Samurai Security

  • AI & Quantum Computing | 404 | Ep. 3
    by Dr David Day on May 17, 2024 at 7:50 pm

    Episode Summary Current Applications of AI in Cybersecurity: Challenges with Unstructured Data: Potential of Quantum Computing: Quantum Speed-Up: Threats and Defence: AI and Quantum Computing in Offensive Cybersecurity: Future Implications and Ethical Considerations: AI Training and Human Supervision: Conclusion: The episode concludes with reflections on the rapid advancements in AI and Quantum Computing, their potential The post AI & Quantum Computing | 404 | Ep. 3 appeared first on Samurai security.

  • The Impact of Quantum Computing on Cybersecurity | 404 | Ep. 2
    by Dr David Day on May 9, 2024 at 1:19 pm

    Episode Summary Introduction to Quantum Computing: Current State and Challenges: Superposition and Entanglement: Impact on Cryptography: Quantum Supremacy: Potential Risks and Ethical Considerations: Future Directions and Speculations: Conclusion: The episode provides an in-depth exploration of the current state, challenges, and future potential of quantum computing in cybersecurity. It underscores the importance of understanding and preparing The post The Impact of Quantum Computing on Cybersecurity | 404 | Ep. 2 appeared first on Samurai security.

  • AI & Cybersecurity | 404 | Ep. 1
    by Dr David Day on May 1, 2024 at 2:32 pm

    Summarised Transcript Simran Basra: Welcome, everyone. Thanks for tuning in. I’m Simran Basra, and today we’re joined by the infamous Dr David Day. Dr. David Day: Hey! Simran Basra: Today, we’re discussing how artificial intelligence, particularly machine learning, is challenging the face of the cybersecurity world. Can you explain how attacks are using AI to The post AI & Cybersecurity | 404 | Ep. 1 appeared first on Samurai security.

  • IoT Developers Are Making It Easy For Hackers 
    by Samurai Brad on April 18, 2024 at 3:06 pm

    The Persistent Security Gaps In IoT Evolution It’s no secret that IoT devices have become a fundamental part of our daily lives. Whether it’s the VoIP and AoIP systems that connect our calls, to the medical devices responsible for monitoring our health, to the industrial IoT (IIoT) machinery in factories, or the smart home systems The post IoT Developers Are Making It Easy For Hackers  appeared first on Samurai security.

  • The Dark Web’s Effect on Children: BBC Interview with Dr. David Day
    by Toby Devonshire on March 18, 2024 at 4:55 pm

    The internet impacts every aspect of our lives, and the dark web hosts content that is not only disturbing but also harmful, especially to the young and vulnerable minds of children. In a revealing conversation with BBC Radio 5, our CEO, Dr David Day, sheds light on the dark web, its impact on children, and The post The Dark Web’s Effect on Children: BBC Interview with Dr. David Day appeared first on Samurai security.

  • Exploring the World of IoT Hacking
    by Momen Eldawakhly on March 7, 2024 at 2:42 pm

    When we talk about “IoT Hacking,” many people think about taking apart gadgets, figuring out how they work, and looking into their software. But there’s more to IoT hacking than just these technical challenges. Our research into cybersecurity threats show us a hidden world of digital battles. Groups of hackers are focusing more and more The post Exploring the World of IoT Hacking appeared first on Samurai security.

  • Why Social Engineering is So Effective in 2024
    by Dr David Day on January 2, 2024 at 2:46 pm

    As technology continues to evolve and the rise of artificial intelligence continues to gain traction, social engineering is increasingly becoming more effective as a method of exploitation used by cybercriminals. Using progressively sophisticated methods, criminals use social engineering to mislead people into breaking security practices and accidentally leak information that can pose a serious vulnerability The post Why Social Engineering is So Effective in 2024 appeared first on Samurai security.

  • Red Teaming: 0x01 Click RCE via VoIP USB
    by Momen Eldawakhly on March 21, 2023 at 3:24 pm

    Disclaimer Have you ever wondered how seemingly innocent, everyday tools can be transformed into powerful hacking devices for use in cybersecurity engagements and adversary simulations? In today’s rapidly evolving digital world, exploring these possibilities is crucial to stay ahead of potential threats. In this research, we’ll delve into the fascinating process of turning a mundane The post Red Teaming: 0x01 Click RCE via VoIP USB appeared first on Samurai security.

  • Red Teaming: Exfiltrating Data & Command Network Nodes (Like a Ghost!) 
    by Momen Eldawakhly on February 2, 2023 at 8:14 am

    Caution:   Before we start, it’s important to note that the activities in this research have been conducted in our own testing and researching environment, locally and in the cloud, for research purposes against assets that we fully own. Any unauthorised use of these techniques in tests or engagements is strictly prohibited and illegal, and Samurai The post Red Teaming: Exfiltrating Data & Command Network Nodes (Like a Ghost!)  appeared first on Samurai security.

  • Dishing – Social Engineering with Deepfake
    by Dr David Day on August 3, 2022 at 2:53 pm

    In 1997, Bregler, Michele, and Slaney wrote a paper about a genuinely innovative and, at the time, unique piece of software. Essentially it automated what some production studios could do only with hours upon hours of manual work, the Video Rewrite Program. It tied these together by building upon older work that created realistic audio The post Dishing – Social Engineering with Deepfake appeared first on Samurai security.

Share Websitecyber