

Talkin' Bout [Infosec] News
Black Hills Information Security
A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.
Join us live on YouTube, Monday's at 4:30PM ET
Join us live on YouTube, Monday's at 4:30PM ET
Episodes
Mentioned books

Oct 19, 2021 • 50min
Talkin’ About Infosec News – 10/19/2021
ORIGINALLY AIRED ON OCTOBER 11, 2021
Articles discussed in this episode:
00:21 – Story # 1: Facebook Aftermath | https://engineering.fb.com/2021/10/05/networking-traffic/outage-details/
09:17 – Story # 2: Twitch Source Code | https://www.theregister.com/2021/10/06/twitch_data_leak/
25:31 – Story # 3: SMS Hacked; 5 Years | https://arstechnica.com/information-technology/2021/10/company-that-routes-sms-for-all-major-us-carriers-was-hacked-for-five-years/
31:40 – Story # 4: K-12 Cybersecurity Bill | https://thehill.com/policy/cybersecurity/575957-biden-signs-bill-into-law-to-strengthen-k-12-school-cybersecurity?rl=1
36:39 – Story # 5: Forced Disclosure? | https://www.newsweek.com/businesses-could-soon-have-disclose-ransomware-payouts-1635838
Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.
https://www.blackhillsinfosec.com/services/cyber-range/
(00:00) - BHIS - Talkin' Bout [infosec] News 2021-10-11
(00:21) - Story # 1: Facebook Aftermath | https://engineering.fb.com/2021/10/05/networking-traffic/outage-details/
(09:17) - Story # 2: Twitch Source Code | https://www.theregister.com/2021/10/06/twitch_data_leak/
(25:31) - Story # 3: SMS Hacked; 5 Years | https://arstechnica.com/information-technology/2021/10/company-that-routes-sms-for-all-major-us-carriers-was-hacked-for-five-years/
(31:40) - Story # 4: K-12 Cybersecurity Bill | https://thehill.com/policy/cybersecurity/575957-biden-signs-bill-into-law-to-strengthen-k-12-school-cybersecurity?rl=1
(36:39) - Story # 5: Forced Disclosure? | https://www.newsweek.com/businesses-could-soon-have-disclose-ransomware-payouts-1635838

Oct 13, 2021 • 43min
Talkin’ About Infosec News – 10/13/2021
ORIGINALLY AIRED ON OCTOBER 4, 2021
Articles discussed in this episode:
00:57 – Story # 1: Facebook is Burning
22:09 – Story # 2: https://www.bleepingcomputer.com/news/security/voipms-phone-services-disrupted-by-ddos-extortion-attack/
25:38 – Story # 3: https://krebsonsecurity.com/2021/10/fcc-proposal-targets-sim-swapping-port-out-fraud/
33:02 – Story # 4: https://cyberworkx.in/2021/10/03/hackers-spreading-malware-by-misusing-trust-of-amnesty-international/
36:55 – Story # 5: https://threatpost.com/finspy-surveillance-kit/175068/
39:04 – Story # 6: https://thehackernews.com/2021/10/a-new-apt-hacking-group-targeting-fuel.html
https://www.blackhillsinfosec.com/services/cyber-range/
(00:00) - BHIS - Talkin' Bout [infosec] News 2021-10-04
(00:57) - Story # 1: Facebook is Burning
(22:09) - Story # 2: https://www.bleepingcomputer.com/news/security/voipms-phone-services-disrupted-by-ddos-extortion-attack/
(25:38) - Story # 3: https://krebsonsecurity.com/2021/10/fcc-proposal-targets-sim-swapping-port-out-fraud/
(33:02) - Story # 4: https://cyberworkx.in/2021/10/03/hackers-spreading-malware-by-misusing-trust-of-amnesty-international/
(36:55) - Story # 5: https://threatpost.com/finspy-surveillance-kit/175068/
(39:04) - Story # 6: https://thehackernews.com/2021/10/a-new-apt-hacking-group-targeting-fuel.html

Sep 29, 2021 • 53min
Talkin’ About Infosec News – 9/29/2021
