Join Rezilion in Las Vegas for Black Hat, BSides and DEFCON, 2023

This time every year, Las Vegas transforms into the epicenter of the security world with a lineup of major industry events – Black Hat, BSides and DEFCON. Rezilion is excited to be ...
The FBI Is Serious About Juice Jacking

Why is ‘Juice Jacking’ Suddenly Back in the News?

KrebsOnSecurity received a nice bump in traffic this week thanks to tweets from the Federal Bureau of Investigation (FBI) and the Federal Communications Commission (FCC) about "juice jacking," a term first coined ...
How Does Minnesota's Emergency Alert System Work?

Sounding the Alarm on Emergency Alert System Flaws

The Department of Homeland Security (DHS) is urging states and localities to beef up security around proprietary devices that connect to the Emergency Alert System -- a national public warning system used ...
CISO Stories Podcast: Fiscally Responsible Ways to Train and Build Community

CISO Stories Podcast: Fiscally Responsible Ways to Train and Build Community

All organizations must have security awareness training programs to teach basics to end users. Similarly, the technical teams need to be exposed to flexible training that is interesting to them ...
Best of Episode: Interview with Jayson E. Street

Best of Episode: Interview with Jayson E. Street

This week is another best of episode with the man, the myth, the legend, Jayson E. Street! In this episode Jayson shares with us several of his greatest hacking and social engineering ...
Best of Episode: Interview with Rachel Tobac

Best of Episode: Interview with Rachel Tobac

This week is a best of episode with special guest Rachel Tobac, CEO of Social Proof Security. In this episode we discuss social engineering, how to get more women in cybersecurity, and ...

DEF CON 28 Safe Mode – Dylan Ayrey’s And Allison Donovan’s ‘Lateral Movement and Privilege Escalation In GCP: Compromise Any Organization Without Dropping an Implant’

Many thanks to DEF CON and Conference Speakers for publishing their comprehensive and outstanding presentations; of which, originally appeared at the organization's DEFCON 28 SAFE MODE Conference, and on the DEF CON ...

DEF CON 28 Safe Mode – Ismail Melih’s Tas And Kubilay Ahmet Kucuk’s ‘Practical VoIP/UC Hacking Using Mr.SIP’

Many thanks to DEF CON and Conference Speakers for publishing their comprehensive and outstanding presentations; of which, originally appeared at the organization's DEFCON 28 SAFE MODE Conference, and on the DEF CON ...

DEF CON 28 Safe Mode – Christopher Wade’s ‘Beyond Root: Custom Firmware For Embedded Mobile Chipsets’

Many thanks to DEF CON and Conference Speakers for publishing their comprehensive and outstanding presentations; of which, originally appeared at the organization's DEFCON 28 SAFE MODE Conference, and on the DEF CON ...