Topics
Industry
Events
Podcasts
Research
Recognition
Leadership
Paul's Security WeeklySubscribe
Encryption, IOT, ICS security, Endpoint Security, Endpoint Security

PSW #616

August 19, 2019
Section 0

Tony Punturiero is the Community Manager at Offensive Security. Discussing about my adventure transferring from being on the blue side to becoming a pentester/red teamer full time. Created an infosec community to help each people in the infosec field come together to learn from one another.

Full Show Notes: https://wiki.securityweekly.com/Episode616

Visit https://www.securityweekly.com/psw for all the latest episodes!

To learn more about our sponsors visit: The Security Weekly Sponsor’s Page

Blue Team To Red Team, Offensive Security

Hosts

Jeff Man

Jeff Man – Sr. InfoSec Consultant

Larry Pesce

Larry Pesce – Senior Managing Consultant and Director of Research

Lee Neely

Lee Neely – Senior Cyber Analyst

Paul Asadorian

Paul Asadorian – CTO

Guests

Tony Punturiero

Tony Punturiero – None – Tony Punturiero is the Community Manager at Offensive Security

Announcements

  • We have exciting news about the Security Weekly webcast program: We are now partnered with (ISC)2 as an official CPE provider! If you attend any of our webcasts, you will be receiving 1 CPE credit per webcast! Register for our upcoming webcasts with (ISC)2 by going to securityweekly.com/webcasts If you have missed any of our previously recorded webcasts, you can find our on-demand library at securityweekly.com/ondemand
  • Some of you told us that you are overwhelmed by the amount of content we distribute! In an attempt to make it a little easier for you to find what you’re interested in, we’ve created our new listener interest list! Sign up for list and select your interests by visiting: securityweekly.com/subscribe and clicking the button to join the list! You can also now submit your suggestions for guests in our recently released guest suggestion form! Go to securityweekly.com/guests and enter your suggestions!
  • Security Weekly will be at Hacker Halted in Atlanta, GA this October 10th-11th! EC-Council is offering our listeners a $100 discount to attend the two day conference. Use discount code HH19SW when you register or go to securityweekly.com/hackerhalted and register there! Make sure you checkout the keynote (Paul Asadoorian) and Mr. Jeff Man’s talk as well!
http://traffic.libsyn.com/sw-all/PSW_616_-_Tony_Punturiero_Offensive_Security.mp3
Section 1

 

 

 

The Huawei shenanigans get deeper and more broad. – This is why I have issues with supply chain, CapitalOne hacker may have stolen from 30 more companies, New Data Breach Has Exposed Millions Of Fingerprint And Facial Recognition Records, Malware lingers in SMBs for an average of 800 days before discovery, and more!

Full Show Notes: https://wiki.securityweekly.com/Episode616

Visit https://www.securityweekly.com/psw for all the latest episodes!

To learn more about our sponsors visit: The Security Weekly Sponsor’s Page

 

Security News: August 15, 2019

Paul’s Stories

  1. Researchers find security flaws in 40 kernel drivers from 20 vendors | ZDNet
  2. What a security researcher learned from monitoring traffic at Defcon
  3. Gamers Beware: Zero-Day in Steam Client Affects All Windows Users
  4. We checked and yup, it’s no longer 2001. And yet you can pwn a Windows box via Notepad.exe
  5. Hack in the box: Hacking into companies with warshipping
  6. New Bluetooth Vulnerability Lets Attackers Spy On Encrypted Connections
  7. A compendium of container escapes – Help Net Security
  8. NULL license plate gets security researcher $12K in tickets
  9. Serious flaws in six printer brands discovered, fixed
  10. Should You Upgrade to Wi-Fi 6?
  11. Intel Patches High-Severity Flaws in Tools, NUC Firmware | SecurityWeek.Com
  12. The Flaw in Vulnerability Management: It’s Time to Get Real
  13. New Research Finds More Struts Vulnerabilities

Larry’s Stories

  1. the Huawei shenanigans get deeper and more broad. – This is why I have issues with supply chain.
  2. CapitalOne hacker may have stolen from 30 more companies
  3. DEFCON 27 badge hacking for beginners
  4. Anti-surveilance techniques make you look like a….car. – Related, I really need to set up the open source license plate recognition software in front of my house…
  5. New, CRITICAL, workable RDP attack
  6. Why choosing and making a list of good VPN services is hard. – I also like the DIY option of Streisand, which I’d never heard of before.

Jeff’s Stories

  1. Black Hat USA 2019 Closes Out Another Record-Breaking Event in Las Vegas So that happened.
  2. New Data Breach Has Exposed Millions Of Fingerprint And Facial Recognition Records
  3. 28M Records Exposed in Biometric Security Data Breach
  4. Accused Capital One Hacker May Have Breached Over 30 Other Organizations
  5. Bad news: Your $125 Equifax data breach payout is pretty damn unlikely If everyone files a claim the individual payout is less than 25 cents.