ORIGINALLY AIRED ON SEPTEMBER 27, 2021
Articles discussed in this episode:
01:20 – Story # 1: https://habr.com/en/post/579714/
02:14 – Story # 1b: https://therecord.media/researcher-discloses-iphone-lock-screen-bypass-on-ios-15-launch-day/
02:54 – Story # 1c: https://www.bleepingcomputer.com/news/apple/new-macos-zero-day-bug-lets-attackers-run-commands-remotely/
04:03 – Story #1d: https://habr.com/en/post/580272/
09:42 – A Wild Noah Has Joined the Chat
13:24 – The Wildest, Grayson & Tenille, Have Joined the Chat
13:45 – A Wild Jeff Has Joined the Chat
14:45 – Story #2: https://www.bbc.com/news/technology-58678907
22:03 – Story #3: https://arstechnica.com/information-technology/2021/09/ransomware-victims-panicked-while-fbi-secretly-held-revil-decryption-key/
29:47 – Story #4: https://thehackernews.com/2021/09/new-nagios-software-bugs-could-let.html
34:34 – Story #5: https://thehackernews.com/2021/09/a-new-bug-in-microsoft-windows-could.html
37:15 – Story #5b: https://github.com/Jamesits/dropWPBT
42:29 – Story #5c: https://github.com/chipsec/chipsec
Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.
https://www.blackhillsinfosec.com/services/cyber-range/
Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.
Join 3,834 other subscribers
Email Address
(00:00) - BHIS - Talkin' Bout [infosec] News 2021-09-27
(01:20) - Story # 1: https://habr.com/en/post/579714/
(02:14) - Story # 1b: https://therecord.media/researcher-discloses-iphone-lock-screen-bypass-on-ios-15-launch-day/
(02:54) - Story # 1c: https://www.bleepingcomputer.com/news/apple/new-macos-zero-day-bug-lets-attackers-run-commands-remotely/
(04:03) - Story # 1d: https://habr.com/en/post/580272/
(09:42) - A Wild Noah Has Joined the Chat
(13:24) - The Wildest, Grayson & Tenille, Have Joined the Chat
(13:45) - A Wild Jeff Has Joined the Chat
(14:45) - Story # 2: https://www.bbc.com/news/technology-58678907
(22:03) - Story # 3: https://arstechnica.com/information-technology/2021/09/ransomware-victims-panicked-while-fbi-secretly-held-revil-decryption-key/
(29:47) - Story # 4: https://thehackernews.com/2021/09/new-nagios-software-bugs-could-let.html
(34:34) - Story # 5: https://thehackernews.com/2021/09/a-new-bug-in-microsoft-windows-could.html
(37:15) - Story # 5b: https://github.com/Jamesits/dropWPBT
(42:29) - Story # 5c: https://github.com/chipsec/chipsec

Sep 28, 2021 • 1h 3min
Webcast: Shellcode Execution with GoLang
In this Black Hills Information Security (BHIS) webcast, we explore using GoLang to author malware with embedded shellcode.
GoLang is a Google-authored modern successor language to C/C++. It is multi-platform, high performance, multi-threaded, and unlike C/C++ includes garbage collection! It has the advantage of compiling to native machine code, unlike .NET C# which is dependent on the common language runtime, and easily reversible. We explore how to execute Windows shellcode with GoLang in the same process thread space, and then also explore one process injection method.
If you are a penetration tester looking to expand your malware authoring skills, a little Go(lang) will take you far!
Recorded • 2021-05-20
Join the BHIS Community Discord: https://discord.gg/bhis
00:00 – FEATURE PRESENTATION BEGINS: Shellcode Execution with GoLang
01:39 – Meet Joff Thyer
02:16 – What is GoLang?
04:14 – Aspects of GoLang
07:43 – C# or Go?
