From Paul's Security Weekly
Jump to: navigation, search

Recorded June 6, 2019 at G-Unit Studios in Rhode Island!

Episode Audio


  • Paul Asadoorian
    Embedded device security researcher, security podcaster, and CEO of Active Countermeasures .
  • Larry Pesce
    Senior Managing Consultant and Director of Research at InGuardians, SANS Instructor.
  • Lee Neely
    is a Sr. Cyber Analyst at LLNL,SANS Analyst, SANS NewsBites Editor

  • Guest Co-Host

    Amanda Berlin is CEO at Mental Health Hackers, and a Sr. Security Architect at Blumira. After beginning to open up about her own mental health struggles, an overwhelming amount of positive feedback encouraged her to continue to lead initiatives to help others struggling to see they aren’t alone.


    • We have exciting news about the Security Weekly webcast program: We are now partnered with (ISC)2 as an official CPE provider! If you attend any of our webcasts, you will be receiving 1 CPE credit per webcast! Register for one of our upcoming webcast with Zane Lackey of Signal Sciences, Ian McShane from Endgame, or Stephen Smith and Jeff Braucher of LogRhythm (or all 3!) by going to securityweekly.com/webcasts If you have missed any of our previously recorded webcasts, you can find our on-demand library at securityweekly.com/ondemand

    • So many of the big East Coast cybersecurity tradeshows take place in crowded cities like Boston and New York, where parking is a nightmare and will cost you an arm and a leg. However, this year's Compass Cybersecurity Symposium is being held at Twin River Casino in Lincoln, RI, just 15 minutes outside of Providence! The venue has plenty of free and easy parking. Speakers include social engineering expert Chris Hadnagy and Security Weekly podcast founder Paul Asadoorian. Use the discount code "SW2019" to save $20 on registration!

    • Security Weekly will be at Hacker Halted in Atlanta, GA this October 10th-11th! EC-Council is offering our listeners a $100 discount to attend the two day conference. Use discount code HH19SW when you register or go to securityweekly.com/hackerhalted and register there! Make sure you checkout the keynote (Paul Asadoorian) and Mr. Jeff Man's talk as well!

    • Have you been trying your hardest to get a ticket to DerbyCon FinishLine?! We know that tickets sold out almost immediately, as they do almost every year, and we have an exciting announcement: Security Weekly is giving away 7 tickets to DerbyCon! Here's what you need to do - subscribe to the Security Weekly YouTube channel and send an email to sam@securityweekly.com with either a written or video testimonial about what Security Weekly means to you! That's it, it's really that simple! First 7 people to complete this will receive a ticket to DerbyCon! You will also be invited to participate in our Security Weekly DerbyCon interview series that Sam and Mark will be running at the conference!

    Interview: Paul Ewing, Endgame - 6:00-6:30PM

    Paul Ewingis the Director of Detection & Intelligence of Endgame
    Paul leads Endgame's adversary hunt efforts by prototyping analytics to detect malicious behaviors and techniques used by cyber threats. Paul has over nine years of experience supporting incident responses and leading hunting teams. His career began as a computer programmer, but transitioned from software design to the pursuit of Advanced Persistent Threats.

    Topic: Nobody knows an organization’s environment better than its IT security team. Software deployment tools, networking and routing nuances, threat models, operational IT tasks, change controls, and more, prove that there are many things that make one infrastructure infinitely unique compared with another.

    Yet security vendors try to solve the same problems for every organization in the same way. The most aggressive of preventions are disabled and often hidden, to avoid the deluge of false positives. Detections are suppressed until cloud services can analyze the stream of events and identify an attack, stopping potential alert fatigue and hiding inaccuracy, yet opening a threat window for adversaries to exploit.

    In this episode of Paul’s Security Weekly, we will talk with Paul Ewing of Endgame about how to close the ‘breakout window’ between detection and response, and hear about Endgame’s recently announced technology, Reflex, that was built with customized protection in mind.

    Segment Resources:

    Hacker Mental Health and Wellness Segment: - 6:30 - 7:30PM

    Paul's tips to mental health and wellness for infosec professionals:

    1. Have a great home office - Many of us work from home, either full-time or part-time. Balancing life with work is a challenge and I find it is an advantage to be able to work from home. I tend to work either early in the morning or late at night to catch up on various projects. This is a great time to work as it is quiet, and with busy family life can provide more time during the day to spend on non-work related activities, without falling behind. The key for me is to have a really awesome work environment at home that is separate from the rest of the house and has accommodations that allow you to look forward to going to work (nice sounding headphones and speakers, 3 monitors, comfy chair, plenty of USB hubs, SD card readers, a dedicated and fast workstation, etc...).
    2. Find a hobby outside of tech - The fun part here is that you get to pick! Sports, music, carpentry, whatever, pick something.
    3. Go on vacation - Planning vacations has never been my strong suit, however, it is important to plan them, having something to look forward to. My recent family vacation was wonderful for the entire family, provided us a nice break and allowed us to experience things together outside of the daily grind. Insert non-formatted text here

