Application Security Weekly #32
Recorded September 17th, 2018 at G-Unit Studios in Rhode Island!
- Check out our On-Demand material! Some of our previously recorded webcasts are now available On-Demand at: securityweekly.com/ondemand.
- DerbyCon is holding its first-ever Mental Health & Wellness Workshop - to help support their efforts, please go to DerbyCon.com/wellness
- Join us for our Webcast with LogRhythm about "Tips & Tricks for Defending the Enterprise Using Open Source Tools". The webcast will be held September 27 @3:00PM EST!
Interview: April Wright, ArchitectSecurity.org
April C. Wright is a hacker, author, teacher, and community leader with over 25 years of breaking, making, fixing, and defending global critical communications and connections. She is an international speaker and trainer, educating others about personal privacy and information security with the goal of safeguarding the digital components we rely on every day. A security specialist for a Fortune 15 company, April has held roles on offensive, defensive, operational, and development teams throughout her career, and been a speaker, trainer, and contributor at numerous security conferences including BlackHat, DEF CON, DerbyCon, Hack in Paris, DefCamp Romania, ITWeb South Africa, as well as for the US Government and industry organizations such as OWASP and ISSA. She has started multiple small businesses including a non-profit, is a member of the DEF CON Groups Core Team, and in 2017 she co-founded the Boston DEF CON Group DC617. April has collected dozens of certifications to add letters at the end of her name, almost died in Dracula’s secret staircase, and once read on ‘teh interwebs’ that researchers at the University of North Carolina released a comprehensive report in 2014 confirming that she is the “most significant and interesting person currently inhabiting the earth”, and even hough it was in The Onion, it was on the internet, so it must be true.
Bugs, Breaches, and More!
1.) Alpine Linux hit with bug that can lead to Poisoned Containers
2.) Safari flaw in iOS Leads to Forced Restart via CSS
3.) Global Warming and Impacts on Cloud Computing
If you Build It, They Will Come
1.) West Virginia to introduce Mobile Phone Voting for Midterm Elections
2.) Data Breaches Affect Stock Performance in the Long Run
3.) Netflix Cloud Security: Detecing Credential Compromise in AWS
Learning & Tools
1.) Hacker Pixel - Open Source Tool to Track Anything
2.) Bluebox-ng, a Node.js VoIP Pentesting Framework
3.) Raccoon - A High Performance Recon & Vulnerability Scanning Tool
Food for Thought
1.) DevOps Demystified: A Primer for Security Practitioners
2.) Silicon Valley's lead over other Tech Hubs is Narrowing
3.) CommitStrip: It's Not an App