09:24 – Go Command Line
10:57 – Golang Type Safety
11:31 – What is Shellcode?
12:51 – Sources of Shellcode
14:50 – Executing Shellcode on Windows
16:08 – GoLang “unsafe” Package
16:55 – Go “syscall” package is becoming per platform
17:50 – GoLang “windows” Package
18:22 – “x/sys/windows” package
20:29 – Looking deeper into Syscall
22:26 – Calling Functions out of Kernel32.dll
(00:00) - FEATURE PRESENTATION BEGINS: Shellcode Execution with GoLang
(01:38) - Meet Joff Thyer
(02:15) - What is GoLang?
(04:12) - Aspects of GoLang
(07:40) - C# or Go?
(09:19) - Go Command Line
(10:52) - Golang Type Safety
(11:25) - What is Shellcode?
(12:44) - Sources of Shellcode
(14:43) - Executing Shellcode on Windows
(15:59) - GoLang "unsafe" Package
(16:46) - Go "syscall" package is becoming per platform
(17:42) - GoLang "windows" Package
(18:13) - "x/sys/windows" package
(20:20) - Looking deeper into Syscall
(22:13) - Calling Functions out of Kernel32.dll
(22:59) - GoLang: Byte Array for Shellcode
(24:18) - Method 1: Direct Syscall
(29:07) - Tangent: The A/V and EDR evasion paradox
(32:04) - Single byte XOR function in GoLang
(33:27) - Method 2: Creating Thread in Same Process
(35:13) - GoLang Windows Native DLL
(36:19) - Steps to build a native DLL
(40:38) - Living off the Land with Native DLL
(43:22) - DEMO : Run shell code
(45:55) - Method 3: Process Injection
(48:20) - DEMO - Remote Process Injection
(49:19) - Additional Resources
(49:59) - DEMO - Remote Process Injection cont.
(52:01) - QnA
(53:46) - LINK: Attacker Emulation and C2 - https://www.antisyphontraining.com/enterprise-attacker-emulation-and-c2-implant-development-w-joff-thyer/

Sep 23, 2021 • 53min
Talkin’ About Infosec News – 9/23/2021
ORIGINALLY AIRED ON SEPTEMBER 20, 2021
Articles discussed in this episode:
00:55 – Story # 1: https://techcrunch.com/2021/09/13/apple-zero-day-nso-pegasus/
19:45 – Story # 2: https://www.tomshardware.com/news/researchers-find-windows-subsystem-linux-malware
27:45 – Story # 3: https://www.wsj.com/articles/u-s-to-target-crypto-ransomware-payments-with-sanctions-11631885336
41:19 – Story # 4: https://apnews.com/article/technology-business-pakistan-seattle-washington-c6122e936e0fcc7c077becdd2559886b
46:55 – Story # 5: https://therecord.media/us-fines-former-nsa-employees-who-provided-hacker-for-hire-services-to-uae/
Join the BHIS Community Discord: https://discord.gg/bhis
Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.
https://www.blackhillsinfosec.com/services/cyber-range/
Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.
Join 3,829 other subscribers
Email Address
Subscribe
(00:00) - BHIS - Talkin' Bout [infosec] News 2021-09-20
(00:55) - Story # 1: https://techcrunch.com/2021/09/13/apple-zero-day-nso-pegasus/
(19:45) - Story # 2: https://www.tomshardware.com/news/researchers-find-windows-subsystem-linux-malware
(27:45) - Story # 3: https://www.wsj.com/articles/u-s-to-target-crypto-ransomware-payments-with-sanctions-11631885336
(41:19) - Story # 4: https://apnews.com/article/technology-business-pakistan-seattle-washington-c6122e936e0fcc7c077becdd2559886b
(46:55) - Story # 5: https://therecord.media/us-fines-former-nsa-employees-who-provided-hacker-for-hire-services-to-uae/

Sep 22, 2021 • 1h 3min
Webcast: The Quest for the Kill Chain Killer Continues
Jordan and Kent have heard from a lot of people that the past Black Hills Information Security (BHIS) webcasts: “Group Policies That Kill Kill Chains” and “Active Directory Best Practices to Frustrate Attackers” have changed their business models for the better.
