Why Firefox is superior, spies in Mexico, WannaCry shuts down a car plant, Cisco patches critical vulnerabilities, hacking air-gapped networks, and more security news!
Full Show Notes: https://wiki.securityweekly.com/Episode519
Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg
Security Weekly Website:
http://securityweekly.com
Follow us on Twitter:
@securityweekly
Learn how to use Windows Event Logs to catch attackers in your network, including domain admin group enumeration and mimikatz attacks! Justin Henderson (@SecurityMapper) categorizes these techniques as "reverse attack analysis for detection" and shows us how to do it in this technical segment! References to Mark Baggett's work on freq.py are made as well (https://isc.sans.edu/forums/diary/Detecting+Random+Finding+Algorithmically+chosen+DNS+names+DGA/19893/)
Full Show Notes: https://wiki.securityweekly.com/Episode519
Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg
Security Weekly Website: http://securityweekly.com
Follow us on Twitter: @securityweekly
Eric Conrad comes into the studio to talk about a groundbreaking new CTF aimed at the defenders and how to become a SANS instructor. A healthy dose of UNIX/Linux nerd talk and how to give effective presentations is included! Eric Conrad is a SANS Senior Instructor, author, and infosec consultant. He also serves as the CTO of Backshore Communications, a company focusing on hunt teaming, intrusion detection, incident handling, and penetration testing.
Full Show Notes: https://wiki.securityweekly.com/Episode519
Security Weekly Web Site: http://securityweekly.com
Follow us on Twitter: @securityweekly
Five ways to maximize your IT training, pocket-sized printing, 30 years of evasion techniques, Ixia teases advanced visibility solutions, and more enterprise security news!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode50
Visit http://securityweekly.com/esw for all the latest episodes!
Brian Ventura is a SANS Instructor and infosec architect, while Ted Gary serves as the Product Marketing Manager at Tenable.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode50
Visit http://securityweekly.com/esw for all the latest episodes!
Negotiation mistakes that are hurting your deals, hiring re-founders, and does VC fund differentiation really matter? Michael and Matt deliver updates from Hexadite, Amazon, Sqrrl, SafeBreach, and more!
Full Show Notes: https://wiki.securityweekly.com/SSWEpisode44
Visit http://securityweekly.com/category/ssw/ for all the latest episodes!
Tarun Desikan is the Co-Founder and CEO of Banyan, a container and microservices security company based in San Francisco. Tarun Joins Michael and Matt to discuss Containerization, biometrics, advice for startups, and more!
Full Show Notes: https://wiki.securityweekly.com/SSWEpisode44
Visit http://securityweekly.com/category/ssw/ for all the latest episodes!
Hacking military phone systems, IoT malware activity doubles, more WikiLeaks dumps, decade-old bugs, and more. Jason Wood of Paladin Security joins us to discuss the erosion of ISP privacy rules on this episode of Hack Naked News!
Full Show Notes: https://wiki.securityweekly.com/HNNEpisode130
Visit http://hacknaked.tv to get all the latest episodes!
One MILLION endpoints, WannaCry is linked to North Korea, IoT is broken (what's new?),inside a porn-pimping spam botnet, fixing Windows Defender, and more security news!
Full Show Notes: https://wiki.securityweekly.com/Episode518
Visit Our Website: https://securityweekly.com
Carrie Roberts of Black Hills Information Security joins us to show hot to use Burp and ProxyCannon to Prevent IP blacklisting while password spraying in this technical segment!
Full Show Notes: https://wiki.securityweekly.com/Episode518
Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg
Security Weekly Website: http://securityweekly.com
Follow us on Twitter: @securityweekly
Trey Forgety is the Director of Government Affairs and Information Security Issues at the National Emergency Number Association. He worked with the White House to develop policy for a nationwide LTE network for public safety known as FirstNet. Trey joins us to discuss emergency response systems and the future of crisis communications in this interview!
Full Show Notes: https://wiki.securityweekly.com/Episode518
Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg
Security Weekly Website: https://securityweekly.com
Follow us on Twitter: @securityweekly
Carbon Black releases Cb Response 6.1, what to ask yourself before committing to a cybersecurity vendor, Malwarebytes replaces antivirus with endpoint protection, and more enterprise security news!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode49
Visit http://securityweekly.com/esw for all the latest episodes!
*Should EDR be installed on every system? Servers too? All clients?
*How important is the configuration of EDR?
*What should your goals be for defense: know malware? unknown malware? ransomware? or are these three different products?
*If you have a big name AV install, what should drive you to change it? e.g. Symantec or Mcafee...
*What are the most common threats missed by EDR?
*How much of a concern is: performance, scalability, manageability, and crashing the host OS?
*When should you consider running two, or more, EDR solutions on the same host? Or, do you run one flavor on some, and another flavor on another?
Full Show Notes: https://wiki.securityweekly.com/ES_Episode49
Visit http://securityweekly.com/esw for all the latest episodes!
Fundraising updates from Yubikey, CybelAngel, Netskope, Illumio, Krypto.co, and more startup new and journey updates!
Full Show Notes: https://wiki.securityweekly.com/SSWEpisode43
Visit http://securityweekly.com/category/ssw/ for all the latest episodes!
