Difference between revisions of "HNNEpisode244"

From Paul's Security Weekly
Jump to: navigation, search
(Annoucements:)
(Expert Commentary: Adam Gordon, ITProTV)
Line 24: Line 24:
  
 
==Expert Commentary: Adam Gordon, [https://securityweekly.com/itpro ITProTV] ==
 
==Expert Commentary: Adam Gordon, [https://securityweekly.com/itpro ITProTV] ==
[[File:AdamGordon.jpg|thumb|right|<center>[https://www.twitter.com/Adam_ITProTV Adam Gordon] is an Edutainer at [https://securityweekly.com/itpro ITProTV].</center>]] Adam has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career.
+
[[File:AdamGordon.jpg|thumb|right|<center>[https://www.twitter.com/Adam_ITProTV Adam Gordon] is an Edutainer at [https://securityweekly.com/itpro ITProTV].</center>]] Adam has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career.<br><br>'''Segment Topic:'''<br>DevSecOps and the culture clash in organizations<br>
 +
# Why do so many organizations view Threats as dynamic, but see risk as a static thing?
 +
# Why is there a lack of ability to see the operational landscape as a derivative of Vulnerabilities, Threats & Risks?
 +
# Why are organizations not able to realize and understand Security ROI from Dev Ops approaches? (lack of meaning + lack of understanding  = lack of security culture (Enterprise Security Architecture))
 +
# What is insanity in the I.T. space? is it practitioners doing the same things over and over, expecting different outcomes? or is it management proudly ignoring common sense in favor of complexity that allows "infrastructure circles" to form?
 
{{SocialMedia}}
 
{{SocialMedia}}

Revision as of 17:14, 3 December 2019

Recorded December 3, 2019 at G-Unit Studios in Rhode Island!

Episode Audio

Hosts

  • Paul Asadoorian
    Embedded device security researcher, security podcaster, and CEO of Active Countermeasures .
  • Annoucements:

    • Register for one of our upcoming webcasts with Steve Laubenstein of Core Security (or all of them!) by going to securityweekly.com -> Click the webcast dropdown & Select Registration! If you have missed any of our previously recorded webcasts, you can find our on-demand library by selecting on-demand from the webcast drop down! If you attend any of our webcasts, you will receive 1 CPE credit per webcast!

    Security News

    1. Vulnerabilities Disclosed in Kaspersky, Trend Micro Products - According to SafeBreach, Kaspersky Secure Connection (KSDE), a VPN client used with various Kaspersky applications, including Security Cloud, Internet Security, Anti-Virus, Total Security, and Kaspersky Free, is impacted by CVE-2019-15689, a vulnerability that could allow an attacker to implant and run an arbitrary unsigned executable. Specifically, KSDE, a signed service that starts automatically at system boot up and which runs as SYSTEM, attempts to load multiple missing DLLs. An attacker able to load an arbitrary DLL could have it run with SYSTEM privileges within the context of ksde.exe. Similar vulnerabilities allow attackers to load DDLs in Trend Micro Products. SafeBreach reported these vulnerabilities to the respective vendors in July of this year. All three have acknowledged the bugs and issued CVE numbers for them.
    2. Microsoft OAuth Flaw Opens Azure Accounts to Takeover - The vulnerability exists because when Microsoft applications undergo the OAuth 2.0 (the next generation of OAuth) authorization flow, they trust certain third-party domains and sub-domains that are not registered by Microsoft. CyberArk researchers discovered three vulnerable Microsoft applications that trust these unregistered domains: Portfolios (a portfolio management tool), O365 Secure Score (a security analytics tool) and Microsoft Trust Service (a portal providing resources about Microsoft security, privacy and compliance practices). at least 54 sub-domains with these URL endings were not registered in the Azure portal – plus, there may be more that weren’t discovered, he said. Attackers can take advantage of this by taking over these domains and then registering them, meaning that they would be approved by default and could request users’ “access_tokens,” which would then allow them to take actions using users’ permissions
    3. Kali Linux Gets New Desktop Environment & Undercover Theme - With the new release, Offensive Security has moved Kali Linux from Gnome to Xfce, a lightweight, open source desktop environment for Linux, BSD, and other Unix-like operating systems. The move is designed to improve performance and the user experience for pen-testers, according to Offensive Security. Xfce, for instance, runs on all levels of Kali installs from high-end laptops to lower-end ARM-based systems.
    4. StrandHogg Vulnerability Allows Malware to Pose as Legitimate Android Apps - The researchers said attackers can use the vulnerability to allow “real-life malware to pose as legitimate apps, with users unaware they are being targeted,” according to a blog post. “The attack can be designed to request permissions which would be natural for different targeted apps to request, in turn lowering suspicion from victims,” researchers wrote. “Users are unaware that they are giving permission to the hacker and not the authentic app they believe they are using.” If the flaw is exploited, to users it appears that they are clicking on an app that they use every day, such as Facebook or Instagram. However, what happens when they click on the app is that instead of the app a user intended to open starting up, malware is deployed that can give permissions to the hacker, who is directed to the legitimate app, researchers said.
    5. Critical Code Execution Vulnerability Found in GoAhead Web Server - Developed by EmbedThis, GoAhead is advertised as the “world's most popular tiny embedded web server.” Both open-source and enterprise versions are available and the vendor says GoAhead is present in hundreds of millions of devices. A Shodan search for GoAhead currently shows over 1.3 million internet-connected systems. The critical GoAhead vulnerability discovered by Talos is related to how multi-part/form-data requests are processed. An unauthenticated attacker can exploit this weakness to trigger a use-after-free condition and execute arbitrary code on the server by sending specially crafted HTTP requests. The security hole is tracked as CVE-2019-5096 and it has been assigned a CVSS score of 9.8.
    6. Control access and permissions to AWS services and resources - If you are in AWS, you should use this: Resource policies allow customers to granularly control who is able to access a specific resource and how they are able to use it across the entire cloud environment. With one click in the IAM console, customers can enable the analyzer across their account to continuously analyze permissions granted using policies associated with their Amazon S3 buckets, AWS KMS keys, Amazon SQS queues, AWS IAM roles, and AWS Lambda functions. While there are other solutions out there for this, it doesn't hurt to enable additional monitoring as your cloud configuration likely changes, a lot.

    Expert Commentary: Adam Gordon, ITProTV

    Adam Gordon is an Edutainer at ITProTV.
    Adam has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career.

    Segment Topic:
    DevSecOps and the culture clash in organizations
    1. Why do so many organizations view Threats as dynamic, but see risk as a static thing?
    2. Why is there a lack of ability to see the operational landscape as a derivative of Vulnerabilities, Threats & Risks?
    3. Why are organizations not able to realize and understand Security ROI from Dev Ops approaches? (lack of meaning + lack of understanding = lack of security culture (Enterprise Security Architecture))
    4. What is insanity in the I.T. space? is it practitioners doing the same things over and over, expecting different outcomes? or is it management proudly ignoring common sense in favor of complexity that allows "infrastructure circles" to form?

    Follow us on Twitter Watch Security Weekly videos Listen to Security Weekly Security Weekly fan page Connect with Paul Google+