Difference between revisions of "PSWEpisode634"
m (→Lee's Stories)
|Line 2:||Line 2:|
|Line 10:||Line 10:|
=== Hosts ===
=== Hosts ===
Latest revision as of 16:39, 13 January 2020
Recorded January 9, 2020 at G-Unit Studios in Rhode Island!
- Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
- OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!
- We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting securityweekly.com/subscribe and clicking the button to join the list! You can also submit your suggestions for guests by going to securityweekly.com/guests and submitting the form! We'll review them monthly and reach out if they are a good fit!
- Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting securityweekly.com, selecting the webcast/training drop down from the top menu bar and clicking registration.
Interview: Dan DeCloss, PlexTrac - 6:00-6:45PM
Dan is the Founder and CEO of PlexTrac and has over 14 years of experience in Cybersecurity. Dan started his career in the Department of Defense and then moved on to consulting where he worked for various companies including serving as a Principal Consultant for Veracode on the penetration testing team. Dan's background and expertise is in application security and penetration testing, involving hacking networks, websites, and mobile applications for clients. He has also served as a Principal Security Engineer for the Mayo Clinic and a Sr. Security Advisor for Anthem – a Fortune 40 health insurance firm. Prior to PlexTrac, Dan was the Director of Cybersecurity for Scentsy where he and his team built the security program out of its infancy into a best-in-class program.
Dan has a Master’s Degree in Computer Science from the Naval Postgraduate School with an emphasis in Information Security. Additionally, Dan holds the OSCP and CISSP certifications. Dan has a passion for helping everyone understand cybersecurity at a practical level, ensuring that there is a good understanding of how to reduce their overall risk.
Improve Pen Testing Outcomes With Purple Teaming
Description: Purple teaming reduces the lifespan of vulnerabilities found from penetration tests by facilitating knowledge transfer between red and blue teams in the remediation phase. PlexTrac provides a single interface through which red teams may report vulnerabilities and blue teams may remediate them. Visit https://securityweekly.com/plextrac to claim your free month of PlexTrac. Also, be sure to stop by their booth in the Early Stage Exhibit at RSA next month, then Human Hacking, Wild West Hacking Fest, and Blackhat
- Purple Team - We don’t have a full-blown internal pen test team, but hire externally. We run purple teaming exercises and track issues and remediation with PlexTrac.
- The living report - Pen testers must continuously work with the client to collaborate on the findings and remediation.
- Pull in vulnerability data from multiple sources - How should you prioritize? How does PlexTrac help?
- Purple Team Cheat Sheet, Demo videos of new features
Tech Segment: Ambuj Kumar, Fortanix - 6:45PM-7:30PM
Ambuj Kumar is co-founder and CEO of Fortanix, creator of Runtime Encryption® technology. In his career, Ambuj has built technologies and products that secure billions of devices. Ambuj is a prolific inventor with more than 30 patents. He holds degrees from Stanford University and IIT Kanpur (Gold Medalist).
The Keys to Your Kingdom: Protecting Data in Hybrid and Multiple Public Clouds
According to Gartner, 70% of businesses are adopting a hybrid cloud and multi-cloud strategy to augment their internal datacenters. The challenges of protecting data and using encryption for multiple hybrid, public cloud, and on-premises environments increases complexity, cost, and security risk. As workloads and sensitive data move to the cloud, keeping cryptographic keys, shared secrets and tokens secure is critical to secure public cloud deployments and successful digital transformation.
- Cloud Encryption Solutions Brief - https://resources.fortanix.com/simplified-hybrid-and-multi-cloud-encryption-solution-brief
- PayPal Demonstration Video https://resources.fortanix.com/paypal-google-cloud-external-key-manager
- Blog Part 1 - Keeping the Keys to Your Kingdom: Google and Fortanix Collaborate to Deliver “BYOKMS” https://www.fortanix.com/blog/2019/11/keeping-the-keys-to-your-kingdom-google-and-fortanix-partner-to-deliver-byokms/
- Blog Part 2 - Keeping the Keys to Your Kingdom: Google and Fortanix Collaborate to Deliver “BYOKMS” https://www.fortanix.com/blog/2019/11/keeping-the-keys-to-your-kingdom-google-and-fortanix-partner-to-deliver-byokms-2/
Security News - 7:30-8:30PM
- Backdoored Phishing Kits are still popular
- Left of boom: Do we actually do this?
- InfoSec Handlers Diary Blog
- Mailbox Master Keys - Schneier on Security
- Microsoft report: around 0.08% of RDP brute-force attacks are successful
- Car Hacking Hits the Streets - Dark Reading
- Google Security Update Fixes Critical RCE Flaw
- That Pulse Secure VPN you're using to protect your data? Better get it patched or it's going to be ransomware time
- Open Source FirmwareWhy Should We Support It?
- What if everyone just said 'Nah' to tracking?
- The Art of Cloud War for Business-Critical Data
- MITRE presents ATT&CK for ICS, a knowledge base for ICS
- Getting Serious About Open Source Security
- Las Vegas Suffers Cyberattack on First Day of CES
- California's IoT cybersecurity bill: What it gets right and wrong - Help Net Security
- Browser zero day: Update your Firefox right now!
- North Korean Hackers Continue to Target Cryptocurrency Exchanges | SecurityWeek.Com
- 4 Ring Employees Fired For Spying on Customers
- Experts warn of ongoing scans for Citrix servers affected by CVE-2019-19781
- Tapplock introduces new enterprise fingerprint scanning padlock accessories - Help Net Security
- Security Ladders
- MITRE Attack framework for ICS. How timely, given the political state of affairs...
- Jamming Chamberlain MyQ garage doors
- Travelex crippling hack hints at new combined ransomware/data breach attacks
- Credit card breach affects 60 national restaurant chains – here's what you need to know
- Search engine for Japanese sex hotels announces security breach
- Would You Hire Someone to Hack Into Your Company? These CEOs Did--and They Think You Should, Too
- https://www.texastribune.org/2020/01/07/greg-abbott-warns-texas-seeing-thousands-cyber-attacks-iran/ so the question is, is network recon a cyber attack or not?
- CISA Bulletin AA20-006A: Potential for Iranian Cyber Response to U.S. Military Strike in Baghdad Guidance on preventative actions and Iranian threat profile/cyber activity.
- You Should Never Print your boarding pass, here's why Boarding passes contain extra informtion which should be protected.
- Half the global 815 Million Smart Speakers put user's privacy at risk
- Shitcoin Wallet Chrome Extension Steals Crypto-Wallet Private Keys and Passwords The extension has been pulled from Chrome store. Remove from browsers where installed. Crypto wallet security only as good as weakest link.
- Facebook moves to detect and remove deep-fake videos Intent to find artificially created AV content, questions of false positives remain.
- PGP keys, software security, and more threatened by new SHA1 Exploit New "collision" attack reinforcing SHA1 is dead. SHA1 still default in many places, such as GNUPG and GitHub for generating signatures.
- Las Vegas hacked: Sin City Hit Attack, suspected ransomware, hits city of Las Vegas. Normally survives about 300,000 attempts/month. Question: how are your recovery/rebuild capabilities and have you tested them (IRL, not tabletop?)
- Chinese Malware Found Preinstalled on US Government-Funded Phones Assurance Wireless, a federal Lifeline Assistance program under Virgin Mobile delivers android devices with pre-installed malware.
- US-CERT AA20-010A: Continued Exploitation of Puls secure VPN Vulnerability Timelines and other events relating to unpatched Pulse Secure VPN servers