And since they’ve been offered the BHIS soapbox again, they thought it was time to update this material and combine it.
Security can sometimes move slow and other times blazingly fast. They’ll discuss what they’ve seen in the past year and how it impacts their view on baseline defensive configurations you shouldn’t be operating without.
At the end of the day, we are in this game to make things difficult for attackers, adversaries, and red teamers. We want to reduce mean time to detection. And we really want to help you make your networks and domains more secure.
So… why not update our favorite webcasts with everything we’ve learned since giving them?
Join the BLACK HILLS INFOSEC Discord Server — https://discord.gg/bhis
The Kill Chains Material: https://www.blackhillsinfosec.com/webcast-group-policies-that-kill-kill-chains/
How to Frustrate Attackers Material: https://www.blackhillsinfosec.com/webcast-group-policies-that-kill-kill-chains/
Recorded•2021-05-13
00:00 – FEATURE PRESENTATION BEGINS – The Quest for the Kill Chain Killer Continues
02:15 – What Changed in the Last Year?
06:31 – The Kill Chain
07:47 – Active Directory Best Practices to Frustrate Attackers
09:22 – Pre-Reqs
13:31 – Active Directory
(00:00) - FEATURE PRESENTATION BEGINS - The Quest for the Kill Chain Killer Continues
(02:14) - What Changed in the Last Year?
(06:26) - The Kill Chain
(07:40) - Active Directory Best Practices to Frustrate Attackers
(09:13) - Pre-Reqs
(13:21) - Active Directory
(16:04) - Organizational Units ^^ Policies
(17:35) - Layer Two Protocols
(20:41) - Addressing LLMNR (NBNS and WPAD too)
(22:50) - Unaddressing of LLMNR
(34:12) - Addressing NBNS
(34:55) - Addressing WPAD
(36:41) - File Shares
(39:24) - SMB Signing
(41:02) - IPv6
(41:53) - LDAP Channel Binding
(42:57) - Microsoft Store
(43:55) - Too Many GPOs to Cover
(44:40) - Dealing with Local Admins
(45:24) - Network Logons
(46:50) - Managed Service Accounts
(48:32) - Application Controls
(49:18) - Speaking of Ransomware...
(50:21) - Firewalls
(52:01) - Canary Accounts
(52:51) - Network Analysis
(54:17) - Credentials
(56:40) - Wrap-Up and Questions

Sep 17, 2021 • 45min
Talkin’ About Infosec News – 9/17/2021
ORIGINALLY AIRED ON SEPTEMBER 13, 2021
Articles discussed in this episode:
00:00 – BHIS – Talkin’ Bout [infosec] News 2021-09-13
02:59 – Story # 1: https://cyberworkx.in/2021/08/31/authentication-bypass-vulnerability-in-exchange-server/
04:43 – Story # 1b: https://techcommunity.microsoft.com/t5/exchange-team-blog/how-to-update-ad-schema-to-address-cve-2021-34470-if-exchange-is/ba-p/2617083
07:22 – Story # 2: https://cyberworkx.in/2021/09/08/microsoft-warns-of-new-zeroday-vulnerability-hunting-down-windows-users/
13:16 – Story # 3: https://therecord.media/ghostscript-zero-day-allows-full-server-compromises/
17:28 – Story # 3b: https://xkcd.com/2347/
22:03 – Story # 4: https://jfrog.com/blog/critical-vulnerability-in-haproxy-cve-2021-40346-integer-overflow-enables-http-smuggling/
30:15 – Story # 5: https://venturebeat.com/2021/09/11/8-orgs-with-web-apps-for-file-uploads-have-adequate-cybersecurity/
33:21 – Story # 5b: https://stackoverflow.com/questions/1732348/regex-match-open-tags-except-xhtml-self-contained-tags/1732454#1732454
34:15 – Story # 6: https://www.bleepingcomputer.com/news/security/hackers-leak-passwords-for-500-000-fortinet-vpn-accounts/
39:32 – Story # 7: https://www.bleepingcomputer.com/news/security/revil-ransomwares-servers-mysteriously-come-back-online/
Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.
