The Hacker Mind-logo

The Hacker Mind

Technology Podcasts

The Hacker Mind is an original podcast from the makers of Mayhem Security. It’s the stories from the individuals behind the hacks you’ve read about. It’s about meeting some of the security challenges in software through advanced techniques such as fuzz testing. It’s a view of the hackers and their world that you may not have heard before.

Location:

United States

Description:

The Hacker Mind is an original podcast from the makers of Mayhem Security. It’s the stories from the individuals behind the hacks you’ve read about. It’s about meeting some of the security challenges in software through advanced techniques such as fuzz testing. It’s a view of the hackers and their world that you may not have heard before.

Language:

English


Episodes
Ask host to enable sharing for playback control

EP 85: The Rise Of Bots (and Bots As A Service)

11/28/2023
Bots are actionable scripts that can slow your day to day business, be enlisted in denial of service attacks, or even keep you from getting those tickets Taylor Swift you desperately want. Antoine Vastel from DataDome explains how it's an arms race: the better we get at detecting them, the more the bots evolve to evade detection. Transcript here.

Duration:00:40:49

Ask host to enable sharing for playback control

EP 84: When Old Medical Devices Keep Pre-shared Keys

11/14/2023
You would think there is a procedure to End-of-Life a medical device, right? Erase personal health info. Erase network configuration info. Speaking at SecTor 2023, Deral Heiland from Rapid 7 said he found that he was able to buy infusion pumps on the secondary market with the network credentials for the original Health Care Delivery Organization in tact. In theory he could join that network as that device and potentially pivot to other parts of the HDO. No good since there are 100s of thousands of these devices in use today. Transcript here.

Duration:00:43:38

Ask host to enable sharing for playback control

EP 83: Tales From The Dark Web: Ransomware, Data Extortion, and Operational Technology

10/31/2023
With the recent Clop attack on customers of MoveIt, ransomware is now old news. Attackers are skipping the encryption and simply extorting the exfiltrated data, according to Thomas “Mannie” Wilken, from the Accenture Cyber Threat Intelligence Dark Web Reconnaissance Team. He should know; he spends his days on the Dark Web seeing the rise of new infostealers, deep fakes, and even the rise of OT technologies as potential targets in the near future. Transcript here.

Duration:00:37:13

Ask host to enable sharing for playback control

EP 82: The Vulkan Files

10/17/2023
Imagine a data dump of files similar to the Snowden Leaks in 2013, only this it’s not from the NSA but from NT Vulkan, a Russian contractor. And it’s a framework for targeting critical IT infrastructures. In a talk at DEF CON 31, Joe Slowick from Huntress, shares what a Russian whistleblower released in the form of emails and documents, and how we can tie some of that back information to some of the Sandworm campaigns and recent attacks against Ukraine. Transcript here.

Duration:00:35:09

Ask host to enable sharing for playback control

EP 81: Hacking Visual Studio Code Extensions

10/3/2023
Rather than use backdoor exploits, attackers are stealing credentials going through the front door. How are they gaining credentials. Sometimes it’s from the tools we trust. Paul Geste and Thomas Chauchefoin discuss their DEF CON 31 presentation Visual Studio Code is why I have (Workspace) Trust issues as well as the larger question of how much we should trust tools that we depend on daily. Transcript here.

Duration:00:49:11

Ask host to enable sharing for playback control

EP 80: Ghost Token

9/19/2023
What if an GPC project OAUTH access token wasn’t deleted? This could expose databases to bad actors. Tal Skverer from Astrix discusses his DEF CON 31 presentation GhostToken: Exploiting Google Cloud Platform App Infrastructure to Create Unremovable Trojan Apps. Transcript here.

Duration:00:36:33

Ask host to enable sharing for playback control

EP 79: Conducting Incident Response in Costa Rica Post Conti Ransomware

9/6/2023
How do you conduct an incident response for an entire country? When it’s 27 different life-critical government ministries each with up to 850 individual devices -- that’s uncharted territory. Esteban Jimenez of ATTI Cyber talks about his experience with the reconstruction of the cybersecurity system following Conti, how the country handled a second ransomware attack from the Hive ransomware group, and we'll discuss what yet remains to be done to secure Costa Rica -- and other Latin American countries from future attacks. Transcript here.

Duration:00:56:50

Ask host to enable sharing for playback control

EP 78: Defending Costa Rica From Conti Ransomware

8/22/2023
What is is like to hack an entire country, to take it’s government services offline, to deny a government an ability to function? Costa Rica knows. Esteban Jimenez of ATTI Cyber has been helping Costa Rica improve its cybersecurity posture for more than 16 years, and he has been helping them recently recover from a crippling ransomware attack in April 2022 that hit 28 ministries of the government. Central and Latin America appear to be a new playground for bad actors testing new malware. But Central and Latin America are learning how to fight back. Transcript here.

Duration:00:56:46

Ask host to enable sharing for playback control

EP 77: Security Chaos Engineering with Kelly Shortridge

8/8/2023
Speaking at Black Hat 2023, Kelly Shortridge is bringing cybersecurity out of the dark ages by infusing security by design to create secure patterns and practices. It’s a subject of her new book on Security Chaos Computing, and it’s a topic that’s long overdue to be discussed in the field. Transcript.

