Difference between revisions of "Episode618"
From Paul's Security Weekly
(→Tech Segment: Corey Thuen, Gravwell - 6:30 - 7:30PM)
|Line 30:||Line 30:|
== Larry's Stories ==
== Larry's Stories ==
== Jeff's Stories ==
== Jeff's Stories ==
Revision as of 20:14, 29 August 2019
Recorded August 29, 2019 at G-Unit Studios in Rhode Island!
- Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
- OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!
- We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting securityweekly.com/subscribe and clicking the button to join the list! You can also submit your suggestions for guests by going to securityweekly.com/guests and submitting the form! We'll review them monthly and reach out if they are a good fit!
- Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting securityweekly.com, selecting the webcast/training drop down from the top menu bar and clicking registration.
Security News - 6:00-6:30PM
- Bug Bounties Continue to Rise, but Market Has Its Own 1% Problem
- A total of six hackers already become millionaires on HackerOne
- New Botnet Targets Android Set-Top Boxes
- Unsecured IoT: 8 Ways Hackers Exploit Firmware Vulnerabilities
- Hacker Jeopardy, Wrong Answers Only Edition
- Second Steam Client Zero-Day Disclosed in a Week
- Identifying vulnerable IoT devices by the companion app they use - Help Net Security
- How to avoid using RDP in Windows
- Asset Management Becomes the New Security Model - Dark Reading
- DLL Hijacking Flaw Found in Bitdefender Antivirus Free 2020 | SecurityWeek.Com
- LinkedIn Details Features of Fight Against Fakes
- Bypassing CSRF Protection
- Humans may have been listening to you via your Xbox
- Why Your Free Dark Web Scan Doesnt Matter
- Harnessing Stunt Hacking for Enterprise Defense | SecurityWeek.Com
- 5 Ways to Improve the Patching Process
- Android ad clicking - A notepad app and a fitness app downloaded on more than a million devices have been secretly clicking on ads without people knowing for nearly a year, security researchers found.
-  2FA defats 99.9% of all cyber attacks] - Microsoft says that systems that leverage multi-factor authentication block nearly all automated cyberattacks, not just on Microsoft platforms – on any online service or website.” Unless you uses SMS and sim swapping happens….
- Android settop boxes prime for malware - IoT botnets move into the home theater market in search of low-hanging fruit…
- Camscanner Android Malware -
An Android Camscanner PDF creator with more than 100 million downloads from the official Play Store has been caught silently installing malware on victims' phones.
- My password is Oyster… - London-dwelling Alfie Fresta wanted a National Rail travelcard discount added to his London Oyster card so the discount would work automatically with his pay-as-you-go smartcard. He was startled when London Overground staff at New Cross Gate station handed him a paper form with a box on it asking for his online Oyster account password.
- KNOB Attack Lets Hackers Insert themselves into your Bluetooth Calls KNOB attack expoits CVE-2019-9506 forcing one bite of entropy, allowing for brute force the key. Bluetooth core updated for minimum key of 7 octets. No publicly available exploit code (yet).
- Hackers Could Decrypt your GSM Calls Attack leverages weaknesses in the key exchange with the cell tower. Albeit a stingray attack is easier.
- Legit-Looking iPhone Lightning Cables will hack your Computer Cable has hotspot and multi-payload capability. Leverages USB device trust settings. O.MG Cable will become available through Hak5. Other cables on radar for similar implementation. MG DEFCON Blog
- Adult Site Luscious Data Breach PII of over 1 million users compromised, including .gov email addresses.
- Scammer tricks city of Saskatoon in BEC City tricked into sending over $1 million. Target accounts in Canada frozen, retrieval underway.
- 80 Suspects Charged with massive BEC Scam 14 arrests made across the us of Nigerian nationals. $6M taken, $40 more atempted via BEC, Romance Scams and other schemes that target the Elderly.
- Apple releases updates to iOS, MacOS and tvOS CVE-2019-8605, use after free code execution flaw discovered by Ned Williamson and Project Zero, fixed in iOS 12.4.1, macOS 10.14.6 suplimental update and tvOS 12.4.1.
- Passports, Licenses of 300 leaked in New Zealand New Zealand Ministry for Culture and Heritage had 300 individuals records exposed due to a coding error. Detected only after attempted fraudulent use of the data.
Tech Segment: Corey Thuen, Gravwell - 6:30 - 7:30PM
Topic: Analyzing custom log sources
Interview: Christopher Hadnagy, Social-Engineer, LLC.- 7:30PM-8:30PM
Through his educational not-for-profit www.social-engineer.org, Chris established the world’s first social engineering penetration testing framework, and created additional resources which have all become staples in the security industry and trusted references for global organizations. Chris is also the founder and CEO of www.social-engineer.com, where he helps strengthen organizations.
Chris specializes in understanding how malicious attackers exploit human communication and trust to obtain access to information and resources through manipulation and deceit. Chris is also a certified Expert Level graduate of Dr. Paul Ekman’s Micro Expressions courses, having made the study of non-verbal behaviors one of his fortes. Chris’s goal is to better secure organizations by educating them on the methods used by attackers, identifying their unique vulnerabilities, and mitigating potential issues through appropriate levels of awareness and security.
SEVillage Orlando 2020, Innocent Lives Foundation
Overview of inaugural SEVillage Orlando 2020. Brief description of the training workshops provided. Mission and information on non-profit Innocent Lives Foundation.