Remove application-security operational-technology-why-old-networks-need-to-learn-new-tricks
article thumbnail

The Biggest Lessons about Vulnerabilities at RSAC 2021

eSecurity Planet

Last week’s RSA Conference covered a litany of network security vulnerabilities, from developing more robust tokenization policies and to addressing UEFI-based attacks, and non-endpoint attack vectors. The SANS Institute presentation, “ The Five Most Dangerous New Attack Techniques ,” is an RSAC staple by this point.

article thumbnail

What does ChatGPT know about phishing?

SecureList

Hearing all the buzz about the amazing applications of ChatGPT and other language models, our team could not help but ask this question. We work on applying machine learning technologies to cybersecurity tasks, specifically models that analyze websites to detect threats such as phishing. Why URL classification?

Phishing 115
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google Pixel 7 and Pixel 7 Pro: The next evolution in mobile security

Google Security

Dave Kleidermacher, Jesse Seed, Brandon Barbello, Sherif Hanna, Eugene Liderman, Android, Pixel, and Silicon Security Teams Every day, billions of people around the world trust Google products to enrich their lives and provide helpful features – across mobile devices, smart home devices, health and fitness devices, and more.

Mobile 132
article thumbnail

The Hacker Mind Podcast: The Hacker Revolution Will Be Televised

ForAllSecure

What if DEF CON CTFs were televised? What if you could see their screens and have interviews with the players in the moment? Jordan Wiens, from Vector 35 , maker of Binary Ninja, is no stranger to CTFs. Last year at Hacker Summer Camp I was invited to Mikko Hypponen’s book launch for If it’s Smart, It’s vulnerable.

article thumbnail

The Hacker Mind Podcast: Fuzzing Hyper-V

ForAllSecure

Ophir Harpaz and Peleg Hadar join The Hacker Mind to discuss their journey from designing a custom fuzzer to identifying a critical vulnerability within Hyper-V and how their new research tool, hAFL1, can benefit others looking to secure other cloud architectures. It functions the same way as a physical network card.

article thumbnail

The Hacker Mind Podcast: The Gentle Art of Lockpicking

ForAllSecure

In this episode Deviant Ollam explains why these mechanical puzzles remain popular with hackers. My guest makes picking locks, at least after he explains it, easy and this understanding into the mechanic starts to explain why lock picking challenges have become a part of the hacker culture today. Want to Learn More About Fuzz Testing?

Hacking 52
article thumbnail

The Hacker Mind Podcast: The Gentle Art of Lockpicking

ForAllSecure

In this episode Deviant Ollam explains why these mechanical puzzles remain popular with hackers. My guest makes picking locks, at least after he explains it, easy and this understanding into the mechanic starts to explain why lock picking challenges have become a part of the hacker culture today. In fact, I keep a bag of them.

Hacking 52