Below is a detailed summary of the episode “DEF CON RECAP – 2025-08-11” of Talkin’ About [Infosec] News, hosted by Black Hills Information Security. The episode weaves together personal career updates, commentary on pop culture (including a tongue-in-cheek take on a new War of the Worlds movie), reviews of emerging vulnerabilities, coverage of recent breaches, and lively discussions about the evolving roles of artificial intelligence and social engineering in the infosec world. The hosts share humorous banter and deep technical insights while discussing news from DEF CON, bug bounty trends, telephone and car security, as well as AI’s impact on vulnerability research.
──────────────────────────────
- Career Changes & Light-Hearted Banter ────────────────────────────── • [00:01–00:21] Speaker A jokes about leaving a security practitioner role to return to the forest service—“waiting through logs” takes on a punny double meaning.
- Notable Quote [00:01, Speaker A]: “You're gonna lose … I'm gonna go back to the forest service and just do logging, but in a different format.” • Friends chime in with commentary about personal style (e.g., the fate of Speaker A’s mustache) and conspiracies of job titles (a nod to a meme about a “director of chickens”), highlighting their laid-back approach.
────────────────────────────── 2. The "War of the Worlds" Cybersecurity Parody ────────────────────────────── • [02:28–03:00] The hosts turn their conversation to a new War of the Worlds movie featuring Ice Cube in a cyber-security-flavored narrative:
- Speaker A describes the movie’s concept as a “cyber security guy” using Teams calls to track aliens, joking about its resemblance to modern OSINT and vulnerability tracking.
- Speaker B quips about the film’s reception—inexplicably topping Amazon viewership charts despite a 3% Rotten Tomatoes rating. • The friendly mockery underscores how pop culture parodies can mirror real cybersecurity practices (like monitoring and alerting), while also revealing the audience’s appetite for self-referential humor.
────────────────────────────── 3. In-Depth Vulnerability & Breach Discussions ────────────────────────────── A major portion of the episode focuses on technical vulnerabilities and breach news from the field:
• HTTP/1.1 Desync & Request Smuggling
- [04:03–04:20] Discussion on PortSwigger’s website (http1mustdie.com) and James Ketto’s research: • Speaker B explains that a desync vulnerability in HTTP/1.1 is still a threat—even against supposedly secure systems like those behind Cloudflare. • Speaker A comments, “My first thought is like, oh yeah, WAF should be able to take care of this...,” noting the limitations of some WAFs which may inadvertently introduce desync issues.
- Bullet Point:
▸ Critical vulnerability details include mismanaged HTTP versions and a potential impact on pen testers’ future reports.
▸ A new Burp add-on has been released to help identify this problem.
• Federal Judiciary Filing System Breach
- [18:04–19:07] The conversation shifts to the PACER network breach affecting federal court filing and case management systems.
• Speaker B warns that leaked confidential files—including discovery documents and internal case details—could leave judiciary processes exposed. • Speaker F adds concerns about the potential exposure of confidential informants.
• SaaS Provider & Social Engineering Attacks
- [20:53–22:50] Brief coverage touches on incidents involving Salesforce and a note about Google’s public threat intelligence report regarding vishing-targeted SaaS providers.
- The discussion highlights how CRM platforms, though containing ostensibly basic customer data like names and emails, can still be harmful when breached.
────────────────────────────── 4. DEF CON, Conferences, and Shifts in Social Engineering ────────────────────────────── • DEF CON Experience and Changing Dynamics
- [06:41–07:40] The hosts recount their experiences at Hacker Summer Camp and DEF CON: • Speaker B describes “crashing some parties” in Vegas, while others note that DEF CON feels “more chill” and less chaotic than in previous years. • Shifting Landscape of Phone-Based Attacks
- [24:08–26:43] A spirited discussion covers how social engineering via telephone still works despite modern tendencies to ignore unknown calls: • Speaker A states his practice: “I never pick up my phone… I just send everyone to voicemail.” • Speaker B brings up vishing on platforms like Teams, implying that even though most people won’t answer personal phones, work numbers remain vulnerable.
- Bullet Point:
▸ AI-powered call screening (iOS26 and existing Android solutions) is on the horizon, potentially reducing successful phishing attempts—but work numbers remain an issue.
────────────────────────────── 5. Automotive & IoT Security Concerns ────────────────────────────── • Car Hacking & Flipper Device Vulnerabilities
- [39:00–41:22] The conversation veers toward automotive security:
• Speaker A jokes about using his Flipper to hack his garage, then transitions to discussing new firmware allowing bypassing of rolling codes on several mainstream car brands (Chrysler, Dodge, Fiat, etc.).
