Active Directory, Backup and recovery, Attack surface mgmt, Bug bounties, Attack simulation, Blue Team

SWN #1

January 7, 2020

 

 

Happy New Year and welcome to the first episode ever of Security Weekly News.
It’s another year of malware, exploits, and fun here on the Security Weekly Network. Ransomware, TikTok, World War III, & in the Expert Commentary, we welcome Jason Wood of Paladin Security, to talk about Iranian Cyber Threats: Practical Advice for Security Professionals!

Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

To learn more about our sponsors visit: The Security Weekly Sponsor’s Page

January 7, 2020

Expert Commentary:

Iranian Cyber Threats: Practical Advice for Security Professionals

In case you hadn’t heard yet, the United States killed Iranian General Qasem Soleimani last Friday. Since then it seems like everyone is freaking out over what Iran’s response will be. I think my favorite headline came from The Express in the UK. “World War 3: Is World War 3 official? Will WW3 happen and will the UK get involved?” To tell you how good their research on the topic was, they said the attack occurred in Iran in the first paragraph, then later say it happened near the Baghdad airport. Even without that level of hysteria, people are concerned as to what Iran’s move is going to be. In our field, folks are worried about cyberattacks from Iran. So let’s talk about preparation for attacks against our systems, regardless of whether Iran did it or not.

In the show notes, I’ve linked to an article by Rick Holland on the Digital Shadows blog. Rick’s analysis is focused on threat modeling in particular, while my point of view is focused more on day to day security operations. He makes the point that this is “not the time ZOMG CYBER IRAN” and I agree with him. Yes, the tension between the US and Iran is at a very high level. Yes, the Iranians are quite busy conducting offensive operations and they are now very angry. At the same time, what really changed for most of us between January 2nd and January 3rd. The answer is not a lot.

Our networks are still plugged into this hostile environment called the internet and they are being attacked by people of varying skill levels. This has been ongoing for years. We should have fairly comprehensive defenses in place already for the type of actions that Iran may take against our organizations. For example, a quick look at APT33 or Refined Kitten’s techniques include things like spear phishing, brute force attacks, and distributed denial of service. There have already been some web defacements in response to General Soleimani’s death. None of these are new and they aren’t limited to Iranian attackers only. You can include the Chinese, Russians, Americans, and nearly everyone else to the list of countries or groups using them.

There’s really nothing new that you need to implement that you should not have in place already. If you don’t have defenses for this stuff in place, then you have bigger problems. In times of greater tension you may decide to be more attentive on your monitoring. For some organizations, that may mean performing hunts in their networks for signs of similar attacks being employed. This is what I would hope to see organizations in financial, defense, government, and critical infrastructure doing. They should already have robust defenses and, due to their threat profile, should be on a higher state of alert. For other organizations, they may be responding to emailed alerts from defenses more closely. And finally, I hope that some organizations decide they need to take a look at their security logs for the first time in months.

So what can you do? Honestly, stay focused on the operational basics. That means making sure patches are being deployed in a timely manner, that unexpected services aren’t hanging out on the internet, and that you’ve changed default passwords to something other than “admin” or “password”. Preferably something really long and not easily guessed. Check to make sure your back up system is working as expected and do a test restore to make sure the process works. Make sure that those who are responsible for security monitoring are paying attention and are not asleep at the keyboard.

One point that Mr. Holland makes in his blog post did stand out is that we need to make sure our threat model includes being “collateral damage” in an attack intended for someone else, but it spreads in unexpected ways. He cites the example of Maersk and NotPetya. Maersk was not the intended victim for NotPetya, but it got caught up in it and was seriously damaged. This could happen to anyone of us. The defenses against this fall into the operational basics again.

Finally, I’d add one more point to the current panic sweeping the twitters. Make sure we keep some perspective on what is going on. We are going to continue to have political and military strife in the world. We can’t lose our cool when another conflict occurs between nations or other groups. If you feel unprepared to respond to an incident in your organization, then that’s a sign that you’ve got some work to do. Otherwise, stay attentive and be ready to respond, regardless of who may be attacking you. After all, that’s what we are paid to do in this field.

Hosts

Doug White

Doug White – Professor

Jason Wood

Jason Wood – Founder; Primary Consultant

Guests

Announcements

  • Our next webcast is January 15th with Cecilia Marinier, RSAC Program Director, Innovation & Scholars where we will discuss RSAC Sandbox, RSAC Innovation Sandbox, RSAC Launch Pad, RSAC Security Scholar and their “How to” Seminar for Innovators and Entrepreneurs! Register for our upcoming webcasts by visiting securityweekly.com, selecting the webcast drop down from the top menu bar and clicking registration.

 

 

Welcome to the Security Weekly News Wrap up for the Week of 2 – February – 2020. Ashley Madison, BADASSARMY, Security Through Obscurity in Iowa, all the show notes, and more on this episode of Security Weekly News Wrap Up.

Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

To learn more about our sponsors visit: The Security Weekly Sponsor’s Page

Ashley Madison Sextortion, Iowa, 3D Brains

Threat of the Week: Security Through Obscurity
https://www.instapaper.com/read/1275238041“> Breach of the Week: Ashley Madison Sextortion
Read up on: Hacking Back and BADASS (see Paul’s Security Weekly Number 638 for this segment)

  1. Badass Army, helping with online shaming and revenge porn. Check it out.
  2. Sudo bug let’s non privileged Linux and macOS users run commands as root.
  3. I sabotaged My Boss with Ransomware from the Dark Web.
  4. Companies and employees embrace BYOD…
  5. Researchers develop a 3d Brain on a chip device at Lawrence Livermore National Lab.
  6. A bluetooth security flaw could let hackers track devices.
  7. For zero trust to work, machines and humans require identification.
  8. 61% of Businesses surveyed had moved away from a commercial app due to appsec concerns.
  9. and of course the Iowa app debacle.
  10. Iowa app.
  11. Kryptos cipher number 4 still unbroken after 3 decades in front of the CIA HQ.
  12. But the NSA broke the first three a lot faster than anyone else, secret NSA documents show.
  13. Tesla Mobileye autopilots can be duped by projected images.
  14. Maybe Deep Learning can learn to drive a vehicle.
  15. Hue Bulbs can lead to network hacks.
  16. How to hack airgapped machines.
  17. Video of airgapped attack.
  18. Performance artist used 99 phones to fake a google maps traffic jam.
  19. Google Maps hack video by Simon Weckert

Hosts

Doug White

Doug White – Professor

Guests

 

 

The CIA spying? NASA could have used a USB charger?, Election technology not very secure?, ICS is a threat, and the return of the Equifax monster from beyond the grave. All this and more on the Security weekly news today.

Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

To learn more about our sponsors visit: The Security Weekly Sponsor’s Page

CIA Spying, Equifax Monster, Chinese Military, Election Security

Security Weekly News — Week of 11 — February — 2020

  1. CIA and BND secretly sell crypto equipment to 120 countries for a LONG time.
  2. Ben Nimmo hunts disinformation bots from Scotland.
  3. Five measures to harden election technology.
  4. Part one of the election technology article.
  5. Israel’s entire voter registry exposed by bad app.
  6. In the United States, a school district decides to implement facial recognition.
  7. ICS is a big threat.
  8. MITRE ATT&CKK for ICS.
  9. Ransomware is likely your biggest threat.
  10. The return of the Equifax Monster.
  11. How the Equifax hack happened.
  12. GAO report on Equifax.
  13. Could NASA have just used USB chargers for Apollo 11? Maybe.

Expert Commentary: Jason Wood

U.S. Charges 4 Chinese Military Officers in 2017 Equifax Hack

Yesterday the United States announced indictments against four soldiers of China’s Peoples Liberation Army for the 2017 data breach of Experian. As you recall, this is when nearly every adult in the US and half of UK adults got free credit monitoring due to their data being compromised. The Department of Justice announced a 9 count indictment against Wu Zhiyong, Wang Qian, Xu Ke and Liu Lei. All four are members of the PLA’s 54th Research Institute.

The breach itself was huge and involved large amounts of data being copied from Experian’s systems. According to the indictment, the operators routed their traffic through over 20 different countries and 34 different servers. They went to great lengths to obscure their activities and to blend in with traffic inside the Experian network. If the indictment is accurate, the US somehow were able to piece this back to these four individuals and get pictures of three of them in uniform. How the US gathered their evidence and traced back to the alleged operators is not documented in the indictment.

According to Attorney General Barr, the decision to indict these men in this breach is due to the wholesale collection of data about US citizens, who the US does not regard as legitimate espionage targets. “The United States, like other nations, has gathered intelligence throughout its history to ensure that national security and foreign policy decision-makers have access to timely, accurate and insightful information,” Barr said. “But we collect information only for legitimate national security purposes. We don’t indiscriminately violate the privacy of ordinary citizens.”

In other words, it’s one thing to go after military and economic data, but another to steal bulk data about people whose only reason for being targeted is that they are US citizens. This could raise objections from some as the US intelligence services have been accused of violating the privacy of ordinary citizens in domestic surveillance programs intended to combat terrorism. Regardless, this is the line the US government has decided to draw.

So what does this mean for the men who have been indicted? Probably not much in the sense of their day to day lives. China is not going to put these men on a plane to the US so that they can be arrested and stand trial. The operation, if China’s, would have been approved by others in leadership, nor would China admit responsibility for such an operation. However, it does provide some risk to the men of eventually being arrested.

If they travel internationally, then that increases their risk of arrest. In July of 2014, the US Secret Service arrested a Russian citizen named Roman Seleznev for his activities in credit card fraud operations. He was arrested while in the Maldives and extradited to the US. It’s entirely possible that the four men named in this indictment could travel to a country that is more sympathetic to the US than they expected and be arrested there.

Obviously, facilitating the arrest of Chinese soldiers is a bit different than that of a regular citizen. Other countries may be more wary of providing that level of cooperation. China would almost certainly express its outrage and look for ways to respond. When Huawei’s CFO was arrested in Canada for violating sanctions on Iran, China responded by arresting a Canadian couple in China. Similar responses would be likely if these four were ever arrested.

Events like this are a bit uncomfortable as we watch nations try to figure out how to respond to events in a highly connected world. Now we can have thefts occur from the other side of the globe without any real hope of holding those involved to any accountability. In this case, we have the US deciding to indict members of the Chinese military in response to a data breach. What will China’s response be? It’s anyone’s guess.

https://www.wired.com/story/equifax-hack-china/

Hosts

Doug White

Doug White – Professor

Jason Wood

Jason Wood – Founder; Primary Consultant

Guests

 

 

CIA pwns well, everyone in history, bluetooth hacking, Thousands of Docker Repositories are open to the internet, lots of ransomware, and is Apple giving up passwords?

Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

To learn more about our sponsors visit: The Security Weekly Sponsor’s Page

CIA Pwns Well, Bluetooth Hacking, Lots of Ransomware, Apple Giving up Passwords?

  1. Equifax Hack Info.
  2. Four Chinese Military Hackers indicted in Equifax Breach.
  3. Overconfidence in our security is the mindkiller.
  4. Thousands of Docker Repositories are open to the internet.
  5. Social media hacks and security flaws in Whatsapp.
  6. The CIA and BDN secretly owned Crypto AG for decades and built back doors into government crypto, secretly.
  7. SweynTooth allows to exploit BLE vulnerabilities in bluetooth.
  8. North Miami Beach Police hit with Ransomware for millions.
  9. Puerto Rico loses 2.6 million in phishing scam.
  10. Benton County Washington loses 740k in social engineering phishing attack.
  11. Estee Lauder exposed 440 million internal records.
  12. A Malware Attack on Boston Children’s Hospital Physicians.
  13. Every voter in Israel had their data leaked.
  14. Emotet evolves with new WIFI worm tool that allows spreading emotet to all nearby WIFI devices and networks.
  15. Red Teaming as a Service from Randori.
  16. Chrome will no longer allow insecure downloads.
  17. Apple joins the Fido Alliance to eliminate the use of passwords.
  18. Dell Support Assist Flaw.
  19. 5 Measures to Harden Election Technology.
  20. How can we make Election Technology Secure?
  21. The Billion Dollar campaign for disinformation.
  22. What was the first thing you ever watched on Netflix?

Hosts

Doug White

Doug White – Professor

Guests

 

 

Quantum Crypto Chaos, IBM Cloud Vulnerabilities in CICS, Crowded Flounder and Hacking Back, Turkish RATs and Julian Assange.

Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

To learn more about our sponsors visit: The Security Weekly Sponsor’s Page

Quantum Crypto Chaos, Cloud Vulnerabilities, Turkish RATs and Julian Assange.

Security Weekly News — Week of 18 — February — 2020

  1. Perfect Secrecy Cryptography with Chaos.
  2. IBM Cloud Vulnerabilities.
  3. US Cybercommand publicly blames North Korea for a number of attacks.
  4. Crowded Flounder.
  5. UK threatens to name and shame foreign states who hire hackers.
  6. The UK releases a review of the Computer Misuse Act.
  7. Israeli soldiers catfished by HAMAS.
  8. ADwind RAT targets Turkish Businesses.
  9. Phishing scam extorts money with threats of flooding Google AdSense with bots.
  10. Julian Assange Trial: Australian PMs trying to prevent extradition to the United States.
  11. Wikileaks video that got Assange hit with 17 counts of Espionage.
  12. Bracelet of Silence will prevent Alexa from Eavesdropping on you.

Expert Commentary: Jason Wood

Malware and HTTPS – a growing love affair

We’ve talked a number of times about browsers encouraging everyone to use HTTPS for all their web sites. This “encouragement” became more aggressive when they started labeling sites using HTTP as “insecure”. As a result, most of the sites that I find myself on are using HTTPS. Malware authors have now decided that maybe using HTTPS is a good thing for them too. The Naked Security blog released a post and report on the growing usage of HTTPS by malware that is worth a read.

