Difference between revisions of "Psw660"

From Security Weekly Wiki
Jump to navigationJump to search
(Added By Paul's Craptastic PPWorks Code)
 
(Added By Paul's Craptastic PPWorks Code)
Line 10: Line 10:
 
************************* DO NOT EDIT THIS SECTION. THIS IS AUTO-GENERATED BY PPWORKS. YOUR CHANGES WILL BE LOST! ***************************
 
************************* DO NOT EDIT THIS SECTION. THIS IS AUTO-GENERATED BY PPWORKS. YOUR CHANGES WILL BE LOST! ***************************
 
-->
 
-->
= 1.  Gravwell Big Bang Release - 06:00 PM  =
+
= 1.  Gravwell Big Bang Release - 06:00 PM-06:45 PM  =
 
<!--   
 
<!--   
 
************************* MAKE CHANGES IN THE TEMPLATES BELOW! ***************************
 
************************* MAKE CHANGES IN THE TEMPLATES BELOW! ***************************
Line 16: Line 16:
  
  
 +
 +
=== Announcements ===
 +
<ul style="margin-left: 50px;">
 +
 +
<li> <p>Security Weekly is an official media partner for Virtual BlackHat 2020! To register and save $200, visit <a href="https://securityweekly.com/summercamp2020" rel="nofollow">https://securityweekly.com/summercamp2020</a> and click the register button. Discount code: “20SecWeekbh” Alongside Virtual BlackHat, we will be running our conference micro-interviews, you guessed it, virtually, in an event called Security Weekly Virtual Hacker Summer Camp, August 3 – August 6, 2020. Options, pricing and availability are all listed on the same page! Reserve your slot now to get your message out to BlackHat attendees!</p></li>
 +
 +
</ul>
  
 
=== Description ===
 
=== Description ===
  
 +
<p>The Gravwell Data Fusion platform is releasing a major update this week. New features make analyzing logs and network data much easier for new users while still keeping the raw power of a unix-like search query pipeline for power users. Gravwell is free for community use and during launch week if you sign up for CE we’re bumping the data cap up to 4 GB/day. This segment is sponsored by Gravwell. Visit <a href="https://securityweekly.com/gravwell" rel="nofollow">https://securityweekly.com/gravwell</a> to learn more about them!</p>
 +
 +
 +
 +
 +
==Guest(s)==
 +
 +
 +
===Corey Thuen===
 +
<gallery mode="nolines" widths=175px heights=175px>
 +
 +
Image:Corey_Thuen_-0.jpg|'''[https://twitter.com/@CoreyThuen Corey Thuen]''' is Co-Founder at Gravwell<br>
 +
 +
</gallery>
 +
Corey Thuen is a founder of Gravwell and has spent over a decade doing cybersecurity at places like Department of Energy national labs, Digital Bond, and IOActive. That experience is now driving development of a full-stack analytics platform built to alleviate pain points he personally experienced from inflexible tools.<br>
  
  
Line 24: Line 46:
  
 
<gallery mode="nolines" widths=175px heights=175px>
 
<gallery mode="nolines" widths=175px heights=175px>
 +
 +
Image:Doug_White-0.png|<center>[https://twitter.com/@dougwhitephd Doug White]  - Professor at Roger Williams University</center>
 +
 +
Image:Jeff_Man_2-0.jpg|<center>[https://twitter.com/@MrJeffMan Jeff Man]  - Sr. InfoSec Consultant at Online Business Systems</center>
 +
 +
Image:Joff_Thyer-0.jpg|<center>[https://twitter.com/@joff_thyer Joff Thyer]  - Security Analyst at Black Hills Information Security</center>
 +
 +
Image:larry_headshot-0.jpg|<center>[https://twitter.com/@haxorthematrix Larry Pesce]  - Senior Managing Consultant and Director of Research at InGuardians</center>
 +
 +
Image:Lee_Neely-0.jpg|<center>[https://twitter.com/@lelandneely Lee Neely]  - Senior Cyber Analyst  at Lawrence Livermore National Laboratory</center>
  
 
Image:Paul_Asadoorian-0.png|<center>[https://twitter.com/@securityweekly Paul Asadoorian]  - Founder & CTO at Security Weekly</center>
 
Image:Paul_Asadoorian-0.png|<center>[https://twitter.com/@securityweekly Paul Asadoorian]  - Founder & CTO at Security Weekly</center>
 +
 +
Image:Tyler_Robinson-0.png|<center>[https://twitter.com/@tyler_robinson Tyler Robinson]  - Managing Director of Network Operations at Nisos, Inc</center>
  
 
</gallery>
 
</gallery>

Revision as of 18:02, 29 July 2020

Paul's Security Weekly Episode #660 - July 30, 2020

Subscribe to all of our shows and mailing list by visiting: https://securityweekly.com/subscribe

1. Gravwell Big Bang Release - 06:00 PM-06:45 PM

Announcements

  • Security Weekly is an official media partner for Virtual BlackHat 2020! To register and save $200, visit <a href="https://securityweekly.com/summercamp2020" rel="nofollow">https://securityweekly.com/summercamp2020</a> and click the register button. Discount code: “20SecWeekbh” Alongside Virtual BlackHat, we will be running our conference micro-interviews, you guessed it, virtually, in an event called Security Weekly Virtual Hacker Summer Camp, August 3 – August 6, 2020. Options, pricing and availability are all listed on the same page! Reserve your slot now to get your message out to BlackHat attendees!