• Speaker F humorously warns, “now your regular key fob doesn’t work anymore,” while speaker B notes that the cyberpunk nature of using a Flipper as your key is simultaneously cool and concerning. • Additional Banter on Modern Chop Shops - They speculate that modern chop shops might evolve to include giant Faraday cages to defeat real-time tracking systems, highlighting the unintended consequences of modern vehicle connectivity.
────────────────────────────── 6. AI in Bug Bounty Hunting & Generative AI Vulnerabilities ────────────────────────────── • AI-Powered Bug Bounty Platforms
- [32:29–33:13] The hosts discuss how automated systems and AI tools—such as Google’s AI-powered bug bounty hunter—are beginning to transform vulnerability research and remediation processes.
- Speaker B highlights the competitive edge that pre-emptive adoption of AI provides, and humorously notes that “if you’re a bug bounty hunter and you’re not using AI, you’re doing it wrong.” • AI Misclassification & Legal Pone Attack
- [49:34–51:13] Another segment critiques generative AI’s role in security reviews: • Speaker B humorously describes an attack where malicious code is hidden within legal disclaimers to fool AI into misclassifying malware as safe. • Speaker A notes the irony by sharing that Microsoft is launching “Project IRE” (a tongue-in-cheek nod about using AI to classify vulnerabilities), and recounts his own attempts to have ChatGPT incorporate copyrighted lyrics—only to have the tool refuse.
- Bullet Point:
▸ The conversation underscores the challenges of AI reliability, including false positives and hallucinated vulnerabilities, while also acknowledging that not using AI is no longer an option in modern research.
────────────────────────────── 7. Final Thoughts & Wrap-Up ────────────────────────────── • Late in the episode [52:47–58:09], the discussion turns to miscellaneous vulnerability news including:
- A Dell firmware vulnerability urging users to patch their systems, with humorous commentary about the fate of employees who use Dell versus ThinkPads.
- Reflections on whether reduced tourism or changes in conference culture are affecting attendance at events like DEF CON and Wild West Hack Infest. • The hosts share parting insights with a mix of humor and pragmatic advice:
- Speaker B wraps up by noting the irony and persistence of certain attack vectors, while Speaker A remarks how even AI can “tell on you” by exposing usage details—reminding listeners to review URLs and sources carefully.
────────────────────────────── Notable Quotes & Timestamps ────────────────────────────── • [00:01, Speaker A]: “You're gonna lose… I'm gonna go back to the forest service and just do logging, but in a different format.” • [02:33, Speaker A]: “It’s literally War of the Worlds but it's just as if this dude on a monitor is the way you're viewing it. Like, it's horrible.” • [04:03, Speaker B]: “It’s number three right now on Amazon’s in the U.S. all right, 3% on Rotten Tomatoes.” • [11:12, Speaker A]: “My first thought is like, oh yeah, WAF should be able to take care of this …” • [24:08, Speaker A]: “I never pick up my phone… I just send everyone to voicemail.” • [35:55, Speaker B]: “I said it at the beginning of the AI hype cycle. AI is not replacing anyone's job, but people who can use AI will replace people who refuse to use AI.” • [41:05, Speaker A]: “Thank you. For reminding me that I am no longer going to go downstairs and try to hack my Subaru just because of that.” • [51:02, Speaker A]: “Microsoft launches Project IRE to autonomously classify AI using AI tools.” (a playful jab at current trends)
────────────────────────────── Conclusion ────────────────────────────── The episode blends humor with serious analysis as the hosts discuss everything from career musings and cinematic cyber absurdities to deep dives into vulnerabilities affecting HTTP protocols, judiciary filing systems, and automotive security. They also explore how AI is reshaping bug bounty hunting and threat analysis—even poking fun at copyright limitations. Listeners are left with an engaging mix of technical insight, industry updates, and self-deprecating humor typical of Black Hills Information Security.
This summary should serve as a comprehensive guide for those who haven't listened, capturing the key discussion points, technical insights, and memorable moments peppered throughout this wide-ranging and lively broadcast.
![DEF CON RECAP – 2025-08-11 - Talkin' Bout [Infosec] News cover](/_next/image?url=https%3A%2F%2Fassets.blubrry.com%2Fcoverart%2Forig%2F577207-646458.jpg&w=1200&q=75)