Talkin' Bout [Infosec] News

Black Hills Information Security
undefined
Oct 19, 2021 • 50min

Talkin’ About Infosec News – 10/19/2021

ORIGINALLY AIRED ON OCTOBER 11, 2021 Articles discussed in this episode: 00:21 – Story # 1: Facebook Aftermath | https://engineering.fb.com/2021/10/05/networking-traffic/outage-details/ 09:17 – Story # 2: Twitch Source Code | https://www.theregister.com/2021/10/06/twitch_data_leak/ 25:31 – Story # 3: SMS Hacked; 5 Years | https://arstechnica.com/information-technology/2021/10/company-that-routes-sms-for-all-major-us-carriers-was-hacked-for-five-years/ 31:40 – Story # 4: K-12 Cybersecurity Bill | https://thehill.com/policy/cybersecurity/575957-biden-signs-bill-into-law-to-strengthen-k-12-school-cybersecurity?rl=1 36:39 – Story # 5: Forced Disclosure? | https://www.newsweek.com/businesses-could-soon-have-disclose-ransomware-payouts-1635838 Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment. https://www.blackhillsinfosec.com/services/cyber-range/ (00:00) - BHIS - Talkin' Bout [infosec] News 2021-10-11 (00:21) - Story # 1: Facebook Aftermath | https://engineering.fb.com/2021/10/05/networking-traffic/outage-details/ (09:17) - Story # 2: Twitch Source Code | https://www.theregister.com/2021/10/06/twitch_data_leak/ (25:31) - Story # 3: SMS Hacked; 5 Years | https://arstechnica.com/information-technology/2021/10/company-that-routes-sms-for-all-major-us-carriers-was-hacked-for-five-years/ (31:40) - Story # 4: K-12 Cybersecurity Bill | https://thehill.com/policy/cybersecurity/575957-biden-signs-bill-into-law-to-strengthen-k-12-school-cybersecurity?rl=1 (36:39) - Story # 5: Forced Disclosure? | https://www.newsweek.com/businesses-could-soon-have-disclose-ransomware-payouts-1635838
undefined
Oct 13, 2021 • 43min

Talkin’ About Infosec News – 10/13/2021

ORIGINALLY AIRED ON OCTOBER 4, 2021 Articles discussed in this episode: 00:57 – Story # 1: Facebook is Burning 22:09 – Story # 2: https://www.bleepingcomputer.com/news/security/voipms-phone-services-disrupted-by-ddos-extortion-attack/ 25:38 – Story # 3: https://krebsonsecurity.com/2021/10/fcc-proposal-targets-sim-swapping-port-out-fraud/ 33:02 – Story # 4: https://cyberworkx.in/2021/10/03/hackers-spreading-malware-by-misusing-trust-of-amnesty-international/ 36:55 – Story # 5: https://threatpost.com/finspy-surveillance-kit/175068/ 39:04 – Story # 6: https://thehackernews.com/2021/10/a-new-apt-hacking-group-targeting-fuel.html https://www.blackhillsinfosec.com/services/cyber-range/ (00:00) - BHIS - Talkin' Bout [infosec] News 2021-10-04 (00:57) - Story # 1: Facebook is Burning (22:09) - Story # 2: https://www.bleepingcomputer.com/news/security/voipms-phone-services-disrupted-by-ddos-extortion-attack/ (25:38) - Story # 3: https://krebsonsecurity.com/2021/10/fcc-proposal-targets-sim-swapping-port-out-fraud/ (33:02) - Story # 4: https://cyberworkx.in/2021/10/03/hackers-spreading-malware-by-misusing-trust-of-amnesty-international/ (36:55) - Story # 5: https://threatpost.com/finspy-surveillance-kit/175068/ (39:04) - Story # 6: https://thehackernews.com/2021/10/a-new-apt-hacking-group-targeting-fuel.html
undefined
Sep 29, 2021 • 53min

