Home

Contact

Contact me at:

rod@rodsoto.net

Media

Sample of media quotes & appearances

Why Deepfake Audio Technology Is a Real Threat to Enterprise Security – IBM Security Intelligence

Forbes: The Mobile Network Of The Future: What You Need To Know About Cybersecurity

IBM Security Intelligence. The US Is Slow to Adopt EHRs, But That Might Actually Be a Good Thing for Healthcare Security

Dark Reading

Shellbot Crimeware Re-Emerges in Monero Mining Campaign

ZDNET

Outlaw Shellbot infects Linux servers to mine for Monero

Fox News

Super Bowl LIII fans will be targeted by hackers both at the game and while watching on TV, experts say

New York Post

Super Bowl Sunday is a hotbed for hackers, security experts warn

SC Magazine

Unsecured MongoDB exposes 200M records of Chinese job seekers

RF Globalnet

The Week In 5G: 12/28/2018 – North American Telcos Predicted To Hold Largest Slice Of Global 5G Market, White House Considers Executive Order Banning Huawei

IBM Security Intelligence

Is 5G Technology a Blessing or a Curse for Security? Depends Who You Ask

CSO Online

What is the cyber kill chain? Why it’s not always the right approach to cyber attacks

City College of San Francisco, CA

CNIT 152 – Incident Response, October 22, 2018 Lecture

Vice

The Hot New Millennial Trend Is Scamming Amazon for Big Money

Silicon Angle

Kodi add-ons found to contain Windows and Linux crypto mining malware

West Virginia blockchain-based mobile voting raises security concerns

Mac security vulnerability via outside apps opened the door to hacking

IBM Security Intelligence

Fight Fire With Fire: How AI Plays a Role in Both Stopping and Committing DDoS Attacks

Legal AI: How Machine Learning Is Aiding — and Concerning — Law Practitioners

Forbes

Hacker Implants NFC Chip In His Hand To Bypass Security Scans And Exploit Android Phones

Forbes China

American Banker

DDoS Attacks Are Still Happening — and Getting Bigger

Dark reading

Millions Of Android Phones In China Have Backdoor

Security Magazine

Monero miner found in third-party Kodi add-ons for Linux and Windows

Bluetooth vulnerability could allow man in the middle attacks

Open AWS S3 bucket exposes private info on thousands of Fedex customers

Rolling Stone Magazine

Geeks on the frontlines – 

CBS

You’ve been hacked – WiFi hacking report

BBC

The man who hacks phones with an implant under his skin

Infosecurity Magazine

Bad Rabbit Ransomware Spreads In Russia, Ukraine

CSO Online

DDoS explained: How distributed denial of service attacks are evolving

Network World

RSA 2017: The Internet of Things security threat

Gizmodo

Eweek

Jask’s Chiron Brings AI Threat Detection to Home Networks

Akamai Warns of Reflection DDoS Attacks Using Millions of UPnP Devices

En espanol

Voice of America (VOA)  

VOA 2019

Univision

Univision – Depredadores Sexuales Apps Populares Espanol 2019

Telemundo

CNN Espanol

Agencia EFE

Chicago Tribune

United Kingdom

Security Magazine UK

Crisis in the SOC as skills shortage bites deep, says report

Can AI smarts replace humans in the Security Operations Centre?

Computer Weekly UK

TechZone360 UK

Portuguese

EBC Agencia Brazil –

Globo

French

Society Magazine

Italian

ZeroUno

Norway

Netherlands

Research

Sample of my present & past research publications & presentations

Bsides SFO 2019 – Profiling “VIP Accounts” Access Patterns in User-Centric Data Streams

Art Into Science Conference (AcoD) Austin – Ops track 01/30/19 – Profiling “VIP Accounts” Access Patterns – Rod Soto, Joseph Zadeh, Xioadan Li

Shellbot Crimeware Re-Emerges in Monero Mining Campaign (Dark Reading)

BSides Las Vegas 2018 – I am the cavalry

IATC – Cavalry is ALL OF US – Joshua Corman, Beau Woods, Rod Soto, Travis Moore & Heath Wickline

DEFCON XXVI – Defcon Demo Labs – Chiron

Black Hat Arsenal USA 2018 – Chiron

Identiverse 2018  – SMS Vulnerabilities in Identity Management

SAMBA Protocol Vulnerabilities Threat Advisory – 2018 – JASK

Domain Impersonation / IDN Campaigns TA – 2018 – JASK

DerbyCon 2017 – Chiron Home based ML IDS with Joseph Zadeh

Black Hat EU 2016 – Splunk 

Hackmiami Conference 2017 – Detection of webshells in compromised perimeter assets using ML algorithms

RSA Conference 2017 – Automated Prevention of Ransomware with Machine Learning and GPOs

DEFCON 2016 – Packet Hacking Village Dynamic Population discovery for Lateral Movement Detection

Hackmiami Conference 2015 – Biohacking – Implantable chip attack vector Demo video

Aktaion – Signatureless Threat Detection. Open source ML tool for ransomware detection

The Lambda Defense: Functional Paradigms of Defense for Cybersecurity

BSides Orlando 2014 – Civilianization of War, paramilitarization of cyberspace and its implications for infosec pros

AKAMAI State of The Internet Q4-2014

DDoS attacks against global markets PLXSert – White Paper

Yummba web injects AKAMAI/PLXSert

Zeus Crimeware kit PLXSert