Remove 07
Remove 2017 Remove Data Remove Document Remove Education
article thumbnail

The CyberWire Daily Podcast EP. 389 With Guest Speaker David Brumley

ForAllSecure

The company's website was defaced with a leering Yoba face, and the attackers claimed to have stolen some 7 1/2 terabytes of data. Department of Education warned that there had been active and ongoing exploitation of the Ellucian Banner system. Dave Bittner: [00:07:05] And so how is that going?

Cloud 52
article thumbnail

The CyberWire Daily Podcast EP. 389 With Guest Speaker David Brumley

ForAllSecure

The company's website was defaced with a leering Yoba face, and the attackers claimed to have stolen some 7 1/2 terabytes of data. Department of Education warned that there had been active and ongoing exploitation of the Ellucian Banner system. Dave Bittner: [00:07:05] And so how is that going?

Cloud 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

THE CYBERWIRE DAILY PODCAST EP. 389 WITH GUEST SPEAKER DAVID BRUMLEY

ForAllSecure

The company's website was defaced with a leering Yoba face, and the attackers claimed to have stolen some 7 1/2 terabytes of data. Department of Education warned that there had been active and ongoing exploitation of the Ellucian Banner system. Dave Bittner: [00:07:05] And so how is that going?

Cloud 40
article thumbnail

Open Source Security Podcast EP. 151 - The DARPA Cyber Grand Challenge With David Brumley

ForAllSecure

David Brumley : 07:17 What the machine did is, it ingested program binaries, meaning we didn't have source code. David Brumley : 07:46 Then, they fixed the vulnerability. Even if you have a vulnerability and a patch, you make a business decision on whether to field it, based upon data. Kurt Seifried : 16:07 Right.

article thumbnail

Open Source Security Podcast EP. 151 - The DARPA Cyber Grand Challenge With David Brumley

ForAllSecure

David Brumley : 07:17 What the machine did is, it ingested program binaries, meaning we didn't have source code. David Brumley : 07:46 Then, they fixed the vulnerability. Even if you have a vulnerability and a patch, you make a business decision on whether to field it, based upon data. Kurt Seifried : 16:07 Right.

article thumbnail

OPEN SOURCE SECURITY PODCAST EP. 151-- THE DARPA CYBER GRAND CHALLENGE WITH DAVID BRUMLEY

ForAllSecure

David Brumley : 07:17 What the machine did is, it ingested program binaries, meaning we didn't have source code. David Brumley : 07:46 Then, they fixed the vulnerability. Even if you have a vulnerability and a patch, you make a business decision on whether to field it, based upon data. Kurt Seifried : 16:07 Right.