Talkin’ About Infosec News – 9/29/2021

ORIGINALLY AIRED ON SEPTEMBER 27, 2021 Articles discussed in this episode: 01:20 – Story # 1: https://habr.com/en/post/579714/ 02:14 – Story # 1b: https://therecord.media/researcher-discloses-iphone-lock-screen-bypass-on-ios-15-launch-day/ 02:54 – Story # 1c: https://www.bleepingcomputer.com/news/apple/new-macos-zero-day-bug-lets-attackers-run-commands-remotely/ 04:03 – Story #1d: https://habr.com/en/post/580272/ 09:42 – A Wild Noah Has Joined the Chat 13:24 – The Wildest, Grayson & Tenille, Have Joined the Chat 13:45 – A Wild Jeff Has Joined the Chat 14:45 – Story #2: https://www.bbc.com/news/technology-58678907 22:03 – Story #3: https://arstechnica.com/information-technology/2021/09/ransomware-victims-panicked-while-fbi-secretly-held-revil-decryption-key/ 29:47 – Story #4: https://thehackernews.com/2021/09/new-nagios-software-bugs-could-let.html 34:34 – Story #5: https://thehackernews.com/2021/09/a-new-bug-in-microsoft-windows-could.html 37:15 – Story #5b: https://github.com/Jamesits/dropWPBT 42:29 – Story #5c: https://github.com/chipsec/chipsec Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment. https://www.blackhillsinfosec.com/services/cyber-range/ Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts. Join 3,834 other subscribers Email Address (00:00) - BHIS - Talkin' Bout [infosec] News 2021-09-27 (01:20) - Story # 1: https://habr.com/en/post/579714/ (02:14) - Story # 1b: https://therecord.media/researcher-discloses-iphone-lock-screen-bypass-on-ios-15-launch-day/ (02:54) - Story # 1c: https://www.bleepingcomputer.com/news/apple/new-macos-zero-day-bug-lets-attackers-run-commands-remotely/ (04:03) - Story # 1d: https://habr.com/en/post/580272/ (09:42) - A Wild Noah Has Joined the Chat (13:24) - The Wildest, Grayson & Tenille, Have Joined the Chat (13:45) - A Wild Jeff Has Joined the Chat (14:45) - Story # 2: https://www.bbc.com/news/technology-58678907 (22:03) - Story # 3: https://arstechnica.com/information-technology/2021/09/ransomware-victims-panicked-while-fbi-secretly-held-revil-decryption-key/ (29:47) - Story # 4: https://thehackernews.com/2021/09/new-nagios-software-bugs-could-let.html (34:34) - Story # 5: https://thehackernews.com/2021/09/a-new-bug-in-microsoft-windows-could.html (37:15) - Story # 5b: https://github.com/Jamesits/dropWPBT (42:29) - Story # 5c: https://github.com/chipsec/chipsec
undefined
Sep 28, 2021 • 1h 3min

