
Tales from the SOC: Classic Crypto – Operation GUNMAN | S1 Ep023
Cold War cryptographic capers in a real-world Spy vs. Spy scenario!
By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

Even though Firefox isn’t based on Chrome, the coders of each browser engine made similar mistakes.

Windows only, apparently, but a sandbox bypass could lead to infection by “just visiting” a rogue site.


When governments demand to regulate crypto, is that a practical step, or just intellectual laziness?

23andMe has loads of DNA samples that they are looking to sell. What to do?

GitHub tools aimed at boosting security were hacked to steal secrets instead.

Everyone loves a feel-good cybersecurity story… like this one.

Criminals have found an Achilles’ heel for mobile phone wallet apps.

New HIPAA regulations now demand adherence. Find out what’s required.

CVVs, chips, PINs, mobile wallets and MFA all make card scams harder. But what problems remain?

As the cybersecurity vendor market matures, it’s hard to know what’s best for your organization.

It’s rarely that the crypto gets cracked… it usually get sidestepped, or downgraded, or bodged.


Physical security measures should be part of your overall security strategy.

End-to-end encryption is everywhere, yet we still have breaches and eavesdropping. Why?

Co-hosts Duck and David tell it like it is!

Even though Firefox isn’t based on Chrome, the coders of each browser engine made similar mistakes.

Windows only, apparently, but a sandbox bypass could lead to infection by “just visiting” a rogue site.

When governments demand to regulate crypto, is that a practical step, or just intellectual laziness?
By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

23andMe has loads of DNA samples that they are looking to sell. What to do?

GitHub tools aimed at boosting security were hacked to steal secrets instead.

Everyone loves a feel-good cybersecurity story… like this one.


Criminals have found an Achilles’ heel for mobile phone wallet apps.




It’s rarely that the crypto gets cracked… it usually get sidestepped, or downgraded, or bodged.

Physical security measures should be part of your overall security strategy.

End-to-end encryption is everywhere, yet we still have breaches and eavesdropping. Why?

Co-hosts Duck and David tell it like it is!


By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.






