Monday, January 24, 2022

7 Minute Security

7MS #504: Monitoring All Your Cloud Thingies with UptimeRobot

Hey friends, today we're talking about how to monitor all your cloud thingies (Web servers, mail servers, etc.) with UptimeRobot. And I'm sharing some fun tips to monitor your internal thingies as well - without the use of any extra agent software. A few tips: If you have a port like 80 or 443 that you have firewalled off to not allow any ol' host to hit, and you still want UptimeRobot to monitor it, one thing you could do if it's a Linux host is create a new screen session: screen -R uptime Then create a new empty directory and spin...

7MS #503: First Impressions of Brute Ratel

Today's episode is all about Brute Ratel, a command and control center that is super cool, quick to setup, and much easier to use (IMHO) than Cobalt Strike. I also talk specifically about some of my favorite command line features, how slick and simple lateral movement is, and the "killer feature" that makes me giggle like the bad guy from Sonic the Hedgehog. In the tangent department, Mrs. 7MS makes an appearance via phone and I bore you to tears about my continued iFly addiction.

Brakeing Down Security

April Wright and Alyssa Miller- Open Source sustainabilty

Alyssa Milller (@AlyssaM_InfoSec) April Wright (@Aprilwright) 0. Open Source issues (quick discussion, because I value your opinions, and supply chain is important in the IoT world too.) Log4j and OSS software management and profitability Free as in beer, but you pay for the cup…...

Crypto-Gram

Crypto-Gram June 15, 2021

In this issue: AIs and Fake Comments The Misaligned Incentives for Cloud Security Vulnerabilities in Weapons Systems from the June 15, 2021 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage

Crypto-Gram May 15, 2021

In this issue: When AIs Start Hacking Security Vulnerabilities in Cellebrite Ransomware Is Getting Ugly from the May 15, 2021 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage

Cyber Security Interviews

#122 – Leeann Nicolo: Go For It

Leeann Nicolo is the Incident Response lead at The Coalition and specializes in digital forensics and cyber investigations. She has conducted investigations into ransomware, phishing, hacking, data breaches, trade secret theft, and employee malfeasance. Leeann has investigated thousands of digital devices and has extensive subject matter expertise in Windows enterprise forensics, mobile device forensics, business email compromise, cloud security, and ransomware.Prior to joining Coalition, Leeann worked at Kivu Consulting in Denver and Kraft Kennedy in New York City overseeing complex cyber investigations and discovery matters for law firms and large multinational corporate clients. She conducted her undergraduate studies at...

#121 – Shannon Brazil: Teach Business to Tech People

Shannon Brazil is a Senior Cyber Security Specialist working within a CIRT of a Canadian Fortune 500. She has been in IT for over 12 years, with the last three years in Cybercrime investigations with law enforcement and recently moving into the private sector to focus on Digital Forensic analysis and investigations and Incident Response.As a hobby, Shannon dives into OSINT CTFs, helps promote young women to enter the STEM industry through Technovation - an innovative program for young entrepreneurs, and offers mentorship to those looking to venture into Cyber Security. She is also a course designer and developer...

Darknet Diaries

108: Marq

This is the story of Marq (twitter.com/dev_null321). Which involves passwords, the dark web, and police.SponsorsSupport for this podcast comes from Cybereason. Cybereason reverses the attacker’s advantage and puts the power back in the defender’s hands. End cyber attacks. From endpoints to everywhere. Learn more at Cybereason.com/darknet.Support for this show comes from Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and get a special offer.View all active sponsors.SourcesCourt records and news articles were used to fact check this episode. However Marq requested that links to his full name not be made...

107: Alethe

Alethe (https://twitter.com/AletheDenis) is a social engineer. Professionally she tries to trick people to give her passwords and access that she shouldn’t have. But her journey to this point is interesting and in this episode she tells us how she became a social engineer.SponsorsSupport for this show comes from Skiff. Skiff is a collaboration platform built for privacy from the ground up. Every document, note, and idea you write is end-to-end encrypted and completely private. Only you and your trusted collaborators can see what you’ve created. Try it out at https://www.skiff.org/darknet.Support for...

Defensive Security

Down The Security Rabbithole

DtSR Episode 484 – Defrauding Mobile Payments

Prologue Have you ever made a payment from your mobile device, wirelessly using NFC? Of course you have, most of us have by now. Did you know there are some (or at least were) fairly significant design flaws, otherwise known as "features", in the various platforms? On this show, we're interested in learning more about Timur's research and what he's uncovered. You'll want to do what I did, check your phone's NFC payments settings, once this show is over.

