Afleveringen
-
In today's episode listen to Chris, Drew, and Logan struggle with the potential ramifications of companies retaliating against hackers by hacking them back!
How do you handle attribution? What about collateral damage?
Who in the world would actually notify the FBI prior to doing this??
Let's (potentially) find out in today's episode! -
Join us as we walk through new and exciting developments in social engineering!
FTX/SBF deepfake link below - don't go to ftxcompensation.com
https://twitter.com/jason_koebler/status/1594720003923722240
Bonus content: Twilio is put on blast and we lament our AI laden future
Happy Holidays everybody! -
Zijn er afleveringen die ontbreken?
-
As 2022 comes to an end, lets look at the best hacks, breaches, and just weirdness in the world of security.
-
Twitter, its been in the news lately, but what does it have to do with Security? In this episode we discuss the most notable items that have been happening along this new Twitter journey and how it is affecting your privacy and security on the platform and if it is going to get better.
-
Telling the difference between a user that's a program and a user that's a real human is a hard problem. It's also a problem that is growing in importance as more and more of our lives are subject to what happens online. We've seen incredibly successful PSYOPS campaigns, service outages, anti-competitive litigation, and myriad other harmful events occur as a direct result of automated abuse.
So what is a bot and how can you successfully deal with them? We share some of our best secrets for effectively dealing with these bad internet denizens in today's episode. -
Uber's ex-CISO has been charged with obstruction of justice and is facing up to 8 years in prison. The LinkedIn and Twitter security worlds are going crazy with the question of "What does this mean for CISOs today?"
Well if you're not engaged in obstructing federal investigations it probably won't change your risk profile at all. If you are a CISO that's obstructing federal investigations well... maybe CISO isn't the best role for you?? Join us as we dig into the "implications" (or lack thereof) of the recent conviction of ex-Uber CISO Joe Sullivan.
- https://www.justice.gov/usao-ndca/press-release/file/1306781/download -
In recent days we've heard whistleblower testimony from Peiter Zatko (aka Mudge) alleging some pretty serious security problems at Twitter. This comes at a fairly opportune time given Elon Musk's interest in buying the company and subsequent cold feet due to Twitter's "bot problem."
For the uninitiated, Mudge is a long-time hacker (an "OG" you could say) that has a reputation of being someone that can "speak truth to power." While we're skeptical of the timing too, the material content of Mudge's report should raise some serious eyebrows. Join us as we dig into the ins and outs of the report and talk a bit more about Mudge and why this report should be taken seriously.
- https://s3.documentcloud.org/documents/22186683/twitter-whistleblower-disclosure.pdf
- https://www.npr.org/2022/09/13/1122671582/twitter-whistleblower-mudge-senate-hearing -
Welcome back for our FIFTH season :)
So it turns out that Uber got hacked... and it looks to be bad. Hats off to their PR team for the job they've done keeping things quiet since. We go over the ins and outs of what we know so far and touch on the status of our DEF CON recordings too!
Here's to our best season yet!
- https://twitter.com/BillDemirkapi/status/1570602097640607744
- https://twitter.com/MalwareTechBlog/status/1570600059909345280
- https://techcrunch.com/2022/09/26/london-police-arrest-uber-rockstar/
- https://blog.avast.com/uber-hack# -
It's the last episode of our fourth season! The security gods were kind to us and gave us a softball with some exploits that are in the news recently; code execution in Confluence and a new ms-msdt code execution exploit in Windows. Lastly, we talk about preparations for DEF CON (we hope to see you there)!
We've loved his journey so far and are so thankful to have you all as listeners. Come say hi at DEF CON and grab a beer with us.
- Windows ms-msdt PoC - https://gist.github.com/tothi/66290a42896a97920055e50128c9f040
- Confluence OGNL Injection PoC - https://github.com/Nwqda/CVE-2022-26134 -
We directly address the question of how hacking actually works by going through some of the underlying issues that contribute to a hack, tell hacking stories, then wrap up with a very brief explanation of the differences with state sponsored hacking!
https://xkcd.com/327/ - Little Bobby Tables
https://www.saleae.com/ - Example Logic Analyzer -
We cover 3 security related news events as well as 1 space related news event in this weeks episode.
From ransomware to NASA sending nudes into space, get your download of news that sparked our interest in this episode. -
Join us as we discuss the black magic of radio communications! What is a radio? Why do phones have so many of them? After covering the basics of radio we delve into radio security (confidentiality/availability/integrity) and its implications with the war in Ukraine.
-
How inclined are you to use tobacco? What were your salaries at your previous jobs? Your family and friends may not know, but data brokers sure do!
Join us as we discuss CCPA and GDPR, two foundational privacy laws which lay the groundwork for taking back our privacy. We discuss actions citizens of California and EU can take to exercise the rights afforded to them under their respective laws.
Later in the conversation we discuss privacy as a human right, the impact of surveillance capitalism on our everyday actions, and possible ways of unwinding the assimilation of your private data into large machine learning models.