Webcast: Shellcode Execution with GoLang

In this Black Hills Information Security (BHIS) webcast, we explore using GoLang to author malware with embedded shellcode. GoLang is a Google-authored modern successor language to C/C++. It is multi-platform, high performance, multi-threaded, and unlike C/C++ includes garbage collection! It has the advantage of compiling to native machine code, unlike .NET C# which is dependent on the common language runtime, and easily reversible. We explore how to execute Windows shellcode with GoLang in the same process thread space, and then also explore one process injection method. If you are a penetration tester looking to expand your malware authoring skills, a little Go(lang) will take you far! Recorded • 2021-05-20 Join the BHIS Community Discord: https://discord.gg/bhis 00:00 – FEATURE PRESENTATION BEGINS: Shellcode Execution with GoLang 01:39 – Meet Joff Thyer 02:16 – What is GoLang? 04:14 – Aspects of GoLang 07:43 – C# or Go? 09:24 – Go Command Line 10:57 – Golang Type Safety 11:31 – What is Shellcode? 12:51 – Sources of Shellcode 14:50 – Executing Shellcode on Windows 16:08 – GoLang “unsafe” Package 16:55 – Go “syscall” package is becoming per platform 17:50 – GoLang “windows” Package 18:22 – “x/sys/windows” package 20:29 – Looking deeper into Syscall 22:26 – Calling Functions out of Kernel32.dll (00:00) - FEATURE PRESENTATION BEGINS: Shellcode Execution with GoLang (01:38) - Meet Joff Thyer (02:15) - What is GoLang? (04:12) - Aspects of GoLang (07:40) - C# or Go? (09:19) - Go Command Line (10:52) - Golang Type Safety (11:25) - What is Shellcode? (12:44) - Sources of Shellcode (14:43) - Executing Shellcode on Windows (15:59) - GoLang "unsafe" Package (16:46) - Go "syscall" package is becoming per platform (17:42) - GoLang "windows" Package (18:13) - "x/sys/windows" package (20:20) - Looking deeper into Syscall (22:13) - Calling Functions out of Kernel32.dll (22:59) - GoLang: Byte Array for Shellcode (24:18) - Method 1: Direct Syscall (29:07) - Tangent: The A/V and EDR evasion paradox (32:04) - Single byte XOR function in GoLang (33:27) - Method 2: Creating Thread in Same Process (35:13) - GoLang Windows Native DLL (36:19) - Steps to build a native DLL (40:38) - Living off the Land with Native DLL (43:22) - DEMO : Run shell code (45:55) - Method 3: Process Injection (48:20) - DEMO - Remote Process Injection (49:19) - Additional Resources (49:59) - DEMO - Remote Process Injection cont. (52:01) - QnA (53:46) - LINK: Attacker Emulation and C2 - https://www.antisyphontraining.com/enterprise-attacker-emulation-and-c2-implant-development-w-joff-thyer/
undefined
Sep 23, 2021 • 53min

Talkin’ About Infosec News – 9/23/2021

ORIGINALLY AIRED ON SEPTEMBER 20, 2021 Articles discussed in this episode: 00:55 – Story # 1: https://techcrunch.com/2021/09/13/apple-zero-day-nso-pegasus/ 19:45 – Story # 2: https://www.tomshardware.com/news/researchers-find-windows-subsystem-linux-malware 27:45 – Story # 3: https://www.wsj.com/articles/u-s-to-target-crypto-ransomware-payments-with-sanctions-11631885336 41:19 – Story # 4: https://apnews.com/article/technology-business-pakistan-seattle-washington-c6122e936e0fcc7c077becdd2559886b 46:55 – Story # 5: https://therecord.media/us-fines-former-nsa-employees-who-provided-hacker-for-hire-services-to-uae/ Join the BHIS Community Discord: https://discord.gg/bhis Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment. https://www.blackhillsinfosec.com/services/cyber-range/ Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts. Join 3,829 other subscribers Email Address Subscribe (00:00) - BHIS - Talkin' Bout [infosec] News 2021-09-20 (00:55) - Story # 1: https://techcrunch.com/2021/09/13/apple-zero-day-nso-pegasus/ (19:45) - Story # 2: https://www.tomshardware.com/news/researchers-find-windows-subsystem-linux-malware (27:45) - Story # 3: https://www.wsj.com/articles/u-s-to-target-crypto-ransomware-payments-with-sanctions-11631885336 (41:19) - Story # 4: https://apnews.com/article/technology-business-pakistan-seattle-washington-c6122e936e0fcc7c077becdd2559886b (46:55) - Story # 5: https://therecord.media/us-fines-former-nsa-employees-who-provided-hacker-for-hire-services-to-uae/
undefined
Sep 22, 2021 • 1h 3min

