
The Hacker Mind Podcast: The Hacker Revolution Will Be Televised
What if DEF CON CTFs were televised? What if you could see their screens and have interviews with the players in the moment? You can. Jordan Wiens, from Vector 35, maker of Binary Ninja, is no stranger to CTFs ... Read More

If You’re Only Doing WAF, You’re Doing API Security Wrong
In the rush to comply with various standards, companies are looking at API security with renewed interest. Some organizations have begun using Web Application Firewalls (WAFs) to protect their APIs, but this isn’t a true solution to API security ... Read More
The Hacker Mind Podcast: Gaining Persistence On Windows Boxes
When we hear about bad actors on a compromised system for 200+ days, we wonder how they survived for so long. Often they hide in common misconfigurations. Paula Januszkiewicz, CEO of Cqure returns to The Hacker Mind to explain ... Read More
Why Fuzz Test: 20 Mozilla Vulnerabilities Found With Fuzz Testing
Recently, Mozilla, makers of the Firefox browser, reported 20 vulnerabilities they found through fuzz testing their code ... Read More

The Hacker Mind Podcast: What Star Wars Can Teach Us About Threat Modeling
VAMOSI: So I found this animation online that speaks to the struggles of every design architect. It’s called the Death Star Architect Speaks Out. If you’re not familiar with the film released Star Wars film, now retitled Episode Four: A New Hope, young Luke Skywalker, a a farm boy, from ... Read More
The Hacker Mind Podcast: Tib3rius
Web application security. OSCP exam. Life as a pen tester ... Read More
How Mayhem Fits Into the Federal Guidance for Securing the Software Supply Chain
In this blog post, we’ll take a deeper look at the NIST guidance for software development. In particular, we’ll look at PW 8.2 in NIST 800-218 ... Read More
The Hacker Mind Podcast: Never Mess With A Hacker
Air travel tips from The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data by Kevin Mitnick and Robert Vamosi ... Read More

Why Vulnerability Scanning Alone Is Not Enough to Keep Your Software Secure
With vulnerability scanning, you are only addressing the known vulnerabilities and missing the bigger picture, which are the unknown vulnerabilities ... Read More
The Hacker Mind: Hacking Latency In Live Music Online
If you call someone on the other side of the world, perhaps you notice the latency in responses. For voice that’s okay, but for live music that’s disastrous ... Read More