The TLDR is that the usage of HTTPS is increasing for malware. According to Sophos, roughly 23% of all malware now uses encrypted HTTP. This has an obvious impact on security monitoring and the data we capture using our tools. We may find that the tools we are mainly depending on may not provide the data we expect or need. As malware authors change their tactics, we need to evaluate our defenses and respond. It’s just not acceptable to lose capability because we don’t change our practices.

For example, network IDS is one of the first security tools that I deployed, but the data it captures is now less rich because of encryption. Does that mean I should no longer use network security tools? No, I do not believe so, though it does change some of the priority that I place on network IDS. It still has very valuable information for me when I’m performing analysis on traffic, but it’s not unusual to not be able to extract a payload due to encryption. So instead, I tend to use network tools to analyze what IP addresses are talking to each other, what ports they use and monitor for patterns of traffic emerging across the network.

Endpoint security tools, DNS monitoring, and other tools become more important as network encryption increases. I find now that my analysis focuses more on execution behavior, such as why did that Word document open a command prompt, which then executed PowerShell, and then started talking to a server I’ve never seen before.

At the moment, we are in a transition state. According to Sophos, 77% of the malware being used is still using HTTP. They correctly point out that web traffic using plain old HTTP is now more unusual and may be an anomaly worth investigating. There is still a ton of bad stuff to be caught using HTTP, but we need to start preparing for when HTTPS eventually becomes the primary mode of network communication.

Some defenses can include the use of proxy servers that perform traffic inspection of decrypted HTTP traffic. That requires implementing a proxy with a certificate authority certificate that is recognized for all your systems. Then you can require all traffic using HTTP and HTTPS to only be allowed out of your network using the proxy. There are some potential legal and privacy ramifications due to the data being decrypted, analyzed, and then re-encrypted to the destination site. You’ll want to avoid performing this activity on banking sites, for example. Work with your legal and HR departments before implementing something like this. Make sure you are authorized to perform this type of monitoring. If allowed, it can really save you some grief.

There are definitely tools out there that can help deal with malware changing their tactics. If someone says we are all doomed due to encryption, they are not correct and probably want to sell you something or have some other agenda. We can continue to perform effective monitoring, but we have to adapt. And it’s always better to start making those changes early on in the process rather than waiting until you are reacting to a malware outbreak that you can’t detect.

Hosts

Doug White

Doug White – Professor

Jason Wood

Jason Wood – Founder; Primary Consultant

Guests

Announcements

  • Join us at InfoSecWorld 2020 – March 30 – April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
  • Attend RSA Conference 2020, February 24-28 in San Francisco, CA! Visit securityweekly.com/rsac2020 to sponsor an interview with us on-site at the conference or register using our code to save $150!
  • OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!

 

 

D-List Celebrities will call you for money, RSA Sold for 2.1B, IBM pulls out of RSA due to fear of COVID-19, Citrix hacks, all this and more on the Security Weekly News Wrapup.

Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

To learn more about our sponsors visit: The Security Weekly Sponsor’s Page

Citrix Hacks, RSA Sold, IBM Runs In Terror, D-List Celebrities

Security Weekly News — Week of 16 — February — 2020

  1. Vulnerable Out of Band Consoles Put Industrial Assets at Risk.
  2. Ransomware attack forces 2-Day Shutdown of Natural Gas Pipeline.
  3. Over 400 ICS Vulnerabilities Disclosed in 2019.
  4. MITRE ATT&CKK for ICS.
  5. Hackers Were Inside Citrix for Five Months.
  6. US President Donald Trump Offered a Pardon to Julian Assange if he Denied Russia Leak.
  7. Austrialian MPs call on UK to block Julian Assange Extradition to the United States.
  8. Wikileaks video that got Assange in trouble in the first place.
  9. 500 Chrome Extensions Caught Stealing Private Data of 1.7 million or more users.
  10. It’s the Boot for TLS 1.0 and 1.1 in Firefox.
  11. Hackers are Actively Exploiting a Zero-Day in WordPress ThemeRex.
  12. ThemeGrill bug allows remote database wipes and Admin access in 200000 WordPress Sites.
  13. Mt. Gox Victims Offered 88% of the original price of their bitcoins.
  14. Dell Sells RSA to a Private Equity Firm for $2.1B.
  15. IBM pulls out of RSA conference due to COVID-19 fears.
  16. Perfect Crypto using photons and the Vernam Cipher.
  17. Cameo video shout out app, maybe not so secure.
  18. Andy Dick for 99$.

Hosts

Doug White

Doug White – Professor

Guests

Announcements

  • Join us at InfoSecWorld 2020 – March 30 – April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
  • tbd
  • OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!

 

 

Tesla files leaked, Shark Tank Judge gets back scam cash, Spotify accounts hacked?, and the Swiss Government is fed up and filing charges in the Crypto AG situation. Jason Wood covers Cyberattacks a Top Concern for Gov Workers.

Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

To learn more about our sponsors visit: The Security Weekly Sponsor’s Page

Tesla, Crypto AG, Shark Tank, COVID-19

Security Weekly News — Week of 1 — March — 2020

  1. Tesla, SpaceX Parts Manufacturer Suffers a Data Breach due to DoppelPaymer.
  2. Maryland Court rules Digital Assets Damaged During Ransomware Attack are Covered.
  3. National Ink and Stitch, LLC v. State Auto Insurance Companies.
  4. U. S. Government Sanctions Two Chinese Nationals in Connection with Lazarus Group Money Laundering.
  5. The two were also named in a 250 Million hack of an unnamed Exchange.
  6. Swiss Government files Criminal Complaint over CIA/BND Crypto AG operation.
  7. Cruise Line Hack Exposes Personal and Financial Data.
  8. How Princess Cruise Ship will be Cleaned of Coronavirus.
  9. Shark Tank Judge almost loses 400k in a spearphishing email scam.
  10. Spotify Hacking: How has someone taken over my music?
  11. COVID-19, CDC Site
  12. Plague, Inc. removed from China’s AppStore.

Expert Commentary:

Cyberattacks a Top Concern for Gov Workers

Doug opened up this episode of Security Weekly News by talking about ransomware. It seems like we talk about ransomware every week. There’s a good reason for that. It’s because we do. And let’s face it, it’s in news every week. Someone got hit with it and they are locked out of their data. They may pay the ransom, they may not, or they may go out of business. It’s in everyone’s awareness. IBM had a poll conducted the cybersecurity concerns and awareness of state and local government employees. The poll was conducted from January 16 – Feb 3, 2020, which plays into one of the findings a bit.