Webcast: The Quest for the Kill Chain Killer Continues

Jordan and Kent have heard from a lot of people that the past Black Hills Information Security (BHIS) webcasts: “Group Policies That Kill Kill Chains” and “Active Directory Best Practices to Frustrate Attackers” have changed their business models for the better. And since they’ve been offered the BHIS soapbox again, they thought it was time to update this material and combine it. Security can sometimes move slow and other times blazingly fast. They’ll discuss what they’ve seen in the past year and how it impacts their view on baseline defensive configurations you shouldn’t be operating without. At the end of the day, we are in this game to make things difficult for attackers, adversaries, and red teamers. We want to reduce mean time to detection. And we really want to help you make your networks and domains more secure. So… why not update our favorite webcasts with everything we’ve learned since giving them? Join the BLACK HILLS INFOSEC Discord Server — https://discord.gg/bhis The Kill Chains Material: https://www.blackhillsinfosec.com/webcast-group-policies-that-kill-kill-chains/ How to Frustrate Attackers Material: https://www.blackhillsinfosec.com/webcast-group-policies-that-kill-kill-chains/ Recorded•2021-05-13 00:00 – FEATURE PRESENTATION BEGINS – The Quest for the Kill Chain Killer Continues 02:15 – What Changed in the Last Year? 06:31 – The Kill Chain 07:47 – Active Directory Best Practices to Frustrate Attackers 09:22 – Pre-Reqs 13:31 – Active Directory (00:00) - FEATURE PRESENTATION BEGINS - The Quest for the Kill Chain Killer Continues (02:14) - What Changed in the Last Year? (06:26) - The Kill Chain (07:40) - Active Directory Best Practices to Frustrate Attackers (09:13) - Pre-Reqs (13:21) - Active Directory (16:04) - Organizational Units ^^ Policies (17:35) - Layer Two Protocols (20:41) - Addressing LLMNR (NBNS and WPAD too) (22:50) - Unaddressing of LLMNR (34:12) - Addressing NBNS (34:55) - Addressing WPAD (36:41) - File Shares (39:24) - SMB Signing (41:02) - IPv6 (41:53) - LDAP Channel Binding (42:57) - Microsoft Store (43:55) - Too Many GPOs to Cover (44:40) - Dealing with Local Admins (45:24) - Network Logons (46:50) - Managed Service Accounts (48:32) - Application Controls (49:18) - Speaking of Ransomware... (50:21) - Firewalls (52:01) - Canary Accounts (52:51) - Network Analysis (54:17) - Credentials (56:40) - Wrap-Up and Questions
undefined
Sep 17, 2021 • 45min