Duration:00:40:32

Ask host to enable sharing for playback control

EP 76: Hacking Medical Systems

7/25/2023
Are we doing enough to secure our health delivery organizations? Given the rise of ransomware attacks, one could day we are not. Karl Sigler from Trustwave SpiderLabs, talks about a new report that his team has written that is focused on the threat landscape for medical devices and the healthcare industry in general. Transcript here.

Duration:00:42:00

Ask host to enable sharing for playback control

EP 75: Hacking .Mil And Other TLD Domains (Ethically)

7/11/2023
Internet domains are brittle. One could hack into a military, a foreign government, or even global commercial web services domain using flaws in the underlying architecture. Fredrik Nordberg Almroth, co-founder of Detectify, talks about how he did just that -- hack .mil, hack the top level domain of the Democratic Republic of Congo, and even Gmail or Wordpress -- just by looking for basic misconfigurations. Transcript.

Duration:00:49:46

Ask host to enable sharing for playback control

EP 74: Disarming Document Threats

6/27/2023
Phishing is everywhere. Who among us has not seen phish in their inbox? Aviv Grafi, from Votiro, gets into the weeds about how malicious documents are formed and how they might (despite good secure posture) still end up in your inbox or browser. He’s created a rather novel method to strip out the good content from the bad without affecting your overall productivity. And maybe, just maybe, stop phishing as a viable attack vector.

Duration:00:41:37

Ask host to enable sharing for playback control

EP 73: Hacking Human Behavior

6/13/2023
Could the nudges and prompts like those from our Fitbits and Apple watches be effective in enforcing good security behavior as well? Oz Alashe, CEO and founder of CybSafe, brings his experience in the UK Intelligence Community to the commercial world along with some solid science around what motivates us to make changes in our lives. It’s not just one-off phishing examples, it’s also about providing positive feedback, even gamification, to make things stick in future insider trust programs. Transcript here.

Duration:00:36:48

Ask host to enable sharing for playback control

EP 72: Tales From A Ransomware Negotiator

5/30/2023
Say you’re an organization that’s been hit with ransomware. At what point do you need to bring in a ransomware negotiator? Should you pay, should you not? Mark Lance, the VP of DFIR and Threat Intelligence for GuidePoint Security, provides The Hacker Mind with stories of ransomware cases he’s handled and best practices for how to handle such an event.

Duration:00:41:31

Ask host to enable sharing for playback control

EP 71: The Internet As A Pen Test

5/17/2023
Small to Medium Business are increasingly the target of APTs and ransomware. Often they lack the visibility of a SOC. Or even basic low level threat analysis. Chris Gray of Deepwatch talks about the view from the inside of a virtual SOC, the ability to see threats against a large number of SMB organizations, and the changes to cyber insurance we’re seeing as a result.

Duration:00:44:49

Ask host to enable sharing for playback control

EP 70: Hacking Real World Criminals Online

5/2/2023
More and more criminals are identified through open source intelligence (OSINT). Sometimes a negative Yelp review can reveal their true identity. Daniel Clemens, CEO of ShadowDragon, talks about his more than two decades of digital investigations, from the origins of the Code Red worm to the mass shooter in Las Vegas, with a fair number of pedophiles and human traffickers identified as well. Find out what Daniel looks for and how he does digital forensics using social media and other open source resources.

Duration:00:58:00

Ask host to enable sharing for playback control

EP 69: Self-Healing Operating Systems

4/18/2023
It’s time to evolve beyond the UNIX operating system. OSes today are basically ineffective database managers, so why not build an OS that’s a database manager? Michael Coden, Associate Director, Cybersecurity, MIT Sloan, along with Michael Stonebreaker will present this novel concept at RSAC 2023. You can learn more at dbos-project.github.io

Duration:00:49:19

Ask host to enable sharing for playback control

EP 68: Incident Response in the Cloud

4/4/2023
Incident response in the cloud. How is it different, and why do we need to pay more attention to it today, before something major happens tomorrow. James Campbell, CEO of Cado Security, shares his experience with traditional incident response, and how the cloud, with its elastic structure, able to spin up and spin down instances, is changing incident response.

Duration:00:43:59

Ask host to enable sharing for playback control

EP 67: When The Dark Web Discovered ChatGPT

3/21/2023
We’ve seen drug marketplaces and extremists use the Dark Web. Will generative AI tools like ChatGPT make things crazier by lowering the barrier to entry? Delilah Schwartz, from Cybersixgill, brings her extensive background with online extremism to The Hacker Mind to talk about how she’s seeing a lot of chatter in the dark web.about AI online. She discusses what is and what is not likely to happen next.

Duration:00:40:54

Ask host to enable sharing for playback control

EP 66: Shattering InfoSec’s Glass Ceiling

3/7/2023
Booth babes and rampant sexism were more of a problem in infosec in the past. That is, until Chenxi Wang spoke up. And she’s not done changing the industry. She’s an amazing person who has done an incredible number of things in a short amount of time -- a PhD in Computer Engineering, inventor of a process still used by the DoD today, a successful teaching career at CMU, a role as security analyst at Forrester, and then a role at Intel McAfee. Today she runs a 100% woman owned VC.

Duration:00:42:55