Application security, Careers, Cloud security, Data security, Incident response, Leadership, Privacy, Threat intelligence, Vulnerability management, Zero trust

Curmudgeon Pills – PSW #691

Kevin and the CYBER.ORG team are currently finalizing nationwide K-12 cybersecurity learning standards with the goal of having all 50 states adopt them. Expected in the fall, these standards will ensure that all students have equal access to standardized K-12 cybersecurity education.

This conversation will introduce Wickr to the PSW listeners. Joel Wallenstrom will discuss the importance of end-to-end encrypted collaboration and communication as it relates to enterprise and federal space.

This week in the Security News, U.S Formally Attributes SolarWinds Attack to Russian Intelligence Agency, FBI Clears ProxyLogon Web Shells from Hundreds of Orgs, Justice Dept. Creates Task Force to Stop Ransomware Spread, Facebook faces mass legal action over data leak, and more!

Segment Resources:

https://cyber.org/standards https://cyber.org/about-us/our-impact

https://cyber.org/news/k-12-cybersecurity-learning-standards-review-session-completed

https://www.businesswire.com/news/home/20200914005156/en/CYBER.ORG-Kicks-Off-National-K-12-Cybersecurity-Learning-Standards-Development

Visit https://www.securityweekly.com/psw for all the latest episodes!

Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter!

Follow us on Twitter: https://www.twitter.com/securityweekly

Like us on Facebook: https://www.facebook.com/secweekly

View Show Index

Full Audio

Segments

1. Why Now is the Time for K-12 Cybersecurity Education – Kevin Nolten – PSW #691

With the U.S. facing a shortage of roughly 314,000 cybersecurity professionals in the workforce, according to CSIS, there is an urgent need to build cybersecurity skills and fill the workforce pipeline with students who are prepared to pursue cybersecurity careers.

The aftermath of the SolarWinds breach has shown that there is a desperate need to expand K-12 cybersecurity education across the country.

Since its inception in 2007, over 21,500 teachers have enrolled in CYBER.ORG’s content platform and over 14,000 teachers have been trained to use CYBER.ORG content for cybersecurity education.

Kevin and the CYBER.ORG team are currently finalizing nationwide K-12 cybersecurity learning standards with the goal of having all 50 states adopt them. Expected in the fall, these standards will ensure that all students have equal access to standardized K-12 cybersecurity education.

Segment Resources:

https://cyber.org/standards https://cyber.org/about-us/our-impact

https://cyber.org/news/k-12-cybersecurity-learning-standards-review-session-completed

https://www.businesswire.com/news/home/20200914005156/en/CYBER.ORG-Kicks-Off-National-K-12-Cybersecurity-Learning-Standards-Development

Announcements

  • Don't miss any of your favorite Security Weekly content! Visit https://securityweekly.com/subscribe to subscribe to any of our podcast feeds and have all new episodes downloaded right to your phone! You can also join our mailing list, Discord server, and follow us on social media & our streaming platforms!

Guest

Kevin Nolten
Kevin Nolten
Director of Academic Outreach at CYBER.ORG

As the Director of Academic Outreach at CYBER.ORG, Kevin directs the organization’s?programmatic outreach efforts and partnerships with the goal of ensuring that every K-12 student in the U.S. has access to cybersecurity education. In his role, he helps advance CYBER.ORG’s K-12 cyber education program with age-appropriate content that aligns with state standards for education in 27 states and counting. The impact of that work is measured in thousands of teachers and students with more content, resources and training that will fuel the cyber workforce pipeline for the future.

Kevin received his Bachelor of Science in Business Management and Administration from LSU Shreveport. Kevin also received his MBA from LSU Shreveport.

Hosts

Matt Alderman
Matt Alderman
Executive Director at CyberRisk Alliance
Jeff Man
Jeff Man
#HackingisNotaCrime Advocate, Sr. InfoSec Consultant at Online Business Systems
Larry Pesce
Larry Pesce
Principal Managing Consultant and Director of Research & Development at InGuardians
Lee Neely
Lee Neely
Information Assurance APL at Lawrence Livermore National Laboratory
Tyler Robinson
Tyler Robinson
Director of Offensive Security & Research at Trimarc Security, Founder & CEO at Dark Element

2. Encrypted Collaboration & Communication – Joel Wallenstrom – PSW #691

This conversation will introduce Wickr to the PSW listeners. Joel Wallenstrom will discuss the importance of end-to-end encrypted collaboration and communication as it relates to enterprise and federal space.

