October 8, 2019 – HNN #237
This week, Signal rushes to patch serious eavesdropping vulnerability, Wi-Fi signal let researchers ID people through walls from their gait, the FBI warns about attacks that bypass MFA, Vulnerable Twitter API leaves tens of thousands of iOS apps open to attacks, and D-Link home routers open to remote takeover will remain unpatched! In the expert commentary, we welcome Justin Elze from TrustedSec, to talk about Red Teaming and Adversary Emulation!
To learn more about TrustedSec, visit: https://securityweekly.com/trustedsec
Justin Elze is the Adversary Emulation and Threat Research Practice Lead at TrustedSec. In his current position, he leads the adversary emulation team in offensive operations against clients simulating full scope attacks. He also works with the research team developing TTPs to circumvent modern security controls facilitating successful operations during engagements. Before TrustedSec Justin worked for Accuvant(Optiv), FusionX, SecureWorks and RedSpin in various offensive security consulting roles. Justin took part in the original Tribe of Hackers book as well as Tribe of Hackers Red Team edition. Outside of his professional career he enjoys automotive performance and drag racing.