Forgetting your Windows password, bidding farewell to SMS authentication, reviewing Black Hat USA 2017, Ubuntu Linux for Windows 10, and more. Jason Wood of Paladin Security joins us to discuss companies being breached due to misconfiguration on this episode of Hack Naked News!
Full Show Notes: https://wiki.securityweekly.com/HNNEpisode133
Visit http://hacknaked.tv to get all the latest episodes!
Russians on PornHub, dirty songs on the radio, Windows security protocol vulnerabilities, tomato plant security, and more security news!
Full Show Notes: https://wiki.securityweekly.com/Episode522
Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg
Security Weekly Website:
http://securityweekly.com
Follow us on Twitter:
@securityweekly
This is a random technical segment on implementing random number generators in Linux. Don shows us the ins and outs of the entropy pool, the different between /dev/random and /dev/urandom, and some awesome hardware that can increase entropy.
Full Show Notes: https://wiki.securityweekly.com/Episode522
Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg
Security Weekly Website: http://securityweekly.com
Follow us on Twitter: @securityweekly
Learn about "fileless" malware, threat actors, evading detection on the endpoint and more!
Joe Desimone is a Malware Researcher at Endgame. He focuses on tracking and countering APTs, reverse engineering malware, and developing novel techniques and tools to empower hunt teams.
Full Show Notes: https://wiki.securityweekly.com/Episode522
Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg
Security Weekly Website:
http://securityweekly.com
Follow us on Twitter:
@securityweekly
Ferruh Mavituna of Netsparker joins us to discuss CI level automated web security!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode53
Visit http://securityweekly.com/esw for all the latest episodes!
Suffering breaches from ex-employees, Tanium announces threat response, the SANS Institute's incident response survey results, and is cybersecurity getting harder?
Full Show Notes: https://wiki.securityweekly.com/ES_Episode53
Visit http://securityweekly.com/esw for all the latest episodes!
If you are a security professional who has not taken the plunge into Docker, this segment is for you. Paul highlights some of the configuration options available for Docket containers and how you can apply them to both your operating system and application hardening strategies.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode53 (Including sample Docker files discussed in this segment)
Visit http://securityweekly.com/esw for all the latest episodes!
Solving artificial stupidity, Petya’s decryption key is released, sleeping with the enemy, burner laptops for DEF CON, and more. Jason Wood of Paladin Security joins us to discuss the FTC shutting down a loan application firm on this episode of Hack Naked News!
Full Show Notes: https://wiki.securityweekly.com/HNNEpisode132
Visit http://hacknaked.tv to get all the latest episodes!
James Jardine is the CEO of Jardine Software and a former SANS Institute author and instructor. James possesses over 15 years of development and application security experience.
Full Show Notes: https://wiki.securityweekly.com/SSWEpisode46
Visit http://securityweekly.com/category/ssw/ for all the latest episodes!
The hells of being a founder, killing projects before they kill you, intellectual property 101, and invisible unicorns. Michael and Paul give updates on Auth0, Upstream, Palo Alto Networks, Symantec, and more!
Full Show Notes: https://wiki.securityweekly.com/SSWEpisode46
Visit http://securityweekly.com/category/ssw/ for all the latest episodes!
Tim Helming joins us to talk about all things related to domains, including luxury domain abuses, the security value of the whois database and more!
Full Show Notes: https://wiki.securityweekly.com/Episode521
Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg
Security Weekly Website:
http://securityweekly.com
Follow us on Twitter:
@securityweekly
Paul Ewing from Endgame talks about the different types of threat hunting (network, host and logs) and the pros and cons of each!
Full Show Notes: https://wiki.securityweekly.com/Episode521
Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg
Security Weekly Website: http://securityweekly.com
Follow us on Twitter: @securityweekly
How to hire infosec professionals, patching automation code, hijacked Android devices, Bitdefender support for Mac, and more security news!
