Blog

Training

Killing the Pen Test & BSides Knoxville (with Adrian Sanabria)

Killing the Pen Test & BSides Knoxville (with Adrian Sanabria) Advanced Persistent Security Podcast Episode 44 Guests: Adrian Sanabria April 26, 2018 If you enjoy this podcast, be sure to give …

Training

Infosec Thoughts (with Jayson E. Street & Tracy Maleeff)

Infosec Thoughts (with Jayson E. Street & Tracy Maleeff) Advanced Persistent Security Podcast Episode 42 Guests: Jayson E. Street and Tracy “Infosec Sherpa” Maleeff April 12, 2018 If you enjoy this …

Training

Security of Mainframes (with Cheryl Biswas & Tracy Maleeff)

Security of Mainframes (with Cheryl Biswas & Tracy Maleeff) Advanced Persistent Security Podcast Episode 41 Guests: Cheryl Biswas and Tracy “Infosec Sherpa” Maleeff April 5, 2018 If you enjoy this podcast, …

Training

Multi-Tool Multi-User HTTP Proxy (with Russel Van Tuyl)

Multi-Tool Multi-User HTTP Proxy (with Russel Van Tuyl) IF IT’S A PROTOCOL, YOU CAN PLAY WITH IT ADVANCED PERSISTENT SECURITY PODCAST EPISODE 26 GUEST: Russel Van Tuyl NOVEMBER 21, 2016 If you …

Training

OSINT, Social Engineering, & the Election (with Ed Porter)

OSINT, Social Engineering, & the Election (with Ed Porter) ADVANCED PERSISTENT SECURITY PODCAST EPISODE 25 GUEST: Ed Porter NOVEMBER 14, 2016 If you enjoy this podcast, be sure to give us a …

Training

Critical Security Controls: Part 1 (with Brian Ventura)

Critical Security Controls: Part 1 (with Brian Ventura) (WITH BRIAN VENTURA) ADVANCED PERSISTENT SECURITY PODCAST EPISODE 23 GUEST: BRIAN VENTURA October 24, 2016 If you enjoy this podcast, be sure to give …

Training

Intro to App Sec (with Frank Rietta)

This episode we discuss Application Security (App Sec) from a high level and graze the surface on a few other vital security concepts and frameworks. We also discuss local happenings in the Security Community and other relevant topics in security.

US Elections Hacked?

Cybersecurity & the US 2016 Presidential Election

First, I would like to thank you for reading this blog post. It is the first of two, maybe more, parts. Before we get started, read the three disclaimers below. …

BSides Knoxville (with Roger Seagle)

CSA Treacherous 12 Concerns: 1-4

Cloud Security is nothing new. However, it is growing in implementation and popularity. This is causing a ripple effect in terms of attacks originating in the cloud, attacking assets in the cloud, and using cloud resources for availability attacks. The purpose of this podcast is to discuss the CSA Treacherous 12 Concerns.

petya

Jam Session: Ransomware Threat In 2016

We all know that Ransomware is a PITA (Pain in the ___). This podcast, we discuss modern examples, infection vectors, mitigations, and root causes. This podcast is meant to start the discussion with management to begin to prevent malware infections instead of scramble to decrypt files or pay the extortionists.

Qatar Bank Breached after Bangladesh

Qatar Bank Breached After Bangladesh

Qatar Bank Breached After Bangladesh  It’s been quite the week for the banking industry with multiple headlining hacks occurring throughout the world with Qatar National Bank being the latest victim.  …

Bangladesh Bank Loses 80 Million USD

Bangladesh Bank Loses 80 Million USD

Bangladesh Bank Loses 80 Million USD …with a $10 router …and NO firewall …We’re NOT making this up… The Bangladesh’s Central Bank was hacked in February 2016 that stole $80 million (they …

Training

Mobile Insecurity (with Georgia Weidman)

Everyone wants to think about how secure they are. This podcast flips the script and assesses insecurity, specifically Mobile Insecurity. We discuss issues within the mobile computing ecosystem.

1. Current Event: Apple Quick Time and why could it not have been Flash. Georgia’s dad still uses Microsoft XP and won’t connect his printer to the network.
2. Georgia delivers her “Mobile Insecurity” talk and we discuss issues in the mobile threat landscape and possible mobile issues.
3. Mobile Malware, Ransomware, and MDM are discussed. Issues within the actual mobile Operating Systems are discussed briefly.
4. Joe asks if Georgia sees mobile devices distributing Ransomware and Malware to cars.
5. Quick banter of Apple vs FBI and the implications of the precedent both attempted and actually set.

4 Things to Know About Ransomware

Top 5 Cybersecurity Threats in 2015

Top 5 Cybersecurity Threats in 2015   In this week’s Top 5 review we will be discussing the Top 5 cybersecurity vulnerabilities and threats in 2015.  This isn’t designed to be …

U.S. House Approves E-Mail Bill

Congress Pushes Revamped CISPA

Congress Pushes Revamped CISPA It seems as if the US Congress is back in the business of making “powerful friends” again. By friends, I mean enemies. This time, it is …

T-Mobile/Verizon Android Device LTE Security Vulnerability

T-Mobile/Verizon Android Device LTE Security Vulnerability

T-Mobile/Verizon Android Device LTE Security Vulnerability Carnegie Mellon University CERT database has published a vulnerability notice regarding the newest security vulnerability that affects Long Term Evolution (LTE) mobile networks. Per …

NSA breaks 1024-bit encryption

NSA breaks 1024-bit encryption | NSA

NSA breaks 1024-bit encryption According to a recent article by Alex Halderman and Nadia Heninger, what most people feared in the cryptography fields looks all too real, the NSA is in the …