Jeff Moss shares some of history of DEF CON, from CFPs to Codes of Conduct, and what makes it a hacker conference. We also discuss the role of hackers and researchers in representing users within policy discussions.
Microsoft turns to a weather-based taxonomy, k8s shares a security audit, a GhostToken that can't be exorcised from Google accounts, BrokenSesame RCE, typos and security, generative AI and security that's more than prompt injection
Podden och tillhörande omslagsbild på den här sidan tillhör
Security Weekly Productions. Innehållet i podden är skapat av Security Weekly Productions och inte av,
eller tillsammans med, Poddtoppen.