We Discover Chaosmology By Talking Die Immanentisierung der Musik des Multiversums
…
continue reading
Das monatliche Radio des Chaos Computer Club Berlin
…
continue reading
Mostly hockey, a little bit of nonsense. What Chaos! is an ALLCITY Network Hockey show hosted by Pete Blackburn and DJ Bean
…
continue reading
Successfully Chaotic Podcast is hosted by Maria Daniels, an expert on out-of-the-box marketing, advocate for wellness and natural foods, and speaker on finding success in the chaos of life.
…
continue reading
Dr. A.J. Swoboda and Dr. Nijay Gupta are co-hosts of Slow Theology: Simple Faith for Chaotic Times. We talk Bible, theology, and anything and everything else under the sun that gives our lives meaning.
…
continue reading
The number one goal for The Chaotic Order podcast is to build one big global neurodiverse family. Remember, be you, but better. ❤️
…
continue reading
Ignorance of the law is no excuse! That’s true for a traffic stop, and it’s true if you want to participate in whatever’s left of American democracy. If the events since the 2016 election taught us anything, it’s that tuning out is not an option. Legal journalists Liz Dye and Andrew Torrez break down the week’s most important courtroom stories, so you can keep on top of this crazy news cycle. Whether it’s Texas giving two middle fingers to the Supreme Court, or Donald Trump in all the courts ...
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
Where styles, moms, and chaos collide! Stylishly navigating the hot mess of motherhood Keeping it real, stylishly messy and always fun! Therapeutic for us, entertaining for you!
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
This CHAOSS Community podcast features members who spent considerable time and effort to understand open source community health and how we can measure it through metrics, analytics, and software. We invite guests to this podcast to talk about how they use open source community health metrics and software in their own open source communities, companies, or foundations. This podcast fills the gap with open source community metric definitions and software on one side and their use on the other ...
…
continue reading
A break from longform videos where I can just talk free form on any topic you request.
…
continue reading
WELCOME to Chrissy Chaos! Remember to rate us on iTunes and Join our Patreon for a WEEKLY bonus ep! patreon.com/chrisdcomedy CHRISDCOMEDY.COM for all upcoming live comedy show dates FOLLOW Chris Distefano On Social Media Instagram - https://www.instagram.com/chrisdcomedy/ Twitter - https://twitter.com/chrisdcomedy Filmed and Edited by THEHOMELESSPIMP https://www.instagram.com/thehomeless... Twitter - https://twitter.com/homelesspimp?lang=en
…
continue reading
Kaffee & Chaos – zu privat, zu lustig, zu viel. Tauche mit uns in die bunte Welt von komplettem Chaos ein! Wir, Mark und Vanessa, plaudern über alles, was man vielleicht besser nicht teilen sollte – mit einer ordentlichen Portion Humor. Ob peinliche Geschichten, tiefe Gedanken oder die großen Fragen des Lebens: Bei uns bleibt nichts ungesagt (und manches vielleicht besser ungehört). Ungefiltert, witzig und immer ein bisschen drüber – genau wie das Leben!
…
continue reading
We are a group of friends who started an actual play podcast with the goal to make you feel like you're at the table with us.
…
continue reading
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
Chaos Springs Eternal is a Delta Green Actual Play podcast. QuarterMasters of the TableTop is a group of four friends who take turns DMing/GMing/otherwise leading each other through various TTRPG Systems https://twitter.com/QMoftheTableTop https://www.instagram.com/quartermastersofthetabletop/
…
continue reading
Problematic faves, dissident feminism, and poodle interruptions: this is Feminine Chaos, featuring cultural commentary from Phoebe Maltz Bovy and Kat Rosenfield. femchaospod.substack.com
…
continue reading
Der Podcast für Kreative und Macher. Es geht von Selbstständigkeit über Persönlichkeitsentwicklung bis hin zu Videoproduktion und digitalem Marketing. Aber wir sind neugierig und schauen auch gerne mal über Adobe Premiere und PPTs hinaus. Häufig erscheinen uns Dinge zu Beginn etwas chaotisch, aber dann lernt man etwas Neues und geht es eben “Weiter im Chaos”. Wir sind Christian (Content Creator) und Kevin (Berater). Begleitet uns doch auf dieser Reise, hört einfach mal rein und folgt uns auf ...
…
continue reading
Every episode brings insight to help guide you through the Chaos and into Clarity. We focus on three principals; Reason, Purpose, and Self-Esteem.
