Episode #235: Pizza Hut Australia Data Breach; Future of Autonomous Defense Systems; Unmasking Election Security; GoLang Flaw in go.mod directive; First Perfect Reproducible Toolchain Shadowed By Critical Vulnerabilities

0 рд╡рд┐рдЪрд╛рд░реЛрдВ┬╖ 09/22/23
It's 5:05!
It's 5:05!
0 рдЧреНрд░рд╛рд╣рдХреЛрдВ
0
рдореЗрдВ

ЁЯОЩя╕П Free access to 230+ episodes of “It’s 5:05!” on your favorite podcast platforms: bit.ly/505-updates тЩ╗я╕П You’re welcome to ЁЭЧ┐ЁЭЧ▓ЁЭЧ╜ЁЭЧ╝ЁЭШАЁЭШБ if your followers will find this of value. ЁЯУМPizza Hut Australia Suffers Data BreachЁЯЗжЁЯЗ║ Edwin Kwan - Sydney, AustraliaтАКPizza Hut Australia notified 193, 000 customers that the company had suffered a data breach. That information included full name, delivery address, delivery instructions, email address, phone number, mass credit card data, and encrypted passwords for online accounts. DOD’s Replicator: Future of Autonomous Defense SystemsЁЯЗ║ЁЯЗ╕ Katy Craig - San Diego, California Deputy Secretary of Defense Kathleen Hicks has just unveiled a vision called Replicator that's all about scale and efficiency. Replicator isn't just about mass-producing these systems, it's about creating a blueprint for future scalability.
Unmasking Election SecurityЁЯЗ║ЁЯЗ╕ Hillary Coover, Washington, DCUS voting machine companies are collaborating with cybersecurity experts to conduct additional stress tests on their systems in preparation for the 2024 election and to counter misinformation. Three major voting equipment manufacturers allowed a group of verified cybersecurity researchers access to their software and hardware for nearly two days.
GoLang Flaw in go.mod directiveЁЯЗ║ЁЯЗ╕ Tracy (Trac) Bannon, Camp Hill, Pennsylvania Golang introduced a new cool feature called the go.mod directive in Go version 1.21. тАКUnfortunately, the bad guys can exploit this. too. тАКAccording to the 2021 Go Developer Survey, there are approximately 2. 7 million developers who use Golang. That's a pretty nice-sized attack surface.
The First Perfect Reproducible Toolchain Shadowed By Critical VulnerabilitiesЁЯЗ╖ЁЯЗ┤ Olimpiu Pop, Transylvania, RomaniaThe libraries we use in our projects are used in their binary format. Yes, even open source ones. That means that the open part in the open source is not fully used, as the code is not inspected. Given the growing number of supply chain attacks, we need a solution for it. Reproducible builds will guarantee that what you have is actually what you wanted.

рдФрд░ рджрд┐рдЦрд╛рдУ

 0 рдЯрд┐рдкреНрдкрдгрд┐рдпрд╛рдБ sort   рдЗрд╕рдХреЗ рдЕрдиреБрд╕рд╛рд░ рдХреНрд░рдордмрджреНрдз рдХрд░реЗрдВ


рдЕрдЧрд▓рд╛