Difference between revisions of "PSWEpisode638"

From Security Weekly Wiki
Jump to navigationJump to search
Line 14: Line 14:
=== Hosts ===
=== Hosts ===

Revision as of 15:24, 6 February 2020

Recorded February 6, 2020 at G-Unit Studios in Rhode Island!

Episode Audio


  • Paul Asadoorian
    Embedded device security researcher, security podcaster, and CEO of Active Countermeasures .
  • Jeff Man
    Infosec analyst
    Pioneering ex-NSA pen tester
    PCI specialist
    Tribe of Hackers
    InfoSec Curmudgeon
    Currently a Sr. InfoSec Consultant for Online Business Systems.
  • Lee Neely
    is a Sr. Cyber Analyst at LLNL,SANS Analyst, SANS NewsBites Editor
  • Patrick Laverty
    is a Pentester for Rapid7

  • Announcements

    • Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
    • OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!
    • We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting securityweekly.com/subscribe and clicking the button to join the list! You can also submit your suggestions for guests by going to securityweekly.com/guests and submitting the form! We'll review them monthly and reach out if they are a good fit!
    • Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting securityweekly.com, selecting the webcast/training drop down from the top menu bar and clicking registration.

    Interview: Katelyn Bowden, BADASS (Battling against Demeaning and Abusive Selfie Sharing) - 6:00-6:45PM

    After finding her own intimate photos online without her consent, Katelyn Bowden discovered that there weren’t many resources for those who find themselves victims of this sort of abuse. In response, she started B.A.D.A.S.S., a nonprofit dedicated to fighting image abuse through victim empowerment and awareness. In their 2 year existence, BADASS has accomplished a lot- from legislation to education, and there’s so much more on the way.

    Segment Topic:

    Segment Description:
    We are going to discuss BADASS, and it’s role in the cybersecurity community. What security means to us, and ways that users can protect their most intimate data

    Segment Resources:

    Tech Segment: - 6:45PM-7:30PM

    Security News - 7:30-8:30PM

    Paul's Stories

    1. Kali Linux 2020.1 released: New tools, Kali NetHunter rootless, and more! - Help Net Security
    2. How to better control access to your Windows network
    3. Coronavirus claims new victim: 'DEF CON cancelled' joke cancelled after DEF CON China actually cancelled
    4. Rings selling my email address to spammers? Thats the least of its problems
    5. Wawa card breach: 30 million card records for sale in the dark web
    6. 97% of airports showing signs of weak cybersecurity
    7. Enterprise Hardware Still Vulnerable to Memory Lane Attacks
    8. Check Point detailed two flaws in Microsoft Azure that could have allowed taking over cloud servers
    9. Securing Containers with Zero Trust

    Larry's Stories

    Jeff's Stories

    Lee's Stories

    1. Sudo bug lets non-privileged Linux and MacOS users run commands as root CVE-2019-18634 affects Sudo 1,8.26 and earlier - stack based buffer overflow - patches in MacOS 10.13,6, 10.14.6, 10.15.2 and Sudo 1.8.30
    2. Ashley Madison Breach data now being used for Extortion Scam targets hundreds of users, demanding .1188 BTC.
    3. Twitter fixes API bug Bug in API that could be used to reveal users by matching names and phone numberes, if they have the "let people who have your phone number find you on Twitter" setting on.
    4. Microsoft patches flaws in Azure stack CVE-2019-1372, a high risk vulnerability as it allows RCE as system & CFE-201-1234, a low risk vulnerability.
    5. 8 cities that have been crippled by Cyberattacks and what they did to fight them Here is how attacks on Atlanta, Baltimore, St. Lucie, New Bedford, New Orleans, Greenville, Pensicola, and Wilmer handled them.

    Tyler's Stories

    Follow us on Twitter Watch Security Weekly videos Listen to Security Weekly Security Weekly fan page Connect with Paul Google+