From Security Weekly Wiki
Revision as of 19:54, 11 February 2019 by Jeff (talk | contribs)
Jump to navigationJump to search

Recorded February 14, 2019 at G-Unit Studios in Rhode Island!

Episode Audio


  • Paul Asadoorian
    Embedded device security researcher, security podcaster, and CEO of Active Countermeasures .
  • Larry Pesce
    Senior Managing Consultant and Director of Research at InGuardians, SANS Instructor.
  • Lee Neely
    is a Sr. Cyber Analyst at LLNL,SANS Analyst, SANS NewsBites Editor
  • Jeff Man
    Infosec analyst
    Pioneering ex-NSA pen tester
    PCI specialist
    Tribe of Hackers
    InfoSec Curmudgeon
    Currently a Sr. InfoSec Consultant for Online Business Systems.

  • Announcements

    • RSA Conference 2019 is coming up March 4 – 8 in San Francisco! Go to rsaconference.com/securityweekly-us19 to register now using the discount code 5U9SWFD to receive $100 off a full conference pass! If you are interested in booking an interview or briefing with Security Weekly, please go to securityweekly.com/conferencerequest to submit your request!
    • Join us April 1-3, at Disney's Contemporary Resort for InfoSec World 2019 where you can connect and network with like-minded individuals in search of actionable information. Visit https://infosecworld.misti.com/ and use the registration code OS19-SECWEEK for 15% off the Main Conference or World Pass. If you are interested in booking an interview or briefing with Security Weekly, please go to securityweekly.com/conferencerequest to submit your request!
    • Registration is now open for the first Security Weekly webcast of 2019! You can register for our "Rise Above Complex Workflows: Practical Ways To Accelerate Incident Response" webcast now by going to securityweekly.com/webcasts.

    Interview: Harry Svedlove, Edgewise - 6:00-6:30PM

    Harry Sverdlove
    is the CTO of Edgewise.

    Harry Sverdlove, Edgewise’s Chief Technology Officer, was previously CTO of Carbon Black, where he was the key driving force behind their industry-leading endpoint security platform. Earlier in his career, Harry was principal research scientist for McAfee, Inc., where he supervised the architecture of crawlers, spam detectors and link analyzers. Prior to that, Harry was director of engineering at Compuware Corporation (formerly NuMega), and principal architect for Rational Software, where he designed the core automation engine for Rational Robot.

    Tech Segment: DomainTools - 6:30 - 7:30PM

    Security News - 7:30PM-8:30PM

    Paul's Stories

    1. How to Defend Against The runC Container Vulnerability - Lots of ways to detect this: identified the modification of both the container’s “/bin/sh” and the host’s “/usr/bin/docker-runc.” We also would have notified customers of the outbound network connection from the host for the reverse shell.
    2. InfoSec Institutes Top Podcasts to Take Your Computer Skills to the Next Level
    3. Ten Quotes to Get Your Boss to Take IT Security Seriously- I like this one: “One of the tests of leadership is the ability to recognize a problem before it becomes an emergency.” – Arnold H. Glasow Author & Businessman
    4. Oh Snapd! Gimme-root-now security bug lets miscreants sock it to your Ubuntu boxes - The vulnerability is found in Snapd, Canonical's open-source toolkit for packaging and running applications via systemd. Exploiting the flaw would allow an attacker to elevate their access from unprivileged process to that of the root user, essentially allowing a complete takeover of the system. Moberly found that, by abusing the way Snapd's API handles HTTP data requests, the tool could be tricked into believing the user has a uid of 0, aka the root user.
    5. IoT providers need to take responsibility for performance
    6. USB Cable with Embedded Wi-Fi Controller - When plugged into a Linux, Mac, or Windows computer, this cable is detected by the operating system as a HID or human interface device. As HID devices are considered input devices by an operating system, they can be used to input commands as if they are being typed on a keyboard. Created by security researcher Mike Grover, who goes by the alias _MG_, the cable includes an integrated WiFi PCB that was created by the researcher. This WiFi chip allows an attacker to connect to the cable remotely to execute command on the computer or manipulate the mouse cursor.
    7. Is Porn Becoming a Monopoly? Member Feature Stories
    8. Security Spills: 9 Problems Causing the Most Stress
    9. How to Create a Dream Team for the New Age of Cybersecurity - Alternatively, CISOs can choose to outsource parts of the security function to expert managed security service providers (MSSPs). No matter how you choose to assemble your team, it is critical that your security team understands your specific business and network context as well as your focus on improving cyber-resilience, and have the needed skills and tools to protect business-critical assets while continuously improving security posture.
    10. Google Paid Out $3.4 Million for Vulnerabilities Reported in 2018
    11. Threatpost Poll: Over Half of Firms Asked Struggle with Mobile Security
    12. Big Themes Set to Emerge at RSA Conference 2019
    13. New Professional Development Institute Aims to Combat Cybersecurity Skills Shortage
    14. Researchers hide malware in Intel SGX enclaves

    Jeff's Stories

    1. RunC Vulnerability Gives Attackers Root Access on Docker, Kubernetes Hosts I'm not gonna say, "I told you so"...

    Lee's Stories