Wall Street Journal Best-Selling Author Shares 6 Secrets to Starting Smart [Book Excerpt] - Note the role of emotion to get traction/results Why Entrepreneurs Need To Keep Their Business Focused - Focus is key. Focusing on the right things is essential, The 5 Steps of Successful Customer Journey Mapping, A Startup’s Guide to Protecting Trade Secrets - Bottle Breacher Uses Google to Hone Marketing Campaign - This is not just because Paul loves it, You need to know what your customers value - They do not define value in terms of features and advantages of products or services.
Full Show Notes: https://wiki.securityweekly.com/SSWEpisode43
Visit http://securityweekly.com/category/ssw/ for all the latest episodes!
How to delete an entire company, GameStop suffers a breach, Macs do get viruses, Docker released LinuxKit, and more. Jason Wood of Paladin Security joins us to discuss the military beefing up their cybersecurity reserve on this episode of Hack Naked News!
Full Show Notes: https://wiki.securityweekly.com/HNNEpisode129
Visit http://hacknaked.tv to get all the latest episodes!
• FBI Arrests NSA Contractor for Leaking Secrets
• getsploit: Search & Download Exploits!
• Some non-lessons from WannaCry
• IDG Contributor Network: Top 5 InfoSec concerns for 2017
• VMware Patches Critical Vulnerabilities in vSphere Data
• Protection OneLogin Security Chief Reveals New Details Of Data Breach
• Authentication Bypass, Potential Backdoors Plague Old WiMAX Routers
• Linux Malware Enslaves Raspberry Pi To Mine Cryptocurrency
• Internet Cameras Have Hard-Coded Passwords You Can't Change
• Will Deception as a Defense Become Mainstream?
• How a few yellow dots burned the Intercepts NSA leaker
• TV Hack Sparks Middle East's Diplomatic Crisis
• 53 Percent of Enterprise Flash Installs are Outdated
• Healthcare Industry Cybersecurity Task Force report
Full Show Notes: https://wiki.securityweekly.com/Episode517
Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg
Security Weekly Website:
http://securityweekly.com
Follow us on Twitter:
@securityweekly
byt3bl33d3r recently released "DeathStar", which use Powershell Empire's API to automatically obtain Domain Admin privileges in an Active Directory environment with the Click of a button. Some may ask "How do i detect and prevent this attack?". Tune in to this segment to find out how to use products available from Javelin Networks to do just that!
Full Show Notes: https://wiki.securityweekly.com/Episode517
Subscribe to YouTube Channel: https://www.youtube.com/securityweekly
Security Weekly Website: https://securityweekly.com
Follow us on Twitter: @securityweekly
Graham Cluley is an award-winning security blogger, researcher and public speaker. In this interview, we discuss ransomware, stealing content, the motivations of attackers, IoT, and more!
Graham has been a well-known figure in the computer security industry since the early 1990s when he worked as a programmer, writing the first ever version of Dr. Solomon's Anti-Virus Toolkit for windows. Since then, he has been employed in senior roles by companies such as Sophos and Mcafee, and now runs his own security news website and podcast.
Full Show Notes: https://wiki.securityweekly.com/Episode517
Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg
Security Weekly Website:
http://securityweekly.com
Follow us on Twitter:
@securityweekly
What should we consider while building an internal penetration testing team? Would you still need external pen tests? Paul and John discuss the pros and cons!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode48
Visit http://securityweekly.com/esw for all the latest episodes!
Automating all the things, Juniper Networks opens a software-defined security ecosystem, millions of devices are running out-of-date systems, DUO New Zealand and McAfee join forces, and more enterprise news!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode48
Visit http://securityweekly.com/esw for all the latest episodes!
Why You Should Think Twice About Listening to Business Gurus (There's no one-size-fits-all approach to innovation), A tech investor analyzed his 5000 monthly emails and explained how startups can stand out, Don't Build a Startup, Build a Business, Can Google’s 20% time really work for your startup?, As a startup, friction is a killer. In Security Startup news: Honeywell launches $100 million venture fund, RiskRecon raised $12M Series A, CounterTack raised $20M Series D, 10 Big Takeaways From Mary Meeker's Widely-Read Internet Report.
Full Show Notes: https://wiki.securityweekly.com/SSWEpisode42
Visit http://securityweekly.com/category/ssw/ for all the latest episodes!
Matt is the former VP of Strategy for Tenable where hew was responsible for developing strategies to enter new markets, develop new products and improve existing products, including the new Tenable.io platform. Prior to Tenable, he ran product strategy for RSA Archer architecting big data approaches to GRC and redefining messaging.
Full Show Notes: https://wiki.securityweekly.com/SSWEpisode42
Visit http://securityweekly.com/category/ssw/ for all the latest episodes!
Exploiting Windows 10, mimicking Twitter users, vulnerabilities in Subarus, security issues surrounding virtual personal assistants, and more. Jason Wood of Paladin Security joins us to discuss sniffing out spy tools with ridesharing cars on this episode of Hack Naked News!
Full Show Notes: https://wiki.securityweekly.com/HNNEpisode128
Visit http://hacknaked.tv to get all the latest episodes!
Chipotle and OneLogin suffer breaches, Windows XP Too Unstable To Spread WannaCry, Patches Available for Linux Sudo Vulnerability, Cisco, Netgear Readying Patches For Samba Vulnerability, oAuth nightmares, Attack and Defense, Jay Beale style, Decoding DECT with an RTL-SDR, and who are the Shadow Brokers?
Full Show Notes: https://wiki.securityweekly.com/Episode516
Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg
Security Weekly Website:
http://securityweekly.com
Follow us on Twitter:
@securityweekly