…
continue reading
The Tao of Chao Podcast focuses on contemporary issues, regulations and class action cases impacting pension and defined contribution retirement plan fiduciaries. Philip Chao and his guests will discuss relevant issues that a plan fiduciary should pay attention to and how such challenges are relevant in operating their retirement plans while serving in the sole interest of participants and beneficiaries.
…
continue reading
1
D&D with the Chaotically Neutral Canucks
Kenny Hayter, Kris Muggins, Smat Muggins, Ryleigh Cameron, Ben Whynot and Paul Hayes
"D&D with the Chaotically Neutral Canucks" guarantees a rollercoaster of hilarity as our zany crew tackles dungeons with a flair of comedy and drama! Check us out where you get your podcasting fix every Monday, at 12PM AST.
…
continue reading
We're the best
…
continue reading
Discover a delightful mix of chaos and comedy as friends engage in loud discussions about random topics. Unfiltered fun awaits you!
…
continue reading
Get together with a group of moms who are removing the Instagram filter from life. Join us as we discuss our struggles, our triumphs, and our all around tom foolery!
…
continue reading
Podcast dla wszystkich, którzy chcą wyjść z przepracowania i zacząć robić to co naprawdę ważne. Dedykowany dla menedżerów, przedsiębiorców i wysokopłatnych specjalistów, czyli osób wykonujących pracę umysłową. W podcastcie poruszane są tematy na temat nowoczesych metod produktwności osób wykonujących pracę umysłową. Słuchając tego podcastu poznasz najlepsze praktyki organizacji pracy, gospodarowania własnym czasem, zwiększania własnej efektywności, osiągania celów, technologii wspierających ...
…
continue reading
Learn how busy and overwhelmed professionals can rediscover their passion, so they can redefine their purpose, and gain the courage to do something about it. We will discuss how to cut through the whirlwinds of life to rise above the chaos and discover a path to significance and ultimately peace.
…
continue reading
A fifth edition Dungeons & Dragons created to highlight third party published supplements in support of the game’s vibrant community.
…
continue reading
The pro wrestling discussion segment of The Bear of Texas Podcast and Pain Train Pipebomb Productions! Ringside Chaos is a pro wrestling podcast committed and dedicated to covering pro wrestling in the most well-educated, knowledgable, and sophisticated way. Ringside Chaos is about talking pro wrestling not only passionately, but correctly.
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
Chaos Lever examines emerging trends and new technology for the enterprise and beyond. Hosts Ned Bellavance and Chris Hayner examine the tech landscape through a skeptical lens based on over 40 combined years in the industry. Are we all doomed? Yes. Will the apocalypse be streamed on TikTok? Probably. Does Joni still love Chachi? Decidedly not.
…
continue reading
Welcome to F1 Chaos, the ultimate podcast for Formula 1 enthusiasts and casual fans alike! Join your host, JJ Chaos, as he dives deep into the thrilling, high-octane world of F1 racing. Each episode, JJ brings you the latest news, race recaps, and insider insights, all wrapped in his signature style of humour and passion. From the adrenaline-pumping races to the behind-the-scenes drama, F1 Chaos covers it all! Whether you're a die-hard fan or just curious about the sport, JJ's engaging comme ...
…
continue reading
Join us as the hosts, who are two female engineers working in an industry run by and set up for the MAN, navigate and talk through problems in the industry, life, relationships, and the differences between Millennial and Gen Z workforce habits.
…
continue reading
Concise lessons in leadership in a world of chaos. Hosted by Ian McClean, leadership expert and founder of Flow Group and GreenLine Conversations.
…
continue reading
Crime, Wine & Chaos is a true crime and chaos, comedy podcast hosted by sisters, Amber Rae and Naomi Lackaff. Join us for a drink as we dive deep into these harrowing stories. Cheers! - EXPLICIT CONTENT - 18 years and older listener advised
…
continue reading
Welcome to Very Random Encounters, a show where we play pen and paper RPGs in which we've randomly determined as many things as is possible, including characters, villains, names, places, and other weirder stuff! It all comes together to be a very random encounter. We're an actual play roleplaying game podcast by four friends who love the challenge of telling a story whose details are all prompted by random rolls. You can start with the first episode in any given season.
…
continue reading
Chaos Magick News offers a glimpse into current events through the lense of Occultism and a look at greater occulture both online and offline. Occasionally insightful and always comedic CMN is the dose of self awareness and humor to cure your Magus-itis or bring back your inspiration for the Magickal worldview.
