FreshRSS

🔒
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayYour RSS feeds

Android exploits are now worth more than iOS exploits for the first time

Exploit broker Zerodium increases zero-day prices for Android, now worth more than iOS.
  • September 3rd 2019 at 15:56

HNN #232 - September 3, 2019

By paul@securityweekly.com

This week, hackers indiscriminately infected iPhones for two years, Google throws bug bounty bucks at mega-popular third-party apps, how Jack Dorsey's Twitter account got hacked, and how attackers are exploiting vulnerable WordPress plugins to backdoor sites! In the Expert Commentary, Larry Alston of Tufin joins us to discuss Developing and Enforcing Security Policies in the Cloud!

 

To learn more about Tufin, visit: https://securityweekly.com/tufin

Full Show Notes: https://wiki.securityweekly.com/HNNEpisode232

 

Visit https://www.securityweekly.com/hnn for all the latest episodes!

Follow us on Twitter: https://www.twitter.com/securityweekly

Like us on Facebook: https://www.facebook.com/secweekly

  • September 3rd 2019 at 21:49

Author of multiple IoT botnets pleads guilty

Creator of infamous Satori botnet faces up to ten years in prison.
  • September 4th 2019 at 00:23

Samsung, Huawei, LG, and Sony phones vulnerable to rogue 'provisioning' messages

Fake phone provisioning messages can allow hackers to hijack email or web traffic from legitimate devices. Nearly half of all Android smartphones impacted.
  • September 4th 2019 at 13:00

Twitter disables SMS-to-tweet feature after its CEO got hacked last week

Twitter disables one of the site's earliest features in response to CEO getting hacked last week.
  • September 4th 2019 at 21:06

Ransomware gang wanted $5.3 million from US city, but they only offered $400,000

New Bedford officials decide to restore from backups after negotiations fail.
  • September 4th 2019 at 23:58

Glass Houses - ESW #152

By paul@securityweekly.com

This week, Paul and Matt Alderman talk Enterprise News, to discuss a Privilege Escalation Vulnerability that existed in Check Point Software, Untangle survey finds SMBs continue to struggle with IT Security, Tufin delivers enhanced Visibility and Topology modeling for Cisco ACI Migration, and how the OS that powered smartphones started from failure! In our second segment, we air two pre recorded interviews from BlackHat 2019 with Jason Brvenik of NSS Labs and Mehul Revankar of SaltStack! In our final segment, we air two more pre-recorded interviews from BlackHat 2019 with Carolyn Crandall of Attivo Networks and Krupa Srivatsan of Infoblox!

 

Full Show Notes: https://wiki.securityweekly.com/ES_Episode152

Visit https://www.securityweekly.com/esw for all the latest episodes!

 

Follow us on Twitter: https://www.twitter.com/securityweekly

Like us on Facebook: https://www.facebook.com/secweekly

  • September 5th 2019 at 09:00

A Chinese APT is now going after Pulse Secure and Fortinet VPN servers

Security researchers spot Chinese state-sponsored hackers going after high-end enterprise VPN servers.
  • September 5th 2019 at 11:11

DK-Lok data breach exposes global enterprise client data, internal emails

Requests to plug the leaking database were trashed - information ironically revealed through the exposed system.
  • September 5th 2019 at 13:00

Zero-day disclosed in Android OS

Android project maintainers fail to fix dangerous privilege escalation bug six months after initial report.
  • September 5th 2019 at 13:26

600,000 GPS trackers left exposed online with a default password of '123456'

Default password is a danger for customers, but also for the vendor itself.
  • September 5th 2019 at 15:47

Belarusian police shut down notorious hacking forum

XakFor served as a cybercrime hub for Russian-speaking criminals since 2012.
  • September 6th 2019 at 04:00

Thousands of servers infected with new Lilocked (Lilu) ransomware

Researchers spot new ransomware targeting Linux-based servers.
  • September 6th 2019 at 10:29

US to collect social media profiles from immigrants, asylum seekers, and refugees

