From Paul's Security Weekly
Recorded August 1, 2019 at G-Unit Studios in Rhode Island!
- Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020 and click the register button to register with our discount code!
- We're currently running our annual Listener Feedback Survey! Please visit securityweekly.com -> click the survey tab & select "2019 Listener Survey" to submit your responses!
- Attend RSA Conference 2020, February 24-28 and join thousands of security professionals, forward-thinking innovators and solution providers for five days of actionable learning, inspiring conversation and breakthrough ideas. Register before January 24 and save $900 on a Full Conference Pass. Save an extra $150 by going to securityweekly.com/rsac2020 and use our code to register!
- Mark your calendars for our Security Weekly Holiday Extravaganza! On December 19th, Security Weekly will be live-streaming 5 one hour panel discussions with some of the most knowledgable professionals in the industry! To round out the evening, Ed Skoudis will be joining the Security Weekly hosts to give his annual announcement about the CounterHack Holiday Hack Challenge! You can view the live stream on our Youtube channel or by visiting securityweekly.com/live. We hope to see you there!
Interview: Sam Straka, LogRhythm- 6:00-6:30PM
Open to discussion, I’m happy to discuss anything! It might be cool to talk about the movement of our market to the Cloud, how LogRhythm is innovating in that area, and why total cost of ownership is important when looking at a SIEM platform. We will also discuss:
- Where to deploy security infrastructure - data compliance requirements, risks of cloud vs. on-prem
- Configuration Management – We’re building our deployment tools on SaltStack which is super powerful and has some interesting security applications
- Elastic’s (and others) new moves in the SIEM space
Tech Segment: Doug Coburn, Signal Sciences - 6:30 - 7:30PM
Great to talk to you today. I've included the link to my github and demo video of Signal Sciences in kubernetes.
Talk about the way Signal Sciences is implemented, especially in the container world. Where we sit in the stack for protection of the web apps in those containers and common first things identified after install (Attack Scanners, Injection Attacks, actionable anomalies like 404 or 500 errors). Finally do a short demo walking through installing Signal Sciences in a Kubernetes environment and the Signal Sciences dashboard.
Security News - 7:30PM-8:30PM
- Black Hat USA 2019 Preview
- Remote code execution is possible by exploiting flaws in Vxworks
- Researchers Are Sounding the Alarm on a Little-Known Risk of Connected Cars
- Alleged Capital One Hacker Barely Bothered to Hide | SecurityWeek.Com
- A Realistic Path Forward for Security Orchestration and Automation
- Until airbags are fitted to email apps to stop staff opening bad messages, what else can a small biz do to protect itself?
- SecOps Success Through Employee Retention
- Microsoft Seriously Beefs Up Security in Windows Server 2019
- Google Releases Beta of Anomaly Detection for G Suite Customers | SecurityWeek.Com
- New Mirai botnet lurks in the Tor network to stay under the radar | ZDNet
- Cisco pays $8.6M to settle security-software whistleblower lawsuit
- Researcher Find Open 'Road Map' to Honda Computers
- Scientists Find Key to Sending Data Trhough Music: Van Halen Audio Stenography works best with rock music. Encode message (e.g. URL) so human ear cannot decode, but any device with app can.
- 7.5TB Breach Reveals Secret Russian IT Projects Twitter account @0v1ruS seems to be tied to @D1G1R3V (DigitalRevolution) who is motivated by information freedom in Russia.
- Silk Road Drug Dealer caught when converting bitcoin to cash Poor operational security choices exposed the blockchain to DHS who traced the Bitcoin origins to Silk Road rather than claimed successful Bitcoin Mining.
- Former Cloud Worker Hacks into Capital One, takes data for 106 million people Hacker was outed after complaining on social media. OPSEC matters. If you applied for a Cap One card between 2006 and 2019 you're in this group.
- 200 million Devices Have VxWorks Vulnerabilities 11 Vulnerabilities discovered, 6 critical in VxWorks OS, while patches are out or available soon, as many as 2 billion discoverable impacted devices are online.
- Thieves Steal Laptops with 30 Years of Data from UWA Growing trend of Australian universities reporting compromises. Laptops belong to students at the University of Western Australia (UWA) containing 30 years of of PII data were stolen. Universities collect a lot of PII and financial data and are challenged to secure it.
- Linus Torvalds prepares to wave goodbye to Linux floppy drives Lack of working hardware and someone to actively take over maintaining the driver will see floppy disk support depricated.
- Hack Breaks Visa Card's Contactless Payment Limit Researchers in the UK found they could take more than the limit (30 pounds/$38 USD) without fraud detection. The limit in US is $100.
- North Carolina County lost $1.7M in BEC Scam $2.5M fraudulently deposited after Phishing scam. $.7M recovered through bank. Insurance paid $75,000.
- US Government issues Light Aircraft Cyber Alert Vulnerabilities in avionic equipment exploited over CAN bus. Mitigation: Physical Access controls. Most devices lack encryption or authentication.
- Verizon 5G Goes Live in more major US Cities Washington DC, Indianapolis IN, Atlanta GA & Detroit MI join Denver, Chicago, Minneapolis, St. Paul and Providence RI.
- Armis found 11 critical vulnerabilities in the VxWorks OS - a platform found in 2 billion devices, including medical equipment and IoT devices; officials say patching will be long and difficult.
- Filecoder.C is targeting Android devices - through malicious links in online forums and then spreading via contact lists through SMS messages that attempt to entice others to install an app, according to research published Monday by the security firm ESET. And this is why I find the Android ecosystem to be a shitshow.
- BEC scam hits NC, losing 1.7 million - Security is just not an IT problem. Other areas of the organizations can put protective controls in process in place to prevent issues as well.
- What’s in your S3 buckets?
- defrauding contactless cards over the predefined limits without "authentication" - It requires MiTM, which tells the terminal and the card, 'no, no, it is ok, no authorization is required, or it is already complete. These are not the droids you're looking for."