…
continue reading
Ever wonder what it would be like raising enough children to fill a short bus? Chaotic Harmony is a podcast that will give you that fly on the wall experience into our household. Our blended family of ten has gone through it all and we are still standing tall! Even if that means someone is holding us up from behind OR we are standing on stilts. Let's be real, with a family like ours you HAVE to expect the unexpected! I'm Angela Schultz and I will be sharing our story with you and all the way ...
…
continue reading
ein ADHS Podcast
…
continue reading
…
continue reading
We're an actual play D&D group who almost exclusively uses homebrew setting expansions in our games. Our first season is set in a world based on Eiichiro Oda's One Piece, and our second one is set in the Star Wars universe. No matter where we end up, we're just a pack of chaos goblins in pretty hats. I have no idea how the DMs stay sane.
…
continue reading
“Cool, Calm, & Chaotic”…The New Podcast Thats Talking All Things… - Health - Food - Music - Positivity - Myths - Truths - Randomness - Top 10 Lists - Pet Peeves - More Food Probably ***ANY & ALL THINGS LIFE! … Ya Know… All Things Awesome! LIFE IS GOOD!
…
continue reading
Everything Orioles for Belly Up Sports Network. Nathan Andrews covers all the weekly chaos that goes on with the Baltimore Orioles and Major League Baseball.
…
continue reading
Calming the Chaos is a podcast by Licensed Mental Health Counselor Tracy Kenela, who interviews a variety of professionals around the world in an effort to find different ways to help people (and herself!) find peace in a chaotic world. Each episode contains Information, tips, tools, and resources that come from different schools of thought, and are presented as a fun and entertaining way to help you move toward a more peaceful and enjoyable life.
…
continue reading
In Lords of Chaos Podcast, Lawrence brings humor and wit to the chaos of life, uncovering the comedy hidden in even the most intense situations. The podcast dives into gritty topics—crime, addiction, and jaw-dropping life experiences—but Lawrence’s knack for finding the laugh-out-loud moments keeps things from getting too dark. With guests who are unafraid to share their wildest, funniest stories, each episode feels like a rollercoaster of emotions, where listeners are just as likely to laug ...
…
continue reading
1
High-Yield Municipal Strategies & The Impact of Fed Rate Cuts w/ Daniel Close | Tao of Chao 23
45:53
Daniel Close, Lead Portfolio Manager for High-Yield Municipal Strategies at Nuveen, joins host Philip Chao in this episode of Tao of Chao to explore the evolving landscape of high-yield municipals. They discuss the effects of the Fed's rate cuts, differences between municipal and treasury yield curves, and the future of fixed-income solutions. Dani…
…
continue reading
1
KCAA: Controlled Chaos with Gary Garver (Wed, 13 Nov, 2024)
1:00:10
1:00:10
Reproducir más Tarde
Reproducir más Tarde
Listas
Me gusta
Me gusta
1:00:10
KCAA: Controlled Chaos with Gary Garver on Wed, 13 Nov, 2024Por KCAA Radio
…
continue reading
1
Which NHL players look the MOST like their teams?
1:10:20
1:10:20
Reproducir más Tarde
Reproducir más Tarde
Listas
Me gusta
Me gusta
1:10:20
As we head to Utah, we discuss which NHL owners we most want to watch a game with and which players look most like their teams. Plus, Alex DeBrincat sits down with Pete for some small talk. 0:00 Intro 0:45 Welcome to What Chaos! 5:38 Small Talk w/ Alex DeBrincat 12:08 NHLPA merchandise 21:08 Owners we want to watch games with 42:46 Players that loo…
…
continue reading
Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/about this event: https://c3voc.dePor OWASP German Chapter
…
continue reading
Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/about this event: https://c3voc.dePor OWASP German Chapter
…
continue reading
Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/about this event: https://c3voc.dePor OWASP German Chapter
…
continue reading
Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/about this event: https://c3voc.dePor OWASP German Chapter
…
continue reading
Web security is increasingly an opt-in approach, leaving developers with both the opportunity and the responsibility to protect their applications. This talk will explore why and how developers can secure their sites against evolving threats.We'll delve into the nuances of cross-site leaks (xs-leaks) and discuss the Cross-Origin Resource Policy (CO…
…
continue reading
Web security is increasingly an opt-in approach, leaving developers with both the opportunity and the responsibility to protect their applications. This talk will explore why and how developers can secure their sites against evolving threats.We'll delve into the nuances of cross-site leaks (xs-leaks) and discuss the Cross-Origin Resource Policy (CO…
…
continue reading