The process of getting refugee status, a green card, and citizenship will become way more intrusive.
  • September 6th 2019 at 14:04

Metasploit team releases BlueKeep exploit

Metasploit BlueKeep module can achieve code execution, is easy to use.
  • September 6th 2019 at 18:01

Apple disputes Google's accuracy on recent iOS hacks, and they may be right

Apple said that Google overstated some claims ina report about a massive hacking campaign aimed at iPhone users.
  • September 6th 2019 at 20:22

Mozilla to gradually enable DNS-over-HTTPS for Firefox US users later this month

DoH tests haven't found any issues. Mozilla to start rolling out DoH to a small set of US users, then gradually roll it out for to more users.
  • September 7th 2019 at 07:39

No municipality paid ransoms in 'coordinated ransomware attack' that hit Texas

More than half of impacted cities and towns are now operating as normal.
  • September 7th 2019 at 11:53

Millions of Exim servers vulnerable to root-granting exploit

The internet's most popular email server impacted by second major bug this summer.
  • September 7th 2019 at 20:39

How to enable DNS-over-HTTPS (DoH) in Google Chrome

A step by step guide to enable DNS-over-HTTPS (DoH) support in the Chrome browser.
  • September 8th 2019 at 22:49

HackerOne bug bounty platform closes new $36.4m funding round

The Series D round brings overall funding to $110.4 million.
  • September 9th 2019 at 08:17

Cyber-security incident at US power grid entity linked to unpatched firewalls

Hackers used a DoS flaw to reboot firewalls at an electric power grid operator for hours.
  • September 9th 2019 at 08:27

Malicious Android apps containing Joker malware set up shop on Google Play

Apps infected with the Trojan managed to circumvent Google store protections.
  • September 9th 2019 at 09:01

Telnet backdoor vulnerabilities impact over a million IoT radio devices

Devices can be remotely exploited as root without any need for user interaction.
  • September 9th 2019 at 10:35

Newly discovered cyber-espionage malware abuses Windows BITS service

New backdoor trojan uses Windows BITS service to hide traffic to and from its command-and-control servers.
  • September 9th 2019 at 11:04

Security researchers expose another instance of Chrome patch gapping

Security bug patched in Chrome's V8 JavaScript engine, but the fix will only reach Chrome tomorrow.
  • September 9th 2019 at 18:33

European police arrest Dark Web counterfeit currency traders

Over €1 million in fake notes has been seized across Europe.
  • September 10th 2019 at 07:55

Student pleads guilty to IRS hack attempt for Trump tax returns

Prosecutors call him a mastermind. Defenders say it was Wayne’s World gone awry.
  • September 10th 2019 at 08:54

PsiXBot malware upgraded with Google DNS over HTTPS, sexploitation kit

The malware has been shaken up with new infrastructure and attack methods.
  • September 10th 2019 at 11:30

Kaspersky launches anti-cheat solution for pro esports tournaments

Because gaming cheats are not all that different from malware, Kaspersky launches esports anti-cheat solution.
  • September 10th 2019 at 12:12

51 tech CEOs send open letter to Congress asking for a federal data privacy law

CEOs who signed: Amazon, AT&T, Dell, IBM, SAP, Salesforce, Visa, Mastercard, and JP Morgan Chase.
  • September 10th 2019 at 14:39

The Man With A Plan - ASW #75

By paul@securityweekly.com

Ty Sbano is the Cloud Chief Information Security Officer of Sisense. Ty will be discussing Tools in the DevOps Pipeline, Component Analysis, and Anything Application Security! ***** A very deep dive into iOS Exploit chains found in the wild followed by Heap Exploit Development, Twitter turns off SMS texting after @Jack hijacking, CVE-2019-15846: Unauthenticated Remote Command Execution Flaw Disclosed for Exim, 7 Steps to Web App Security, Fuzzing 101: Why Bug Hunters Still Love It After All These Years, and more!

Full Show Notes: https://wiki.securityweekly.com/ASW_Episode75 Visit https://www.securityweekly.com/asw for all the latest episodes!