Announcements

  • Security Weekly listeners save $100 on their RSA Conference 2021 All Access Pass! RSA Conference will be a fully virtual experience from May 17th-20th, 2021. Security Weekly will be live streaming Monday-Thursday in the virtual broadcast alley, interviewing some of the top sponsors and speakers for the event. To register using our discount code, please visit https://securityweekly.com/rsac2021 [securityweekly.com] and use the code 5U1CYBER! We hope to "see" you there!

  • Do you have a specific guest or topic that you want us to cover on one of the shows? Submit your suggestions for guests by visiting https://securityweekly.com/guests and completing the form! We review suggestions monthly and will reach out to you once reviewed!

Guest

Joel Wallenstrom
Joel Wallenstrom
CEO and President at Wickr

Joel Wallenstrom is the CEO & President of Wickr and a world-renowned information security expert. He has led top white hat hacker teams responding to some of the most high-profile incidents in the past 20 years. Under his executive guidance, Wickr has since pivoted the company from solely offering a free consumer product to a robust enterprise compliance ready, secure collaboration platform used by the Fortune 500 and top federal organizations. Prior to joining Wickr, Joel co-founded iSEC Partners, one of the world’s leading information security research teams, later acquired by the NCC Group.

Hosts

Matt Alderman
Matt Alderman
Executive Director at CyberRisk Alliance
Jeff Man
Jeff Man
#HackingisNotaCrime Advocate, Sr. InfoSec Consultant at Online Business Systems
Larry Pesce
Larry Pesce
Principal Managing Consultant and Director of Research & Development at InGuardians
Lee Neely
Lee Neely
Information Assurance APL at Lawrence Livermore National Laboratory
Tyler Robinson
Tyler Robinson
Director of Offensive Security & Research at Trimarc Security, Founder & CEO at Dark Element

3. Feds Have a Busy Two Weeks, British Tween Takes On TikTok, & More Facebook Woes… – PSW #691

This week in the Security News, U.S Formally Attributes SolarWinds Attack to Russian Intelligence Agency, FBI Clears ProxyLogon Web Shells from Hundreds of Orgs, Justice Dept. Creates Task Force to Stop Ransomware Spread, Facebook faces mass legal action over data leak, and more!

Announcements

  • We have officially launched SW Labs with our first set of product reviews on Attack Surface Monitoring. To see an overview of the category definition, our testing methodology, or the actual product reviews, please visit https://securityweekly.com/reviews

  • Join us June 29th for a webcast with Tyler Robinson and Beau Bullock to learn how to pivot into the world of Crypto security. Visit https://securityweekly.com/webcasts to register with only your name and email! Don't forget to check out our library of on-demand webcasts & technical trainings at securityweekly.com/ondemand.

