Episode #235: Pizza Hut Australia Data Breach; Future of Autonomous Defense Systems; Unmasking Election Security; GoLang Flaw in go.mod directive; First Perfect Reproducible Toolchain Shadowed By Critical Vulnerabilities

0 Views· 09/22/23
It's 5:05!
It's 5:05!
0 Subscribers
0

🎙️ Free access to 230+ episodes of “It’s 5:05!” on your favorite podcast platforms: bit.ly/505-updates ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value. 📌Pizza Hut Australia Suffers Data Breach🇦🇺 Edwin Kwan - Sydney, Australia Pizza Hut Australia notified 193, 000 customers that the company had suffered a data breach. That information included full name, delivery address, delivery instructions, email address, phone number, mass credit card data, and encrypted passwords for online accounts. DOD’s Replicator: Future of Autonomous Defense Systems🇺🇸 Katy Craig - San Diego, California Deputy Secretary of Defense Kathleen Hicks has just unveiled a vision called Replicator that's all about scale and efficiency. Replicator isn't just about mass-producing these systems, it's about creating a blueprint for future scalability.
Unmasking Election Security🇺🇸 Hillary Coover, Washington, DCUS voting machine companies are collaborating with cybersecurity experts to conduct additional stress tests on their systems in preparation for the 2024 election and to counter misinformation. Three major voting equipment manufacturers allowed a group of verified cybersecurity researchers access to their software and hardware for nearly two days.
GoLang Flaw in go.mod directive🇺🇸 Tracy (Trac) Bannon, Camp Hill, Pennsylvania Golang introduced a new cool feature called the go.mod directive in Go version 1.21.  Unfortunately, the bad guys can exploit this. too.  According to the 2021 Go Developer Survey, there are approximately 2. 7 million developers who use Golang. That's a pretty nice-sized attack surface.
The First Perfect Reproducible Toolchain Shadowed By Critical Vulnerabilities🇷🇴 Olimpiu Pop, Transylvania, RomaniaThe libraries we use in our projects are used in their binary format. Yes, even open source ones. That means that the open part in the open source is not fully used, as the code is not inspected. Given the growing number of supply chain attacks, we need a solution for it. Reproducible builds will guarantee that what you have is actually what you wanted.

Show more

 0 Comments sort   Sort By


Up next