  • September 10th 2019 at 15:53

The Matrix - BSW #142

By paul@securityweekly.com

David X Martin is the CEO at DavidXMartin, LLC. He is passionate about helping business leaders sleep better at night by equipping them with critical cyber risk management tools that protect their enterprises while enhancing strategic business growth. David will be covering Critical Business Decision Making - IT vs Business Making. ***** Brian Reed is the Chief Mobility Officer at NowSecure. Brian discusses mobile-app traffic now outpaces mobile web traffic, yet for many organizations mobile security drags behind web leaving businesses at risk. In fact, industry benchmarks show 85% of mobile apps have security issues and 72% have mobile privacy issues. As more organizations build mobile apps to engage with customers in delightful experiences and drive digital transformation, dev and security teams are looking for ways to ensure security and privacy are built-in.

Full Show Notes: https://wiki.securityweekly.com/BSWEpisode142

Visit https://www.securityweekly.com/bsw for all the latest episodes!

  • September 10th 2019 at 15:59

Mozilla launches Firefox VPN extension for US users

New Firefox VPN extension expected to become Mozilla's first commercial service.
  • September 10th 2019 at 17:28

Microsoft patches two zero-days in massive September 2019 Patch Tuesday

Microsoft's September 2019 Patch Tuesday comes with 80 fixes, 17 of which are for critical bugs.
  • September 10th 2019 at 19:07

HNN #233 - September 10, 2019

By paul@securityweekly.com

This week, 60,000 GPS trackers for people and pets are using the same password, YouTube fined $170m for covertly tracking kids online, a free working exploit for BlueKeep, WordPress 5.2.3 fixes new clutch of security vulnerabilities, critical Exim flaw opens millions of servers to Takeover, cyberattack Disrupted Firewalls at U.S. Power Utility, a Million-plus IoT Radios Open to Hijack via Telnet Backdoor, Vulnerabilities in D-Link, Comba Routers Can Leak Credentials, and vulnerabilities exposed 2 million Verizon customer contracts. In the expert commentary, Matt Alderman talks about the slew of ransomware attacks, and pay-offs, targeted at cities and municipalities earlier this year, is the tide starting to turn?

Full Show Notes: https://wiki.securityweekly.com/HNNEpisode233 Visit http://hacknaked.tv to get all the latest episodes!

  • September 10th 2019 at 19:51

Intel server-grade CPUs impacted by new NetCAT attack

Academics develop new network-based attack that steals keystrokes from an active SSH session.
  • September 10th 2019 at 20:38

281 suspects arrested in massive crackdown against BEC scammers

Operation reWired: 167 suspects arrested in Nigeria, 74 in the US.
  • September 10th 2019 at 22:47

Google to run DNS-over-HTTPS (DoH) experiment in Chrome

Starting with Chrome 78, the browser will automatically switch to DoH-compatible servers for certain DNS providers.
  • September 11th 2019 at 09:37

Adobe Flash, Application Manager patch update squashes critical code execution bugs

Two bugs could lead to arbitrary code being let loose on infected systems.
  • September 11th 2019 at 10:28

Telegram fixes privacy-breaking bug that stopped recipient message and image deletion

Even after deletion, images would remain in storage on user devices.
  • September 11th 2019 at 12:14

New Passive RFID Tech Poses Threat to Enterprise IoT

image

As RFID technology continues to evolve, IoT security measures struggle to keep pace.

The Internet of Things (IoT) industry is growing at a staggering pace. The IoT market in China alone will hit $121.45 billion by 2022 and industry analysts predict that more than 3.5 billion devices will be connected through IoT globally by 2023. 

Among the most important technologies precipitating this breakneck growth is RFID or Radio Frequency Identification. RFID-tagged devices can help track inventory, improve the efficiency of healthcare and enhance services for customers in a variety of industries. 