Talkin’ About Infosec News – 9/17/2021

ORIGINALLY AIRED ON SEPTEMBER 13, 2021 Articles discussed in this episode: 00:00 – BHIS – Talkin’ Bout [infosec] News 2021-09-13 02:59 – Story # 1: https://cyberworkx.in/2021/08/31/authentication-bypass-vulnerability-in-exchange-server/ 04:43 – Story # 1b: https://techcommunity.microsoft.com/t5/exchange-team-blog/how-to-update-ad-schema-to-address-cve-2021-34470-if-exchange-is/ba-p/2617083 07:22 – Story # 2: https://cyberworkx.in/2021/09/08/microsoft-warns-of-new-zeroday-vulnerability-hunting-down-windows-users/ 13:16 – Story # 3: https://therecord.media/ghostscript-zero-day-allows-full-server-compromises/ 17:28 – Story # 3b: https://xkcd.com/2347/ 22:03 – Story # 4: https://jfrog.com/blog/critical-vulnerability-in-haproxy-cve-2021-40346-integer-overflow-enables-http-smuggling/ 30:15 – Story # 5: https://venturebeat.com/2021/09/11/8-orgs-with-web-apps-for-file-uploads-have-adequate-cybersecurity/ 33:21 – Story # 5b: https://stackoverflow.com/questions/1732348/regex-match-open-tags-except-xhtml-self-contained-tags/1732454#1732454 34:15 – Story # 6: https://www.bleepingcomputer.com/news/security/hackers-leak-passwords-for-500-000-fortinet-vpn-accounts/ 39:32 – Story # 7: https://www.bleepingcomputer.com/news/security/revil-ransomwares-servers-mysteriously-come-back-online/ Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment. https://www.blackhillsinfosec.com/services/cyber-range/ (00:00) - BHIS - Talkin' Bout [infosec] News 2021-09-13 (02:59) - Story # 1: https://cyberworkx.in/2021/08/31/authentication-bypass-vulnerability-in-exchange-server/ (04:43) - Story # 1b: https://techcommunity.microsoft.com/t5/exchange-team-blog/how-to-update-ad-schema-to-address-cve-2021-34470-if-exchange-is/ba-p/2617083 (07:22) - Story # 2: https://cyberworkx.in/2021/09/08/microsoft-warns-of-new-zeroday-vulnerability-hunting-down-windows-users/ (13:16) - Story # 3: https://therecord.media/ghostscript-zero-day-allows-full-server-compromises/ (17:28) - Story # 3b: https://xkcd.com/2347/ (22:03) - Story # 4: https://jfrog.com/blog/critical-vulnerability-in-haproxy-cve-2021-40346-integer-overflow-enables-http-smuggling/ (30:15) - Story # 5: https://venturebeat.com/2021/09/11/8-orgs-with-web-apps-for-file-uploads-have-adequate-cybersecurity/ (33:21) - Story # 5b: https://stackoverflow.com/questions/1732348/regex-match-open-tags-except-xhtml-self-contained-tags/1732454#1732454 (34:15) - Story # 6: https://www.bleepingcomputer.com/news/security/hackers-leak-passwords-for-500-000-fortinet-vpn-accounts/ (39:32) - Story # 7: https://www.bleepingcomputer.com/news/security/revil-ransomwares-servers-mysteriously-come-back-online/
undefined
Sep 16, 2021 • 1h 51min

Webcast: Getting Started in Blockchain Security and Smart Contract Auditing

Why is blockchain security important? Blockchain usage has exploded since the Bitcoin whitepaper was first published in 2008. Many applications rely on this technology for increased trust and privacy, where they would otherwise be absent from a centralized system. The ecosystem surrounding blockchain technology is large, complex, and has many moving pieces. Exchanges exist where users can transact various cryptocurrencies, NFTs, and tokens. Smart contracts can be written to programmatically apply behavior to blockchain transactions. Decentralized Finance (DeFi) markets exist where users can swap tokens without needing to sign up for an account. All of these pieces are prone to vulnerabilities, and with blockchain being at the forefront of emerging technology, new issues are being found daily. In this Black Hills Information Security (BHIS) webcast, we’ll use case studies about recent blockchain hacks to introduce the underlying issues that occur in writing/engineering smart contracts that have ultimately lead to the loss of millions of dollars to attackers. Join us on the BLACK HILLS INFOSEC Discord channel for discussion and interaction with the community — https://discord.gg/bhis 0:00:00 – PreShow Banter™ — Beau Has a Fan Club 0:32:39 – FEATURE PRESENTATION: Getting Started in Blockchain Security and Smart Contract Auditing 0:36:39 – Roadmap 0:37:51 – Why Blockchain Security 0:39:21 – Growing Use Cases for Blockchain 0:43:23 – Blockchain Elements That Need Securing 0:49:00 – What Are Smart Contracts 0:51:22 – EVM : Ethereum Virtual Machine 0:54:00 – Solidity 0:59:55 – Smart Contract Vulns 1:04:00 – Reentrancy 1:05:54 – Front-Running 1:07:41 – Inter Overflow and Underflow (00:00) - PreShow Banter™ — Beau Has a Fan Club (32:39) - FEATURE PRESENTATION: Getting Started in Blockchain Security and Smart Contract Auditing (36:39) - Roadmap (37:51) - Why Blockchain Security (39:21) - Growing Use Cases for Blockchain (43:23) - Blockchain Elements That Need Securing (49:00) - What Are Smart Contracts (51:22) - EVM : Ethereum Virtual Machine (54:00) - Solidity (59:53) - Smart Contract Vulns (01:03:59) - – Reentrancy (01:05:52) - – Front-Running (01:07:39) - – Inter Overflow and Underflow (01:09:10) - – Denial-of-Service (01:10:38) - – Access Control (01:12:41) - – Timestamp Dependence (01:15:17) - Case Studies – Uranium Finance Hack (01:17:21) - – Poly Network Hack (01:21:02) - – Cream Finance Hack (01:24:37) - DEMO: Live Exploit (01:35:10) - Exploit Recap (01:35:40) - Security Tools – VS Code + Solidity Visual Developer (01:36:35) - – Slither (01:36:53) - – Mythril & MythX (01:37:23) - Get-Started Resources (01:38:30) - Bug Bounties (01:38:46) - Key Takeaways (01:39:56) - This is the End – Q & A
undefined
Sep 9, 2021 • 49min