Full Show Notes: https://wiki.securityweekly.com/Episode521
Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg
Security Weekly Website:
http://securityweekly.com
Follow us on Twitter:
@securityweekly
Paul and Doug talk about the need for and the pitfalls of Egress Filtering in your enterprise network. And sweaty lawyers.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode52
Visit http://securityweekly.com/esw for all the latest episodes!
Fortinet preps for a next-gen firewall, Samsung no longer males printers, beware of Cisco training, using the right switches, Kubernetes, requirements and testing, to update or not to update and more!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode52
Visit http://securityweekly.com/esw for all the latest episodes!
Separating the hacked and the paranoid, remote Linux hacking, Petya goes postal at FedEx, today’s mainstream hacktivism tools, and why choosing Windows should get you fired!
Full Show Notes: https://wiki.securityweekly.com/Episode520
Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg
Security Weekly Website:
http://securityweekly.com
Follow us on Twitter:
@securityweekly
Guy came on the show and gave a live demo on how to become Domain Admin in an Active Directory environment, and keep those privileges for 20+ years. Guys shows us how to abuse service accounts to get yourself a golden ticket. Then shows how the Javelin Networks technology can be used to detect, prevent and monitor for this type of attack and the exposures inside Active Directory that hand over the keys, er tickets, to the kingdom.
Full Show Notes: https://wiki.securityweekly.com/Episode520
Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg
Security Weekly Website: http://securityweekly.com
Follow us on Twitter: @securityweekly
Moses returns to the show to discuss his background in technology and security (which is eerily similar to Paul's!). The crew then got into a deep discussion of the history of many different technologies (Solaris Firewalls, IDS, Java and more!). Moses talked at length about serialization bugs in both PHP and Java. Then we dove right into JavaScript. It was a nerdfest, not to be missed!
Full Show Notes: https://wiki.securityweekly.com/Episode520
Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg
Security Weekly Website:
http://securityweekly.com
Follow us on Twitter:
@securityweekly
Apollo Clark discusses the tools and techniques your team can use to manage, monitor and tune your enterprise AWS deployment.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode51
Visit http://securityweekly.com/esw for all the latest episodes!
Love it or hate it, Docker (and containers) are here to stay. Embrace change in this segment where Paul and Apollo discuss using Docker in the enterprise. We cover security considerations, deployment scenarios and much more!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode51
Visit http://securityweekly.com/esw for all the latest episodes!
Microsoft buys another company, to patch (or not), the shift in the cybersecurity battleground, Carbon Black’s Petya assessment, and more enterprise news!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode51
Visit http://securityweekly.com/esw for all the latest episodes!
Why most startups fail, conference season tips, the question you need to ask before solving any problem, and when should you hit pause? Michael and Paul deliver updates from GreatHorn, Cybereason, Amazon, and more!
Full Show Notes: https://wiki.securityweekly.com/SSWEpisode45
Visit http://securityweekly.com/category/ssw/ for all the latest episodes!
DoD networks have been compromised, the Shadow Brokers continue their exploits, a Pennsylvania healthcare system gets hit with Petya, and more. Jason Wood of Paladin Security joins us to discuss nations' offensive technical strengths and defensive weaknesses on this episode of Hack Naked News!
Full Show Notes: https://wiki.securityweekly.com/HNNEpisode131
Visit http://hacknaked.tv to get all the latest episodes!
Fred Kneip is the Chief Executive Officer for CyberGRX. Fred has served in several senior management roles, and has worked as an investor with two later-stage private equity investment firms. Fred joins us to talk about his journey in this interview!
Full Show Notes: https://wiki.securityweekly.com/SSWEpisode45
Visit http://securityweekly.com/category/ssw/ for all the latest episodes!
Why Firefox is superior, spies in Mexico, WannaCry shuts down a car plant, Cisco patches critical vulnerabilities, hacking air-gapped networks, and more security news!
Full Show Notes: https://wiki.securityweekly.com/Episode519
Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg
Security Weekly Website:
http://securityweekly.com
Follow us on Twitter:
@securityweekly