PSWEpisode630

From Paul's Security Weekly
Revision as of 22:21, 11 December 2019 by Johnny (talk | contribs) (Tech Segment: John Strand, BHIS - 6:45PM-7:30PM)
Jump to: navigation, search

Recorded December 12, 2019 at G-Unit Studios in Rhode Island!

Episode Audio

Hosts

  • Paul Asadoorian
    Embedded device security researcher, security podcaster, and CEO of Active Countermeasures .
  • Larry Pesce
    Senior Managing Consultant and Director of Research at InGuardians, SANS Instructor.
  • Lee Neely
    is a Sr. Cyber Analyst at LLNL,SANS Analyst, SANS NewsBites Editor


  • Announcements

    • Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
    • OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!
    • We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting securityweekly.com/subscribe and clicking the button to join the list! You can also submit your suggestions for guests by going to securityweekly.com/guests and submitting the form! We'll review them monthly and reach out if they are a good fit!
    • Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting securityweekly.com, selecting the webcast/training drop down from the top menu bar and clicking registration.


    Interview: Jorge Salamero, Sysdig - 6:00-6:45PM

    Jorge Salamerois the Director of Technical Marketing at Sysdig


    Jorge enjoys playing with containers and Kubernetes, home automation and DIY projects. Currently, he is part of the Sysdig team, and in the past was a Debian developer. When he is away from computers, you will find him walking with his 2 dogs in the mountains or driving his car through a twisted road.

    Segment Topic:


    Segment Description:

    Tech Segment: John Strand, BHIS - 6:45PM-7:30PM

    John Strandis the Security analyst, Founder of Black Hills Information Security, and CTO of Offensive Countermeasures.


    John Strand is the Founder of Black Hills Information Security and Active Countermeasures. John has both consulted and taught hundreds of organizations in the areas of security, regulatory compliance, and penetration testing. John is a contributor to the industry shaping Penetration Testing Execution Standard and 20 Critical Controls frameworks.

    Segment Topic:
    Backdoors & Breaches

    Segment Description:

    Security News - 7:30-8:30PM

    Paul's Stories

    1. Your Smart Christmas Lights Are Safer Than They Were Last Year - There is hope for IoT security! (and I own these lights, and hopefully the new version...or maybe hopefully the old version so I can more easily hack my Christmas tree): The good news is that researchers at Pen Test compared tests they did on the Twinkly lights (from the manufacturer LEDWORKs) last year to the new version of the lights released for the 2019 holiday season and found most of the issues to be solved. LEDWORKS replaced the ESP8266 module with the slightly more secure ESP32, which researchers mentioned in their public research about the security of the lights last year was a better option than the one already in the product.
    2. Exploring Legacy Unix Security Issues | Liquidmatrix Security Digest
    3. Intels SGX coughs up crypto keys when scientists tweak CPU voltage - 'By subtly increasing or decreasing the current delivered to a CPU—operations known as "overvolting" and "undervolting"—a team of scientists has figured out how to induce SGX faults that leak cryptographic keys, break integrity assurances, and potentially induce memory errors that could be used in other types of attacks. The breakthrough leading to these attacks was the scientists' ability to use previous research into the undocumented model-specific register inside the x86 instruction set to abuse the dynamic voltage scaling interface that controls the amount of voltage used by a CPU. Also noteworthy is surgically controlling the voltage in a way that introduces specific types of attacks.
    4. Russian police raid NGINX Moscow office | ZDNet
    5. Reusing Cookies
    6. Consumers not willing to compromise when it comes to IoT security - Help Net Security - It's one thing to say in a survey that you care about the security of your IoT devices, but another when you are actually shopping and realize that a device with the same functionality can be purchased for 75% cheaper than the "secure" one.
    7. AirDoS: Hackers Can Block iPhones, iPads Via AirDrop Attack | SecurityWeek.Com - Annoying: Bagaria discovered that an attacker can use the AirDoS attack to “infinitely spam” all nearby iPhones and iPads with an AirDrop popup. The dialog box will keep appearing on the screen regardless of how many times the user presses the Accept or Decline buttons. The attack will continue even after the user locks and unlocks the device.
    8. Shenzhen's Homegrown Cyborg
    9. How Hackers Are Breaking Into Ring Cameras - Enable two-factor, this is just a password spraying/guessing attack. The tools being traded and sold also sound really lame (and probably have backdoors put in by the authors).
    10. Bloomberg accidentally created an Alexa Fleshlight and oh my gawd - Okay, relax everyone, it's an ear. That's they, er, uh, wrong security hole?
    11. 4 Steps to Communicate Anything Clearly, According to a Scientist Who Teaches Quantum Physics to Kids - I love 1, 2 and 4. #3 would not fly for most audiences we present to, but again depends on the audience.
    12. InfoSec Handlers Diary Blog - Integrating Pi-hole Logs in ELK with Logstash - I mean, because, why not? This is really great.
    13. New PyXie Python RAT targets multiple industries
    14. Use Hash-Identifier to Determine Hash Types for Password Cracking
    15. 20 VPS providers to shut down on Monday, giving customers two days to save their data | ZDNet
    16. Scientists Crack Longest, Most Complex Encryption Key Ever

    Larry's Stories

    Lee's Stories

    1. Reveton ransomware schemer stripped of six years of freedom, ₤270,000, and Rolex This was malvertizing which loaded fake ransomware which tricked users into making payments via older techniques rather than actually encrypting files. The prosecution estimates he collected closer to £720,000, the court has given him 3 months to collect the fine, or face two years in jail and the fine remains.


    <center> Follow us on Twitter Watch Security Weekly videos Listen to Security Weekly Security Weekly fan page Connect with Paul Google+