Recorded July 11, 2019 at G-Unit Studios in Rhode Island!
- Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
- OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!
- We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting securityweekly.com/subscribe and clicking the button to join the list! You can also submit your suggestions for guests by going to securityweekly.com/guests and submitting the form! We'll review them monthly and reach out if they are a good fit!
- Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting securityweekly.com, selecting the webcast/training drop down from the top menu bar and clicking registration.
Interview: Blue/Purple Teaming (defense) - Ben Ten, TrustedSec - 6:00-6:30PM
Ben has been working in technology and development for over 20 years. He spent 13 years doing defense in the medical industry before moving over to the offense. He uses his knowledge of defense in order to refine his offensive skills and then uses this knowledge to equip customers with a better understanding of defensive methodologies.
- Education & Certifications
- GIAC Certified Penetration Tester (GPEN)
- Professional Affiliations
- Board Member for Secure Chicago, LLC
- Passion for Security
- Ben has dedicated himself to the security industry for the past 15 years.
He speaks at several conferences a year across the US and he has presented in Oslo, Norway. Ben is active in the security community by offering talks, training, and encouraging new people to get involved. Ben has released open source tools including The PoshSec Framework, HoneyCreds, and Not PowerShell (nps) which are designed to help organizations refine their security posture.
- Comes from defense, but is more focused on purple team. What exactly is a purple team? Training? Assessment, both? Aren’t the stupid users to blame?
- Foreign language to avoid detection.
- Speaking versus training? What have you been doing for training, as you’ve been pulling back from speaking.
- PowerShell on non-Windows platforms. Are there any cool, non-obvious things we can do?
- Have you encountered during a red team an environment that had Powershell so locked down it would compromise his C2 capabilities and how did he go about circumventing it.
- nconventional C2 Frameworks that don't use powershell like Covenant or Silent Trinity, RTT (Silent Break)
- The PoshSec Framework, HoneyCreds, and Not PowerShell (nps)
Security News - 6:30 - 7:30PM
An open question: PGP vs Signal for e-mail secure communication? Adoption of PGP vs Signal?
- Malware on the High Seas - phishing being used against the US Cost Guard in an attempt to gain access to data on the vessels.
- Microsoft warns of file-less malware attack Astaroth, reminds me of what we do as red teasers
- Unattended, no click Zoom hacks
- Hate crime perps caught because they automatically connected to WiFi
- US weapon systems hacked in 9 second because of default passwords and other DoD cyber security folly
- GoBotKR botnet through pirate Korean videos
- Apple iMessage bug bricks phones, patch available
- Android apps harvest data, even though they were told not to
- Zoom RCE Vulnerability Found
- YouTube banning hacking videos, now admits mistake
- Android Won't Take No For an Answer More than 1000 Android apps still collect personal data even after user clicks no.
- Down Goes Twitter!
- Porn Pirating Lawyers sentenced - A US lawyer who uploaded pornography on to file-sharing sites then sued people who downloaded it, has been sentenced to five years in jail.
- Crypto Peer-to-Peer Exchanges Grow in Popularity as Regulatory Scrutiny Rises - The uptick in regulatory scrutiny amid this year’s re-emergence of cryptocurrencies is driving some of the speculative asset classes’ biggest advocates further into the darkest corners of finance.
- Rhode Island Governor Cuts CISO Position from Cabinet - The controversial decision to eliminate the state's chief information security officer has inspired criticism, though state officials have promised a continued commitment to cybersecurity efforts.
- Cybersecurity Firm McAfee Preps for Public Market Return - The company's owners - private-equity firms TPG and Thoma Bravo, and chipmaker Intel - have been meeting with bankers this week to discuss plans for an initial public offering that could occur later this year, The Wall Street Journal reports.
- Chinese Tourists forced to install Software at border Chinese border officials side-load JingWang application; primarily targeting Xinjiang's Uighur population; that sends device data to their servers, un-encrypted, for analysis also searches for 73,000 files of interest such as religious videos, images and electronic documents.
- 1TB Police Bodycam footage available online The police department IT service providers, who were collecting the videos were compromised. Make sure that your service provider is InfoSec aware. Should we expect the hackers to store the acquired content securely?
- Orvibo IoT management database insecure SmartMate device management database, with 2 Billion records for devices in 2 Million households had no protection and included usernames, non-salted MD5 Hashed passwords, password reset codes and device location data. How secure is your IoT management system?
- Russian hackers target banks Hacker group compromises IT systems, causes ATM to dispense any amount unchecked.
- U.S. Cyber Command warns of Outlook flaw exploited by Iranian Hackers Hckers exploit Microsoft Outlook vulnerability tracked as CVE-2017-11774 in an effort to deliver malware.
- Huawei Employees linked to China State Intel Agencies Look to the big picture - consider the alliances of your suppliers, at all levels. Who are they truly working for?
- Acedemics steal data from air-gapped systems via Keyboard's LEDs It is interesting how you can leverage system components to exfiltrate data across an air-gap. Ben-Gurion University has researched for years. Some other examples LCD Displays CPU fans for pickup as audio CPU Load for pickup as heat HDD Motor/Head noise
- It would take 50-year-old NASA computer more than a quintillion years to mine a single bitcoin block Relative comparison of Appolo-era computer compute speed to today's tech.
Tech Segment: Reinhard Hochrieser, Jumio - 7:30PM-8:30PM
Reinhard Hochrieser is Vice President of Product Management at Jumio, and responsible for the entire product experience, driving innovative ideas and solutions, and leading a global team of product managers. He previously served as Jumio’s director of product management and has been with the company since 2012. Reinhard has more than a decade of experience in enterprise solutions and held multiple product and engineering roles at Keba Group, a market leader of automation solutions for the banking and postal industries, before joining Jumio. He holds a Master of Science degree and Bachelor of Science degree in computer science from Johannes Kepler University Linz.
Today’s State of Security Demands the Need for Biometric Authentication
- Growth of account takeover and how to prevent it – Data breaches continue to threaten organizations and expose usernames and passwords on the Dark Web, enabling fraudsters to use stolen data to access a user’s existing account, tips to protect against account takeover
- Death of traditional authentication methods & rise of biometric-based authentication – Two-factor authentication, passwords and knowledge-based authentication are no longer reliable or secure because they can be easily bypassed. Companies need to embrace emerging technology, such as artificial intelligence, augmented intelligence and machine learning, and adopt new authentication methods, like biometric-based authentication, to fight automated fraud and protect their online ecosystems.