What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Blog.webp 2024-02-13 02:40:43 La Chine appelle les États-Unis pour le piratage.La preuve?TBD!
China Calls Out U.S. For Hacking. The Proof? TBD!
(lien direct)
Le gouvernement chinois adopte une approche agressive pour lutter contre les histoires de campagnes de cyber-offensives chinoises: la promotion des histoires de hacks américains sur les organisations chinoises, mais sans les données pour les sauvegarder.
The Chinese government is taking an aggressive approach to countering stories of Chinese cyber offensive campaigns: promoting tales of US hacks on Chinese organizations, but without the data to back them up.
Hack ★★
Blog.webp 2023-12-04 13:59:58 FBI: L'APT iranien cible les PLC de fabrication israélienne utilisée dans les industries critiques
FBI: Iranian APT Targets Israeli-Made PLCs Used In Critical Industries
(lien direct)
Le piratage d'un centre de traitement de l'eau de Pennsylvanie en novembre fait partie d'une campagne plus large d'un groupe iranien APT contre les utilisateurs de la technologie opérationnelle fabriquée par Israël. Le message FBI: Iranian APT Targets Israel-Made PLCS utilisés dans les industries critiques est apparue pour la première fois sur The Security Ledger avec Paul F. Roberts .
The hack of a Pennsylvania water treatment facility in November is part of a larger campaign by an Iranian APT group against users of Israel-made operational technology. The post FBI: Iranian APT Targets Israeli-Made PLCs Used In Critical Industries first appeared on The Security Ledger with Paul F. Roberts.
Hack Industrial ★★
Blog.webp 2023-10-04 12:01:00 Épisode 253: DevseCops les pires pratiques avec Tanya Janca de We Hack Purple
Episode 253: DevSecOps Worst Practices With Tanya Janca of We Hack Purple
(lien direct)
Tanya Janca du groupe que nous piragez Purple, parle avec l'hôte du grand livre de la sécurité Paul Roberts sur les plus grandes erreurs de sécurité que les équipes de Devsecops font, et la «tragédie des communes» de l'application », alors que de plus en plus d'équipes de développement penchentsur le code open source. Le post Episode 253: DevSecops les pires pratiques avec Tanya Janca de We Hack ... Lisez toute l'entrée ... & nbsp; & raquo; cliquez sur l'icône ci-dessous pour écouter.
Tanya Janca of the group We Hack Purple, talks with Security Ledger host Paul Roberts about the biggest security mistakes that DevSecOps teams make, and application development\'s “tragedy of the commons,” as more and more development teams lean on open source code. The post Episode 253: DevSecOps Worst Practices With Tanya Janca of We Hack...Read the whole entry... »Click the icon below to listen.
Hack ★★
Blog.webp 2022-09-05 16:32:55 Episode 242: Hacking the Farm (and John Deere) with Sick Codes (lien direct) In our latest podcast, Paul caught up with Sick Codes (@sickcodes) to talk about his now-legendary presentation at the DEF CON Conference in Las Vegas, in which he demonstrated a hack that ran the Doom first person shooter on a John Deere 4240 touch-screen monitor. The post Episode 242: Hacking the Farm (and John Deere) with Sick Codes appeared...Read the whole entry... »Click the icon below to listen. Hack
Blog.webp 2022-04-19 15:31:51 Episode 237: Jacked on the Beanstalk – DeFi\'s Security Debt Runs Wide, Deep (lien direct) The hack of Beanstalk is just the latest major compromise of a decentralized finance (DeFi) platform. In this podcast, Jennifer Fernick of NCC Group joins me to talk about why DeFi's security woes are much bigger than Beanstalk. Hack
Blog.webp 2021-07-30 17:30:41 Encore Podcast: Chris Valasek on Hacking The Jeep Cherokee (lien direct) With Black Hat and DEFCON upon us, we revisit a 2015 interview with Chris Valasek about his wireless, software based hack of a Chrysler Jeep Cherokee. Hack
Blog.webp 2021-06-10 14:26:25 Episode 216: Signed, Sealed and Delivered: The Future of Supply Chain Security (lien direct) In this episode of the podcast (#216) we talk with Brian Trzupek, Digicert's Vice President of Product, about the growing urgency of securing software supply chains, and how digital code signing can help prevent compromises like the recent hack of the firm SolarWinds. The post Episode 216: Signed, Sealed and Delivered: The Future of Supply Chain...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/654400338/0/thesecurityledger -->» Hack
Blog.webp 2021-02-15 17:33:34 Episode 203: Don\'t Hack The Water and Black Girls Hack Founder Tennisha Martin (lien direct) In this episode of the Security Ledger Podcast (#203) we talk about the apparent hack of a water treatment plant in Oldsmar Florida with Frank Downs of the firm BlueVoyant. In our second segment: is infosec's lack of diversity a bug or a feature? Tennisha Martin of Black Girls Hack joins us to talk about the many obstacles that black women face...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/644380242/0/thesecurityledger -->» Hack
