loader from loading.io

48 - Paulino Calderón & Practical IoT Hacking

The InfoSec & OSINT Show

Release Date: 03/11/2021

Episode 80 | Psychology and Ransomware show art Episode 80 | Psychology and Ransomware

The InfoSec & OSINT Show

In Episode 80, Josh Amishav talks about the pyschological warfare that is being waged against various ransomware gangs, developments to Darkside, REvil and Blackmatter, Russia's handling of cyber criminals, using stealer log combo lists as part of your OSINT investigations and more. 

info_outline
Episode 79 | Mastering The Science Behind Social Engineering show art Episode 79 | Mastering The Science Behind Social Engineering

The InfoSec & OSINT Show

In Episode 79, Josh Amishav chats with Mike Murr about the science behind social engineering, micro-expressions, FACS, which is the Facial Action Coding System, Common mistakes made during SE engagements, manipulation techniques and more. 

info_outline
Episode 78 | The 3 Root Causes of Ransomware show art Episode 78 | The 3 Root Causes of Ransomware

The InfoSec & OSINT Show

In Episode 78, Josh Amishav does a solo adventure to talk about the thought process behind launching the Breachsense Darkweb API. The three main takeaways from the episode are:

info_outline
Episode 77 | Collecting Threat Intel For Good show art Episode 77 | Collecting Threat Intel For Good

The InfoSec & OSINT Show

In Episode 77, Josh Amishav talks with Nate Warfield about threat intel, CTI League and cloud risk. My three main takeaways from the episode are:

info_outline
Episode 76 | Automating Attack Surface Management show art Episode 76 | Automating Attack Surface Management

The InfoSec & OSINT Show

In Episode 76, Josh Amishav chats with Chris Dale about several techniques to associate a given asset back to a company. Three takeaways from the episode are:

info_outline
75 - Jeff Man - From the NSA to PCI show art 75 - Jeff Man - From the NSA to PCI

The InfoSec & OSINT Show

In episode 75, Jeff Man joins us to talk about his time in the NSA, PCI, Hak4Kidz and content creation. My 3 main takeaways were 1) What red teaming was like in the 80s 2) Why PCI gets a bad reputation and 3) His tips for giving great conference talks.

info_outline
74 - Brett Johnson & Online Crime show art 74 - Brett Johnson & Online Crime

The InfoSec & OSINT Show

In episode 74, Brett Johnson joins us to talk about online crime, social engineering, spear phishing and trust. My 3 main takeaways were 1) How criminals convince us to trust them online 2) Bypassing company policies via social engineering and 3) How to get people to believe fake news and legends over facts

info_outline
73 - Higinio Ochoa & Hacking with Anonymous show art 73 - Higinio Ochoa & Hacking with Anonymous

The InfoSec & OSINT Show

In episode 73, Higinio Ochoa joins us for a behind the scenes look at his hacking escapades with Anonymous. The same methodology can be used for bug hunting today. My 3 main takeaways were 1) Building target lists at scale 2) His two OpSec mistakes which led to him getting caught and 3) What his must have hacking tools are now.

info_outline
72 - Nathan Sweaney & The Future of Privacy show art 72 - Nathan Sweaney & The Future of Privacy

The InfoSec & OSINT Show

In episode 72, Nathan Sweaney joins us talk about the future of privacy. My 3 main takeaways were 1) Who's collecting our bluetooth and wifi signals 2) How to get your talk accepted to a security con and 3) How he used OSINT to steal (in air quotes) his twitter handle from a Nazi.

info_outline
71 - Peter Taylor & Fraud Detection show art 71 - Peter Taylor & Fraud Detection

The InfoSec & OSINT Show

In episode 71, Peter Taylor "The Fraud Guy" joins us talk about various aspects of fraud. My 3 main takeaways were 1) The common types of fraud he sees in his investigations 2) How Covid has influenced the fraud space and 3) Why aged shell companies and email addresses are so valuable

info_outline
 
More Episodes
 
 

This week Paulino Calderón joins the show to chat about his methodology for finding bugs in IoT devices, using Lua for quick exploit development, alarming vulnerabilities he found in a smart water bottle, extending Nmap's functionality and his tips for starting a security business.

For more information, including the show notes check out https://breachsense.io/podcast