Web security is increasingly an opt-in approach, leaving developers with both the opportunity and the responsibility to protect their applications. This talk will explore why and how developers can secure their sites against evolving threats.We'll delve into the nuances of cross-site leaks (xs-leaks) and discuss the Cross-Origin Resource Policy (CO…
…
continue reading
Web security is increasingly an opt-in approach, leaving developers with both the opportunity and the responsibility to protect their applications. This talk will explore why and how developers can secure their sites against evolving threats.We'll delve into the nuances of cross-site leaks (xs-leaks) and discuss the Cross-Origin Resource Policy (CO…
…
continue reading
1
Double-Edged Crime: How Browser Extension Fingerprinting Might Endanger Users and Extensions Alike (god2024)
23:43
Browser extensions are powerful tools that enhance the web browsing experience, offering their users a wide range of functionalities. However, these features can also introduce security and privacy issues for their users, mainly through a technique known as extension fingerprinting — where malicious websites track users based on the extensions they…
…
continue reading
1
Double-Edged Crime: How Browser Extension Fingerprinting Might Endanger Users and Extensions Alike (god2024)
23:43
Browser extensions are powerful tools that enhance the web browsing experience, offering their users a wide range of functionalities. However, these features can also introduce security and privacy issues for their users, mainly through a technique known as extension fingerprinting — where malicious websites track users based on the extensions they…
…
continue reading
1
Double-Edged Crime: How Browser Extension Fingerprinting Might Endanger Users and Extensions Alike (god2024)
23:43
Browser extensions are powerful tools that enhance the web browsing experience, offering their users a wide range of functionalities. However, these features can also introduce security and privacy issues for their users, mainly through a technique known as extension fingerprinting — where malicious websites track users based on the extensions they…
…
continue reading
1
Double-Edged Crime: How Browser Extension Fingerprinting Might Endanger Users and Extensions Alike (god2024)
23:43
Browser extensions are powerful tools that enhance the web browsing experience, offering their users a wide range of functionalities. However, these features can also introduce security and privacy issues for their users, mainly through a technique known as extension fingerprinting — where malicious websites track users based on the extensions they…
…
continue reading
Recent developments in web technologies have seen a paradigm shift from monolithic server-based applications to REST-based microservices with feature-rich browser-based frontends. This progression has brought with it novel classes of security flaws. In this talk we review how client-side variants of injection vulnerabilities such as cross-site scri…
…
continue reading
Recent developments in web technologies have seen a paradigm shift from monolithic server-based applications to REST-based microservices with feature-rich browser-based frontends. This progression has brought with it novel classes of security flaws. In this talk we review how client-side variants of injection vulnerabilities such as cross-site scri…
…
continue reading
Recent developments in web technologies have seen a paradigm shift from monolithic server-based applications to REST-based microservices with feature-rich browser-based frontends. This progression has brought with it novel classes of security flaws. In this talk we review how client-side variants of injection vulnerabilities such as cross-site scri…
…
continue reading
Recent developments in web technologies have seen a paradigm shift from monolithic server-based applications to REST-based microservices with feature-rich browser-based frontends. This progression has brought with it novel classes of security flaws. In this talk we review how client-side variants of injection vulnerabilities such as cross-site scri…
…
continue reading
Web apps use Server-Side Requests to request data from other servers, e.g., for link previews. However, they are exploited by attackers who might request internal resources or non-public services. This attack is called Server-Side Request Forgery (SSRF).The talk explains what SSRF is, how it can be used to exploit servers, and how to defend against…
…
continue reading
Web apps use Server-Side Requests to request data from other servers, e.g., for link previews. However, they are exploited by attackers who might request internal resources or non-public services. This attack is called Server-Side Request Forgery (SSRF).The talk explains what SSRF is, how it can be used to exploit servers, and how to defend against…
…
continue reading
Web apps use Server-Side Requests to request data from other servers, e.g., for link previews. However, they are exploited by attackers who might request internal resources or non-public services. This attack is called Server-Side Request Forgery (SSRF).The talk explains what SSRF is, how it can be used to exploit servers, and how to defend against…