DtSR Episode 483 – How Not to Screw Up Your Cloud

Prologue We have a repeat guest today! Mr. Mark Simos joins me once again to talk about Microsoft's Cloud Adoption Framework (CAF) and it's applicability to not only Azure, but also your other clouds. Building resilient and secure clouds isn't just about security, it's about design and architecture that adheres to good practices. Microsoft's CAF is fantastic place to start - listen here to learn more. Guest Mark Simos LinkedIn: https://www.linkedin.com/in/marksimos/  Twitter: @marksimos

Open Source Security

Episode 307 – Got vulnerabilities? Introducing GSD

Josh and Kurt talk about the Global Security Database (GSD) project. This is a Cloud Security Alliance (CSA) effort to build community around vulnerability identifiers. Show Notes We rate dogs Racoons that heal your sadness Global Security Database Episode 261 – DWF is back! Welcome to community powered CVE GSD mailing list GSD Circle group GSD Database GSD Project Plan

Episode 306 – Open source isn't broken, it's an experience

Josh and Kurt talk about the faker and colors NPM events. There is a lot of discussion around open source being broken or somehow failing because of these events. The real answer is open source is an experience. How we interact with our dependencies determines what the experience looks like. Show Notes Developer corrupts colors and faker Will Wright Pee Internet Anonymity

Episode 305 – Norton, Ethereum, NFT, and Apes

Josh and Kurt talk about Norton creating an Ethereum mining pool. This is almost certainly a bad idea, we explain why. We then discuss the reality of NFTs and the case of stolen apes. NFTs can be very confusing. The whole world of cryptocurrency is very confusing for normal people. None of this is new, there have always been con artists, there will always be con artists. Show Notes Norton Crypto FAQ Stolen Ape Smart contract...

OWASP 24/7

The InfoSec Color Wheel with Jasmine Henry

We’ve all heard of “Red Teams” and “Blue Teams” when it comes to cybersecurity. But what about the “Purple Team”, the “Yellow Team” or the “Blue Team”. What are those? In February of 2020, Louis Cremen introduced the InfoSec Colour Wheel to the security community. The wheel expands upon April Wright’s work on bringing builders into the security team. The value of the wheel is to show the various types of security teams, seven in all, and the role each plays in security. Jasmine Henry brought the wheel to my attention. As she and I talked, we realized the InfoSec Wheel...

CYA – Cover Your Assets with Chris Roberts

A couple weeks ago I read an article by Chris Roberts. The headline screamed, “Security Solved!” Security solved? What the hell was he talking about. Everyday there’s a new media storm around the latest breach or ransomware attack. There’s an entire industry built around the idea that security is hard, and the need for special equipment, software and people to even think about being secure. Chris was insistent. He professed that security is not hard nor complicated. Not only does he consider it inexpensive and undemanding to do the right thing, his premise is it’s easy to get the simple...

Purple Squad Security

Risky Business

Risky Business #651 — Russia's ransomware diplomacy

On this week’s show Patrick Gray, Adam Boileau and Dmitri Alperovitch discuss the week’s security news, including: Russia arrests REvil crew Ukraine government hit in messy hacks White House hosts open source pow-wow, but is it pointless? US cyber reporting law will come back from the dead Report: Israeli police targeted activists with NSO but without warrants Much, much more This week’s sponsor interview is with...

Risky Biz Soap Box: Rolling your own threat intelligence with Steve Miller

In this edition of the soap box we’re chatting with Steve Miller, the head of threat intelligence at Stairwell. Steve has a long history doing this sort of stuff. He worked inside various bits of the US government doing cyber things, and also spent a decent chunk of his career at Mandiant. His new employer, Stairwell, is basically a platform that collects information about all files present in your environment and let’s...

SANS ISC

Security Now

SN 854: Anatomy of a Log4j Exploit – Buggy KCode, WordPress Security

Picture of the Week "Hack the Pentagon" with Log4j Open Source Software Security Summit Microsoft's January Patch Tuesday Review: The GOOD News Microsoft's January Patch Tuesday Review: The Not So Good News Check Your Router Firmware Updates Chrome to Implement PNA Three High Severity Flaws in WordPress Add-ons Closing the Loop: Listener feedback SpinRite Anatomy of a Log4j Exploit We invite you to read our show notes at https://www.grc.com/sn/SN-854-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes...

SN 853: URL Parsing Vulnerabilities – US CISA on Log4J, WordPress Security Update, What Is a Pluton

Picture of the Week. The US CISA Log4J status update. The H2 Database Console vulnerability. The Federal Trade Commission gets into the act! Chrome fixed 37 known problems last week. The Privacy-first Brave browser. WordPress 5.8.3 security update. What, exactly, is a "Pluton"? The first of Dennis Taylor's three Bobiverse novels. SpinRite. URL Parsing Vulnerabilities. We invite you to read our show notes at https://www.grc.com/sn/SN-853-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's...