One of the interesting findings is that overall these employees have a higher level of concern about cyberattacks than they do about natural disasters, environmental disasters, terrorist attacks, disease outbreaks, and economic decline. At this point, I suspect the poll was taken prior to the current level of concern about the coronavirus. I’d be interested in seeing how much these numbers have changed. One thing that I noticed on this high level finding is that the levels of concern is that the levels of concern on these categories varies depending on the role an employee has in the organization. IT staff were far and away most concerned about security incidents than anything else. Conversely, emergency personnel were concerned about these type of events, their highest concerns were natural disasters and terrorist attacks.

IBM cites ransomware being in the news and local governments being targeted with ransomware as reasons for this higher level of concern. As I was reading up on topics for this week, I ran into articles on state governments being locked up with more ransomware. No surprise there, but I imagine these employees are feeling a bit targeted.

I also thought it was interesting that with this concern level, 44% of employees said they have not received basic security training and 70% have not received what they feel is adequate training to respond to security attacks. Contrast that with 66% of the people polled said their employer is prepared for security incidents and 74% of them were confident in their ability to not fall prey to an attack. I’m assuming that would mean some kind of social engineering or phishing attack. My experience makes me feel that some folks are a bit overconfident in their judgement. These attacks are too widespread and successful to buy into that self assessment. And I’ve conducted attacks that worked very well in organizations of all types.

One of the thoughts I had as I read this last bit on training was that a good phish is going to create a sense of urgency, fear, or worry. That level of stress weakens our judgment and makes us more likely to make mistakes. In times of stress, people fall back on their previous experiences and training. Good training would make it more likely that someone would recognize the attack because they have the ability to fall back on that knowledge and experience on how to respond.

I suspect most of our organizations would have similar findings if this poll was taken against them. Sure, this was a poll that will be used by IBM for marketing, but there’s still some useful information here. The catch is that we will need to be able to craft training that is actually realistic and useful. For example, I’ve seen phish training that is set up to not look too realistic or be too good. The organizations fear it could impede the legitimate flow of information in it. It’s good to be aware of this issue, but instead of weakening the training in a massive way it probably would be better figure out how to adjust the training to take that into account. Provide a way to get good feedback to the employee on where the signs were that a phish was a fake and don’t make them fear their employment for failing to recognize them immediately.

If you would like to take a look at the poll results, I have them linked in the show notes for you. In the mean time, think about the security training your organization does and whether it could be improved and where those improvements should be made.


https://www.ibm.com/downloads/cas/74JKYWZQ

Hosts

Doug White

Doug White – Professor

Jason Wood

Jason Wood – Founder; Primary Consultant

Guests

Announcements

  • Our first-ever virtual training is happening on March 19th at 11:00am ET with Adam Kehler & Rob Harvey from the Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming webcasts & trainings by visiting securityweekly.com, selecting the webcast/training drop down from the top menu bar and clicking registration.
  • Join us at InfoSecWorld 2020 – March 30 – April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
  • OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!

 

 

Hacker Movies, misinformation, and 70% of government employees felt they hadn’t had adequate training in security.

Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

To learn more about our sponsors visit: The Security Weekly Sponsor’s Page

Security Weekly News Wrap Up

Security Weekly News Wrapup

  1. 42 Percent of IT and Security Managers say then have been breached from password compromise.
  2. 92% of UKK healthcare orgs indicated that unauthorized data access and data leakage led to incidents.
  3. A harris poll showed that 780% of govt. employees didn’t feel that they had had adequate training.
  4. Shark Tank star almost loses 400k in social engineering scam.
  5. WPA2 attack by Kr00k can grab wifi signals and decrypt them.
  6. Ultrasound waves vibrating tables can access your personal assistant and carry on a conversation.
  7. US Government warns that foreign actors are continuing to interfere with the election process.
  8. California voters had a tough time actually voting on Tuesday.
  9. Maryland Court rules that assets damaged during ransomware attack are covered by insurance.
  10. National Ink and Stitch, LLC. v. State Auto Insurance Companies.
  11. AWS Servers Hacked: Rootkit in the Cloud…
  12. Hackers IMDB. 1985
  13. 1983
  14. The Matrix. 1999
  15. Brazil. 1985
  16. eXistenZ. 1999
  17. The Italian Job. 2003 (but the old one is better)
  18. The Italian Job. 1969 (the old one with no hacking)

Hosts

Doug White

Doug White – Professor

Guests

Microsoft dumps legacy protocols, Whisper leaks all your secrets and ranks predators, malware developers unimpressed with Chrome 80, and James Adams from Core Security.

Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

To learn more about our sponsors visit: The Security Weekly Sponsor’s Page

James Adams and the News

Hosts

Doug White

Doug White – Professor

Guests

James Adams

James Adams – Sales Engineer

Announcements

  • Register for our upcoming webcasts and virtual trainings by visiting securityweekly.com selecting the webcast/training drop down from the top menu bar and clicking registration. In our first virtual training with Online Business Systems you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. In our next webcast with Gravwell, we will cut through the marketing buzzwords and teach you about collecting & analyzing logs in hybrid cloud environments.
  • We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting securityweekly.com/subscribe and clicking the button to join the list! You can also submit your suggestions for guests by going to securityweekly.com/guests and submitting the form! We’ll review them monthly and reach out if they are a good fit!
  • Join us at InfoSecWorld 2020 – March 30 – April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
  • OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!
  • We’re looking forward to attending SecureWorld Boston, March 25th & 26th at the Hynes Convention Center. The 16th annual conference brings together New England’s InfoSec community for training, collaboration, and networking. This year’s theme is “Animal Defenses of the Animal Kingdom.” Security Weekly listeners save $100 off their registration for a full Conference Pass. Go to www.secureworldexpo.com and register using the discount code SECURITYWEEKLY.
  • CyberSecurity Exchange Day hosted by OSHEAN and the Pell Center was originally scheduled for Wednesday, March 18th and has currently been postponed. The new date is still TBD and we will keep you posted as soon as we hear more!

Biting other passengers on EU flights, Everyone is going to telecommute, NSO argues with Facebook in court of phone bugging, the return of FIDO, and more.

Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

To learn more about our sponsors visit: The Security Weekly Sponsor’s Page

Security Weekly News Wrap Up

Hosts

Doug White

Doug White – Professor

Guests

Plague surveillance coming soon, the US government is worried about cryptocurrency, dbags attack the HHS, and new attacks on Android phones.

Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

To learn more about our sponsors visit: The Security Weekly Sponsor’s Page

COVID, HHS, Android Phones, Nintendo

Hosts

Doug White

Doug White – Professor

Jason Wood

Jason Wood – Founder; Primary Consultant

Guests



On this week’s news recap, Microsoft Remote Desktop Web Access Authentication Timing Attack, Multiple TCP/IP stack flaws could leave millions of devices open to attack, Adobe fixes a buffer overflow issue in Reader which is exploited in the wild, and Apple Patches Recent Sudo Vulnerability in macOS. Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

Microsoft Patches 3 and Skips 1, Adobe Overflow, & Apple Sudo Fix – Wrap Up

Hosts

Matt Alderman

Matt Alderman –

Executive Director at CyberRisk Alliance

Audio



This week Dr. Doug talks Bad typing, Crippled Video Drivers from NVDIA, TDOS, APT31, Malformed URLs, and more! Also, Jason Wood returns for Expert Commentary! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

Crippled Video Drivers, TDoS, APT31, Typing Inference, & “Shadow Attacks”

Hosts

Doug White

Doug White –

Professor at Roger Williams University

Jason Wood

Jason Wood –

Founder; Primary Consultant at Paladin Security

Audio



This week, Dr. Doug talks Flying cars, Net Neutrality, LOTS of supply chain stories, and all this weeks’ shows, on the Security Weekly News Wrap Up! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

Supply Chain, Sandstorm Returns, Flying Cars, & Net Neutrality – Wrap Up

Hosts

Doug White

Doug White –

Professor at Roger Williams University

Audio



This week, Dr. Doug talks Flying cars, Net Neutrality, LOTS of supply chain stories, and all this weeks’ shows, on the Security Weekly News Wrap Up! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

Supply Chain, Sandstorm Returns, Flying Cars, & Net Neutrality – Wrap Up

Hosts

Doug White

Doug White –

Professor at Roger Williams University

Audio

 

 


 

This week in the Security Weekly News, Gootloader, the darker web, Copyright infringement, a very special guest from the future, and deep fakes, all this Aaran Leyland joins for guest expert commentary! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

Gootloader, the darker and lighter web, deep fakes, and Aaran Leyland

Hosts

Aaran Leyland

 

Aaran Leyland –

CEO at Restricted Access, Ltd

Doug White

 

Doug White –

Professor at Roger Williams University

Audio

 

 


 

This week in the Security Weekly News, Gootloader, the darker web, Copyright infringement, a very special guest from the future, and deep fakes, all this Aaran Leyland joins for guest expert commentary! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

Gootloader, the darker and lighter web, deep fakes, and Aaran Leyland

Hosts

Aaran Leyland

 

Aaran Leyland –

CEO at Restricted Access, Ltd

Doug White

 

Doug White –

Professor at Roger Williams University

Audio



This week Dr. Doug talks Non-fungible tokens, Exchange, Talon cameras, OSINT, Rockwell, & show wrap ups on the Security Weekly Wrap Up Show! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

Non-Fungible Tokens, Talon Cameras, OSINT, & Rockwell – Wrap Up

Hosts

Doug White

Doug White –

Professor at Roger Williams University

Audio



This week Dr. Doug talks More Microsoft attacks and more info on the Exchange server attacks, a new Intel Side Channel attack, Your python may be poisoned, the DoD let down its guard on contractors, & Aaran Leyland returns for guest Expert Commentary! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

Microsoft, DoD, Alexa, Intel, Aaran Leyland, & Side Channel Attacks

Hosts

Aaran Leyland

Aaran Leyland –

CEO at Restricted Access, Ltd

Doug White

Doug White –

Professor at Roger Williams University

Audio



This week Dr. Doug talks Studmaster, McAfee, z0Miner, Exchange, Linux, and bad cameras! All this, with his Favorite Threat of the Week, and the show Wrap Ups for the week! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

“Studmaster”, John McAfee, Exchange Escalation, z0Miner, & Bad Cameras

Hosts

Doug White

Doug White – Professor at Roger Williams University

@dougwhitephd

Doug White is a Cybersecurity professor at Roger Williams University, the President of Secure Technology, and a Security Weekly network host.

Announcements

  • Do you have a specific guest or topic that you want us to cover on one of the shows? Submit your suggestions for guests by visiting https://securityweekly.com/guests and completing the form! We review suggestions monthly and will reach out to you once reviewed!

Audio



This week: Dr. Doug talks more chrome zero days, Schneider Electric Meters, Exchange redux, Signal, iPhone, Nvidia, and the triumphant return of Jason Wood for Expert Commentary on the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

Chrome Zero Days, Schneider Electric Meters, Exchange Redux, & Signal

Hosts

Doug White

Doug White – Professor at Roger Williams University

@dougwhitephd

Doug White is a Cybersecurity professor at Roger Williams University, the President of Secure Technology, and a Security Weekly network host.

Jason Wood

Jason Wood – Founder; Primary Consultant at Paladin Security

@Jason_Wood

Jason Wood is the founder of Paladin Security and the primary consultant. Prior to starting Paladin Security, Jason was a Principal Security Consultant with Secure Ideas. At Secure Ideas, he performed penetration tests for clients in a wide range of industries. These include health care, financial services, SaaS businesses, government agencies and critical infrastructure.

Audio



Dr. Doug talks Tinder, Schneider Electric, Chrome, Ulysses, Mirai, as well as his Favorite Threat of the Week, all the show Wrap Ups from this week, & more! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

Tinder, Schneider Electric, Chrome, Ulysses, Mirai, & Zero Days – Wrap Up

Hosts

Doug White

Doug White – Professor at Roger Williams University

@dougwhitephd

Doug White is a Cybersecurity professor at Roger Williams University, the President of Secure Technology, and a Security Weekly network host.

Audio



Sponsored By


sponsor
Visit https://securityweekly.com/gigamon for more information!

This week, Dr.Doug talks GE Universal Relays, NETOP, Microsoft, F5, and has a special Guest Expert Commentary featuring Martyn Crew & Baseer Balazadeh from Gigamon!

This segment is sponsored by Gigamon.

Visit https://securityweekly.com/gigamon to learn more about them! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

F5, DTLS Servers, Black Kingdom Ransomware, GE Devices, & Gigamon

Guests

Baseer Balazadeh

Baseer Balazadeh – Sr. Technical Marketing Engineer at Gigamon

Baseer Balazadeh has worked in IT management and implementation for more than 15 years. His experiences range from hands-on work on application architectures to development with DevOps best practices to network security and application migration into the public cloud IaaS. He has a bachelor’s degree in computer system networking engineering from Westwood College.

Martyn Crew

Martyn Crew – Director, Industry Solutions at Gigamon

Martyn Crew is Director of Industry Solutions at Gigamon. He brings a 30 year background in all aspects of enterprise IT to his role at Gigamon where he focuses on a number of initiatives and products including the company’s Application Visibility and Intelligence solutions.

Hosts

Doug White

Doug White – Professor at Roger Williams University

@dougwhitephd

Doug White is a Cybersecurity professor at Roger Williams University, the President of Secure Technology, and a Security Weekly network host.

Audio



This week, Doug talks SolarWinds patches, Jack Dorsey’s Clockblock, Tesla banned, 11 zero-days in one year, Turing, & the recaps of this week’s content on the Security Weekly News Wrap-Up! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

SolarWinds Patch, Jack Dorsey BlockClock, Tesla Banned, 11 0-Days, Turing – Wrap-Up

Hosts

Doug White

Doug White – Professor at Roger Williams University

@dougwhitephd

Doug White is a Cybersecurity professor at Roger Williams University, the President of Secure Technology, and a Security Weekly network host.

