Difference between revisions of "Episode606"

From Paul's Security Weekly
Jump to: navigation, search
(Larry's Stories)
(Larry's Stories)
Line 43: Line 43:
 
== Larry's Stories ==
 
== Larry's Stories ==
 
#[https://threatpost.com/one-million-devices-open-to-wormable-microsoft-bluekeep-flaw/145113/ Researchers have discovered one million devices that are vulnerable to a “wormable” Microsoft flaw, which could open the door to a WannaCry-like cyberattack]
 
#[https://threatpost.com/one-million-devices-open-to-wormable-microsoft-bluekeep-flaw/145113/ Researchers have discovered one million devices that are vulnerable to a “wormable” Microsoft flaw, which could open the door to a WannaCry-like cyberattack]
#[https://threatpost.com/gatekeeper-bug-in-macos-mojave-allows-malware-to-execute/145124/ Researcher Filippo Cavallarin disclosed a bug in the macOS security feature Gatekeeper that allows malicious code execution on systems running the most recent version of Mojave (10.14.0)]
+
#[https://threatpost.com/gatekeeper-bug-in-macos-mojave-allows-malware-to-execute/145124/ Researcher Filippo Cavallarin disclosed a bug in the macOS security feature Gatekeeper] - Allows malicious code execution on systems running the most recent version of Mojave (10.14.0)
#[https://threatpost.com/50k-servers-infected-with-cryptomining-malware-in-nansh0u-campaign/145140/ Up to 50,000 servers were infected over the past four months as part of a high-profile cryptojacking campaign, believed to orchestrated by Chinese-language adversaries]
+
#[https://threatpost.com/50k-servers-infected-with-cryptomining-malware-in-nansh0u-campaign/145140/ Up to 50,000 servers were infected over the past four months as part of a high-profile cryptojacking campaign] - Believed to orchestrated by Chinese-language adversaries
#[https://www.cnet.com/news/apple-google-microsoft-blast-uks-ghost-proposal-to-spy-on-encrypted-chats/ Apple, Google, WhatsApp, Microsoft, along with 43 security experts and privacy advocates, have signed an open letter to the GCHQ calling out the UK spy agency's "ghost proposal.”  If they back down from one country, where will they draw the line?]
+
#[https://www.cnet.com/news/apple-google-microsoft-blast-uks-ghost-proposal-to-spy-on-encrypted-chats/ Apple, Google, WhatsApp, Microsoft, along with 43 security experts and privacy advocates, have signed an open letter to the GCHQ calling out the UK spy agency's "ghost proposal.”] - If they back down from one country, where will they draw the line?]
#[https://krebsonsecurity.com/2019/05/should-failing-phish-tests-be-a-fireable-offense/ Would your average Internet user be any more vigilant against phishing scams if he or she faced the real possibility of losing their job after falling for one too many of these emails? Recently, I met someone at a conference who said his employer had in fact terminated employees for such repeated infractions. As this was the first time I’d ever heard of an organization actually doing this, I asked some phishing experts what they thought (spoiler alert: they’re not fans of this particular teaching approach)]
+
#[https://krebsonsecurity.com/2019/05/should-failing-phish-tests-be-a-fireable-offense/ Would your average Internet user be any more vigilant against phishing scams if he or she faced the real possibility of losing their job after falling for one too many of these emails?] - Recently, I met someone at a conference who said his employer had in fact terminated employees for such repeated infractions. As this was the first time I’d ever heard of an organization actually doing this, I asked some phishing experts what they thought (spoiler alert: they’re not fans of this particular teaching approach)
  
 
== Lee's Stories ==
 
== Lee's Stories ==
 
<br><br>
 
<br><br>

Revision as of 15:24, 30 May 2019

Recorded May 30, 2019 at G-Unit Studios in Rhode Island!

Episode Audio

Hosts

  • Paul Asadoorian
    Embedded device security researcher, security podcaster, and CEO of Active Countermeasures .
  • Larry Pesce
    Senior Managing Consultant and Director of Research at InGuardians, SANS Instructor.
  • Lee Neely
    is a Sr. Cyber Analyst at LLNL,SANS Analyst, SANS NewsBites Editor


  • Announcements

    • Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
    • OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!
    • We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting securityweekly.com/subscribe and clicking the button to join the list! You can also submit your suggestions for guests by going to securityweekly.com/guests and submitting the form! We'll review them monthly and reach out if they are a good fit!
    • Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting securityweekly.com, selecting the webcast/training drop down from the top menu bar and clicking registration.