Security Weekly

Quality of Ingredients – ESW #257

This week, Rickard Carlsson from Detectify is with us to discuss a funeral for vulnerability management! Then, Will Clark from Accela joins us to talk about architecture and security in the trenches! In the Enterprise Security News: 1Password plans to do some shopping with their massive Series C, Devo announces a $250M round, Permiso Security and Tromzo emerge backed by both traditional VCs and industry execs, STG spins out McAfee’s MVISION XDR product as Trellix - the first of many spinouts, they say, Microsoft reminds us that, in addition to being the industry’s largest security vendor, they can also...

UEFI, 2-Factor Failure, McAfee, Whispergate, Oracle Patches & More! – Wrap Up – SWN #180

This week, Dr. Doug talks: 2-factor failure, UEFI, McAfee, Whispergate, oracle patches, and more on the Security Weekly News Wrap-up Show!   Show Notes: https://securityweekly.com/swn180 Visit https://www.securityweekly.com/swn for all the latest episodes!   Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Shared Security

Pandemic Surveillance in Canada, Malware-Filled USB Sticks are Back, Kill Switches in New Cars

Canada’s federal government admitted to surveilling its population’s movements during the COVID-19 lock-down by tracking 33 million phones, the FBI warned that a hacker group has been sending malware-laden USB sticks to companies, and details on a new law in the United States which will install kill switches in new cars. ** Links mentioned on the show ** Canada secretly tracked 33 million phones during COVID-19 lockdown (misleading title) https://nypost.com/2021/12/25/canada-secretly-tracked-33-million-phones-during-lockdown/ https://www.reddit.com/r/privacy/comments/s7mb6l/canada_secretly_tracked_33_million_phones_during/ Hackers Have Been Sending Malware-Filled USB Sticks to U.S. Companies Disguised as Present https://gizmodo.com/hackers-have-been-sending-malware-filled-usb-sticks-to-1848323578 New...

Digital Wellbeing with Kelly Finnerty from Startpage

Kelly Finnerty, Director of Brand at Startpage, joins co-host Tom Eston to discuss the very important topic of digital wellbeing. In this episode you’ll learn about the mental, financial, and societal impacts of constant tracking. Plus, what are some holistic approaches and tactics that we can use to help our own digital wellbeing. Kelly also shares details about Startpage’s new web browser extension “Startpage Privacy Protection”. ** Links mentioned on the show ** Startpage Privacy Protection Browser Extension https://add.startpage.com/protection/ ThinkPrivacy https://thinkprivacy.ch/ Privacy Mindset: Europe vs....

Smashing Security

258: Tesla remote hijacks and revolting YouTubers

Carole's still on jury service, but the show must go on! We take a look at how some Tesla owners are at risk of having their expensive cars remotely hijacked, and why YouTubers are up in arms over NFTs. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault. Visit https://www.smashingsecurity.com/258 to check out this episode’s show notes and episode links. Follow the show on Twitter at @SmashinSecurity, or on the Smashing Security subreddit, or visit our...

257: Pokemon-hunting cops and the Spine Collector scammer

Who has been playing video games rather than hunting down criminals? How is a man alleged to have stolen manuscripts of unpublished books from celebrity authors? Which pot contains an elephant? And why has Graham been listening to podcasts about pest control marketing? All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault. Visit https://www.smashingsecurity.com/257 to check out this episode’s show notes and episode links. Follow the show on Twitter at @SmashinSecurity, or on the...

Sophos

S3 Ep66: Cybercrime busts, wormable Windows, and the crisis of featuritis

Russia busts Revil. Romance scammer sent to prison. Wormable Windows hole patched. Memories of the HAPPY99 virus. Linux disk encryption trouble. Apple browsers leak personal data. And how (not) to paint a computer. https://nakedsecurity.sophos.com/revil-ransomware-crew-allegedly-busted https://nakedsecurity.sophos.com/romance-scammer-who-targeted-670-women https://nakedsecurity.sophos.com/wormable-windows-http-hole https://nakedsecurity.sophos.com/serious-security-linux-full-disk-encryption-bug https://nakedsecurity.sophos.com/serious-security-apple-safari-leaks-private-data With Paul Ducklin and Doug Aamoth. Original music by Edith Mudge (https://www.edithmudge.com) Got questions/suggestions/stories to share? Email: tips@sophos.com Twitter: NakedSecurity (https://twitter.com/nakedsecurity) Instagram: NakedSecurity (https://instagram.com/nakedsecurity)