For example, many hospitals across the world are beginning to test the use of on-metal RFID tags to not only track their inventory of surgical tools--such as scalpels, scissors, and clamps--but to ensure that each tool is properly sterilized and fully maintained prior to new operations. The implications of the widespread application of RFID tracking in the healthcare system would be a dramatic reduction in the number of avoidable infections due to unsterilized equipment and a sharp increase in the efficiency of surgical procedures.

IDenticard Vulnerabilities in PremiSys ID System

Although passive RFID technology shows much promise for streamlining and improving the management of IoT, unresolved vulnerabilities in the technology’s security remain a bottleneck for both the implementation of RFID and the growth of the IoT industry. 

In January, the research group at Tenable discovered multiple zero-day vulnerabilities in the PremiSys access control system developed by IDenticard, a US-based manufacturer of ID, access and security solutions. 

The vulnerabilities - which included weak encryption and a default username-password combination for database access - would have allowed an attacker to gain complete access to employee personal information of any organization using the PremiSys ID system. Though IDenticard released a patch to resolve the vulnerabilities, the incident points to growing security risks around network-connected, RFID-tagged devices.

In the summer of 2017, these security risks were put on full display when researchers from the KU Leuven university discovered a simple method to hack the Tesla Model S’s keyless entry fob. The researchers claim that these types of attacks were possible (prior to the security patch rolled out by Tesla in June of 2018) because of the weak encryption used by the Pektron key’s system. 

Despite the numerous security concerns that have surfaced in recent years, RFID is still one of the most tenable solutions for increasing the efficiency and safety of IoT. That said, for enterprise to take full advantage of the benefits of RFID technology, stronger security protocols and encryptions must be implemented. 

Compounding the threat is the fact that many RFID-enabled enterprise networks are at an increased risk of breaches (especially those in the Industrial IoT, IIoT) due to their inability to detect vulnerabilities and breaches in the first place. In fact, a recent study published in January by Gemalto discovered that nearly 48% of companies in all industries are unable to detect IoT device breaches. 

The Bain & Co. study pointed to security as the major obstacles to full-scale RFID/IoT adoption. With data breaches costing, on average, more than $3.86 million or $148 per record, new security measures must be taken if IoT is to fulfill its promises of en masse real-time connection between businesses, consumers, and their devices. Unsurprisingly, in the Gemalto survey interviewing 950 of the world’s leaders in IT and IoT businesses, more than 79% of them claim to want more robust guidelines for comprehensive IoT security. 

According to The Open Web Application Security Project (OWASP), there are ten primary vulnerabilities present in IoT and many of these risk factors are directly related to the implementation of RFID technology. 

Securing RFID-Enabled Enterprise IoT Devices

Of the many vulnerabilities in RFID/IoT devices and technologies, few impact consumers as directly as those presented by RFID scanners. 

RFID scanners can glean information from any RFID-enabled device, not just credit cards and phones. Our IoT and IIoT, both growing at a breakneck pace and with security features lagging behind, are prime targets for exploitation. 

Security analysts have raised concerns about the safety of data traveling on these networks for years. In fact, in a study conducted by IBM, it was found that fewer than 20% of routinely test their IoT apps and devices for security vulnerabilities. With data breaches growing at an alarming pace--2018 alone resulted in the exposure of more than 47.2 million records--many customers are asking, “What protections do we have against the growing threat against connected devices?” 

As it happens, quite a lot. In 2017, a research group at the IAIK Graz University of Technology created an RFID-based system aiming to secure RFID data on an open Internet of Things (IoT) network. The engineers designed a novel RFID tag that exclusively uses the Internet Protocol Security layer to secure the RFID tag and its sensor data, regardless of what type of RFID scanner attempts to steal the tag data.

Their innovation lies in collecting the RFID sensor data first through a virtual private network (VPN) application. Using the custom RFID tag, communications are routed through the IPsec protocol, which provides secure end-to-end encryption between an RFID-enabled IoT device and the network to which it’s connected. 

Solutions that identify and resolve potential IoT device vulnerabilities still need more work before we can expect widespread implementation. For one thing, the IPsec protocol, which is available on most consumer VPN applications, does not secure networks with 100% certainty.