    Security News - 7:30PM-8:30PM

    Paul's Stories

    1. VMware addressed flaws in its Workstation and Tools
    2. Streaming Video Fans Open to TV Hijacking
    3. When Security Goes Off the Rails - Perhaps most interesting are the training findings: "Amtrak did not provide sufficient training on all characteristics of the Charger locomotive," and "Engineers could better master the characteristics of a new locomotive with the use of simulators." How many of us have gotten "sufficient training" on "all characteristics" of the software we use to get our jobs done? What would that even mean for a systems administrator? How long is sufficient RedHat system administration training? What does it mean to get sufficient training on an Amazon Web Services component, which is subject to change at any time? How many of us have ever used a simulator or range?
    4. Experts Call For IoT Security Regulation
    5. YouTube bans kids live-streaming without an adult present
    6. 0patch experts released unofficial Patch Available for Recent Windows 10 Task Scheduler Zero-Day
    7. 440 Million Android Users Plagued By Extremely Obnoxious Pop-Ups - Attackers are getting more sneaky and patient: For instance, it takes a little sleep before swinging into action. “These ads do not immediately bombard the user once the offending application is installed, but become visible at least 24 hours after the application is launched,” the researchers said. “For example, obtrusive ads did not present themselves until two weeks after the application ‘Smart Scan’ had been launched on a Lookout test device.”
    8. PLATINUM APT Found Using Text-based Steganography to Hide Backdoor - The Steganographic Nature of Whitespace or SNOW for short, is a steganographic covert messaging technique that involves “…concealing messages in ASCII text by appending whitespace to the end of [sentence] lines” (Kwan, 2013). The technique exploits the fact that most text viewer applications do not show spaces and tabs which hide encrypted messages that are unreadable even if detected without the correct decryption key.
    9. Exclusive: Cisco SVP Jeff Reed Talks Firewall of the Future - SDx
    10. Apple's Find My feature requires two devices, boasts extreme security safeguards
    11. It's Time To Pay Attention To Zorin OS 15, The Best Desktop Linux Distro You've Never Heard Of
    12. Switching to Windows? These Are the Best Mac Alternatives
    13. How to Bypass UAC & Escalate Privileges on Windows Using Metasploit

    Larry's Stories

    1. Exim 0-day “the worlds most popular e-mail server”
    2. Apple announced the ‘Sign in with Apple’ API, and restrictions on location-tracking
    3. Tap ’n Ghost - Researchers have created a novel proof-of-concept (PoC) attack named Tap ‘n Ghost, which targets Near Field Communication (NFC)-enabled Android smartphones. This allows an attacker to take control of a target phone simply by tricking the victim into placing their handset on a specially crafted surface, such as a table in a public space that has been maliciously implanted
    4. 12m records exposed via Quest….and others, Optum360, AMCA - American Medical Collection Agency
    5. [1] Rogue TV broadcasts with smart TVs
    6. TVA fails DHS audit - The Tennessee Valley Authority (TVA) inspector general has reported that 115 TVA registered domains were found not meeting the Department of Homeland Security (DHS) standards for cybersecurity during an audit earlier this year. A memo published by the TVA Inspector General's Office on May 29, 2019, reported that internal auditors also found that encryption requirements were inadequate on 20 TVA websites.
    7. cDc releases behind the scenes video of the BO2K release and talk

    Lee's Stories

    1. SalesForce bans customers from gun sales SalesForce new customer agreement bans new and existing customers from certain types of weapons sales. How does a SaaS dictate your business plan or morality?
    2. The Password is dead, long live the Password Microsoft updates password change guidance to align with NIST 800-63B nit changing passwords on a schedule.
    3. What is your iPhone talking to Overnight? App trackers, Android and iOS, are sending your information to third parties, often invisible to users.
    4. Microsoft Office retires support for old Android versions Microsoft is reducing the number of Android versions supported by their productivity apps July 1st. Choice: update your Android, or move to alternative suite.
    5. Russian Government Requires Tinder to share user data Tinder is being compelled to cooperate with FSB, while they have registered, they are not yet sharing data. Last app that refused, Telegram, is now banned in Russia.
    6. Chinese Military to give up on Windows for custom OS Back in 2014 China laid out plans for removing Windows from all government computers. They also don't trust Linux as an OS source, so they will be writing their own OS. I guess the foot's on the other hand now.
    7. ANU Suffers second hack in a year Good news: new controls implemented were able to detect this attack. Bad News: not enough completed (in the last two weeks) to prevent the attack. The attack came in late 2018, so there was a delay detecting.
    8. How likely are weaponized cars? Security considerations including secure updates, testing, recall, and life-cycle, become increasingly important at scale.
    9. Unit 42 Discovers Vulnerabilties in Acrobat and Reader and Foxit Reader, shares at BlueHat Shanghai 2019. Palo Alto Unit 42 is actively seeking and sharing vulnerabilities discovered.