Blog.webp 2020-12-18 17:55:57 Episode 197: The Russia Hack Is A 5 Alarm Fire | Also: Shoppers Beware! (lien direct) In this podcast, sponsored by LastPass, former U.S. CISO Greg Touhill joins us to talk about news of a vast hack of U.S. government networks, which he calls a "five alarm fire" reportedly set by Russia. The post Episode 197: The Russia Hack Is A 5 Alarm Fire | Also: Shoppers Beware! Hack LastPass
Blog.webp 2019-09-25 16:32:50 Episode 162: Have We missed Electric Grid Cyber Attacks for Years? Also: Breaking Bad Security Habits (lien direct) In this episode of the podcast #162: according to the non profit that oversees it, the first disruptive hack of the U.S. grid happened in March of this year. Our guest, Joe Weiss, said it really happened more than a decade ago and that hundreds more like it have been overlooked or mis-classified. Also: Rachel Stockton of the firm LastPass* joins...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/607155916/0/thesecurityledger -->» Hack LastPass
Blog.webp 2019-05-17 13:27:02 Researchers Hack Aircraft Landing System with $600 Radios (lien direct) Airplane radio navigation systems are vulnerable to manipulation using software defined radio, researchers have shown. The post Researchers Hack Aircraft Landing System with $600 Radios Hack
Blog.webp 2019-02-19 13:23:05 Podcast Episode 134: The Deep Fake Threat to Authentication and analyzing the PEAR Compromise (lien direct) Vijay Balasubramaniyan of Pindrop joins us to talk about it. And, in our second segment, Sam Bisbee the CSO of the firm ThreatStack joins us to talk about last month's hack of the PEAR open source package manager and why data deserialization attacks are a growing threat to projects that use open source components. The post Podcast Episode 134:...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/598068876/0/thesecurityledger -->» Hack Threat
Blog.webp 2019-01-07 17:47:00 More Questions as Expert Recreates Chinese Super Micro Hardware Hack (lien direct) Though the companies named in a blockbuster Bloomberg story have denied that China hacked into Supermicro hardware that shipped to Amazon, Apple and nearly 30 other firms, a recent demonstration at hacking conference in Germany proves the plausibility of the alleged hack.   The post More Questions as Expert Recreates Chinese Super Micro Hardware...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/590964640/0/thesecurityledger -->» Hack
Blog.webp 2018-10-09 17:00:05 Podcast Episode 115: Joe Grand on Unicorn Spotting and Bloomberg\'s Supply Chain Story (lien direct) In this week's episode (#115), noted hardware enthusiast and hacker Joe Grand (aka “Kingpin”) told reporters from Bloomberg that finding an in-the-wild supply chain hack implanting malicious hardware on motherboards was akin to witnessing “a unicorn jumping over a rainbow.” They went with their story about just such an...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/573788130/0/thesecurityledger -->» Hack
Blog.webp 2018-10-05 00:36:03 Apple, Amazon Throw Shade on Supply Chain Hack Story (lien direct) A report by Bloomberg alleging a massive operation by China’s Peoples Liberation Army (PLA) to plant spy hardware on servers used by some of the U.S.’s most high profile corporations is being refuted by tech vendors Apple as well as Amazon, who contend that no such compromises took place. The report written by Jordon Robinson and...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/572886254/0/thesecurityledger -->» Hack
Blog.webp 2018-09-06 21:04:03 Opinion: The Corporate Lessons of Election Hacks (lien direct) Recent demonstrations of election hacks are about more than ballots. They also contain important lessons for enterprises,  Security Ledger Editor in Chief Paul Roberts argues in this opinion piece. (Note: this post first appeared on Hitachi Security Systems web site.) Did an 11 year old hack a state election website? Are voting machines easy prey...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/568344144/0/thesecurityledger -->» Hack
Blog.webp 2018-08-28 03:06:03 Podcast Episode 110: Why Patching Struts isn\'t Enough and Hacking Electricity Demand with IoT? (lien direct) In this week's episode (#110): the second major flaw in Apache Struts 2 in as many years and has put the information security community on alert. But is this vulnerability as serious as the last, which resulted in the hack of the firm Equifax? We talk with an expert from the firm Synopsys.  And: we've heard a lot about the risk of cyber...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/566525656/0/thesecurityledger -->» Hack Vulnerability Patching Equifax
Blog.webp 2018-07-25 12:50:05 Expert says: Hack your Smart Home to Secure It (lien direct) Smart home security starts at home, according to researcher Michael Sverdlin who says that consumers should explore the security of their smart home technology and consider simple modifications or hacks to remove insecure or promiscuous features. Not long ago, Michael Sverdlin, the back-end team leader for IoT security startup Vdoo, bought his...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/560700964/0/thesecurityledger -->» Hack Guideline
Last update at: 2024-04-28 05:07:51
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter