Episode #235: Pizza Hut Australia Data Breach; Future of Autonomous Defense Systems; Unmasking Election Security; GoLang Flaw in go.mod directive; First Perfect Reproducible Toolchain Shadowed By Critical Vulnerabilities
๐๏ธ Free access to 230+ episodes of “It’s 5:05!” on your favorite podcast platforms: bit.ly/505-updates โป๏ธ You’re welcome to ๐ฟ๐ฒ๐ฝ๐ผ๐๐ if your followers will find this of value. ๐Pizza Hut Australia Suffers Data Breach๐ฆ๐บ Edwin Kwan - Sydney, AustraliaโPizza Hut Australia notified 193, 000 customers that the company had suffered a data breach. That information included full name, delivery address, delivery instructions, email address, phone number, mass credit card data, and encrypted passwords for online accounts. DOD’s Replicator: Future of Autonomous Defense Systems๐บ๐ธ Katy Craig - San Diego, California Deputy Secretary of Defense Kathleen Hicks has just unveiled a vision called Replicator that's all about scale and efficiency. Replicator isn't just about mass-producing these systems, it's about creating a blueprint for future scalability.
Unmasking Election Security๐บ๐ธ Hillary Coover, Washington, DCUS voting machine companies are collaborating with cybersecurity experts to conduct additional stress tests on their systems in preparation for the 2024 election and to counter misinformation. Three major voting equipment manufacturers allowed a group of verified cybersecurity researchers access to their software and hardware for nearly two days.
GoLang Flaw in go.mod directive๐บ๐ธ Tracy (Trac) Bannon, Camp Hill, Pennsylvania Golang introduced a new cool feature called the go.mod directive in Go version 1.21. โUnfortunately, the bad guys can exploit this. too. โAccording to the 2021 Go Developer Survey, there are approximately 2. 7 million developers who use Golang. That's a pretty nice-sized attack surface.
The First Perfect Reproducible Toolchain Shadowed By Critical Vulnerabilities๐ท๐ด Olimpiu Pop, Transylvania, RomaniaThe libraries we use in our projects are used in their binary format. Yes, even open source ones. That means that the open part in the open source is not fully used, as the code is not inspected. Given the growing number of supply chain attacks, we need a solution for it. Reproducible builds will guarantee that what you have is actually what you wanted.