Changes

From Security Weekly Wiki
Jump to navigationJump to search
3,953 bytes added ,  18:36, 10 July 2019
no edit summary
==Episode Audio==
<!-- <div align="center">
{{#widget:SoundCloud
|id=496965687633557724
|width=75%
|height=100
|visual=false
}}
</div> -->
=== Hosts ===
= Interview: Paul Ewing, [https://securityweekly.com/endgame Endgame] - 6:00-6:30PM =
[[File:PaulEwing.png|right|250px|thumb|<center>'''[https://twitter.com/_paulewing Paul Ewing]'''is a Partner the Director of Detection & Intelligence of [https://securityweekly.com/endgame Endgame]</center>]] Paul leads Endgame's adversary hunt efforts by prototyping analytics to detect malicious behaviors and techniques used by cyber threats. Paul has over nine years of experience supporting incident responses and leading hunting teams. His career began as a computer programmer, but transitioned from software design to the pursuit of Advanced Persistent Threats.<br><br>Topic: Nobody knows an organization’s environment better than its IT security team. Software deployment tools, networking and routing nuances, threat models, operational IT tasks, change controls, and more, prove that there are many things that make one infrastructure infinitely unique compared with another.<br><br>Yet security vendors try to solve the same problems for every organization in the same way. The most aggressive of preventions are disabled and often hidden, to avoid the deluge of false positives. Detections are suppressed until cloud services can analyze the stream of events and identify an attack, stopping potential alert fatigue and hiding inaccuracy, yet opening a threat window for adversaries to exploit.<br><br>In this episode of Paul’s Security Weekly, we will talk with Paul Ewing of Endgame about how to close the ‘breakout window’ between detection and response, and hear about Endgame’s recently announced technology, Reflex, that was built with customized protection in mind.<br><br>Segment Resources:
* About Endgame Reflex: https://www.endgame.com/sites/default/files/endgame-solution-brief-reflex.pdf
* Reflex announcement: https://www.endgame.com/news/press-releases/endgame-introduces-reflex
* EQL Github repository: https://github.com/endgameinc/eql
<!--<center>{{#ev:youtube|WJAiTXAvtRQO1tnGHvvlEg}}</center>-->
<br>
= Tech Hacker Mental Health and Wellness Segment: Paul Asadoorian, [https://securityweekly.com/domaintools DomainTools] - 6:30 - 7:30PM =
<!-- [[File:Justin Murphy.jpg|right|250px|thumb|<center>'''[https://twitter.com/Cisco Justin Murphy]'''<br>is the Cloud Security CS at [https://www.cisco.com/ CISCO].</center>]] -->
 
Paul's tips to mental health and wellness for infosec professionals:
 
# Have a great home office - Many of us work from home, either full-time or part-time. Balancing life with work is a challenge and I find it is an advantage to be able to work from home. I tend to work either early in the morning or late at night to catch up on various projects. This is a great time to work as it is quiet, and with busy family life can provide more time during the day to spend on non-work related activities, without falling behind. The key for me is to have a really awesome work environment at home that is separate from the rest of the house and has accommodations that allow you to look forward to going to work (nice sounding headphones and speakers, 3 monitors, comfy chair, plenty of USB hubs, SD card readers, a dedicated and fast workstation, etc...).
# Find a hobby outside of tech - The fun part here is that you get to pick! Sports, music, carpentry, whatever, pick something.
# Go on vacation - Planning vacations has never been my strong suit, however, it is important to plan them, having something to look forward to. My recent family vacation was wonderful for the entire family, provided us a nice break and allowed us to experience things together outside of the daily grind. Insert non-formatted text here
<center>{{#ev:youtube|cWYwIDE85IE}}</center>
<br><br>
= Security News - 7:30PM-8:30PM =
 <!-- <center>{{#ev:youtube|iPHM80z9D9kmha6iT1bB0U}}</center>-->
== Paul's Stories ==
== Larry's Stories ==
#[https://it.slashdot.org/story/19/06/06/0046234/new-rce-vulnerability-impacts-nearly-half-of-the-internets-email-servers Exim 0-day “the worlds most popular e-mail server”]
#[https://threatpost.com/wwdc-2019-apple-facebook-privacy/145290/ Apple announced the ‘Sign in with Apple’ API, and restrictions on location-tracking]
#[https://threatpost.com/tap-ghost-attack-android/145286/ Tap ’n Ghost] - Researchers have created a novel proof-of-concept (PoC) attack named Tap ‘n Ghost, which targets Near Field Communication (NFC)-enabled Android smartphones. This allows an attacker to take control of a target phone simply by tricking the victim into placing their handset on a specially crafted surface, such as a table in a public space that has been maliciously implanted
#[https://www.cnet.com/news/quest-diagnostics-says-nearly-12m-patients-exposed-by-data-breach/ 12m records exposed via Quest….and others, Optum360, AMCA - American Medical Collection Agency]
#[https://threatpost.com/smart-tv-bug-rogue-broadcasts/145275/] Rogue TV broadcasts with smart TVs
#[https://www.infosecurity-magazine.com/news/tva-noncompliant-with-federal-1/ TVA fails DHS audit] - The Tennessee Valley Authority (TVA) inspector general has reported that 115 TVA registered domains were found not meeting the Department of Homeland Security (DHS) standards for cybersecurity during an audit earlier this year. A memo published by the TVA Inspector General's Office on May 29, 2019, reported that internal auditors also found that encryption requirements were inadequate on 20 TVA websites.
#[https://m.youtube.com/watch?feature=youtu.be&v=oHxNEvklKqE cDc releases behind the scenes video of the BO2K release and talk]
== Lee's Stories ==
#[https://www.foxnews.com/tech/tinder-russian-government-user-data Russian Government Requires Tinder to share user data] Tinder is being compelled to cooperate with FSB, while they have registered, they are not yet sharing data. Last app that refused, Telegram, is now banned in Russia.
#[https://news.softpedia.com/news/chinese-military-to-give-up-on-windows-adopt-custom-operating-system-526213.shtml Chinese Military to give up on Windows for custom OS] Back in 2014 China laid out plans for removing Windows from all government computers. They also don't trust Linux as an OS source, so they will be writing their own OS. I guess the foot's on the other hand now.
#[https://www.itnews.com.au/news/anu-suffers-second-significant-hack-in-a-year-526123 ANU Suffers second hack in a year] Good news: new controls implemented were able to detect this attack. Bad News: not enough completed (in the last two weeks) to prevent the attack. The attack came in late 2018, so there was a delay detecting.
#[https://www.helpnetsecurity.com/2019/06/03/weaponized-cars/ How likely are weaponized cars?] Security considerations including secure updates, testing, recall, and life-cycle, become increasingly important at scale.
#[https://unit42.paloaltonetworks.com/unit-42-discovers-vulnerabilities-in-adobe-acrobat-and-reader-and-foxit-reader-shares-threat-research-at-microsoft-bluehat-shanghai-2019/ Unit 42 Discovers Vulnerabilties in Acrobat and Reader and Foxit Reader, shares at BlueHat Shanghai 2019.] Palo Alto Unit 42 is actively seeking and sharing vulnerabilities discovered.
<br><br>

Navigation menu