Links from the show:
https://www.wired.com/story/verizon-user-privacy-settings/
https://www.oag.ca.gov/privacy/ccpa
https://gdpr.eu/ -
It's been a bit over a week since some troublesome photos were posted to Twitter that appeared to show a breach of Okta's administrative portal. In the days since there have been a number of statements from Okta that leave us... disappointed to say the least. When you're such a critical part of modern digital infrastructure (and a security product to boot) one would hope that a breach and the remediation process would be handled with diligence and care. That doesn't seem to be the case here.
Join us as we talk about Oofta, our new tag line for the Okta breach.
- Okta "We Made a Mistake" - https://www.bleepingcomputer.com/news/security/okta-we-made-a-mistake-delaying-the-lapsus-hack-disclosure/
- Okta Breach FAQ - https://support.okta.com/help/s/article/Frequently-Asked-Questions-Regarding-January-2022-Compromise?language=en_US
- Mandiant Forensic Report for Okta Breach - https://twitter.com/BillDemirkapi/status/1508527487655067660
- KrebsOnSecurity A Closer Look at the LAPSUS Group - https://krebsonsecurity.com/2022/03/a-closer-look-at-the-lapsus-data-extortion-group/ -
It's been a few weeks since the start of the Russian invasion of Ukraine. Throughout the war we have seen repeated examples of what it means to be engaged in a 21st century war. In this episode we dive in to some of the electronic warfare that we've observed so far coming from both sides of the conflict. It's no exaggeration to say that there have been a number of surprises in a short amount of time.
Links from the show:
- Generations of Warfare - https://en.wikipedia.org/wiki/Generations_of_warfare
- Network Battalion 65 Twitter - https://twitter.com/xxnb65
- Live UA Map - https://liveuamap.com/ -
Today we have the pleasure of speaking with Royal Rivera, CCO of HaasOnline. We discuss some of the major hacks and current cases in the Crypto space.
HAAS Online
https://www.haasonline.com/
4.5 Billion of Stolen Crypto
https://www.justice.gov/opa/pr/two-arrested-alleged-conspiracy-launder-45-billion-stolen-cryptocurrency
Open Seas Social Engineering Hack
https://threatpost.com/nft-investors-lose-1-7m-in-opensea-phishing-attack/178558/
Bitfinex Exchange Hack in Hong Kong
https://fortune.com/2016/08/03/bitcoin-stolen-bitfinex-hack-hong-kong/
SOL Wormhole Hack
https://www.cnbc.com/2022/02/02/320-million-stolen-from-wormhole-bridge-linking-solana-and-ethereum.html
Crypto CEOs testify before lawmakers on digital assets — 12/8/21
https://www.youtube.com/watch?v=F_kZELcynKQ
Rap video from 4.5 Billion Dollars Defendent (NSFW, and terrible)
https://www.youtube.com/watch?v=7jlSHGAem6g -
Today we have Covert Entry expert Deviant Ollam to talk about physical security, how he got into the industry, his stories from in the field as a Red Teamer, and how he is looking to change a phrase that many have adopted in the industry.
https://deviating.net/
YouTube:
https://www.youtube.com/user/DeviantOllam
Twitter:
https://twitter.com/deviantollam
Instagram:
https://instagram.com/deviantollam
GitHub:
https://github.com/deviantollam
Trainings:
https://www.redteamalliance.com/RTCG.html
-
Hello and welcome back!
It's been a bit of a hiatus for us here at Security Explained, but we're BACK in action and kicking things off with a casual conversation with our good friend Samy Kamkar.
Samy has been a staple in the infosec community for years and even has a worm named after him (the Samy Worm!). He's got a list of wild projects longer than most resumes and has recently been part of an acquisition in his role at OpenPath.
Join us for a fun conversation with one of the sharpest hackers you're likely to meet!
Samy Kamkar
https://samy.pl
https://www.openpath.com/
https://twitter.com/samykamkar -
We're currently on an extended break between seasons 3 and 4 but LO AND BEHOLD the Internet has given us an early Christmas (non)gift .
Log4j has been all over the news recently as one of the most impactful vulnerabilities disclosed in recent memory. From AWS to GCP, Cloudflare to DigitalOcean, the Log4shell vulnerability is forcing all manners of security teams to stay up late patching their systems.
Join us in this impromptu dive into what is arguably the most impactful vulnerability of the last decade! -
In this final episode of our third season we take the time to chat about a topic near and dear to our hearts - security research! We each picked one of our favorite projects to discuss, ranging from enumerating IPv6 addresses on the Internet to hacking the fledgling Ubuntu mobile phone to Drew's mischievous habits spinning up his own cellular base stations. We've mentioned security research time and again on the show, but this is the first time that we're diving into specific research that has played a significant role in our respective lives and careers.
Thank you so much for joining us on our journey thus far and we can't wait to come back in season 4 with even better tips and tricks! - Laat meer zien