From Paul's Security Weekly
Paul's Security Weekly #580
Recorded October 25, 2018 at G-Unit Studios in Rhode Island!
- If you are interested in quality over quantity and having meaningful conversations instead of just a badge scan, join us April 1-3, at Disney's Contemporary Resort for InfoSec World 2019 where you can connect and network with like-minded individuals in search of actionable information. Use the registration code OS19-SECWEEK for 15% off the Main Conference or World Pass.
- Join us for our Webcast with Signal Sciences entitled Which way should you shift testing in the SDLC? This webcast will be held November 8th @3-4pm EST. Go to securityweekly.com/signalsciences to register now!
- One of our illustrious co-hosts, Patrick Laverty, will be co-presenting "Pentesting: Tips, Tricks and Stories" with Aaron Herndon at BSides CT 2019! Ticket sales are open until the day of the show (Saturday, November 3rd) for $20. Go to bsidesct.org to register now!
Interview: Veronica Schmitt, DFIRLABS - 6:00-6:30PM
In between attending Metallica concerts and being converted into a cyborg (no really, ask her about her metal bits sometime), she completed a Diploma in Criminal Justice and Forensic Investigation from the University of Johannesburg. Deciding to brave foreign climes and curiosities, she went on to receive training in Europe on digital forensics and cyber crime investigation from the United States Department of Homeland Security.
She is an Associate Member of a number of professional bodies, including the Institute of Information Technology of Professionals of South Africa, the Association of Certified Fraud Examiners, and the International Association of Computer Investigative Specialists.
Veronica has contributed to several publications, including the ISC2 CCFP : Certified Computer Forensic Practitioner.
She is currently juggling a Master’s thesis on ransomware, several digital forensics cases, getting a quality forensics training company off the ground, and reverse engineering ransomware whilst also keeping her two year old from walking into things. You can contact her by lighting up the night sky with the DFIRLABS beacon mounted on the top of the Gotham police department, or alternatively by email.
Tech Segment: Yossi Sassi, Javelin Networks - 6:40PM-7:00PM
Security News - 7:10 - 8:00PM
- Most security professionals fear AI attacks
- Masscan as a lesson in TCP/IP
- Have Network, Need Network Security Monitoring
- UPDATED VERSION: RouterSploit 3.4.0
- Serious D-Link router security flaws may never be patched
- FDA releases cybersecurity guidance
- Few employers have a culture that supports cybersecurity
- Watch Hackers Steal A Tesla
- Most Enterprise Vulns Remain Unpatched A Month After Discovery
- Securing Serverless: Attacking an AWS Account via a Lambda Function
- California Addresses Default Passwords
- Spies Among Us: Tracking, IoT & the Truly Inside Threat
- NotPetya Linked to Industroyer Attack on Ukraine Energy Grid
- RedHunt Linux - Adversary Emulation, Threat Hunting & Intelligence, (Wed, Oct 17th)
- In Groundbreaking Decision, Feds Say Hacking DRM to Fix Your Electronics Is Legal "The new exemptions are a major win for the right to repair movement and give consumers wide latitude to legally repair the devices they own."
- Russian Malware Was Apparently Used in an Attempt to Sabotage a Saudi Petrol Plant "Cybersecurity firm FireEye points the finger at the Russian government and a government-linked facility for creating a destructive malware."
- British Airways: 185,000 more passengers may have had details stolen "Airline says customers affected by data breach will be contacted by Friday, as investigation continues"
- An ISP Left Corporate Passwords, Keys, and All its Data Exposed on the Internet "According to a new report by the security researchers at UpGuard, a Washington-based ISP by the name of Pocket iNet left 73 gigabytes of essential operational data publicly exposed in a misconfigured Amazon S3 storage bucket for months."'
- Technical Rundown of WebExec "... flaw in WebEx's WebexUpdateService allows anyone with a login to the Windows system where WebEx is installed to run SYSTEM-level code remotely. That's right: this client-side application that doesn't listen on any ports is actually vulnerable to remote code execution! A local or domain account will work, making this a powerful way to pivot through networks until it's patched."