Hosts

Jeff Man
Jeff Man
#HackingisNotaCrime Advocate, Sr. InfoSec Consultant at Online Business Systems
  1. 1. Pulse Secure Critical Zero-Day Security Bug Under Active Exploit - A critical zero-day security vulnerability in Pulse Secure VPN devices has been exploited by nation-state actors to launch cyberattacks against U.S. defense, finance and government targets, as well as victims in Europe, researchers said.
  2. 2. How to Obtain PCI DSS Compliance and Why It’s Important - I didn't write this!!!
  3. 3. Cyberattacks and Security Breach Disclosures: U.S. Federal Law Coming? - The U.S. intelligence apparatus is pressing Congress to propose measures that require private industry to share security breach information and other threat intelligence to the federal government.
  4. 4. Google and Apple grilled on app store policies in tense Senate hearing - Rivals including Match Group and Spotify accuse the tech giants of retaliation and anticompetitive behavior.
Larry Pesce
Larry Pesce
Principal Managing Consultant and Director of Research & Development at InGuardians
  1. 1. Becoming N-able
  2. 2. In epic hack, Signal developer turns the tables on forensics firm Cellebrite - One example of this lack of hardening was the inclusion of Windows DLL files for audio/video conversion software known as FFmpeg. The software was built in 2012 and hasn’t been updated since. Marlinspike said that in the intervening nine years, FFmpeg has received more than 100 security updates. None of those fixes are included in the FFmpeg software bundled into the Cellebrite products.
  3. 3. Re: [PATCH] SUNRPC: Add a check for gss_release_msg – Greg KH
  4. 4. Felix Wilhelm on Twitter
  5. 5. grep.app
  6. 6. Bash Uploader Security Update – Codecov
  7. 7. Vulnerability Spotlight: Remote code execution vulnerabilities in Cosori smart air fryer
  8. 8. Airstrike Attack – FDE bypass and EoP on domain joined Windows workstations (CVE-2021-28316)
  9. 9. Russian Foreign Intelligence Service Exploiting Five Publicly Known Vulnerabilities to Com
  10. 10. ‘Master,’ ‘Slave’ and the Fight Over Offensive Terms in Computing
  11. 11. Zero-day vulnerability in Desktop Window Manager (CVE-2021-28310) used in the wild
  12. 12. Dutch supermarkets run out of cheese after ransomware attack
  13. 13. Justice Department announces court-authorized effort to disrupt exploitation of Microsoft Exchange Server vulnerabilities
  14. 14. IoT bug report claims “at least 100M devices” may be impacted
  15. 15. Security researcher drops Chrome and Edge exploit on Twitter
  16. 16. Identity Management Day: Cybercriminals No Longer Hack in, They Log In – Security Boulevard
Lee Neely
Lee Neely
Information Assurance APL at Lawrence Livermore National Laboratory
  1. 1. China-linked APT used Pulse Secure VPN zero-day to hack US defense contractors - A new zero-day vulnerability (CVE-2021-22893) affecting PulseSecure VPN equipment is being exploited by two China-linked hacking groups in order to breach networks belonging to U.S. defense contractors as well as government organizations around the world.
  2. 2. Zero-day vulnerabilities in SonicWall email security are being actively exploited - SonicWall is urging customers to apply patches to resolve three zero-day vulnerabilities (CVE-2021-20021, CVE-2021-20022, and CVE-2021-20023) in its email security solution that are being actively exploited in the wild.
  3. 3. REvil gang tries to extort Apple, threatens to sell stolen blueprints - The REvil/Sodinokibi operators published a post on their shaming website on April 20, 2021, claiming to have stolen information from Quanta Computer Inc who refused to pay. Now turning to Apple for ransom.
  4. 4. Russia-linked APT SVR actively targets these 5 flaws - NSA, FBI, and CISA issued a joint alert warning on April 15 that Russia-linked APT group SVR ("Cozy Bear, The Dukes, APT29) has been spotted actively exploiting five vulnerabilities affecting Fortinet FortiGate VPN (CVE-2018-13379), Synacor Zimbra Collaboration Suite (CVE-2019-9670), Pulse Secure Pulse Connect Secure VPN (CVE-2019-11510), Citrix Application Delivery Controller and Gateway (CVE-2019-19781), and VMware Workspace ONE Access (CVE-2020-4006) in attacks targeting U.S. companies and the DIB.
  5. 5. Security Bug Allows Attackers to Brick Kubernetes Clusters – The Open Security - Vulnerability (CVE-2021-20291) affecting one of the Go libraries on which Kubernetes is based that is triggered when a cloud container pulls a malicious image from a registry could be exploited by attackers to cause a denial-of-service (DoS) condition on the CRI-O and Podman container engines, effectually bricking Kubernetes clusters.
  6. 6. Domain Name Security Neglected by U.S. Energy Companies: Report - A majority of the largest energy companies in the United States appear to have neglected the security of their domain names, according to CSC it found that the 80 percent of energy firms neglecting their domain names do not use registry locks.
  7. 7. Arrest Made Over California City Data Breach - Nearly every member of the Huntington Park, Calif. finance department has been placed on leave and one was arrested following a probe into a "large-scale security breach of electronic financial records at Huntington Park City Hall" on April 14 that resulted in a criminal investigation by the Huntington Park Police Department (HPPD).
  8. 8. ParkMobile Data Breach: 21Million User Data Exposed - Atlanta, Ga.-based smart parking and mobility solutions provider ParkMobile has disclosed that account details belonging to 21 million customers using its ParkMobile app were compromised and are now being sold online following a March 2021 security incident caused by a vulnerability affecting third-party applications used by the company. ParkMobile recommends changing your password.
