Recorded January 16, 2020 at G-Unit Studios in Rhode Island!
- 1 Episode Audio
- 2 Announcements
- 3 Interview: Gene Kim, IT Revolution - 6:00-6:45PM
- 4 Tech Segment: Ryan Speers & Jeff Spielberg, River Loop Security - 6:45PM-7:30PM
- 5 Security News - 7:30-8:30PM
- Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
- OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!
- We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting securityweekly.com/subscribe and clicking the button to join the list! You can also submit your suggestions for guests by going to securityweekly.com/guests and submitting the form! We'll review them monthly and reach out if they are a good fit!
- Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting securityweekly.com, selecting the webcast/training drop down from the top menu bar and clicking registration.
Interview: Gene Kim, IT Revolution - 6:00-6:45PM
Gene Kim is a multiple award-winning CTO, researcher and author, and has been studying high-performing technology organizations since 1999. He was founder and CTO of Tripwire for 13 years. He has written six books, including The Unicorn Project (2019), The Phoenix Project (2013), The DevOps Handbook (2016), the Shingo Publication Award winning Accelerate (2018), and The Visible Ops Handbook (2004-2006) series. Since 2014, he has been the founder and organizer of DevOps Enterprise Summit, studying the technology transformations of large, complex organizations.
The Unicorn Project and The Five Ideals
I’ll share with you my goals and aspirations for The Unicorn Project, describe in detail the Five Ideals, along with my favorite case studies of both ideal and non-ideal, and why I believe more than ever that DevOps will be one of the most potent economic forces for decades to come.
Tech Segment: Ryan Speers & Jeff Spielberg, River Loop Security - 6:45PM-7:30PM
Hardware or Device based security. Designing security from the beginning of product development
The world continues to see a proliferation of highly insecure IoT/embedded products. How can companies making embedded products design security in from the start, and why don’t they do it today? Importantly, security needs to be baked in while remaining lean and moving quickly towards an MVP product. Discussions will range from hardware chip selection, cryptographic protocol design, and firmware security -- both at the design and security pen test phases.
- Problem Space
- We keep seeing the same vulnerabilities in embedded / IoT – hardcoded passwords, outdated open source packages, unnecessary network exposure. While some exploited vulns are complex chains, most remain simple, fixable issues. However, we continue to see thousands of new embedded devices (consumer IoT to industrial and critical system) that don’t fix these issues (summary of landscape from f-prime at https://s3-eu-central-1.amazonaws.com/evermade-fsecure-assets/wp-content/uploads/2019/04/01094545/IoT-Threat-Landscape.pdf). This creates the need to start identifying these issues earlier in development since patching cycle times in embedded are long.
- Shifting security left
- We looked at our past data from 10 years of services work, and found that it’s more expensive for firms to respond to 1 vulnerability disclosure than it is to do an end-to-end embedded secure design process https://www.riverloopsecurity.com/blog/2019/08/proactive-reactive/
- Where security teams/expertise can help
- Considerations for embedded
- There’s a special order of operations when it comes to embedded systems – hardware changes can be incredibly expensive (for a PCB turn), and there’s a goal to always minimize BOM cost. This manifests itself as issues with chip selection and hardware design which create vulnerabilities from the start – that have no easy fix in the field. This makes the initial threat modeling, architecture, and key design decisions (e.g. chip selection) critical to get right
- Using tooling
- We’ve open sourced some things that may be relevant, such as https://www.riverloopsecurity.com/blog/2019/04/secure-embedded-development-banned-h/ to help developers avoid memory safety issues in the first place as much as possible. Firmware Security Analysis – quickly growing field - There are tools for firmware evaluation, including some open source ones such as https://github.com/cruise-automation/fwanalyzer and more in-depth commerical ones such as one we launched, https://pilot-security.com. If you want, we could talk about what such types of tools can/can’t do - and how people can use them to find bugs early in development.
Security News - 7:30-8:30PM
- Powerful GPG collision attack spells the end for SHA-1
- Artificial Personas and Public Discourse - Schneier on Security
- Unpatched Citrix Flaw Now Has PoC Exploits
- How Cyber Security Affects SEO
- Cisco addressed a high-severity bug in Webex that could allow Remote Code Execution
- Security pitfalls to avoid when programming using an API - Help Net Security
- Lottery hacker gets 9 months for his 5 cut of the loot
- 5G Security - Schneier on Security
- Exploit that gives remote access affects ~200 million cable modems
- Perfect Sense unveils Gyro to simplify cloud infrastructure management - Help Net Security
- Serious back door Vulnerabilities spotted in Tik Tok
- Malicious npm package taken down after Microsoft warning
- Windows 10: NSA reveals major flaw in Microsoft's code
- Trump Slams Apple for Refusing to Unlock Suspected Shooters iPhones
- PussyCash adult webcam data breach exposes highly sensitive data of models
- How to Reduce Your Attack Surface with 11 Proven Tips
- PayPal patches high severity password vulnerability Security token exposure in CAPTCHA process resolved. No evidence of abuse found.
- DOI halting use of DJI drones over concerns of Chinese Tech DOI has over 800 DJI drones which may have surveylence capabilities. Decision to replace rather than repair.
- Maze ransomware operators publish 14GB of Southwire files Southware refused to pay the ransom, and obtained an injunction aginst the first publisher of their data. Maze raises the stakes. REvil similarly inclined.
- AA20-014A: Critical Vulnerabilities in Microsoft Windows Operating Systems CryptoAPI spoofing vulnerability - CVD-2020-0601, Windows RDP vulnerabilities - CVD-2020-0609, CVD-2020-0610, CVD-2020-0611 - impacts Server 2012 and newer, Windows 7 and newer. Apply January patch bundle.