Audio



This week, Dr. Doug talks Microsoft, Apple Store, PhP, Video Game Cheating, Joe Biden’s executive order, & the return of Jason Wood for Expert Commentary! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

Microsoft, PhP, Apple Store, & Video Game Cheats

Hosts

Doug White

Doug White – Professor at Roger Williams University

@dougwhitephd

Doug White is a Cybersecurity professor at Roger Williams University, the President of Secure Technology, and a Security Weekly network host.

Jason Wood

Jason Wood – Founder; Primary Consultant at Paladin Security

@Jason_Wood

Jason Wood is the founder of Paladin Security and the primary consultant. Prior to starting Paladin Security, Jason was a Principal Security Consultant with Secure Ideas. At Secure Ideas, he performed penetration tests for clients in a wide range of industries. These include health care, financial services, SaaS businesses, government agencies and critical infrastructure.

Audio



This week, Dr. Doug talks Joe Biden, Bad Octal, Bad, North Korea Zinc Group, PhP, NMP, the Mafia, and the show Wrap Ups for the week! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

Joe Biden, Bad Octal, Bad, North Korea, PhP, & QNAP

Hosts

Doug White

Doug White – Professor at Roger Williams University

@dougwhitephd

Doug White is a Cybersecurity professor at Roger Williams University, the President of Secure Technology, and a Security Weekly network host.

Audio



Breaches, Microsoft, the Dead Return to Life, The IRS is coming for your Bitcoin, Have YOU been PWNed, and the Expert Commentary of none other than Jason Wood! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

IRS “Operation Hidden Treasure”, Microsoft Edge Grows, & ‘more_eggs’ Malware

Hosts

Doug White

Doug White – Professor at Roger Williams University

@dougwhitephd

Doug White is a Cybersecurity professor at Roger Williams University, the President of Secure Technology, and a Security Weekly network host.

Jason Wood

Jason Wood – Founder; Primary Consultant at Paladin Security

@Jason_Wood

Jason Wood is the founder of Paladin Security and the primary consultant. Prior to starting Paladin Security, Jason was a Principal Security Consultant with Secure Ideas. At Secure Ideas, he performed penetration tests for clients in a wide range of industries. These include health care, financial services, SaaS businesses, government agencies and critical infrastructure.



This week, Elon visits an audio-only virtual bar, Ubiquity denies, Accellion, ToadSuck.gov, and more, plus show wrap-ups! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

Accellion Breach, Discord/Slack Malware, & Virtual Audio Bars – Wrap Up

Hosts

Doug White

Doug White – Professor at Roger Williams University

@dougwhitephd

Doug White is a Cybersecurity professor at Roger Williams University, the President of Secure Technology, and a Security Weekly network host.



This week, Dr. Doug talks naughty vaccines, Air frying is not frying, BGP is leaking, Codecov, Lazarus, Google Alerts, Nitro Ransomware, & we’re joined once more for expert commentary by Jason Wood! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

Major BGP Leak, Codecov Attack, Lazarus APT, Discord Ransomware, & GEICO Breach

Hosts

Doug White

Doug White – Professor at Roger Williams University

@dougwhitephd

Doug White is a Cybersecurity professor at Roger Williams University, the President of Secure Technology, and a Security Weekly network host.

Jason Wood

Jason Wood – Founder; Primary Consultant at Paladin Security

@Jason_Wood

Jason Wood is the founder of Paladin Security and the primary consultant. Prior to starting Paladin Security, Jason was a Principal Security Consultant with Secure Ideas. At Secure Ideas, he performed penetration tests for clients in a wide range of industries. These include health care, financial services, SaaS businesses, government agencies and critical infrastructure.



Just sit right back and you’ll hear a tale, Lots of Zero Days, CodeCov, FBI Hack backs, Cozy Bear, Mystery Science Theatre, the Professor and the rest, here on Security Weekly Wrap Up Island! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

SonicWall Vulns, Lots of Zero Days, The FBI, The Professor, & The Rest

Hosts

Doug White

Doug White – Professor at Roger Williams University

@dougwhitephd

Doug White is a Cybersecurity professor at Roger Williams University, the President of Secure Technology, and a Security Weekly network host.



This week in the Security Weekly News: Dirty emojis, Nvidia zero-days, Shlayer, Cozy Bear, Emotet, Babuk, iOS 14.5, and Jason Wood returns for Expert Commentary! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

Nvidia 0-Days,Emotet Nukes Itself, Babuk D.C Attack, & iOS 14.5

Hosts

Doug White

Doug White – Professor at Roger Williams University

@dougwhitephd

Doug White is a Cybersecurity professor at Roger Williams University, the President of Secure Technology, and a Security Weekly network host.



In the Security Weekly News Wrap Up for this week: Government intervention in Ransomware, Joe Biden’s response to Russia, Passwordstate, AI, Mitre, Chrome, contaminated instruments, and Dr. Doug’s Favorite Threat of the Week! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

Gov’t Tackles Ransomware, Passwordstate Backdoor, & BinD Updates – Wrap Up

Hosts

Doug White

Doug White – Professor at Roger Williams University

@dougwhitephd

Doug White is a Cybersecurity professor at Roger Williams University, the President of Secure Technology, and a Security Weekly network host.



In the Security Weekly News Wrap Up for this week: Government intervention in Ransomware, Joe Biden’s response to Russia, Passwordstate, AI, Mitre, Chrome, contaminated instruments, and Dr. Doug’s Favorite Threat of the Week! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

Gov’t Tackles Ransomware, Passwordstate Backdoor, & BinD Updates – Wrap Up

Hosts

Doug White

Doug White – Professor at Roger Williams University

@dougwhitephd

Doug White is a Cybersecurity professor at Roger Williams University, the President of Secure Technology, and a Security Weekly network host.



This week Dr. Doug talks Dan Kaminsky, Spectre, Badalloc, Cardassian Overlords, Apple patches, and the notorious Jason Wood returns for Expert Commentary! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

‘BadAlloc’ Flaws, Dan Kaminsky, Apple 0-Days, & Spectre Defenses Shattered

Hosts

Doug White

Doug White – Professor at Roger Williams University

@dougwhitephd

Doug White is a Cybersecurity professor at Roger Williams University, the President of Secure Technology, and a Security Weekly network host.

Jason Wood

Jason Wood – Founder; Primary Consultant at Paladin Security

@Jason_Wood

Jason Wood is the founder of Paladin Security and the primary consultant. Prior to starting Paladin Security, Jason was a Principal Security Consultant with Secure Ideas. At Secure Ideas, he performed penetration tests for clients in a wide range of industries. These include health care, financial services, SaaS businesses, government agencies and critical infrastructure.



This week in the Security Weekly News Wrap Up Dr. Doug talks: Pings are bad, m’kay, Yahoo Answers, Python ipaddress bugs and the curse of octal, Deepfakes, Qualcom, Spectre, First Horizon Bank, & the show Wrap Ups for this week! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

Yahoo Answer Babbies, Bad Pings, Python Bugs, & Spectre Attacks – Wrap Up

Hosts

Doug White

Doug White – Professor at Roger Williams University

@dougwhitephd

Doug White is a Cybersecurity professor at Roger Williams University, the President of Secure Technology, and a Security Weekly network host.