https://www.blackhillsinfosec.com/services/cyber-range/
(00:00) - BHIS - Talkin' Bout [infosec] News 2021-09-13
(02:59) - Story # 1: https://cyberworkx.in/2021/08/31/authentication-bypass-vulnerability-in-exchange-server/
(04:43) - Story # 1b: https://techcommunity.microsoft.com/t5/exchange-team-blog/how-to-update-ad-schema-to-address-cve-2021-34470-if-exchange-is/ba-p/2617083
(07:22) - Story # 2: https://cyberworkx.in/2021/09/08/microsoft-warns-of-new-zeroday-vulnerability-hunting-down-windows-users/
(13:16) - Story # 3: https://therecord.media/ghostscript-zero-day-allows-full-server-compromises/
(17:28) - Story # 3b: https://xkcd.com/2347/
(22:03) - Story # 4: https://jfrog.com/blog/critical-vulnerability-in-haproxy-cve-2021-40346-integer-overflow-enables-http-smuggling/
(30:15) - Story # 5: https://venturebeat.com/2021/09/11/8-orgs-with-web-apps-for-file-uploads-have-adequate-cybersecurity/
(33:21) - Story # 5b: https://stackoverflow.com/questions/1732348/regex-match-open-tags-except-xhtml-self-contained-tags/1732454#1732454
(34:15) - Story # 6: https://www.bleepingcomputer.com/news/security/hackers-leak-passwords-for-500-000-fortinet-vpn-accounts/
(39:32) - Story # 7: https://www.bleepingcomputer.com/news/security/revil-ransomwares-servers-mysteriously-come-back-online/

Sep 16, 2021 • 1h 51min
Webcast: Getting Started in Blockchain Security and Smart Contract Auditing
Why is blockchain security important?
Blockchain usage has exploded since the Bitcoin whitepaper was first published in 2008. Many applications rely on this technology for increased trust and privacy, where they would otherwise be absent from a centralized system.
The ecosystem surrounding blockchain technology is large, complex, and has many moving pieces. Exchanges exist where users can transact various cryptocurrencies, NFTs, and tokens. Smart contracts can be written to programmatically apply behavior to blockchain transactions. Decentralized Finance (DeFi) markets exist where users can swap tokens without needing to sign up for an account.
All of these pieces are prone to vulnerabilities, and with blockchain being at the forefront of emerging technology, new issues are being found daily.
In this Black Hills Information Security (BHIS) webcast, we’ll use case studies about recent blockchain hacks to introduce the underlying issues that occur in writing/engineering smart contracts that have ultimately lead to the loss of millions of dollars to attackers.