Talkin’ About Infosec News – 9/9/2021

ORIGINALLY AIRED ON SEPTEMBER 7, 2021 Articles discussed in this episode: 02:14 – Story # 1: https://therecord.media/chinese-hackers-behind-july-2021-solarwinds-zero-day-attacks 06:17 – Story # 2: https://www.secureworld.io/industry-news/ciso-lawsuit-solarwinds 08:30 – Story # 3: https://taskandpurpose.com/news/air-force-cybersecurity-nicolas-chaillan/ 10:29 – Story # 3b: https://www.linkedin.com/pulse/time-say-goodbye-nicolas-m-chaillan/ 13:20 – Story # 4: https://venturebeat.com/2021/09/02/the-cybersecurity-industry-is-burning-and-vcs-dont-care/ 18:03 – Story # 5: https://www.theregister.com/2021/09/03/how_to_be_a_ransomware/ 24:38 – Story # 6: https://www.bleepingcomputer.com/news/security/over-60-000-parked-domains-were-vulnerable-to-aws-hijacking/ 28:30 – Story # 7: https://www.zdnet.com/article/fbi-warns-of-ransomware-attacks-targeting-food-and-agriculture-sector-as-white-house-pushes-for-proactive-measures/ 33:20 – Story # 7b: https://twitter.com/vxunderground/status/1435306913038745612 34:16 – Story # 7c: https://twitter.com/vxunderground/status/1433758742244478982 37:29 – Story # 8: https://cyberworkx.in/2021/09/06/russian-mobile-comes-with-preinstalled-malware/ 38:26 – Story # 9: https://krebsonsecurity.com/2021/09/gift-card-gang-extracts-cash-from-100k-inboxes-daily/ 45:31 – Story # 10: https://www.bleepingcomputer.com/news/security/mcdonalds-leaks-password-for-monopoly-vip-database-to-winners/ (00:00) - BHIS - Talkin' Bout [infosec] News 2021-09-07 (02:14) - Story # 1: https://therecord.media/chinese-hackers-behind-july-2021-solarwinds-zero-day-attacks/ (06:17) - Story # 2: https://www.secureworld.io/industry-news/ciso-lawsuit-solarwinds (08:30) - Story # 3: https://taskandpurpose.com/news/air-force-cybersecurity-nicolas-chaillan/ (10:29) - Story # 3b: https://www.linkedin.com/pulse/time-say-goodbye-nicolas-m-chaillan/ (13:20) - Story # 4: https://venturebeat.com/2021/09/02/the-cybersecurity-industry-is-burning-and-vcs-dont-care/ (18:03) - Story # 5: https://www.theregister.com/2021/09/03/how_to_be_a_ransomware/ (24:38) - Story # 6: https://www.bleepingcomputer.com/news/security/over-60-000-parked-domains-were-vulnerable-to-aws-hijacking/ (28:30) - Story # 7: https://www.zdnet.com/article/fbi-warns-of-ransomware-attacks-targeting-food-and-agriculture-sector-as-white-house-pushes-for-proactive-measures/ (33:20) - Story # 7b: https://twitter.com/vxunderground/status/1435306913038745612 (34:16) - Story # 7c: https://twitter.com/vxunderground/status/1433758742244478982 (37:29) - Story # 8: https://cyberworkx.in/2021/09/06/russian-mobile-comes-with-preinstalled-malware/ (38:26) - Story # 9: https://krebsonsecurity.com/2021/09/gift-card-gang-extracts-cash-from-100k-inboxes-daily/ (45:31) - Story # 10: https://www.bleepingcomputer.com/news/security/mcdonalds-leaks-password-for-monopoly-vip-database-to-winners/
undefined
Sep 3, 2021 • 57min