This week in the Security Weekly News: Elon, Jerry Lee Lewis, Colonial Pipeline, Net Neutrality redux, Lemon Duck, Rico, & Jason Wood returns for Expert Commentary! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

Elon Musk, Colonial Pipeline, Net Neutrality Redux, & Lemon Duck Botnet

Hosts

Doug White

Doug White – Professor at Roger Williams University

@dougwhitephd

Doug White is a Cybersecurity professor at Roger Williams University, the President of Secure Technology, and a Security Weekly network host.

Jason Wood

Jason Wood – Founder; Primary Consultant at Paladin Security

@Jason_Wood

Jason Wood is the founder of Paladin Security and the primary consultant. Prior to starting Paladin Security, Jason was a Principal Security Consultant with Secure Ideas. At Secure Ideas, he performed penetration tests for clients in a wide range of industries. These include health care, financial services, SaaS businesses, government agencies and critical infrastructure.



This week: Dr. Doug talks Elon tweets, Horse Ridge, Frag Attacks, Lots of Ransomware, Fightin’ Joe Biden, as well as show Wrap Ups & his Favorite Threat of the Week! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

The Dogefather, Horse Ridge, Frags Return, Ransomware, & Fightin’ Joe – Wrap Up

Hosts

Doug White

Doug White – Professor at Roger Williams University

@dougwhitephd

Doug White is a Cybersecurity professor at Roger Williams University, the President of Secure Technology, and a Security Weekly network host.



Sponsored By


sponsor
Visit https://securityweekly.com/barracuda for more information!

This week: the Security Weekly News, and special guest Fleming Shi joins for an expert commentary where he discusses API security and supply chain attacks, application security, supply chain security, how your supply chain can damage your reputation, and lessons learned from recent attacks on Sunburst!

In the news: Charlie bit my finger, Darkside in the People’s court, Big Sur, Trend Micro, and Russian Keyboards.

This segment is sponsored by Barracuda Networks.

Visit https://securityweekly.com/barracuda to learn more about them! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

DarkSide “Court”, TrendMicro, & Lessons Learned From Supply Chain Attacks

Guests

Fleming Shi

Fleming Shi – CTO at Barracuda Networks

@ShiFleming

Fleming joined Barracuda in 2004 as the founding engineer for the company’s web security product offerings, helping to create the first version of Barracuda’s message archiving product and paving the way for expansion into new content security product areas. As Chief Technology Officer, Fleming leads the company’s threat research and innovation engineering teams in building future technology platforms to deliver continued success in our security and data protection products. He has more than 20 patents granted or pending in network and content security.

Hosts

Doug White

Doug White – Professor at Roger Williams University

@dougwhitephd

Doug White is a Cybersecurity professor at Roger Williams University, the President of Secure Technology, and a Security Weekly network host.



Nobelium returns, M1RACLES Vuln, Bezos ‘The Devourer of Worlds’, Vulnhub Doug Rants about his Favorite Threat of the Week and more, on this Security Weekly News Wrap-Up! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

Nobelium, Bezos, Apple Vulns, SonicWall Patches, & VMware RCM

Hosts

Doug White

Doug White – Professor at Roger Williams University

@dougwhitephd

Doug White is a Cybersecurity professor at Roger Williams University, the President of Secure Technology, and a Security Weekly network host.



This week in the Security News Dr. Doug talks: Hillbilly Cannibal Weekend, Siloscape, Amazon is listening, the FBI and the DHS got their eye on you, DHS requirements, Apple Announcements, and Jason Wood returns for his Expert Commentary! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

New Siloscape Malware, Amazon Sidewalk, DarkSide Crypto Repo, & Internet Outages

Hosts

Doug White

Doug White – Professor at Roger Williams University

@dougwhitephd

Doug White is a Cybersecurity professor at Roger Williams University, the President of Secure Technology, and a Security Weekly network host.

Jason Wood

Jason Wood – Founder; Primary Consultant at Paladin Security

@Jason_Wood

Jason Wood is the founder of Paladin Security and the primary consultant. Prior to starting Paladin Security, Jason was a Principal Security Consultant with Secure Ideas. At Secure Ideas, he performed penetration tests for clients in a wide range of industries. These include health care, financial services, SaaS businesses, government agencies and critical infrastructure.



This week in the Security Weekly News, Dr. Doug talks: Bezos in space, Steam, VMWARE, lots of ransomwmare, Siloscape, TikTok, of course the Show Wrap Ups, and his Favorite Threat for this Week! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

Steam Malware, RCE Bug in VMWare, TikTok Biometrics, & Kubernetes Backdoors – Wrap Up

Hosts

Doug White

Doug White – Professor at Roger Williams University

@dougwhitephd

Doug White is a Cybersecurity professor at Roger Williams University, the President of Secure Technology, and a Security Weekly network host.



This week in the Security Weekly News, Dr. Doug talks: Bezos in space, Steam, VMWARE, lots of ransomwmare, Siloscape, TikTok, of course the Show Wrap Ups, and his Favorite Threat for this Week! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

Steam Malware, RCE Bug in VMWare, TikTok Biometrics, & Kubernetes Backdoors – Wrap Up

Hosts

Doug White

Doug White – Professor at Roger Williams University

@dougwhitephd

Doug White is a Cybersecurity professor at Roger Williams University, the President of Secure Technology, and a Security Weekly network host.



This week Dr. Doug talks: Nuclear weapons, astrology, G7, cyber games, and we are joined by of Jason Wood for Expert Commentary on this episode of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

Nuclear RDP, Instagram Bugs, Cyber Games, Risk in Utilities, & Crypto-Astrology

Hosts

Doug White

Doug White – Professor at Roger Williams University

@dougwhitephd

Doug White is a Cybersecurity professor at Roger Williams University, the President of Secure Technology, and a Security Weekly network host.

Jason Wood

Jason Wood – Founder; Primary Consultant at Paladin Security

@Jason_Wood

Jason Wood is the founder of Paladin Security and the primary consultant. Prior to starting Paladin Security, Jason was a Principal Security Consultant with Secure Ideas. At Secure Ideas, he performed penetration tests for clients in a wide range of industries. These include health care, financial services, SaaS businesses, government agencies and critical infrastructure.



This week Dr. Doug talks: Nuclear weapons, astrology, G7, cyber games, and we are joined by of Jason Wood for Expert Commentary on this episode of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

Nuclear RDP, Instagram Bugs, Cyber Games, Risk in Utilities, & Crypto-Astrology

Hosts

Doug White

Doug White – Professor at Roger Williams University

@dougwhitephd

Doug White is a Cybersecurity professor at Roger Williams University, the President of Secure Technology, and a Security Weekly network host.