Join us on the BLACK HILLS INFOSEC Discord channel for discussion and interaction with the community — https://discord.gg/bhis
0:00:00 – PreShow Banter™ — Beau Has a Fan Club
0:32:39 – FEATURE PRESENTATION: Getting Started in Blockchain Security and Smart Contract Auditing
0:36:39 – Roadmap
0:37:51 – Why Blockchain Security
0:39:21 – Growing Use Cases for Blockchain
0:43:23 – Blockchain Elements That Need Securing
0:49:00 – What Are Smart Contracts
0:51:22 – EVM : Ethereum Virtual Machine
0:54:00 – Solidity
0:59:55 – Smart Contract Vulns
1:04:00 – Reentrancy
1:05:54 – Front-Running
1:07:41 – Inter Overflow and Underflow
(00:00) - PreShow Banter™ — Beau Has a Fan Club
(32:39) - FEATURE PRESENTATION: Getting Started in Blockchain Security and Smart Contract Auditing
(36:39) - Roadmap
(37:51) - Why Blockchain Security
(39:21) - Growing Use Cases for Blockchain
(43:23) - Blockchain Elements That Need Securing
(49:00) - What Are Smart Contracts
(51:22) - EVM : Ethereum Virtual Machine
(54:00) - Solidity
(59:53) - Smart Contract Vulns
(01:03:59) - – Reentrancy
(01:05:52) - – Front-Running
(01:07:39) - – Inter Overflow and Underflow
(01:09:10) - – Denial-of-Service
(01:10:38) - – Access Control
(01:12:41) - – Timestamp Dependence
(01:15:17) - Case Studies – Uranium Finance Hack
(01:17:21) - – Poly Network Hack
(01:21:02) - – Cream Finance Hack
(01:24:37) - DEMO: Live Exploit
(01:35:10) - Exploit Recap
(01:35:40) - Security Tools – VS Code + Solidity Visual Developer
(01:36:35) - – Slither
(01:36:53) - – Mythril & MythX
(01:37:23) - Get-Started Resources
(01:38:30) - Bug Bounties
(01:38:46) - Key Takeaways
(01:39:56) - This is the End – Q & A

Sep 9, 2021 • 49min
Talkin’ About Infosec News – 9/9/2021
ORIGINALLY AIRED ON SEPTEMBER 7, 2021
Articles discussed in this episode:
02:14 – Story # 1: https://therecord.media/chinese-hackers-behind-july-2021-solarwinds-zero-day-attacks
06:17 – Story # 2: https://www.secureworld.io/industry-news/ciso-lawsuit-solarwinds
08:30 – Story # 3: https://taskandpurpose.com/news/air-force-cybersecurity-nicolas-chaillan/
10:29 – Story # 3b: https://www.linkedin.com/pulse/time-say-goodbye-nicolas-m-chaillan/
13:20 – Story # 4: https://venturebeat.com/2021/09/02/the-cybersecurity-industry-is-burning-and-vcs-dont-care/
18:03 – Story # 5: https://www.theregister.com/2021/09/03/how_to_be_a_ransomware/
24:38 – Story # 6: https://www.bleepingcomputer.com/news/security/over-60-000-parked-domains-were-vulnerable-to-aws-hijacking/
28:30 – Story # 7: https://www.zdnet.com/article/fbi-warns-of-ransomware-attacks-targeting-food-and-agriculture-sector-as-white-house-pushes-for-proactive-measures/
33:20 – Story # 7b: https://twitter.com/vxunderground/status/1435306913038745612
34:16 – Story # 7c: https://twitter.com/vxunderground/status/1433758742244478982
37:29 – Story # 8: https://cyberworkx.in/2021/09/06/russian-mobile-comes-with-preinstalled-malware/
38:26 – Story # 9: https://krebsonsecurity.com/2021/09/gift-card-gang-extracts-cash-from-100k-inboxes-daily/
45:31 – Story # 10: https://www.bleepingcomputer.com/news/security/mcdonalds-leaks-password-for-monopoly-vip-database-to-winners/
(00:00) - BHIS - Talkin' Bout [infosec] News 2021-09-07
(02:14) - Story # 1: https://therecord.media/chinese-hackers-behind-july-2021-solarwinds-zero-day-attacks/
(06:17) - Story # 2: https://www.secureworld.io/industry-news/ciso-lawsuit-solarwinds
(08:30) - Story # 3: https://taskandpurpose.com/news/air-force-cybersecurity-nicolas-chaillan/
(10:29) - Story # 3b: https://www.linkedin.com/pulse/time-say-goodbye-nicolas-m-chaillan/
