News
Episode 244: ZuoRAT brings APT Tactics to Home Networks

In this episode of the Security Ledger podcast, brought to you by ReversingLabs, we interview Danny Adamitis (@dadamitis) of Black Lotus Labs about the discovery of ZuoRAT, malware that targets SOHO...

Read more
News
Episode 242: Hacking the Farm (and John Deere) with Sick Codes

In our latest podcast, Paul caught up with Sick Codes (@sickcodes) to talk about his now-legendary presentation at the DEF CON Conference in Las Vegas, in which he demonstrated a hack that ran...

Read more
News
Episode 241: If Its Smart, Its Vulnerable a Conversation with Mikko Hyppönen

We speak with Mikko Hyppönen on the sidelines of the DEF CON Conference in Las Vegas to talk about his new book, “If its Smart it Vulnerable."
The post Episode 241: If...

Read more
News
DEF CON DOOM Patrol: Deere Jailbreak Raises Questions on Security, Competition

A researcher presented the results of a year-long effort to reverse engineer John Deere hardware to run a version of the DOOM first person shooter. He also discovered a number of...

Read more
News
Episode 238: Robots Are The Next Frontier In Healthcare Cyber Risk

In this episode of the podcast (#238) we speak with Daniel Brodie, the CTO at the firm Cynerio. about his firm’s discovery of a string of critical security flaws in an autonomous medical robot,...

Read more
News
Episode 235: Justine Bone of MedSec on Healthcare Insecurity

In this episode of the podcast (#235) Justine Bone, the CEO of Medsec, joins Paul to talk about cyber threats to healthcare organizations in the age of COVID. Justine’s firm works with...

Read more
News
Episode 226: The Cyber Consequences Of Our Throw Away Culture

We speak with John Shegerian of ERI about his new book: “The Insecurity of Everything” and how our e-waste may be exposing sensitive data to other nations.
The post Episode 226: The...

Read more
News
Episode 224: Engineering Trust In The Cyber Executive Order

In this spotlight edition of the podcast, sponsored by Trusted Computing Group* Thomas Hardjono and Henk Birkholz join us to talk about President Biden’s Cyber Executive Order and how the EO’s call...

Read more
News
Encore Podcast: Chris Valasek on Hacking The Jeep Cherokee

With Black Hat and DEFCON upon us, we revisit a 2015 interview with Chris Valasek about his wireless, software based hack of a Chrysler Jeep Cherokee.
The post Encore Podcast: Chris...

Read more
News
Encore Podcast: Is Autonomous Driving Heading for a Crash?

Elon Musk is a big fan of his company’s Fully Self Driving software. But is it safe? In this encore edition of the podcast from 2018, we speak with Beau Woods...

Read more