Talkin’ About Infosec News – 9/3/2021

ORIGINALLY AIRED ON AUGUST 30, 2021 Articles discussed in this episode: 01:38 – Story # 1: https://carbuzz.com/news/tom-cruise-couldnt-stop-thieves-stealing-his-bmw-7-series 14:45 – Story # 2: https://www.vice.com/en/article/jg84yy/data-brokers-netflow-data-team-cymru 23:24 – Story # 3: https://www.reuters.com/technology/exclusive-microsoft-warns-thousands-cloud-customers-exposed-databases-emails-2021-08-26/ 27:37 – Story # 4: https://cyberworkx.in/2021/08/28/five-different-malware-families-targeting-pulse-secure-devices/ 33:08 – Story # 5: https://www.techradar.com/news/microsoft-warns-of-elaborate-new-cybercrime-scheme-to-steal-your-login-details 36:36 – Story # 6: https://twitter.com/EdClowes/status/1430083273015840776?s=19 39:43 – Story # 7: https://www.theregister.com/2021/08/26/qurium_bright_data_philippines_ddos/ 46:18 – Story # 8: https://www.foxbusiness.com/technology/florida-woman-fired-rampage-company-computer-system 50:22 – Story # 9: https://www.nextgov.com/cybersecurity/2021/08/white-house-tasks-nist-producing-another-cybersecurity-framework/184868/ Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment. https://www.blackhillsinfosec.com/services/cyber-range/ Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts. Join 3,809 other subscribers Email Address (00:00) - BHIS - Talkin' Bout [infosec] News 2021-08-30 (01:38) - Story # 1: https://carbuzz.com/news/tom-cruise-couldnt-stop-thieves-stealing-his-bmw-7-series (14:45) - Story # 2: https://www.vice.com/en/article/jg84yy/data-brokers-netflow-data-team-cymru (23:24) - Story # 3: https://www.reuters.com/technology/exclusive-microsoft-warns-thousands-cloud-customers-exposed-databases-emails-2021-08-26/ (27:37) - Story # 4: https://cyberworkx.in/2021/08/28/five-different-malware-families-targeting-pulse-secure-devices/](https://cyberworkx.in/2021/08/28/five-different-malware-families-targeting-pulse-secure-devices/) (33:08) - Story # 5: https://www.techradar.com/news/microsoft-warns-of-elaborate-new-cybercrime-scheme-to-steal-your-login-details (36:36) - Story # 6: https://twitter.com/EdClowes/status/1430083273015840776?s=19 (39:43) - Story # 7: https://www.theregister.com/2021/08/26/qurium_bright_data_philippines_ddos/ (46:18) - Story # 8: https://www.foxbusiness.com/technology/florida-woman-fired-rampage-company-computer-system (50:22) - Story # 9: https://www.nextgov.com/cybersecurity/2021/08/white-house-tasks-nist-producing-another-cybersecurity-framework/184868/

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app