Risky Business

Risky Business

Australia

Risky Business primary podcast.

Episodes

Risky Business #456 -- Your MSP *will* get you owned  

On this week’s show Adam pops in to discuss the week’s news. (Links below) After the news segment Adam and Patrick both chat about topics near and dear to their hearts: Shoddy infosec marketing and shoddy MSP security.

This week’s show is brought to you by WordFence, a company that makes a WordPress security plugin. It’s not so much an enterprise security tool, but it turns out that when you run two million Wordpress plugins you wind up collecting some pretty valuable threat intel and IOCs. WordFence’s Mark Maunder joins the show this week to talk about WordPress security and malware distribution!

You can add Patrick, or Adam on Twitter if that’s your thing. Show notes are below…

Show notes More people infected by recent WCry worm can unlock PCs without paying ransom | Ars Technica There’s new evidence tying WCry ransomware worm to prolific hacking group | Ars Technica Windows 7, not XP, was the reason last week’s WCry worm spread so widely | Ars Technica EternalRocks Worm Spreads Seven NSA SMB Exploits | Threatpost | The first stop for security news PATCH Act Calls for VEP Review Board | Threatpost | The first stop for security news US politicians think companies should be allowed to 'hack back' after WannaCry Sweden Drops Julian Assange's Rape Charge, But the WikiLeaks Founder Won't Go Free | WIRED Examining the FCC claim that DDoS attacks hit net neutrality comment system | Ars Technica Google Elevates Security in Android O | Threatpost | The first stop for security news Android Gets Security Makeover With Google Play Protect | Threatpost | The first stop for security news Any Half-Decent Hacker Could Break Into Mar-a-Lago, We Tested It | Gizmodo Australia Senate's Use of Signal A Good First Step, Experts Say | Threatpost | The first stop for security news Should SaaS Companies Publish Customers Lists? — Krebs on Security Private Eye Allegedly Used Leaky Goverment Tool in Bid to Find Tax Data on Trump — Krebs on Security Yahoo Retires ImageMagick After Bugs Leak Server Memory | Threatpost | The first stop for security news Twitter Bug Allowed Hackers To Tweet From Any Account - Motherboard Breaking the iris scanner locking Samsung’s Galaxy S8 is laughably easy | Ars Technica Subtitle Hack Leaves 200 Million Vulnerable to Remote Code Execution | Threatpost | The first stop for security news Apple Patches Pwn2Own Vulnerabilities in Safari, macOS, iOS | Threatpost | The first stop for security news BostonGlobe.com disables articles when your browser’s in private mode | Ars Technica Gravityscan - Free Website Malware and Vulnerability Scanner WordPress Security Plugin | Wordfence
Risky Business #455 -- What a mess  

On this week’s show, of course, we are taking a deep dive on WannaCry. Most of the coverage of this debacle has actually been pretty bad, and there’s been nothing that I’ve seen that even approaches being comprehensive, so we’re going to try to fix that in this edition of the show.

This week’s show is sponsored by Cylance, which, it must be said, didn’t “ambulance chase” this interview, they booked this sponsor slot in January this year.

Cylance CEO Stuart McClure joins the show this week to talk about ambulance chasing, why it is that we still don’t have a decent technical analysis of WannaCry and he generally gives us an industry view on this thing.

Links to items discussed in this week’s show have moved – they’re now included in this post, below.

Oh, and do add Patrick, or Adam on Twitter if that’s your thing.

Show notes WCry ransomware worm’s Bitcoin take tops $70k as its spread continues | Ars Technica Virulent WCry ransomware worm may have North Korea’s fingerprints on it | Ars Technica Two days after WCry worm, Microsoft decries exploit stockpiling by governments | Ars Technica WCry is so mean Microsoft issues patch for 3 unsupported Windows versions | Ars Technica WannaCry Variants Pick Up Where Original Left Off | Threatpost | The first stop for security news Microsoft Releases XP Patch for WannaCry Ransomware | Threatpost | The first stop for security news New Jaff Ransomware Part Of Active Necurs Spam Blitz | Threatpost | The first stop for security news NSA officials worried about the day its potent hacking tool would get loose. Then it did. - The Washington Post The WannaCry Ransomware Hackers Made Some Major Mistakes | WIRED What you need to know about the WannaCry Ransomware | Symantec Connect Community OH LORDY! Comey Wanna Cry Edition — Steemit Massive cryptocurrency botnet used leaked NSA exploits weeks before WCry | Ars Technica Trump confirms he shared intel with Russia’s foreign minister | Ars Technica Trump Signs Cybersecurity Executive Order | Threatpost | The first stop for security news WikiLeaks Reveals Two CIA Malware Frameworks | Threatpost | The first stop for security news HP laptops covertly log user keystrokes, researchers warn | Ars Technica Apple Patches Pwn2Own Vulnerabilities in Safari, macOS, iOS | Threatpost | The first stop for security news Dutch Cops Bust Another PGP BlackBerry Company for Alleged Money Laundering - Motherboard Protect Against WannaCry: Microsoft Issues Patch for Unsupported Windows (XP, Vista, 8,...) Chelsea Manning Release: What to Know About Whistleblower | Time.com
Risky Business #454 -- Intel AMT latest, TavisO's horror-show Windows bug, Macron leaks and more!  

