Security Nation cover logo
RSS Feed Apple Podcasts Overcast Castro Pocket Casts
English
Non-explicit
simplecast.com
41:18

It looks like this podcast has ended some time ago. This means that no new episodes have been added some time ago. If you're the host of this podcast, you can check whether your RSS file is reachable for podcast clients.

Security Nation

by Jen Ellis and Tod Beardsley

Security Nation is a podcast dedicated to celebrating the champions in the cybersecurity community who are advancing security in their own ways. We also cover the latest developments in infosec that you should know about.

Copyright: © 2024 Security Nation

Episodes

Tod and Jen and Jennifer on Season 5 of Security Nation

25m · Published 21 Dec 19:23

No Rapid Rundown this time! But you can get links to all the past episodes in Season 5, here:

  • Never Mind the Ears, Here's Security Nation

Jeremi Gosney on the Psychology of Password Hygiene

48m · Published 26 Oct 18:05

Interview links

  • Jeremi on Password Nihilism
  • The Rails bug Jeremi referenced

Rapid Rundown links

  • Risky Business Newsletter on fake PoCs: "GitHub aflood with fake and malicious PoCs"
  • The cited paper: "How security professionals are being attacked: A study of malicious CVE proof of concept exploits in GitHub"
  • Also relevant is Honeysploit by Curtis Brazzell

Like the show? Want to keep Jen and Tod in the podcasting business? Feel free to rate and review with your favorite podcast purveyor, like Apple Podcasts.

James Kettle of PortSwigger on Advancing Web-Attack Research

36m · Published 12 Oct 18:05

Interview Links

  • Prior Security Nation episode in which loads of PortSwigger references were dropped:
    • https://www.rapid7.com/blog/post/2021/08/18/security-nation-daniel-crowley/
  • New research from James about browser-powered desync attacks:
    • https://portswigger.net/research/browser-powered-desync-attacks

Rapid Rundown Links

  • Semi-secret Fortinet advisory: 
    • https://twitter.com/Gi7w0rm/status/1578398457227878407
  • CVE Details as they come: 
    • https://www.rapid7.com/blog/post/2022/10/07/cve-2022-40684-remote-authentication-bypass-vulnerability-in-fortinet-firewalls-web-proxies/
  • Existence of Fortinet CVE-2022-40684 PoC posted, but not the PoC itself:
    • https://twitter.com/Horizon3Attack/status/1579285863108087810
  • The Hidden Harms of Silent Patches: 
    • https://www.rapid7.com/blog/post/2022/06/06/the-hidden-harm-of-silent-patches/

Like the show? Want to keep Jen and Tod in the podcasting business? Feel free to rate and review with your favorite podcast purveyor, like Apple Podcasts.

Taki Uchiyama of Panasonic on Product Security and Incident Response

30m · Published 28 Sep 19:00

Interview Links

  • Check out Panasonic's delightful PSIRT page – especially if you have a vulnerability in one of Panasonic's many, many products to report.

Rapid Rundown Links

  • Check out Inti's research on "oops, we made a surveillance system" at notmyplate.com.

Like the show? Want to keep Jen and Tod in the podcasting business? Feel free to rate and review with your favorite podcast purveyor, like Apple Podcasts.

Chris Levendis and Lisa Olson on Cloud CVEs

36m · Published 14 Sep 19:18

Interview Links

  • Check out the CVE blog post on handling cloud vulnerabilities.
  • Read up on the rules for assigning CVEs.
  • See an example cloud CVE affecting Microsoft Azure.
  • Read the Microsoft Security Response Center’s blog post on cloud vulnerabilities.

Rapid Rundown Links

  • Check out Dominic White’s tweet on iOS remembered networks.
  • Read the update on the recently released RFC 9293.

Like the show? Want to keep Jen and Tod in the podcasting business? Feel free to rate and review with your favorite podcast purveyor, like Apple Podcasts.

Gordon “Fyodor” Lyon on Nmap, the Open-Source Security Scanner

37m · Published 31 Aug 18:00

Interview Links

  • Check out Nmap if, for some reason, you haven’t already.
  • Learn about Npcap, the packet capture library tool that Gordon and his company also offer.
  • Watch Gordon and HD Moore, the creator of Metasploit, chat about the evolution of network scanning on YouTube.

Rapid Rundown Links

  • Read the Bleeping Computer story on hackers using DeFi bugs to steal cryptocurrency.

Like the show? Want to keep Jen and Tod in the podcasting business? Feel free to rate and review with your favorite podcast purveyor, like Apple Podcasts.

Jen and Tod on Hacker Summer Camp 2022

33m · Published 18 Aug 01:02

Learn more about some of our favorite presentations from the Vegas conferences, including: 

  • Susan Paskey on threat hunting in MFA logs
  • Jeremi Gosney on "passwords, but nihilism" (an apparently unscheduled, live threat modeling exercise on password risks)
  • Patrick Wardle on Zoom LPE vulnerabilities
  • Gaurav Keerthi, Pete Cooper, and Lily Newman on global policy challenges
  • Jake Baines on Cisco ASA vulnerabilities and weaknesses (check out the blog post, too)
  • Jonathan Leitschuh on fixing OSS vulnerabilities at scale
  • Eugene Lim on so many iCal standards within standards

 

Like the show? Want to keep Jen and Tod in the podcasting business? Feel free to rate and review with your favorite podcast purveyor, like Apple Podcasts.

Curt Barnard on Defaultinator (Black Hat Arsenal Preview)

32m · Published 03 Aug 20:16

Interview links

  • Learn all about Defaultinator.
  • Read up on the Raspberry Pi default password vulnerability.
  • Check out the GitHub repositories for Defaultinator.

Rapid Rundown links

  • Read Derek Abdine's disclosures on Arris and Arris-like routers.
  • Check out the Security Boulevard article on keeping PoCs secret.
  • Peruse Matt Blaze’s tweet thread on teaching physical security secrets despite complaints from locksmiths.

Like the show? Want to keep Jen and Tod in the podcasting business? Feel free to rate and review with your favorite podcast purveyor, like Apple Podcasts.

Jacques Chester of Shopify Talks CVSS Scores

39m · Published 20 Jul 17:43

Interview Links

  • A Closer Look at CVSS Scores

Rapid Rundown Links

  • Bleeping Computer story: PyPI mandates 2FA for critical projects, developer pushes back
  • Twitter thread on deleting atomicwrites, and undeleting it

PyPi issues mentioned

  • https://github.com/pypi/warehouse/issues/11625
  • https://github.com/pypi/warehouse/issues/11805
  • https://github.com/pypi/warehouse/issues/11798

Like the show? Want to keep Jen and Tod in the podcasting business? Feel free to rate and review with your favorite podcast purveyor, like Apple Podcasts.

Pete Cooper and Irene Pontisso on the Results of the UK Government’s Security Culture Challenge

36m · Published 06 Jul 19:00

Interview Links

  • Revisit our first episode with Peter and Irene from Season 4.
  • Read the paper on the UK government’s cybersecurity strategy through 2030.

Rapid Rundown Links

  • Check out the article on so-called pig-butchering scams.

Like the show? Want to keep Jen and Tod in the podcasting business? Feel free to rate and review with your favorite podcast purveyor, like Apple Podcasts.

Security Nation has 78 episodes in total of non- explicit content. Total playtime is 53:42:16. The language of the podcast is English. This podcast has been added on October 28th 2022. It might contain more episodes than the ones shown here. It was last updated on March 1st, 2024 08:42.

Similar Podcasts

Every Podcast » Podcasts » Security Nation