Researchers at Horst Görtz Institute for IT Security (HGI) at Ruhr-Universität Bochum (RUB) recently discovered a Bleichenbacher vulnerability in numerous commercial VPNs, including those used by Cisco, Clavister, Huawei and Zyxel.

RFID Breaking Big in the Enterprise Market

When it comes to RFID security, conversations gravitate toward consumer applications like contactless payment fraud or bugs in wearable technology. Though RFID spending is mostly business-to-consumer, the next largest spending category is the enterprise, comprising nearly 30% of the total RFID market.

RFID’s market size is projected to grow an additional 30% through 2020, as enterprise embraces RFID tags in everything from supply-chain management to security keycard systems. One of the big enablers of IoT in enterprises has been the simple addition of “passive” RFID tags for day-to-day operational functions. 

Passive RFID systems are comprised of RFID tags, readers/antennas, middleware, and (in many cases), RFID printers.  

With the rate the technology has evolved, the modern market now has access to thousands of tag-types with increased range and sensitivity and a plethora of substance-specific designs (e.g. tags made specifically for metal, liquid, and other materials). This technology allows for unprecedented tracking for and security of inventory, personnel, and other company assets.

Passive RFID tags, which have no electronic components, cost roughly 1/100th of the price of their “active” counterparts. And, although they have a much lower range than their active counterparts, they require no internal power source and instead draw their power from electromagnetic energy emitted by the local RFID readers. Though a tag cannot be assigned an IP address, the reader is actually part of the IoT network and is identified by its IP address, which makes the latter vulnerable, as we’ve seen, to the same kinds of hacks that affect other devices when steps have not been taken to hide the IP address.

Because of these factors, passive RFID tags are ideal for companies and supply chains operating in extreme heat and cold, dust, debris and exposure to other elements.

Final Thoughts

With all of this taken into consideration, the question still remains, “What can the average consumer do to protect their IoT devices from hackers?”

One of the simplest solutions is to make a minor investment into some kind of blocking or wallet jamming card. If you have first generation contactless cards, ask your bank or credit card company to upgrade you to the encrypted second generation. While your data might be skimmed, it will be unreadable to the perpetrator due to the power of modern encryption protocols. 

For example, a standard 256-bit protocol would take 50 supercomputers many billions of years to decrypt and the impracticalities of such an attack lead cybercriminals to target easier prey. 

Ultimately, the accelerating pace of RFID tech will make our lives more convenient. With greater convenience, however, comes a greater need for security solutions. When it comes to RFID, one can only hope that the good guys stay one step ahead in the ongoing crypto arms race.

About the author: A former defense contractor for the US Navy, Sam Bocetta turned to freelance journalism in retirement, focusing his writing on US diplomacy and national security, as well as technology trends in cyberwarfare, cyberdefense, and cryptography.

 

Copyright 2010 Respective Author at Infosec Island
  • September 11th 2019 at 14:33

How Ethical Hackers Find Weaknesses and Secure Businesses

When people hear about hackers, it typically conjures up images of a hooded figure in a basement inputting random code into a computer terminal. This Hollywood cliché is far from the truth from modern-day cybersecurity experts, and it’s also important to note that not all hackers are malicious.

Hackers and their role in information cybersecurity is a vastly growing career on a global scale. Market research predictions in the cybersecurity space is expected to exceed $181.77 billion by 2021. The global market for cybersecurity is growing, and companies are considering security an imperative for today’s organizations.

The cybersecurity landscape has growing threats today, with data breaches and attacks happening constantly. For instance, it’s hard to forget the infamous WannaCry ransomware attack spread through the world, targeting Microsoft machines and bringing multiple services worldwide to their knees. The attack hit an estimated 200,000 computers across 150 countries, encrypting files in health services, motor manufacturing, telephone companies, logistics companies, and more.

So, what can we do to secure our businesses and online infrastructure? One option is to look to ethical hackers, or white hat hackers, security experts who approaches your data and services through the eyes of a malicious attacker. An engagement from an ethical hacker is designed to see how your infrastructure or applications would hold up against a real-world attack.

