From Paul's Security Weekly
Recorded March 28, 2019 at G-Unit Studios in Rhode Island!
- We just released our 2019 Security Weekly 25 Index Survey. Please go to securityweekly.com and click the Survey link to help us understand who's evaluating, using, or formerly used any of the Security Weekly 25 companies. The results will be summarized and presented back to all responders in a private webcast.
Interview: Mary Beth Borgwing, Cyber Social Club - 6:00-6:30PM
Mary Beth worked in the technology and security sector in Boston, New York and DC, with companies launching new products to the tech and security market as well as companies such as MarshMMC, looking to understand cyber security and complex enterprise risk management. Her time in the insurance industry along with serving as an executive in tech companies is important today as companies look to understand cyber risk management and how it affects it workforce and bottom line.
Tech Segment: Threat Hunting & AI Hunter, Active Countermeasures - 6:30 - 7:30PMhttps://www.honeynet.org/), and an active contributor to the PCI special interest group responsible for the standards for credit card processing in public cloud environments (https://www.pcisecuritystandards.org/pdfs/pr_130205_Cloud_SIG.pdf). I’ve also developed security training, including complete courses for SANS where I served as a Fellow Instructor (https://www.sans.edu/bios/chris-brenton), and for the Cloud Security Alliance where I authored and presented all of their online training material (https://cloudsecurityalliance.org/education/white-papers-and-educational-material/courseware/). I currently run the day to day operations at Active Countermeasures (https://www.activecountermeasures.com/), where we provide inexpensive tools that that simplify the process of threat hunting your network.
In this tech talk, Chris will discuss why threat hunting is the missing link between our protection tools and our response tools. He'll then go hands on with AI-Hunter, to show how the tool can be used to identify command and control channels.
Slides: File:AI Hunter.pdf - **To open slides**: Click the link and then click the Adobe PDF Icon.
Security News - 7:30PM-8:30PM
- Algorithms can now find bugs in computer chips before they are made - Help Net Security
- Advanced Breach Protection Demystified Untold Truths On Security Beyond AV
- Quantum Computing and Code-Breaking
- Operation SaboTor Police arrested 61 vendors and buyers in the dark web
- Grindr Poses National Security Risk, U.S. Gov Says
- Everything I Needed to Know About Third-Party Risk Management, I Learned from Meet the Parents
- Microsoft Tackles IoT Security with New Azure Updates
- New Shodan Monitor service allows tracking Internet-Exposed devices
- Ex-NSA Contractor Set to Plead Guilty for Theft of top Secret Information
- Shmoocon Friedman Tombstone Talk
- Attackers exploiting IMAP to bypass MFA on O365 and G-Suite accounts Legacy access, IMAP, POP, SMTP are not protected by MFA and are default enabled result in a successful vector for password spraying attacks.
- Vietnam's OceanLotus Group Ramps up hacking car companies APT23 (aka OceanLotus) is aggressively targeting multinational auto manufacturers to get trace secrets and other sensitive information to augment their vehicle production capabilities.
- UC Browser violates Google Play Store Rules The very popular UC Mobile browser allows downloading executable content from the parent companies servers, bypassing the Google Play Store servers and update/vetting mechanisms.
- Russia is spoofing GPS Signals on a massive scale GPS Spoofing and jamming is purportedly to protect locations of sensitive people. The US Coast guard received 63 reports in 2018, and while the source is largely unexplained, as attribution is very difficult, C4ADS claims this impacted 1311 commercial ships in Russian waters since 2016.
- Pre-Installed Android Apps Face Little Oversight OEM installed Android Apps may have extra permissions and access to personal data, versus installing them after the fact. Which can result in benign/unrecognized data gathering.
- 61% of CIO's believe employees leak data maliciously Employees think they don't, IT leadership thinks they do. Root causes for intentional sharing include not having the needed collaboration tools. Unintended sharing comes from phishing and uneducated or uninformed workers. Unauthorized sharing also due to being rushed, stress, and tired workers.
- Apple releases multiple security updates Apple releases 51 iOS fixes, privilege escalation flaws in Windows products, Safari updates to stop arbitrary code execution, macOS updates focus on privilege escallation and kernal access flaws.
- Huawei gear with epic flaws
- Cisco Systems issued 24 patches Wednesday tied to vulnerabilities in its IOS XE operating system and warned customers that two small business routers (RV320 and RV325) are vulnerable to attack and that no patches are available for either. A total of 19 of the bugs were rated high severity by Cisco, with the others rated medium.
- Unsealed court documents reveal the work of Microsoft’s Digital Crimes Unit (DCU) in targeting the Tehran-linked APT35 group, also known as Charming Kitten and Phosphorous
- DLA Piper has become the latest big name to be denied a multimillion-dollar cyber insurance claim following major losses caused by the NotPetya
- Huawei bungled its response to warnings from an ISP's code review team about a security vulnerability common across its home routers – patching only a subset of the devices rather than all of its products that used the flawed firmware.
- Office Depot and Support.com have coughed up $35m after they were accused of lying to people that their PCs were infected with malware in order to charge them cleanup fees
- Microsoft is claiming its attempts at disrupting a well-known Iranian state-sponsored APT group have had a “significant impact.”
- Security researchers have come across a waterholing campaign that have compromised four South Korean websites by injecting fake login forms to steal user credentials.