Jason Wood

Jason Wood – Founder; Primary Consultant at Paladin Security

@Jason_Wood

Jason Wood is the founder of Paladin Security and the primary consultant. Prior to starting Paladin Security, Jason was a Principal Security Consultant with Secure Ideas. At Secure Ideas, he performed penetration tests for clients in a wide range of industries. These include health care, financial services, SaaS businesses, government agencies and critical infrastructure.



This week Dr. Doug talks: Nuclear weapons, astrology, G7, cyber games, and we are joined by of Jason Wood for Expert Commentary on this episode of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

Nuclear RDP, Instagram Bugs, Cyber Games, Risk in Utilities, & Crypto-Astrology

Hosts

Doug White

Doug White – Professor at Roger Williams University

@dougwhitephd

Doug White is a Cybersecurity professor at Roger Williams University, the President of Secure Technology, and a Security Weekly network host.

Jason Wood

Jason Wood – Founder; Primary Consultant at Paladin Security

@Jason_Wood

Jason Wood is the founder of Paladin Security and the primary consultant. Prior to starting Paladin Security, Jason was a Principal Security Consultant with Secure Ideas. At Secure Ideas, he performed penetration tests for clients in a wide range of industries. These include health care, financial services, SaaS businesses, government agencies and critical infrastructure.



This week, Dr. Doug talks: Pinchy Spider, Drones, Biden and Putin, Microsoft, CVS, along with the Show Wrap Ups & his Favorite Threat of the Week! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

Akamai Outages, Microsoft, Cyber Insurance, & Pinchy Spider – Wrap Up

Hosts

Doug White

Doug White – Professor at Roger Williams University

@dougwhitephd

Doug White is a Cybersecurity professor at Roger Williams University, the President of Secure Technology, and a Security Weekly network host.



This week, Dr. Doug talks: Pinchy Spider, Drones, Biden and Putin, Microsoft, CVS, along with the Show Wrap Ups & his Favorite Threat of the Week! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

Akamai Outages, Microsoft, Cyber Insurance, & Pinchy Spider – Wrap Up

Hosts

Doug White

Doug White – Professor at Roger Williams University

@dougwhitephd

Doug White is a Cybersecurity professor at Roger Williams University, the President of Secure Technology, and a Security Weekly network host.



This week, Dr. Doug talks: Pinchy Spider, Drones, Biden and Putin, Microsoft, CVS, along with the Show Wrap Ups & his Favorite Threat of the Week! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

Akamai Outages, Microsoft, Cyber Insurance, & Pinchy Spider – Wrap Up

Hosts

Doug White

Doug White – Professor at Roger Williams University

@dougwhitephd

Doug White is a Cybersecurity professor at Roger Williams University, the President of Secure Technology, and a Security Weekly network host.



This week, Dr. Doug talks: Pinchy Spider, Drones, Biden and Putin, Microsoft, CVS, along with the Show Wrap Ups & his Favorite Threat of the Week! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

Akamai Outages, Microsoft, Cyber Insurance, & Pinchy Spider – Wrap Up

Hosts

Doug White

Doug White – Professor at Roger Williams University

@dougwhitephd

Doug White is a Cybersecurity professor at Roger Williams University, the President of Secure Technology, and a Security Weekly network host.



This week in the Security Weekly News: Aaran Leyland guest hosts and talks Oddball, BDSM Videos, iPhone wifi hacks, South Korea, Russia, Carnival, and Google. All this and
the returning Expert Commentary of Jason Wood! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

Special Guest Host, ‘Oddball’ Malware, iPhone WIFI Hacks, & Russian VPN Bans

Hosts

Aaran Leyland

Aaran Leyland – CEO at Restricted Access, Ltd

Founder and Chief Executive Officer of Restricted Access Ltd, an organisation that believes that you need to be prepared by having the correct bespoke documentation and exercise using your documents.
Seasonal Worker for Security Weekly Productions since July 2018
CIR Advisory, Wargaming and Technical Manager at Deloitte 2018-2020
Cyber Security Manager at Royal Air Force 1995-2018

Jason Wood

Jason Wood – Founder; Primary Consultant at Paladin Security

@Jason_Wood

Jason Wood is the founder of Paladin Security and the primary consultant. Prior to starting Paladin Security, Jason was a Principal Security Consultant with Secure Ideas. At Secure Ideas, he performed penetration tests for clients in a wide range of industries. These include health care, financial services, SaaS businesses, government agencies and critical infrastructure.



This week in the SWN Wrap Up, Dr. Doug talks: NYC Department of Health, Windows 11, John McAfee, Dell UEFI, Zyxel, DarkRadiation, and of course the Wrap Ups of all the shows from this week! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

John McAfee, Dell UEFI, Dark Radiation, Zyxel, Windows 11, & NYC Advisory – Wrap Up

Hosts

Doug White

Doug White – Professor at Roger Williams University

@dougwhitephd

Doug White is a Cybersecurity professor at Roger Williams University, the President of Secure Technology, and a Security Weekly network host.



This week in the Security Weekly News, Number one in the charts, the cyber charts that is, Binance receives the ban hammer from UK’s FCA, Lawmakers introduce American Cybersecurity Literacy Act – Marines this does not apply, you keep chomping on your crayons, key vulnerabilities in the Atlassian project and software development platform, GitHub bug bounties: payouts surge past $1.5 million mark – sounds like rooky numbers to me, the UK MoD giving away secrets for free, if you ride the bus, and the return of Jason Wood for Expert Commentary! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

Returning Guest Host, GitHub Bounties, CISCO, Binance Banned, & WD Hacks

Hosts

Aaran Leyland

Aaran Leyland – CEO at Restricted Access, Ltd

Founder and Chief Executive Officer of Restricted Access Ltd, an organisation that believes that you need to be prepared by having the correct bespoke documentation and exercise using your documents.
Seasonal Worker for Security Weekly Productions since July 2018
CIR Advisory, Wargaming and Technical Manager at Deloitte 2018-2020
Cyber Security Manager at Royal Air Force 1995-2018

Jason Wood

Jason Wood – Founder; Primary Consultant at Paladin Security

@Jason_Wood

Jason Wood is the founder of Paladin Security and the primary consultant. Prior to starting Paladin Security, Jason was a Principal Security Consultant with Secure Ideas. At Secure Ideas, he performed penetration tests for clients in a wide range of industries. These include health care, financial services, SaaS businesses, government agencies and critical infrastructure.



This week in the Security Weekly News: The Revenge of the AI Beer Bots, NIST Software definitions, Printspooler, linkedin leaked out, Cybersecurity legislation, and more along with the show Wrap Ups for this week! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

PrintNightmare, LinkedIn Leaks, Cyber Legislation, & Beer Bots – Wrap Up

Hosts

Doug White

Doug White – Professor at Roger Williams University

@dougwhitephd

Doug White is a Cybersecurity professor at Roger Williams University, the President of Secure Technology, and a Security Weekly network host.

prestitial ad