Turning to Ethical Hackers

A commonly used term for ethical hackers attacking your system is known as the “Red Team.” While this term covers a broader attack surface, including attacks against people, such as social Engineering, and physical attacks, such as lock picking. Would your security stop dedicated and professional attackers or would they find holes and weaknesses, unknown to you and your internal security team (also known as, The Blue team)?

The job description for an ethical hacker can be simple to breakdown – assess the target, scope out all functionality and weaknesses, attack the system and then prove it can be exploited. While the job description can be described quite easily, the work involved can be large and undoubtedly complex. Additionally, when carrying out a pen-test or assessment of a client’s application or network, production safety and legality is what separates the “good guys” (ethical hackers) from the “bad guys” (malicious hackers).

Assessing the Target

When beginning an assessment of a system or application, we must have a set scope before we begin. It is illegal to attack systems without prior consent and furthermore a waste of time to work on assets out of the predefined scope. Target assessment can be one of the most important steps in a well-performed test. The idea of simply jumping straight in and attacking a system on the first IP or functionality we come across is a bad way to start.

The best practice is to find everything that is part of the assessment and see how it works together. We must know what the system in place was designed to do and how data is transferred throughout. Building maps with various tools gives a much greater picture of the attack surface we can leverage. The assessment of the target is commonly known as the “enumeration phase.”

At the end of this phase we should have a great place to start attacking, with an entire structure of the system or application, hopefully with information regarding operating systems, services packs, version numbers and any other fingerprinting data that can lead to an effective exploit of the target.

Vulnerability Analysis

All information gathered against the machines or applications should immediately give a good hacker a solid attack surface and the ability to identify weakness in the system. The internet provides a vast amount of information that can easily be associated with the architecture and lists of all known exploits or vulnerabilities already found against said systems.

There are additional tools to help with vulnerability analysis, like scanners, that flag possible points of weakness in the system or application. All of the analytic data is much easier to find and test after a thorough assessment.

Exploitation

Then, with exploitation, the services of an ethical hacker make an impact. We may have all the assessment data and vulnerability analysis information, but if they do not know how to perform strong attacks or bypass any security mechanisms in place, then the previous steps were useless. Exploiting a commonly known vulnerability can be fairly straight forward if it has write-ups from other security specialists. But hands-on experience against creating your own injections and obfuscated code, or black/white list in place is invaluable.

Furthermore, it is imperative to test with production safety in mind. Having an ethical hacker run dangerous code or tests against the system may cause untold damage. This defeats the purpose of a secure test. The objective is to prove that it is vulnerable, without causing harm or disruption to the live system.

Providing Concepts

After a test has been concluded, the results of all exploits, vulnerability analysis and even enumeration data returning valuable system information should be documented and presented to the client. All vulnerabilities should be given ratings (Standard rating systems like CVSS3 are most common to use) on how severe the issue and impact of the exploit could be.

Additionally, steps shown on how an attacker could perform this exploit should be included in a step-by-step proof of concept. The client should be able to follow along with your report and end up with the same results showing the flaw in the system. Again, non-malicious attacks should be given in the report.

Providing these proof-of-concept reports to clients, with steps on how to reproduce the issues and give non-malicious examples of how the system can be breached, is paramount to success in securing your systems.

No Perfect System

Finally, it’s important to note that no system is ever considered flawless. Exploits and vulnerabilities are released on almost a daily basis on every type of machine, server, application and language. Security assessments and tests in modern applications must be a continual process. This is where the role of a hacker in your organization, simulating attacks in the style of a malicious outsider becomes invaluable.

Approaching your currently implemented security as a target to beat or bypass, instead of a defense mechanism waiting to be hit, is the strongest and fastest way to find any flaws that may already exist! Modern-day web applications have been described as a living, breathing thing and negligence for keeping it secure will surely result in a digital disaster!

About the author: Jonathan Rice works as a vulnerability web application specialist for application security provider WhiteHat Security. In this role, Rice has focused on manual assessments, vulnerability verification and dynamic application security testing (DAST).

