Application security, DevOps

Goose Egg – ASW #140

This week, we welcome Brandon Edwards, Co-Founder and Chief Scientist at Capsule8, to discuss Targeting, Exploiting, & Defending Linux! Linux is all over the place (sometimes surprising), why is targeting it different? What types of attacks are used? How can we defend against attacks on Linux? We can incorporate recent attacks against Sudo as a timely reference.

In the Application Security News, Dependency confusion for internal packages, Chrome pulls down the Great Suspender, Microsoft highlights web shells, some strategies on scaling AppSec, & more!

Visit https://securityweekly.com/capsule8 to learn more about them!

To register for Capsule8's upcoming webcast "Preparing Linux Hosts for Unexpected Threats" visit https://attendee.gotowebinar.com/register/1056145103342240783?source=SW.

Visit https://www.securityweekly.com/asw for all the latest episodes!

Follow us on Twitter: https://www.twitter.com/securityweekly

Like us on Facebook: https://www.facebook.com/secweekly

View Show Index

Full Audio

Segments

1. Targeting, Exploiting, & Defending Linux – Brandon Edwards – ASW #140

Linux is all over the place (sometimes surprising), why is targeting it different? What types of attacks are used? How can we defend against attacks on Linux? We can incorporate recent attacks against Sudo as a timely reference.

This segment is sponsored by Capsule8.

Visit https://securityweekly.com/capsule8 to learn more about them!

To register for Capsule8's upcoming webcast "Preparing Linux Hosts for Unexpected Threats" visit https://attendee.gotowebinar.com/register/1056145103342240783?source=SW.

Sponsored By

Capsule8

Announcements

  • Don't miss any of your favorite Security Weekly content! Visit https://securityweekly.com/subscribe to subscribe to any of our podcast feeds and have all new episodes downloaded right to your phone! You can also join our mailing list, Discord server, and follow us on social media & our streaming platforms!

  • Join us June 29th for a webcast with Tyler Robinson and Beau Bullock to learn how to pivot into the world of Crypto security. Visit https://securityweekly.com/webcasts to register with only your name and email! Don't forget to check out our library of on-demand webcasts & technical trainings at securityweekly.com/ondemand.

Guest

Brandon Edwards
Brandon Edwards
Co-Founder and Chief Scientist at Capsule8

Brandon is the Co-founder and Chief Scientist at Capsule8. He is responsible for cybersecurity research strategy and for operationalizing findings into resulting innovations. Prior to Capsule8, Brandon was VP of Threat Labs at BAE Systems, having joined the company through its successful acquisition of SilverSky, where he designed their cloud-based, zero-day prevention product. He has also served as hacker-in-residence at the NYU Tandon School of Engineering, and held senior security roles at TippingPoint and McAfee.

Hosts

Mike Shema
Mike Shema
Security Partner at Square
John Kinsella
John Kinsella
Co-founder & CTO at Cysense

2. Dependency Confusion, Suspender Falls, Web Shells, & AppSec Scale – ASW #140

This week on the Application Security News, Dependency confusion for internal packages, Chrome pulls down the Great Suspender, Microsoft highlights web shells, some strategies on scaling AppSec, & more!

Announcements

  • Do you have a specific guest or topic that you want us to cover on one of the shows? Submit your suggestions for guests by visiting https://securityweekly.com/guests and completing the form! We review suggestions monthly and will reach out to you once reviewed!

  • If you missed Security Weekly Unlocked, you can now access all of the content on-demand, whether you registered before the live event or not, by visiting https://securityweekly.com/unlocked and clicking either the button to register or the button to login!

Hosts

Mike Shema
Mike Shema
Security Partner at Square
  1. 1. Dependency Confusion: How I Hacked Into Apple, Microsoft and Dozens of Other Companies - The package is coming from inside the house! -- except not really. Our horror trope returns with a dash of DNS and publicly posted internal item names.
  2. 2. The Great Suspender Chrome extension’s fall from grace - A different sort of supply chain sneakiness, something we might call "usurped trust" or "trust laundering".
  3. 3. Web shell attacks continue to rise - A tour through some visual obfuscation and nefarious scripting. A nice read to learn about post-exploitation techniques along with some reasonable recommendations to counter them. We last touched this specific topic from Microsoft back on February 10, 2020 in episode 95.
  4. 4. Let’s Encrypt Gears Up to Replace 200M Certificates a Day - Availability is important to services that provide security as much as it's an important piece of the CIA triad. Confidentially isn't as confidential if you can get the certs to make the communications confidential! You can find more details at https://letsencrypt.org/2021/02/10/200m-certs-24hrs.html
  5. 5. Appsec Development: Keeping it all together at scale - What if scaling security reviews was the wrong strategy all along?
  6. 6. completely ridiculous API (crAPI) will help you to understand the ten most critical API security risks - Learn about API security by poking at an insecure API.
  7. 7. Apple Outlines 2021 Security, Privacy Roadmap - How would you document the security for your own product or SaaS platform? You can read the full guide online or download the 196-page PDF at https://support.apple.com/guide/security/welcome/web
John Kinsella
John Kinsella
Co-founder & CTO at Cysense
prestitial ad