Artwork
iconShare
 
Manage episode 518927485 series 3290432
Content provided by Jacob Torrey, Haroon meer, and Marco slaviero. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jacob Torrey, Haroon meer, and Marco slaviero or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

Q3’25 ThinkstScapes

Microsoft-induced security woes

One Token to rule them all - obtaining Global Admin in every Entra ID tenant via Actor tokens

Dirk-jan Mollema

[Blog post]

Turning Microsoft's Login Page into our Phishing Infrastructure

Keanu Nys

[Slides] [Video]

You snooze you lose: RPC-Racer winning RPC endpoints against services

Ron Ben Yizhak

[Slides] [Code] [Video]

Internal Domain Name Collision 2.0

Philippe Caturegli

[Slides] [Video]

Logs are not always as they appear

Source IP Spoofing in Cloud Logs: A Hands-On Look Across AWS, Azure, and GCP

Eliav Livneh

[Video]

I'm in Your Logs Now, Deceiving Your Analysts and Blinding Your EDR

Olaf Hartong

[Slides] [Code]

From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion

Shu-Hao Tung

[Slides] [Paper] [Video]

Autobots roll out!

Automating software security with LLMs

Tyler Nighswander

[Site] [Code] [Video]

Agents Built From Alloys

Albert Ziegler

[Blog post] [Dataset]

AI Agents for Offsec with Zero False Positives

Brendan Dolan-Gavitt

[Slides]

Are CAPTCHAs Still Bot-hard? Generalized Visual CAPTCHA Solving with Agentic Vision Language Model

Xiwen Teoh, Yun Lin, Siqi Li, Ruofan Liu, Avi Sollomoni, Yaniv Harel, and Jin Song Dong

[Site] [Paper] [Code]

Good vibrations

Invisible Ears at Your Fingertips: Acoustic Eavesdropping via Mouse Sensors

Mohamad Habib Fakih, Rahul Dharmaji, Youssef Mahmoud, Halima Bouzidi, and Mohammad Abdullah Al Faruque

[Site] [Paper]

TimeTravel: Real-time Timing Drift Attack on System Time Using Acoustic Waves

Jianshuo Liu, Hong Li, Haining Wang, Mengjie Sun, Hui Wen, Jinfa Wang, and Limin Sun

[Paper]

Nifty sundries

Crescent library brings privacy to digital identity systems

Christian Paquin, Guru-Vamsi Policharla, and Greg Zaverucha

[Blog post] [Paper] [Code]

Journey to the center of the PSTN: How I became a phone company, and how you can too

Enzo Damato

[Slides] [Video]

Safe Harbor or Hostile Waters: Unveiling the Hidden Perils of the TorchScript Engine in PyTorch

Ji'an Zhou and Lishuo Song

[Slides]

Ghosts in the Machine Check – Conjuring Hardware Failures for Cross-ring Privilege Escalation

Christopher Domas

[Slides] [Code] [Video]

Machine Against the RAG: Jamming Retrieval-Augmented Generation with Blocker Documents

Avital Shafran, Roei Schuster, and Vitaly Shmatikov

[Paper] [Code]

Inverting the Xorshift128+ random number generator

Scott Contini

[Blog post] [Code]

  continue reading

17 episodes