DEF CON LiveCTF 2022 - Day 1

The Hacker Mind Podcast: The Hacker Revolution Will Be Televised

|
What if DEF CON CTFs were televised? What if you could see their screens and have interviews with the players in the moment? You can. Jordan Wiens, from Vector 35, maker of Binary Ninja, is no stranger to CTFs ... Read More
If You’re Only Doing WAF, You’re Doing API Security Wrong

If You’re Only Doing WAF, You’re Doing API Security Wrong

|
In the rush to comply with various standards, companies are looking at API security with renewed interest. Some organizations have begun using Web Application Firewalls (WAFs) to protect their APIs, but this isn’t a true solution to API security ... Read More

The Hacker Mind Podcast: Gaining Persistence On Windows Boxes

|
When we hear about bad actors on a compromised system for 200+ days, we wonder how they survived for so long. Often they hide in common misconfigurations. Paula Januszkiewicz, CEO of Cqure returns to The Hacker Mind to explain ... Read More

Why Fuzz Test: 20 Mozilla Vulnerabilities Found With Fuzz Testing

|
Recently, Mozilla, makers of the Firefox browser, reported 20 vulnerabilities they found through fuzz testing their code ... Read More
The Death Star Architect Speaks Out

The Hacker Mind Podcast: What Star Wars Can Teach Us About Threat Modeling

|
VAMOSI: So I found this animation online that speaks to the struggles of every design architect. It’s called the Death Star Architect Speaks Out. If you’re not familiar with the film released Star Wars film, now retitled Episode Four: A New Hope, young Luke Skywalker, a a farm boy, from ... Read More

The Hacker Mind Podcast: Tib3rius

|
Web application security. OSCP exam. Life as a pen tester ... Read More

How Mayhem Fits Into the Federal Guidance for Securing the Software Supply Chain

|
In this blog post, we’ll take a deeper look at the NIST guidance for software development. In particular, we’ll look at PW 8.2 in NIST 800-218 ... Read More

The Hacker Mind Podcast: Never Mess With A Hacker

|
Air travel tips from The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data by Kevin Mitnick and Robert Vamosi ... Read More
Why Vulnerability Scanning Alone Is Not Enough to Keep Your Software Secure

Why Vulnerability Scanning Alone Is Not Enough to Keep Your Software Secure

|
With vulnerability scanning, you are only addressing the known vulnerabilities and missing the bigger picture, which are the unknown vulnerabilities ... Read More

The Hacker Mind: Hacking Latency In Live Music Online

|
If you call someone on the other side of the world, perhaps you notice the latency in responses. For voice that’s okay, but for live music that’s disastrous ... Read More