…
continue reading
Web apps use Server-Side Requests to request data from other servers, e.g., for link previews. However, they are exploited by attackers who might request internal resources or non-public services. This attack is called Server-Side Request Forgery (SSRF).The talk explains what SSRF is, how it can be used to exploit servers, and how to defend against…
…
continue reading
This episode of Ringside Chaos delves into Bully Ray's legacy, exploring his extensive career in professional wrestling, his impact on the industry, and his storytelling prowess. The hosts discuss Bully Ray's contributions to wrestling, including his time in ECW, TNA, and WWE, and his current role in the wrestling community. They also touch on pote…
…
continue reading
1
„Well, What Would You Say if I Said That You Could?” – Scanning for Vulnerabilities Without Getting Into Trouble (god2024)
27:07
The need for comprehensive measurements of security and privacy risks on the Web is undeniable as it helps developers in focusing on emerging trends in security. However, large-scale scans for server-side vulnerabilities remains a sensitive topic, due to their potential to harm servers, disrupt services, and incur financial losses. Even smaller, si…
…
continue reading
1
„Well, What Would You Say if I Said That You Could?” – Scanning for Vulnerabilities Without Getting Into Trouble (god2024)
27:07
The need for comprehensive measurements of security and privacy risks on the Web is undeniable as it helps developers in focusing on emerging trends in security. However, large-scale scans for server-side vulnerabilities remains a sensitive topic, due to their potential to harm servers, disrupt services, and incur financial losses. Even smaller, si…
…
continue reading
1
„Well, What Would You Say if I Said That You Could?” – Scanning for Vulnerabilities Without Getting Into Trouble (god2024)
27:07
The need for comprehensive measurements of security and privacy risks on the Web is undeniable as it helps developers in focusing on emerging trends in security. However, large-scale scans for server-side vulnerabilities remains a sensitive topic, due to their potential to harm servers, disrupt services, and incur financial losses. Even smaller, si…
…
continue reading
1
„Well, What Would You Say if I Said That You Could?” – Scanning for Vulnerabilities Without Getting Into Trouble (god2024)
27:07
The need for comprehensive measurements of security and privacy risks on the Web is undeniable as it helps developers in focusing on emerging trends in security. However, large-scale scans for server-side vulnerabilities remains a sensitive topic, due to their potential to harm servers, disrupt services, and incur financial losses. Even smaller, si…
…
continue reading
1
Dicke Bretter, diesmal über fünf Jahre Landtagsarbeit zu Digitalthemen
1:16:30
1:16:30
Reproducir más Tarde
Reproducir más Tarde
Listas
Me gusta
Me gusta
1:16:30
CR295: Über Digitalpolitik in Sachsen, mit Daniel Gerber Seit ab dem vergangenen Jahr auch der Podcast „Dicke Bretter“ beim Chaosradio läuft, gab es nur eine Live-Sendung, nämlich vom Chaos Communication Congress. Jetzt folgt die zweite Live-Aufnahme von den Datenspuren in Dresden. „Dicke Bretter“ will über die Entstehung von Gesetzen und Standards…
…
continue reading
As organizations increasingly rely on SAP systems to manage critical business processes, the security of these environments is an increasing challenge for companies and has also been recognized by the OWASP Core Business Application Security (CBAS) project. This talk will explore the security of SAP systems from an attacker's perspective, uncoverin…
…
continue reading
As organizations increasingly rely on SAP systems to manage critical business processes, the security of these environments is an increasing challenge for companies and has also been recognized by the OWASP Core Business Application Security (CBAS) project. This talk will explore the security of SAP systems from an attacker's perspective, uncoverin…
…
continue reading
As organizations increasingly rely on SAP systems to manage critical business processes, the security of these environments is an increasing challenge for companies and has also been recognized by the OWASP Core Business Application Security (CBAS) project. This talk will explore the security of SAP systems from an attacker's perspective, uncoverin…
…
continue reading
As organizations increasingly rely on SAP systems to manage critical business processes, the security of these environments is an increasing challenge for companies and has also been recognized by the OWASP Core Business Application Security (CBAS) project. This talk will explore the security of SAP systems from an attacker's perspective, uncoverin…
…
continue reading
1
032 - Schlüpfer & Rauchentwöhnung
1:07:20
1:07:20
Reproducir más Tarde
