Firmware, Mainframes, Security and Risk – PSW #806
Do people still use mainframes? IoT and firmware security, Apple Find my, Bluetooth is the gift that keeps on giving, to hackers that is, and more!
Announcements
Follow us on LinkedIn for updates across our organization, show highlights, and more! You can find us by searching for Security Weekly Productions.
Hosts

Paul Asadoorian
Founder at Security Weekly
- 1. Disclaimer!
- 2. Software Complexity Bedevils Mainframe Security
- 3. Flash Programmer Shows Some Nifty Tricks
- 4. FujiFilm printer credentials encryption issue fixed
- 5. nneonneo/ghidra-rickroll: Get rickrolled, right in your favourite NSA reverse engineering tool
- 6. RCE exploit for Wyze Cam v3 publicly released, patch now
- 7. Only One Hacker At The Keyboard? Amateurs!
- 8. CVE-2023-46604
- 9. Hardware Hacking P2
- 10. Common Vulnerability Scoring System
- 11. Release EMBA v1.3.1 – Diff it · e-m-b-a/emba
- 12. Keylogger keyboard leaks passwords via Apple’s “Find My” location network
- 13. Looney Tunables Vulnerability Exploited by Kinsing
- 14. Kinsing Actors Exploiting Recent Linux Flaw to Breach Cloud Environments

Bill Brenner
Senior Vice President, Audience Content Strategy at CyberRisk Alliance

Larry Pesce
Product Security Research and Analysis Director at Finite State
- 1. North Korea’s BlueNoroff APT Debuts ‘Dumbed Down’ macOS Malware
- 2. Open Wounds: The last 5 years have left Bluetooth to bleed
- 3. Apple ‘Find My’ network can be abused to steal keylogged passwords
- 4. ‘Untouchable’: Associates React to Arrest of Drug Trafficker Turned ‘Encryption King’
- 5. Unveiling Socks5Systemz: The Rise of a New Proxy Service via PrivateLoader and Amadey
- 6. Bypassing Android 13 Restrictions with SecuriDropper
- 7. QNAP warns of critical command injection flaws in QTS OS, apps
- 8. Two Russians indicted for hacking JFK taxi dispatch system
- 9. Google Warns How Hackers Could Abuse Calendar Service as a Covert C2 Channel