Remove DNS Remove Hacking Remove InfoSec Remove Risk
article thumbnail

Security Ledger Podcast: Security Automation Is (And Isn't) The Future Of InfoSec

ForAllSecure

How exactly will artificial intelligence help bridge the infosec skills gap and what kinds of security work are still best left to humans? One of the unique things about how they did this is they judged it in a full spectrum hacking contest. If you look at like the Tesla hack, it was interesting. David Brumley: Oh, no.

InfoSec 52
article thumbnail

Security Ledger Podcast: Security Automation Is (And Isn't) The Future Of InfoSec

ForAllSecure

How exactly will artificial intelligence help bridge the infosec skills gap and what kinds of security work are still best left to humans? One of the unique things about how they did this is they judged it in a full spectrum hacking contest. If you look at like the Tesla hack, it was interesting. David Brumley: Oh, no.

InfoSec 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SECURITY LEDGER PODCAST: SECURITY AUTOMATION IS (AND ISN'T) THE FUTURE OF INFOSEC

ForAllSecure

How exactly will artificial intelligence help bridge the infosec skills gap and what kinds of security work are still best left to humans? One of the unique things about how they did this is they judged it in a full spectrum hacking contest. If you look at like the Tesla hack, it was interesting. David Brumley: Oh, no.

InfoSec 40
article thumbnail

Security Roundup January 2021

BH Consulting

Unsurprisingly, the SolarWinds supply chain attack stars in the year’s worst hacks and breaches from both Wired and Ars Technica. The Ars piece also called out the “impressive” hacking of iPhones through Wi-Fi. Six Open Source tools for your security team MORE Finding SUNBURST victims using passive DNS. Links we liked.

article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

Which brings us back to Aadhaar and some rather unpleasant headlines of late, particularly the likes of The World's Largest Biometric ID System Keeps Getting Hacked. They claim that they're hack-proof. But claiming the service is "hack-proof", that's something I definitely have an issue with. Can you prove otherwise?

Hacking 279
article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Shah provides her expertise in hacking, software development, and kernel development and advocates for open source initiatives. Lots of accounts including Bezos, Elon Musk, Joe Biden, Barack Obama, Bill Gates, Mr Beast, and a ton more getting hacked for a bitcoin scheme. — Dave Kennedy (@HackingDave) July 15, 2020.

article thumbnail

The Hacker Mind Podcast: Tib3rius

ForAllSecure

Hacking websites is perhaps often underestimated yet is super interesting with all its potential for command injections and cross site scripting attacks. In fact, the word “hack” simply means to take things apart. It’s about challenging out expectations about the people who hack for a living.

DNS 40