MP3•Episode home
Manage episode 518927485 series 3290432
Content provided by Jacob Torrey, Haroon meer, and Marco slaviero. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jacob Torrey, Haroon meer, and Marco slaviero or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.
Q3’25 ThinkstScapes
Microsoft-induced security woes
One Token to rule them all - obtaining Global Admin in every Entra ID tenant via Actor tokens
Dirk-jan Mollema
Turning Microsoft's Login Page into our Phishing Infrastructure
Keanu Nys
You snooze you lose: RPC-Racer winning RPC endpoints against services
Ron Ben Yizhak
Internal Domain Name Collision 2.0
Philippe Caturegli
Logs are not always as they appear
Source IP Spoofing in Cloud Logs: A Hands-On Look Across AWS, Azure, and GCP
Eliav Livneh
[Video]
I'm in Your Logs Now, Deceiving Your Analysts and Blinding Your EDR
Olaf Hartong
From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion
Shu-Hao Tung
Autobots roll out!
Automating software security with LLMs
Tyler Nighswander
Agents Built From Alloys
Albert Ziegler
AI Agents for Offsec with Zero False Positives
Brendan Dolan-Gavitt
[Slides]
Are CAPTCHAs Still Bot-hard? Generalized Visual CAPTCHA Solving with Agentic Vision Language Model
Xiwen Teoh, Yun Lin, Siqi Li, Ruofan Liu, Avi Sollomoni, Yaniv Harel, and Jin Song Dong
Good vibrations
Invisible Ears at Your Fingertips: Acoustic Eavesdropping via Mouse Sensors
Mohamad Habib Fakih, Rahul Dharmaji, Youssef Mahmoud, Halima Bouzidi, and Mohammad Abdullah Al Faruque
TimeTravel: Real-time Timing Drift Attack on System Time Using Acoustic Waves
Jianshuo Liu, Hong Li, Haining Wang, Mengjie Sun, Hui Wen, Jinfa Wang, and Limin Sun
[Paper]
Nifty sundries
Crescent library brings privacy to digital identity systems
Christian Paquin, Guru-Vamsi Policharla, and Greg Zaverucha
Journey to the center of the PSTN: How I became a phone company, and how you can too
Enzo Damato
Safe Harbor or Hostile Waters: Unveiling the Hidden Perils of the TorchScript Engine in PyTorch
Ji'an Zhou and Lishuo Song
[Slides]
Ghosts in the Machine Check – Conjuring Hardware Failures for Cross-ring Privilege Escalation
Christopher Domas
Machine Against the RAG: Jamming Retrieval-Augmented Generation with Blocker Documents
Avital Shafran, Roei Schuster, and Vitaly Shmatikov
Inverting the Xorshift128+ random number generator
Scott Contini
17 episodes