S3 Ep65: Supply chain conniption, NetUSB hole, Honda flashback, FTC muscle

A JavaScript coder sabotages his own projects. Routers with critical holes. Honda cars party like it's 2002. The FTC warns everyone to patch. And a Log4Shell-like bug in another Java library. https://nakedsecurity.sophos.com/javascript-developer-destroys-own-projects https://nakedsecurity.sophos.com/home-routers-with-netusb-support https://nakedsecurity.sophos.com/honda-cars-in-flashback-to-2002 https://nakedsecurity.sophos.com/ftc-threatens-legal-action https://nakedsecurity.sophos.com/log4shell-like-security-hole With Paul Ducklin and Doug Aamoth. Original music by Edith Mudge (https://www.edithmudge.com) Got questions/suggestions/stories to share? Email: tips@sophos.com Twitter: NakedSecurity (https://twitter.com/nakedsecurity) Instagram: NakedSecurity (https://instagram.com/nakedsecurity)

S3 Ep64: Log4Shell again, scammers keeping busy, and Apple Home bug

Log4Shell - the gift that keeps on taking. Scammers threatening your social media accounts. Apple Home has a pecuuuuliar bug. And why 2FA is easier than you think. https://nakedsecurity.sophos.com/sfw-the-top-n-cybersecurity-stories https://nakedsecurity.sophos.com/log4shell-vulnerability-number-four https://nakedsecurity.sophos.com/log4shell-the-movie https://nakedsecurity.sophos.com/instagram-copyright-infringment-scams https://nakedsecurity.sophos.com/apple-home-software-bug With Paul Ducklin and Doug Aamoth. Original music by Edith Mudge (https://www.edithmudge.com) Got questions/suggestions/stories to share? Email: tips@sophos.com Twitter: NakedSecurity (https://twitter.com/nakedsecurity) Instagram: NakedSecurity (https://instagram.com/nakedsecurity)

Southern Fried Security

The CyberJungle

The CyberWire

Updates on the continuing hybrid war in Ukraine. Julian Assange will get another chance to avoid extradition. And Russian privateers find that they’re expendable.

Updates on the continuing hybrid war in Ukraine. The UK charges Russia with trying to install a puppet in Kyiv. Nominal hacktivists claim an attack against Belarusian railroads. Compromise of Greek parliamentary email accounts reported. Netherlands authorities warn against relaxing your guard against Log4j exploitation. Julian Assange will get another chance...

Andrew Maloney: Never-ending thirst for knowledge. [COO] [Career Notes]

COO and Co-Founder of Query. AI, Andrew Maloney, shares how the building blocks he learned in the military helped him get where he is today. Coming from a blue collar family with a minimal knowledge of computers, Andrew went into computer operations in the Air Force. While deployed to Oman just after...

The Silver Bullet

The Social-Engineer

Threatpost

Troy Hunt Weekly

Weekly Update 279

Presently sponsored by: Kolide provides endpoint security for teams that value privacy, transparency, and employee productivity. Try Kolide for free today!It's mostly breaches this week and that's mostly business as usual, except for one. I didn't know whether I should speak about the one that frankly, upset me, but I felt it would be somewhat disingenuous not to. I couldn't on the one hand build out this "brand", for want of a better term, of transparency and then just shelve a breach and not talk about it because it's too uncomfortable. So, here it is, and hopefully that's the...

Weekly Update 278

Presently sponsored by: Got Slack? Got Macs? Get Kolide: Device security that fixes challenging problems by messaging your users on Slack. Try Kolide Today!I recorded this a week after Charlotte appeared with me, fresh out of isolation with a negative COVID test. However... 9 year old Elle had tested positive on Monday (albeit entirely symptomatic, so no idea how long she'd been positive) but hey, hopefully she'd be clear today. Yeah, nah and to top it off, 12 year old Ari was positive. Also entirely asymptomatic (and double-vaxed) so instead of ending today with our freedom, we're ending day...

Unsupervised Learning

News & Analysis | NO. 315

The latest in Security News, Technology News, Human News, Ideas Trends & Analysis, Discovery, Recommendations, and the Weekly Aphorism… Web Version: https://danielmiessler.com/podcast/news-analysis-no-315/Support the show: https://danielmiessler.com/support/See omnystudio.com/listener for privacy information.

Your Value Comes from Your Output

A short essay on how there are no shortcuts to getting a seat at the table. The secret is no secret at all: It's hard work on a hard problem…Support the show: https://danielmiessler.com/support/See omnystudio.com/listener for privacy information.

News & Analysis: NO. 314

The latest in Security News, Technology News, Human News, Ideas Trends & Analysis, Discovery, Recommendations, and the Weekly Aphorism… Web Version: https://danielmiessler.com/podcast/news-analysis-no-314/Support the show: https://danielmiessler.com/support/See omnystudio.com/listener for privacy information.