Reproducir más Tarde
Listas
Me gusta
Me gusta
1:07:20
Säulenheilige tragen keine Trunks! Dr. Spree und Dr. Mo heilen Euch von schlechten GewohnheitenPor dr.spre & dr.mo
…
continue reading
This is a free preview of a paid episode. To hear more, visit femchaospod.substack.com Kat and Phoebe discuss extruding our intestines (or not) in the wake of the election, and the history and future of woke media. LINKS: 'Challah for Ceasefire'?: Phoebe Maltz Bovy on watching women's media walk the political tightrope Kat urges artists not “to all…
…
continue reading
Network fingerprinting exists for a while and some methods such as JA3 have achieved wide adoption across the industry. Introducing network fingerprinting into login flows can help you stave off attackers. However, there are various challenges that you need to overcome: technical, organizational and regulatory.In this talk we will take a look at th…
…
continue reading
Network fingerprinting exists for a while and some methods such as JA3 have achieved wide adoption across the industry. Introducing network fingerprinting into login flows can help you stave off attackers. However, there are various challenges that you need to overcome: technical, organizational and regulatory.In this talk we will take a look at th…
…
continue reading
Network fingerprinting exists for a while and some methods such as JA3 have achieved wide adoption across the industry. Introducing network fingerprinting into login flows can help you stave off attackers. However, there are various challenges that you need to overcome: technical, organizational and regulatory.In this talk we will take a look at th…
…
continue reading
Network fingerprinting exists for a while and some methods such as JA3 have achieved wide adoption across the industry. Introducing network fingerprinting into login flows can help you stave off attackers. However, there are various challenges that you need to overcome: technical, organizational and regulatory.In this talk we will take a look at th…
…
continue reading
In early 2024, hundreds of DKIM setups still used cryptographic keys vulnerable to a bug from 2008 in Debian's OpenSSL package. Vulnerable hosts included prominent names like Cisco, Oracle, Skype, and Github.In 2022, it was discovered that printers generated TLS keys that could be trivially broken with an over 300-year-old algorithm by Pierre de Fe…
…
continue reading
In early 2024, hundreds of DKIM setups still used cryptographic keys vulnerable to a bug from 2008 in Debian's OpenSSL package. Vulnerable hosts included prominent names like Cisco, Oracle, Skype, and Github.In 2022, it was discovered that printers generated TLS keys that could be trivially broken with an over 300-year-old algorithm by Pierre de Fe…
…
continue reading
In early 2024, hundreds of DKIM setups still used cryptographic keys vulnerable to a bug from 2008 in Debian's OpenSSL package. Vulnerable hosts included prominent names like Cisco, Oracle, Skype, and Github.In 2022, it was discovered that printers generated TLS keys that could be trivially broken with an over 300-year-old algorithm by Pierre de Fe…
…
continue reading
In early 2024, hundreds of DKIM setups still used cryptographic keys vulnerable to a bug from 2008 in Debian's OpenSSL package. Vulnerable hosts included prominent names like Cisco, Oracle, Skype, and Github.In 2022, it was discovered that printers generated TLS keys that could be trivially broken with an over 300-year-old algorithm by Pierre de Fe…
…
continue reading
Viele Teams stehen vor der Herausforderung, beim Threat Modeling relevante Bedrohungen zu identifizieren, insbesondere wenn nur wenig Security-Expertise vorhanden ist. Die Auswahl und Bewertung von potenziellen Risiken kann für Nicht-Experten schwierig sein. Dieser Lightning Talk zeigt, wie Generative AI (GenAI) hier unterstützen kann, indem sie Be…
…
continue reading
Viele Teams stehen vor der Herausforderung, beim Threat Modeling relevante Bedrohungen zu identifizieren, insbesondere wenn nur wenig Security-Expertise vorhanden ist. Die Auswahl und Bewertung von potenziellen Risiken kann für Nicht-Experten schwierig sein. Dieser Lightning Talk zeigt, wie Generative AI (GenAI) hier unterstützen kann, indem sie Be…
…
continue reading
Viele Teams stehen vor der Herausforderung, beim Threat Modeling relevante Bedrohungen zu identifizieren, insbesondere wenn nur wenig Security-Expertise vorhanden ist. Die Auswahl und Bewertung von potenziellen Risiken kann für Nicht-Experten schwierig sein. Dieser Lightning Talk zeigt, wie Generative AI (GenAI) hier unterstützen kann, indem sie Be…
…
continue reading
Viele Teams stehen vor der Herausforderung, beim Threat Modeling relevante Bedrohungen zu identifizieren, insbesondere wenn nur wenig Security-Expertise vorhanden ist. Die Auswahl und Bewertung von potenziellen Risiken kann für Nicht-Experten schwierig sein. Dieser Lightning Talk zeigt, wie Generative AI (GenAI) hier unterstützen kann, indem sie Be…
…
continue reading