(13:20) - Story # 4: https://venturebeat.com/2021/09/02/the-cybersecurity-industry-is-burning-and-vcs-dont-care/
(18:03) - Story # 5: https://www.theregister.com/2021/09/03/how_to_be_a_ransomware/
(24:38) - Story # 6: https://www.bleepingcomputer.com/news/security/over-60-000-parked-domains-were-vulnerable-to-aws-hijacking/
(28:30) - Story # 7: https://www.zdnet.com/article/fbi-warns-of-ransomware-attacks-targeting-food-and-agriculture-sector-as-white-house-pushes-for-proactive-measures/
(33:20) - Story # 7b: https://twitter.com/vxunderground/status/1435306913038745612
(34:16) - Story # 7c: https://twitter.com/vxunderground/status/1433758742244478982
(37:29) - Story # 8: https://cyberworkx.in/2021/09/06/russian-mobile-comes-with-preinstalled-malware/
(38:26) - Story # 9: https://krebsonsecurity.com/2021/09/gift-card-gang-extracts-cash-from-100k-inboxes-daily/
(45:31) - Story # 10: https://www.bleepingcomputer.com/news/security/mcdonalds-leaks-password-for-monopoly-vip-database-to-winners/

Sep 3, 2021 • 57min
Talkin’ About Infosec News – 9/3/2021
ORIGINALLY AIRED ON AUGUST 30, 2021
Articles discussed in this episode:
01:38 – Story # 1: https://carbuzz.com/news/tom-cruise-couldnt-stop-thieves-stealing-his-bmw-7-series
14:45 – Story # 2: https://www.vice.com/en/article/jg84yy/data-brokers-netflow-data-team-cymru
23:24 – Story # 3: https://www.reuters.com/technology/exclusive-microsoft-warns-thousands-cloud-customers-exposed-databases-emails-2021-08-26/
27:37 – Story # 4: https://cyberworkx.in/2021/08/28/five-different-malware-families-targeting-pulse-secure-devices/
33:08 – Story # 5: https://www.techradar.com/news/microsoft-warns-of-elaborate-new-cybercrime-scheme-to-steal-your-login-details
36:36 – Story # 6: https://twitter.com/EdClowes/status/1430083273015840776?s=19
39:43 – Story # 7: https://www.theregister.com/2021/08/26/qurium_bright_data_philippines_ddos/
46:18 – Story # 8: https://www.foxbusiness.com/technology/florida-woman-fired-rampage-company-computer-system
50:22 – Story # 9: https://www.nextgov.com/cybersecurity/2021/08/white-house-tasks-nist-producing-another-cybersecurity-framework/184868/
Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.
https://www.blackhillsinfosec.com/services/cyber-range/
Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.
Join 3,809 other subscribers
Email Address
(00:00) - BHIS - Talkin' Bout [infosec] News 2021-08-30
(01:38) - Story # 1: https://carbuzz.com/news/tom-cruise-couldnt-stop-thieves-stealing-his-bmw-7-series
(14:45) - Story # 2: https://www.vice.com/en/article/jg84yy/data-brokers-netflow-data-team-cymru
(23:24) - Story # 3: https://www.reuters.com/technology/exclusive-microsoft-warns-thousands-cloud-customers-exposed-databases-emails-2021-08-26/
(27:37) - Story # 4: https://cyberworkx.in/2021/08/28/five-different-malware-families-targeting-pulse-secure-devices/](https://cyberworkx.in/2021/08/28/five-different-malware-families-targeting-pulse-secure-devices/)
(33:08) - Story # 5: https://www.techradar.com/news/microsoft-warns-of-elaborate-new-cybercrime-scheme-to-steal-your-login-details
(36:36) - Story # 6: https://twitter.com/EdClowes/status/1430083273015840776?s=19
(39:43) - Story # 7: https://www.theregister.com/2021/08/26/qurium_bright_data_philippines_ddos/
(46:18) - Story # 8: https://www.foxbusiness.com/technology/florida-woman-fired-rampage-company-computer-system
(50:22) - Story # 9: https://www.nextgov.com/cybersecurity/2021/08/white-house-tasks-nist-producing-another-cybersecurity-framework/184868/


