Artwork for podcast It's 5:05! Daily cybersecurity and open source briefing
Episode #235: Pizza Hut Australia Data Breach; Future of Autonomous Defense Systems; Unmasking Election Security; GoLang Flaw in go.mod directive; First Perfect Reproducible Toolchain Shadowed By Critical Vulnerabilities
Episode 23522nd September 2023 • It's 5:05! Daily cybersecurity and open source briefing • Contributors from Around the World
00:00:00 00:12:20

Shownotes

🎙️ Free access to 230+ episodes of “It’s 5:05!” on your favorite podcast platforms: bit.ly/505-updates ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value. 📌

Pizza Hut Australia Suffers Data Breach

🇦🇺 Edwin Kwan - Sydney, Australia

 Pizza Hut Australia notified 193, 000 customers that the company had suffered a data breach. That information included full name, delivery address, delivery instructions, email address, phone number, mass credit card data, and encrypted passwords for online accounts.

DOD’s Replicator: Future of Autonomous Defense Systems

🇺🇸 Katy Craig - San Diego, California

Deputy Secretary of Defense Kathleen Hicks has just unveiled a vision called Replicator that's all about scale and efficiency. Replicator isn't just about mass-producing these systems, it's about creating a blueprint for future scalability.

Unmasking Election Security

🇺🇸 Hillary Coover, Washington, DC

US voting machine companies are collaborating with cybersecurity experts to conduct additional stress tests on their systems in preparation for the 2024 election and to counter misinformation. Three major voting equipment manufacturers allowed a group of verified cybersecurity researchers access to their software and hardware for nearly two days.


GoLang Flaw in go.mod directive

🇺🇸 Tracy (Trac) Bannon, Camp Hill, Pennsylvania

Golang introduced a new cool feature called the go.mod directive in Go version 1.21.  Unfortunately, the bad guys can exploit this. too.  According to the 2021 Go Developer Survey, there are approximately 2. 7 million developers who use Golang. That's a pretty nice-sized attack surface.


The First Perfect Reproducible Toolchain Shadowed By Critical Vulnerabilities

🇷🇴 Olimpiu Pop, Transylvania, Romania

The libraries we use in our projects are used in their binary format. Yes, even open source ones. That means that the open part in the open source is not fully used, as the code is not inspected. Given the growing number of supply chain attacks, we need a solution for it. Reproducible builds will guarantee that what you have is actually what you wanted.


Chapters

Video

More from YouTube