October 8, 2019 – HNN #237

This week, Signal rushes to patch serious eavesdropping vulnerability, Wi-Fi signal let researchers ID people through walls from their gait, the FBI warns about attacks that bypass MFA, Vulnerable Twitter API leaves tens of thousands of iOS apps open to attacks, and D-Link home routers open to remote takeover will remain unpatched! In the expert commentary, we welcome Justin Elze from TrustedSec, to talk about Red Teaming and Adversary Emulation!

To learn more about TrustedSec, visit: https://securityweekly.com/trustedsec

Full episode and show notes


Justin Elze
Justin Elze
Adversary Emulation and Threat Research Practice Lead at TrustedSec

Justin Elze is the Adversary Emulation and Threat Research Practice Lead at TrustedSec. In his current position, he leads the adversary emulation team in offensive operations against clients simulating full scope attacks. He also works with the research team developing TTPs to circumvent modern security controls facilitating successful operations during engagements. Before TrustedSec Justin worked for Accuvant(Optiv), FusionX, SecureWorks and RedSpin in various offensive security consulting roles. Justin took part in the original Tribe of Hackers book as well as Tribe of Hackers Red Team edition. Outside of his professional career he enjoys automotive performance and drag racing.


Paul Asadoorian
Paul Asadoorian
Founder at Security Weekly
prestitial ad