Episode #235: Pizza Hut Australia Data Breach; Future of Autonomous Defense Systems; Unmasking Election Security; GoLang Flaw in go.mod directive; First Perfect Reproducible Toolchain Shadowed By Critical Vulnerabilities

0 ืฆืคื™ื•ืชยท 09/22/23
It's 5:05!
It's 5:05!
0 ืžื ื•ื™ื™ื
0
ื‘

๐ŸŽ™๏ธ Free access to 230+ episodes of “It’s 5:05!” on your favorite podcast platforms: bit.ly/505-updates โ™ป๏ธ You’re welcome to ๐—ฟ๐—ฒ๐—ฝ๐—ผ๐˜€๐˜ if your followers will find this of value. ๐Ÿ“ŒPizza Hut Australia Suffers Data Breach๐Ÿ‡ฆ๐Ÿ‡บ Edwin Kwan - Sydney, Australiaโ€ŠPizza Hut Australia notified 193, 000 customers that the company had suffered a data breach. That information included full name, delivery address, delivery instructions, email address, phone number, mass credit card data, and encrypted passwords for online accounts. DOD’s Replicator: Future of Autonomous Defense Systems๐Ÿ‡บ๐Ÿ‡ธ Katy Craig - San Diego, California Deputy Secretary of Defense Kathleen Hicks has just unveiled a vision called Replicator that's all about scale and efficiency. Replicator isn't just about mass-producing these systems, it's about creating a blueprint for future scalability.
Unmasking Election Security๐Ÿ‡บ๐Ÿ‡ธ Hillary Coover, Washington, DCUS voting machine companies are collaborating with cybersecurity experts to conduct additional stress tests on their systems in preparation for the 2024 election and to counter misinformation. Three major voting equipment manufacturers allowed a group of verified cybersecurity researchers access to their software and hardware for nearly two days.
GoLang Flaw in go.mod directive๐Ÿ‡บ๐Ÿ‡ธ Tracy (Trac) Bannon, Camp Hill, Pennsylvania Golang introduced a new cool feature called the go.mod directive in Go version 1.21. โ€ŠUnfortunately, the bad guys can exploit this. too. โ€ŠAccording to the 2021 Go Developer Survey, there are approximately 2. 7 million developers who use Golang. That's a pretty nice-sized attack surface.
The First Perfect Reproducible Toolchain Shadowed By Critical Vulnerabilities๐Ÿ‡ท๐Ÿ‡ด Olimpiu Pop, Transylvania, RomaniaThe libraries we use in our projects are used in their binary format. Yes, even open source ones. That means that the open part in the open source is not fully used, as the code is not inspected. Given the growing number of supply chain attacks, we need a solution for it. Reproducible builds will guarantee that what you have is actually what you wanted.

ืœื”ืจืื•ืช ื™ื•ืชืจ



ื”ื‘ื