  9. 9. Vulnerabilities in OpENer Stack Expose Industrial Devices to Attacks - Multiple vulnerabilities (CVE-2021-27478, CVE-2020-13556, CVE-2021-27482, CVE-2021-27500, and CVE-2021-27498) in the OpENer stack are being exploited in attacks aimed at supervisory control and data acquisition (SCADA) and other industrial control systems.
  10. 10. Popular Codecov code coverage tool hacked to steal dev credentials - Codecov platform used to host code testing reports and statistics has disclosed that an unknown threat actor managed to modify its Bash Uploader on April 1 and expose sensitive information located in customers' CI environments as part of a supply-chain attack that took place in late January.
  11. 11. NAME:WRECK vulnerabilities could impact 100 million servers, IoT devices - Security researchers say they have discovered nine vulnerabilities affecting the FreeBSD, Nucleus NET, IPnet, and NetX TCP/IP stacks, collectively dubbed "NAME:WRECK," that could be leveraged to target a variety of servers, medical devices, and industrial devices.
  12. 12. Hundreds of electric utilities downloaded SolarWinds backdoor, regulator says – CyberScoop - NERC has revealed that 25 percent of approximately 1,500 electric utilities sharing data with the North American power grid say they have installed the malicious SolarWinds software.
  13. 13. NSA discovers critical Exchange Server vulnerabilities, patch now - Microsoft today has released security updates for Exchange Server that address a set of four vulnerabilities with severity scores ranging from high to critical. CVE-2021-28480 and CVE-2021-28481 being rated as High-risk due to the possibility of remote code execution without the need for authentication or user interaction.
  14. 14. Indian Brokerage Firm Upstox Suffers Data Breach Leaking 2.5 Millions Users’ Data - Online trading and discount brokerage firm Upstox has disclosed it suffered a data breach that resulted in more than 2.5 million users' PII being exposed on the dark web.
  15. 15. Dutch supermarkets run out of cheese after ransomware attack - Netherlands-based logistics and food network operator Bakker Logistiek reportedly suffered a ransomware attack last week during which attackers encrypted devices on its network, disrupted food transportation and fulfillment, and caused cheese and other food shortages in supermarkets throughout the Netherlands.
  16. 16. Joker Android Trojan Lands in Huawei AppGallery App Store - Ten variants of the Joker Android Trojan managed to slip into the Huawei AppGallery app store and were downloaded by more than 538,000 users, the Joker variants are disguised as apps such as virtual keyboards, camera apps, launchers, online messengers, sticker collections, coloring programs, and a game.
  17. 17. Pokies shut down by hacker ransomware attack - Tasmania's lone casino operator has confirmed it is being held to ransom in a cyber attack that has impacted its pokies machines and hotel bookings system for more than one week.
  18. 18. Incident at Natanz not an accident, damage worse than Iran revealing - The incident at Natanz on Sunday morning was not an “accident” and the damage is much graver than what Iran is presenting to the public, Western sources quoted in Israeli media said the attack, which was initially referred to as an “accident” by Iran, was carried out by the Mossad.
  19. 19. Attackers deliver legal threats, IcedID malware via contact forms - Hackers have been spotted leveraging legitimate corporate contact forms in spear-phishing campaigns that threaten enterprise targets with lawsuits and attempt to infect their systems with the "IcedID" modular banking Trojan.
  20. 20. Researchers uncover a new Iranian malware used in recent cyberattacks - Iran-linked APT group "OilRig" (APT34) has been identified leveraging a new backdoor dubbed "SideTwist" in a spear-phishing attack against a possible Lebanese target in order to exfiltrate sensitive information from the compromised system.
  21. 21. 330K stolen payment cards and 895K stolen gift cards sold on dark web - In February 2021, a hacker reportedly began selling 895,000 gift cards and more than 300,000 payment cards on a top-tier Russian-language hacking forum that were stolen during a breach of Cardpool.com.
  22. 22. Vulnerability in ‘Domain Time II’ Could Lead to Server, Network Compromise - A vulnerability residing in the “Domain Time II” network time solution can be exploited in Man-on-the-Side (MotS) attacks, cyber-security firm GRIMM warned. Exploit relies on intercepting a UDP update providing a new URL for software update.
  23. 23. Windows 10 hacked again at Pwn2Own, Chrome and Zoom also fall - Contestants hacked Microsoft's Windows 10 OS twice during the second day of the Pwn2Own 2021 competition, together with the Google Chrome web browser and the Zoom Platform. Note Pwn2Own discovered vulnerabilities are reported to vendors with a 90 day fix window.
  24. 24. Hackers Hack Hackers as Underground Carding Site is Breached - PII belonging to thousands of cyber criminals using the "Swarmshop" underground forum was leaked online to another underground forum on March 17, 2021. The database was posted on a different underground forum and contained 12,344 records of the card shop admins, sellers, and buyers including their nicknames, hashed passwords, contact details, history of activity and current balance.
Tyler Robinson
Tyler Robinson
Director of Offensive Security & Research at Trimarc Security, Founder & CEO at Dark Element
prestitial ad