design to build better, more secure, more resilient software in the first place.
#GCAPODCAST EP. 5: How IOACTIVE Hacked into an In-Flight Modem
Avionics Magazine – Ruben Santamarta, a cybersecurity researcher with IOACTIVE used a “back-door” vulnerability to demonstrate his ability to hack into an in-flight commercial airplane’s satellite internet modem. We discuss the demonstration with Ruben and his IOACTIVE colleague Josep Pi Rodriguez. The cyber experts explain how the flaw that allowed the hack to occur was resolved by the industry.