Copyright 2010 Respective Author at Infosec Island
  • September 11th 2019 at 14:41

Most Android flashlight apps request an absurd number of permissions

Two Android flashlight apps, in particular, are requesting 77 permissions... for some reason.
  • September 11th 2019 at 20:48

Infamous surveillance tech vendor makes pledge to follow UN human rights policy

Facing legal assault, NSO Group pledges to fight customers abusing its tools to spy on innocents, political opponents.
  • September 11th 2019 at 23:14

Most consumers will refuse to work with enterprises that won’t keep their data secure

There are ramifications for enterprise customer retention as an understanding of data protection increases.
  • September 12th 2019 at 10:08

Google discloses vulnerability in Chrome OS 'built-in security key' feature

Security issue fixed in late June, with the release of Chrome OS 75. Additional remediation steps below.
  • September 12th 2019 at 10:20

California mulls over ban of facial recognition tech in police body cameras

The state Senate appears to be listening to appeals to reel in the widespread use of biometrics.
  • September 12th 2019 at 12:18

Simjacker attack exploited in the wild to track users for at least two years

Simjacker attack abuses STK and S@T Browser technologies installed on some SIM cards.
  • September 12th 2019 at 13:30

Hey Google: What we search for most in cybersecurity .. cyber security?

Google search data reveals the most popular hacker in the world, alongside the cybersecurity topics we care most about.
  • September 12th 2019 at 14:25

Drop Down Low - ESW #153

By paul@securityweekly.com

This week, in the Enterprise News, Splunk buys SaaS startup Omnition, Stage Fund buys Israeli cybersecurity co Cymmetria, Trustwave platform brings more visibility and control cloud security, and more! Steve Laubenstein is the VP - Cyber Threat Products Group at Core Security - a HelpSystems Company. Steve will be discussing the need to understand your system's resilience to attacks, and your people's ability to quickly identify and respond has never been higher. Yet, we live in an IT world that is increasingly becoming borderless. We will be discussing the role of pen testing where mobile, cloud, IoT and network sprawl are the new normal.

To learn more about Core Security, visit: https://securityweekly.com/coresecurity

We interview Dan Cornell, the Founder & CTO the at DenimGroup.Next, Bryson Bort, the Founder & CEO at SCYTHE. Last, Yuriy Bulygin, the Founder & CEO at Eclypsium.

Full Show Notes: https://wiki.securityweekly.com/ES_Episode153

Visit https://www.securityweekly.com/esw for all the latest episodes!

  • September 12th 2019 at 16:18

Sophos open-sources Sandboxie, a utility for sandboxing any application

Sandboxie is now a free download. Source code to be open-sourced at a later date.
  • September 12th 2019 at 19:20

France will attempt to block Facebook’s Libra cryptocurrency on European soil

Country officials say unresolved privacy issues could pose a risk to consumers.
  • September 13th 2019 at 10:45

Scammer behind sextortion campaigns arrested in France

Twenty-year-old Frenchman arrested at Paris Airport on Monday for extorting tens of victims.
  • September 13th 2019 at 10:54

InnfiRAT malware lurks in your machine to steal cryptocurrency wallet data

The new Trojan will also harvest information from open browser sessions.
  • September 13th 2019 at 11:58

US Treasury sanctions three North Korean hacking groups

US wants to seize financial assets associated with the Lazarus Group, Bluenoroff, and Andarial.
  • September 13th 2019 at 16:47

Disqus & Kickstarter hacker warns against password reuse

Former hacker aims for a white-hat career, apologizes to one of his victims, and gives out advice to users.
  • September 13th 2019 at 22:36

Israeli police arrest execs from vendor of mobile surveillance tech

Ability execs arrests over the weekend after raids on the company's offices.
  • September 16th 2019 at 00:48

Pen test goes pear-shaped: cybersecurity firm staff arrested over courthouse burglary

A midnight raid was not what court administrators had in mind for electronic record security tests.
  • September 16th 2019 at 05:19
❌