    Interview: Eric Butash & Mike Klein, Highlander Institute - 6:00 - 6:30PM

    Eric Butash
    is the Director of Digital Platforms at Highlander Institute.
    Eric Butash is Director of Digital Platforms for InnovateEdu out of NYC. Eric oversees national K-12 data interoperability initiatives such as ProjectUnicorn and DataViz. He just moved to InnovateEdu from the Highlander Institute where he was the Director of Operation. The Institute is an innovation "hub" for redesigning K12 classrooms in to be more personalized. Prior to that, Eric has spent 15 years in various technology leadership roles across K-12. He currently serves as the Sr. Advisor to the K12 National Advisory Council on Cybersecurity Executive Board, CommonSense Media National Ambassador, and 2017 Recipient of ISTE's Making IT Happen Award.







    Mike Klein
    is the Professional Learning Coordinator at Highlander Institute.
    As Professional Learning Coordinator at Highlander Institute, Michael Klein leads coaching and capacity building for a team of 12 educational consultants in addition to directly supporting teachers, school leaders and district leaders with change management in urban, suburban and rural districts across the country. Michael also serves on the Board of Directors for the Edcamp Foundation. Michael was a founding teacher at High Tech High’s newest middle school in Chula Vista, California and worked as an elementary school teacher in Brooklyn and Harlem. In addition to teaching, Michael worked as research assistant to Tony Wagner on his book Creating Innovators: The Making of Young People Who Will Change the World, and has experience as part of two fast-growing education technology companies. Michael earned his undergraduate degree in History at Vassar College and his Master’s in Education at Bank Street College.



    Tech Segment: Paul Asadoorian - 6:30-7:00PM




    Security News - 7:30PM-8:30PM

    Paul's Stories

    1. Redditor can stay anonymous, court rules
    2. The industrys best-kept secret: why mobile ad fraud prevention is just too good to be true
    3. Spies with that? Police can snoop on McDonald's and Westfield wifi customers
    4. 8 Ways to Authenticate Without Passwords
    5. Flipboard Resets User Passwords in Response to Data Breach | SecurityWeek.Com
    6. Eternally Blue: Baltimore City leaders blame NSA for ransomware attack
    7. Docker Vulnerability Gives Arbitrary File Access to Host | SecurityWeek.Com
    8. Trends in Cybersecurity to Watch
    9. Majority of CISOs plan to ask for an increase in cybersecurity investment - Help Net Security
    10. Hackers actively exploit WordPress plugin flaw to send visitors to bad sites
    11. Virus-packed laptop sells as artwork for over RM5.5mil
    12. Technology is Not Our Problem | SecurityWeek.Com
    13. What a teen grade hackers confession can teach us
    14. The cryptominer that kept coming back
    15. InfoSec Handlers Diary Blog - Analyzing First Stage Shellcode
    16. Malware Found on PoS Systems at Checkers and Rally's Restaurants | SecurityWeek.Com
    17. High-Risk Flaws Found in Process Control Systems From B&R Automation | SecurityWeek.Com
    18. macOS Gatekeeper Bypass Exploits Trust on Network Shares | SecurityWeek.Com
    19. InfoSec Handlers Diary Blog - nmap Service Fingerprint
    20. Killer SecOps Skills: Soft Is the New Hard
    21. Old Threats Are New Again

    Larry's Stories

    1. Researchers have discovered one million devices that are vulnerable to a “wormable” Microsoft flaw, which could open the door to a WannaCry-like cyberattack
    2. Researcher Filippo Cavallarin disclosed a bug in the macOS security feature Gatekeeper - Allows malicious code execution on systems running the most recent version of Mojave (10.14.0)
    3. Up to 50,000 servers were infected over the past four months as part of a high-profile cryptojacking campaign - Believed to orchestrated by Chinese-language adversaries
    4. Apple, Google, WhatsApp, Microsoft, along with 43 security experts and privacy advocates, have signed an open letter to the GCHQ calling out the UK spy agency's "ghost proposal.” - If they back down from one country, where will they draw the line?]
    5. Would your average Internet user be any more vigilant against phishing scams if he or she faced the real possibility of losing their job after falling for one too many of these emails? - Recently, I met someone at a conference who said his employer had in fact terminated employees for such repeated infractions. As this was the first time I’d ever heard of an organization actually doing this, I asked some phishing experts what they thought (spoiler alert: they’re not fans of this particular teaching approach)

    Lee's Stories