Gesamtlänge aller Episoden: 123 days 19 hours 26 minutes
Your WAF is not safe! Sven Morgenroth, a Security Researcher at Netsparker, blows Paul’s mind with his ninja-esque input filter bypass skills in this technical segment! Full Show Notes: Subscribe to YouTube Channel: Security Weekly Website: ...
Bryson Bort is the Founder and CEO of GRIMM, a Washington, D.C. based security engineering and consulting services company. Bryson delves in-depth into his entrepreneurship journey, the problems GRIMM aims to solve, and the current state of pen...
In an attempt to define some of the basic areas for collecting information relevant to potential attacks, Paul came up with 4 enchanted quadrants. They cover Endpoints, SIEM, Network and Threat Intelligence. Check out the discussion in this segment!...
Security in the public cloud, the pitfalls of formal education, advanced security for AWS, and more enterprise news! Full Show Notes: Visit for all the latest episodes!
Mike Nichols, Director of Products at Endgame, joins us to discuss EDR, threat detection, and customer relations! Full Show Notes: Visit for all the latest episodes!
How not to botch your pitch, why VCs love insurance, ten ways to preserve cash as a bootstrapped startup, and updates from OpenText, WatchGuard, and more! Full Show Notes: Visit for all the latest episodes!
Matt joins Paul to recap the startups that caught their attention at the recent Black Hat conference in Las Vegas! Startup Companies: - Skyport Systems - IntSights - Capsule8 - Zingbox - RiskSense - ZeroFox Full Show Notes: Visit for...
Allowing terrible passwords, four arrested in Game of Thrones leak, using EternalBlue to attack hotel guests, and more. Don Pezet of ITProTV joins us to deliver expert commentary on this episode of Hack Naked News! Full Show Notes: Visit to get all...
Mystery bug bounties, Marcus Hutchins pleads not guilty, a password guru regrets past advice, Dropbox and offline two-factor authentication, and more security news! Full Show Notes: Subscribe to YouTube Channel:...
Printer attacks have been around for some time. Paul describes some of the latest techniques and research into printer hacking, including capturing print jobs, manipulating print jobs and other attacks. These are useful on penetration tests (believe...