Description

The Gravwell Data Fusion platform is releasing a major update this week. New features make analyzing logs and network data much easier for new users while still keeping the raw power of a unix-like search query pipeline for power users. Gravwell is free for community use and during launch week if you sign up for CE we’re bumping the data cap up to 4 GB/day. This segment is sponsored by Gravwell. Visit <a href="https://securityweekly.com/gravwell" rel="nofollow">https://securityweekly.com/gravwell</a> to learn more about them!



Guest(s)

Corey Thuen

Corey Thuen is a founder of Gravwell and has spent over a decade doing cybersecurity at places like Department of Energy national labs, Digital Bond, and IOActive. That experience is now driving development of a full-stack analytics platform built to alleviate pain points he personally experienced from inflexible tools.


Hosts

2. MIDAS - 07:00 PM

Description

Hosts

3. Security News - 08:00 PM

Description

Hosts

Paul Asadoorian's Content:

Articles

  1. DIY: Hunting Azure Shadow Admins Like Never Before
  2. Bitdefender Releases Landmark Open Source Software project - Hypervisor-based Memory Introspection - Interesting: using APIs within hypervisors – based on CPU instructions - to gain access to raw memory events within running virtual machines and apply security logic by taking advantage of the role of hypervisors in the workload stack to stop attacks.
  3. CVE-2020-8163
  4. Companies Respond to 'BootHole' Vulnerability - The vulnerability is a buffer overflow related to how GRUB2 parses its grub.cfg configuration file. An attacker with admin privileges on the targeted system can modify this file so that their malicious code is executed in the UEFI environment before the OS is loaded.
  5. Bug in widely used bootloader opens Windows, Linux devices to persistent compromise - Help Net Security
  6. Vulnerability Allowed Brute-Forcing Passwords of Private Zoom Meetings
  7. GNU GRUB2 Vulnerability - Original research from Eclypsium: https://eclypsium.com/wp-content/uploads/2020/07/Theres-a-Hole-in-the-Boot.pdf
  8. Python Developers: Prepare!!! - People all for sudden forgot that preparing SQL statements is a thing. I think the problem is in part that Python makes it so easy to mix up prepared/not-prepared. I think an ORM helps A TON with these types of problems.
  9. Offensive Security Acquires Cybersecurity Training Project VulnHub
  10. 11 Tips And Tricks To Write Better Python Code
  11. Source code from 50+ companies, including Nintendo, Microsoft and Adobe, published online - The published code from Nintendo is gaining much of the attention online because it gives an inside look at the source code behind a range of classic games including Mario, Mario Kart, Zelda, F-Zero and Pokemon series. The Nintendo code also includes pre-release art, fully playable prototypes of some games and even references to projects that were never completed. Looks like poor source code version/repo controls.
  12. The Age of Mass Surveillance Will Not Last Forever - I kinda agree: Meanwhile, the corporations of the world digested the realization that their darkest shame—their willful complicity in crimes against the public—had not been punished. Rather, these collaborators had been actively rewarded, with either explicitly retroactive immunity or informal guarantees of perpetual impunity. They became our latest Big Brother, striving to compile perfect records of private lives for profit and power. From this emerged the contemporary corruption of our once-free internet, called surveillance capitalism.
  13. BootHole Secure Boot Threat Found In Most Every Linux Distro, Windows 8 And 10
  14. Hackers Broke Into Real News Sites to Plant Fake Stories - Ghostwriter has deployed a bolder tactic: hacking the content management systems of news websites to post their own stories. They then disseminate their literal fake news with spoofed emails, social media, and even op-eds the propagandists write on other sites that accept user-generated content. GRU? NO evidence, but why not mention them: While FireEye has made no such claims that the Ghostwriter news site compromises were the work of the GRU, Hultquist argues that the incidents in Poland and the Baltics should nonetheless serve as a warning.
  15. New tool detects shadow admin accounts in AWS and Azure environments
  16. The Garmin Ransomware Hack Is Horrifying - So opt-out, and all the features go bye-bye (* shaking my head): While most Garmin smartwatches do not connect to the internet natively and store workout information on the devices themselves, the Garmin Connect app does not allow users to transfer their workout information to the app without storing it on Garmin’s servers. Garmin allows users to “Opt Out” of sharing workout information with the company, but opting out makes the app essentially useless
  17. New Features in Python 3.9