TrustedSec Security Podcast – TrustedSec

https://www.trustedsec.com

Eine durchschnittliche Folge dieses Podcasts dauert 0m. Bisher sind 9 Folge(n) erschienen.
subscribe
share



 

recommended podcasts


  • 1
  • 1

Episode 2.15 – FTP is still a thing – DNS and Settings Content Files!


Welcome to the Trusted Security Podcast – a podcast dedicated to bringing the latest news on information security and the industry. This episode features the following members: Dave Kennedy, Ben Tenjamin, Geoff Walton, Chris Prewitt, Justin Bollinger The post Episode 2.15 – FTP is still a thing – DNS and Settings Content Files! appeared first on TrustedSec.


share





 16 July 2018  n/a
 
 

Episode 2.14 – Zip Slip Slip and split it up to the hip hip hip!


Welcome to the Trusted Security Podcast – a podcast dedicated to bringing the latest news on information security and the industry. This episode features the following members: Dave Kennedy, Ben Tenjamin, Geoff Walton, Chris Prewitt, Justin Bollinger The post Episode 2.14 – Zip Slip Slip and split it up to the hip hip hip! appeared first on TrustedSec.


share





 07 June 2018  n/a
 
 

Episode 2.13 (lucky 13) – Let’s talk about facebook! Plaintext Passwords and More!


Welcome to the Trusted Security Podcast – a podcast dedicated to bringing the latest news on information security and the industry. This episode features the following members: Dave Kennedy, Ben Tenjamin, Geoff Walton, Chris Prewitt, Justin Bollinger The post Episode 2.13 (lucky 13) – Let’s talk about facebook! Plaintext Passwords and More! appeared first on TrustedSec.


share





 13 April 2018  n/a
 
 

Episode 2.12 Is that CryptoMiner or a Utility? Wildcards for the Masses, Look-a-Likes, and More CPU Vulnerabilities


Welcome to the Trusted Security Podcast – a podcast dedicated to bringing the latest news on information security and the industry. This episode features the following members: Dave Kennedy, Ben Tenjamin, Geoff Walton, Chris Prewitt, Justin Bollinger The post Episode 2.12 Is that CryptoMiner or a Utility? Wildcards for the Masses, Look-a-Likes, and More CPU Vulnerabilities appeared first on TrustedSec.


share





 16 March 2018  n/a
 
 

Episode 2.10 Is your keyboard listening? A different type of jailbreak, Grinch Bots Stealing Christmas? Chrome, and Red Team Architecture!


Welcome to the Trusted Security Podcast – a podcast dedicated to bringing the latest news on information security and the industry. This episode features the following members: Dave Kennedy, Ben Tenjamin, Geoff Walton, Chris Prewitt, Justin Bollinger The post Episode 2.10 Is your keyboard listening? A different type of jailbreak, Grinch Bots Stealing Christmas? Chrome, and Red Team Architecture! appeared first on TrustedSec.


share





 08 December 2017  n/a
 
 

Episode 2.9 OWASP Top 10 2017, OSX Root login bypass, Uber Hacked, who are the shadow brokers, ROCA!


Welcome to the Trusted Security Podcast – a podcast dedicated to bringing the latest news on information security and the industry. This episode features the following members: Dave Kennedy, Ben Tenjamin, Geoff Walton, Chris Prewitt, Justin Bollinger The post Episode 2.9 OWASP Top 10 2017, OSX Root login bypass, Uber Hacked, who are the shadow brokers, ROCA! appeared first on TrustedSec.


share





 04 December 2017  n/a
 
 

Episode 2.8 – NSA and Exploit Tools, Petya, Russia, and Ransomware, systemd, Deathstar, and Office persistence methods


Welcome to the Trusted Security Podcast – a podcast dedicated to bringing the latest news on information security and the industry. This episode features the following members: Dave Kennedy, Ben Tenjamin, Geoff Walton, Chris Prewitt, Justin Bollinger The post Episode 2.8 – NSA and Exploit Tools, Petya, Russia, and Ransomware, systemd, Deathstar, and Office persistence methods appeared first on TrustedSec.


share





 03 July 2017  n/a
 
 

Episode 2.7 Tavis breaks the Internet, Executive Orders, Diskless Persistence Methods, and more!


Welcome to the Trusted Security Podcast - a podcast dedicated to bringing the latest news on information security and the industry. This episode features the following members: Dave Kennedy, Scott White, Geoff Walton, Costa Petros, and Alex Hamerstone. The post Episode 2.7 Tavis breaks the Internet, Executive Orders, Diskless Persistence Methods, and more! appeared first on TrustedSec.


share





 11 May 2017  n/a
 
 

Episode 2.6 – Special Guest Jayson E. Street, Shadow Brokers, Google OAuth, and more!


Welcome to the Trusted Security Podcast - a podcast dedicated to bringing the latest news on information security and the industry. This episode features the following members: Dave Kennedy, Scott White, Justin Bollinger, Costa Petros, Ben Ten, Chris Prewitt, Jayson E. Street The post Episode 2.6 – Special Guest Jayson E. Street, Shadow Brokers, Google OAuth, and more! appeared first on TrustedSec.


share





 06 May 2017  n/a
 
 
  • 1
  • 1