Lee’s Stories

  1. Malware lingers in SMBs for an average of 800 days before discovery SMBs are often understaffed, or lack staff and infrastructure to detect and respond to Malware.
  2. Update to iOS 12.4 to Block New Vulnerabilities 13% of five year old or less iOS devices are not even running iOS 12.
  3. AirDrop and Password sharing can reveal passwords Bug in AirDrop can be used to reveal device information including a cryptographic hash that can be decoded to the device phone number.
  4. CafePress changes password policy after 23m pwned accounts CafePress was storing passwords insecurely, having users change their passwords fixes that. They aren’t really acknowledging the breach.
  5. Equifax Settlement Phishing Surprise, there are phishing emails for the Equifax settlement. Use the FTC Site or go directly to Equifax Settlement site.
  6. New flaws in Qualcomm Chips expose Android Devices to Hacking Critical vulnerabilities dubbed “QualPwn” could allow devices to be exploited via WLAN firmware weakness. Devices with Qualcomm Snapdragon 835 and 435 chips vulnerable.

Hosts

Jeff Man

Jeff Man – Sr. InfoSec Consultant

Larry Pesce

Larry Pesce – Senior Managing Consultant and Director of Research

Lee Neely

Lee Neely – Senior Cyber Analyst

Paul Asadorian

Paul Asadorian – CTO

Guests

Announcements

  • We have exciting news about the Security Weekly webcast program: We are now partnered with (ISC)2 as an official CPE provider! If you attend any of our webcasts, you will be receiving 1 CPE credit per webcast! Register for our upcoming webcasts with (ISC)2 by going to securityweekly.com/webcasts If you have missed any of our previously recorded webcasts, you can find our on-demand library at securityweekly.com/ondemand
  • Some of you told us that you are overwhelmed by the amount of content we distribute! In an attempt to make it a little easier for you to find what you’re interested in, we’ve created our new listener interest list! Sign up for list and select your interests by visiting: securityweekly.com/subscribe and clicking the button to join the list! You can also now submit your suggestions for guests in our recently released guest suggestion form! Go to securityweekly.com/guests and enter your suggestions!
  • Security Weekly will be at Hacker Halted in Atlanta, GA this October 10th-11th! EC-Council is offering our listeners a $100 discount to attend the two day conference. Use discount code HH19SW when you register or go to securityweekly.com/hackerhalted and register there! Make sure you checkout the keynote (Paul Asadoorian) and Mr. Jeff Man’s talk as well!
http://traffic.libsyn.com/sw-all/PSW_616_-_Security_News-0_converted.mp3
Section 2

 

 

In this segment, we interview O’Shea Bowens from Null Hat Security and Tyler Robinson from Nisos, Inc., from the Blue Team Village. Then we interview Aaran Leyland in the Social Engineering Village.

Full Show Notes: https://wiki.securityweekly.com/Episode616

Visit https://www.securityweekly.com/psw for all the latest episodes!

To learn more about our sponsors visit: The Security Weekly Sponsor’s Page

 

Hosts

Matt Alderman

Matt Alderman – CEO

Announcements

  • We have exciting news about the Security Weekly webcast program: We are now partnered with (ISC)2 as an official CPE provider! If you attend any of our webcasts, you will be receiving 1 CPE credit per webcast! Register for our upcoming webcasts with (ISC)2 by going to securityweekly.com/webcasts If you have missed any of our previously recorded webcasts, you can find our on-demand library at securityweekly.com/ondemand
  • Some of you told us that you are overwhelmed by the amount of content we distribute! In an attempt to make it a little easier for you to find what you’re interested in, we’ve created our new listener interest list! Sign up for list and select your interests by visiting: securityweekly.com/subscribe and clicking the button to join the list! You can also now submit your suggestions for guests in our recently released guest suggestion form! Go to securityweekly.com/guests and enter your suggestions!
  • Security Weekly will be at Hacker Halted in Atlanta, GA this October 10th-11th! EC-Council is offering our listeners a $100 discount to attend the two day conference. Use discount code HH19SW when you register or go to securityweekly.com/hackerhalted and register there! Make sure you checkout the keynote (Paul Asadoorian) and Mr. Jeff Man’s talk as well!
http://traffic.libsyn.com/sw-all/PSW_616_-_DEF_CON_27_Interviews-0_converted.mp3

Related

Encryption
OpenSSL vulnerability can ‘definitely be weaponized,’ NSA cyber director says

Derek B. JohnsonMarch 21, 2022

The flaw affects OpenSSL versions 1.02, 1.1.1, and 3.0, all of which have been patched. OpenSSL is a core component of Unix and Linux-based systems, and is also bundled into software applications that run on Windows.

Encryption
Here’s why EMV alone isn’t enough to protect fuel pump transactions

Ruston Miles February 15, 2022

Gas stations and convenience stores must adopt a layered approach based on EMV chips and point-to-point encryption.

Encryption
NSA gains new cybersecurity authorities over national security systems

Derek B. JohnsonJanuary 19, 2022

The White House memo places the NSA in a role similar to the one the Cybersecurity and Infrastructure Security Agency (CISA) plays among federal civilian agencies.

prestitial ad

About Us
SC MediaCyberRisk AllianceContact UsCareersPrivacy
Get Involved
SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us
Explore
Product reviewsResearchWhite papersWebcastsPodcasts

Copyright © 2022 CyberRisk Alliance, LLC All Rights Reserved This material may not be published, broadcast, rewritten or redistributed in any form without prior authorization.

Your use of this website constitutes acceptance of CyberRisk Alliance Privacy Policy and Terms & Conditions.