We’ve got a real bread-and-butter show for you this week. Adam is along in this week’s news segment to talk about the latest on the Intel AMT bugs, Tavis Ormandy’s horror-show Windows Defender bug, the Macron email dump and more.

In this week’s feature interview we speak with Adobe security engineer and OAuth 2 in Action co-author Antonio Sanso about what companies like Google might be able to do to make their OAuth implementations a little safer for users… Which, you know, might be something worth considering given an OAuth-based phishing attack was able to compromise something like a million Google accounts the other week.

This week’s show is brought to you by Thinkst Canary! Canary is of course the wonderful little hardware honeypot device Thinkst makes that you can plug into your network that’ll let you know when you have attackers on your LAN. Thinkst’s head of development, Macro Slaviero, joins the show this week to talk about the CIA’s leaked watermarking solution Scribbles, as well as to talk a little about Thinkst’s so-called “bird guide”. It’s a document (linked below) with a bunch of advice for those of you considering using Honeypots.

Links to items discussed in this week’s show have moved – they’re now included in this post, below.

Oh, and do add Patrick, or Adam on Twitter if that’s your thing.

Show notes The hijacking flaw that lurked in Intel chips is worse than anyone thought | Ars Technica mjg59 | Intel AMT on wireless networks Massive vulnerability in Windows Defender leaves most Windows PCs vulnerable | Ars Technica Emergency Update Patches Zero Day in Microsoft Malware Protection Engine | Threatpost | The first stop for security news Microsoft’s recent success in blocking in-the-wild attacks is eerily good | Ars Technica Veritas - Security Response Advisories Hacked Macron Emails Leak Online Ahead of French Presidential Runoff Election | WIRED The NSA Confirms It: Russia Hacked French Election ‘Infrastructure’ | WIRED Patrick Gray on Twitter: "I'm not convinced this is true. At all. Will discuss on this week's show! https://t.co/cvyRahSaxr" Press releases - National Commission for the Control of the Campaign for the Presidential Election Here's How Easy It Is to Get Trump Officials to Click on a Fake Link in Email F.B.I. Director James Comey Is Fired by Trump - The New York Times Google's OSS-Fuzz Finds 1,000 Open Source Bugs | Threatpost | The first stop for security news Ultrasonic Beacons Are Tracking Your Every Movement | Threatpost | The first stop for security news Dark Web Suspects Busted After Visiting Image Sharing Site Outside of Tor - Motherboard Cisco kills leaked CIA 0-day that let attackers commandeer 318 switch models | Ars Technica grugq is creating analysis on applied security, cyber, operational, and otherwise. | Patreon Canarytokens Thinkst Canary Bird Guide:
Risky Biz Soap Box: A microvirtualisation primer with Bromium co-founder Ian Pratt  

This Soap Box edition is all about desktop microvirtualisation! Bromium has been around for about six years now, and they make an endpoint security package that is really, really different to other solutions in the market. The whole thing hinges on what they call Microvisors, which amount to hardware-enabled isolation on your desktop.

Bromium’s software is basically a way to virtualise user tasks, whether that’s working on a Word document or browsing an exploit-riddled lyrics website with Java and Flash enabled, the idea is if an exploit gets dropped on you it gets trapped in a micro-VM.

Personally, I’m a big fan of Bromium’s stuff. one of the things that kind of hindered the adoption of this tech in its early days is it relies on CPU features that were basically new six years ago, so not everyone could run it. There was also a bit of a UX hit. But there’s good news! Hardware refresh cycles have taken their course, and now running Bromium’s software is viable in almost all enterprises.

Where this goes from being interesting to downright compelling is if you’re an enterprise forced to run vulnerable software. I’m thinking specifically of old browsers running things like Java. In many organisations, running out-of-date crapware is a business requirement.

Well, running Bromium on those endpoints will basically solve that problem. Sure, nothing is magic, but by the time you’ve finished listening to this conversation with Bromium co-founder and President Ian Pratt, I think you’ll definitely want to take a look at the tech. You should take a look at the tech, because it’s borderline impossible to solve that problem any other way.

I hope you enjoy it!

Risky Business #453 -- The Intel bugs: How freaked out should you be?  

On this week’s show we’re looking at an issue that kicked up last week when creepware scumbags Flexispy announced they were moving their bug bounty program to HackerOne. VICE journalist Josoph Cox asked HackerOne CEO Marten Mickos if he’d be happy to host their program, and his answer is as follows:

“Any company that operates legally within its jurisdiction, treats our hackers with respect and takes vulnerability disclosure seriously is generally welcome to run their program on the HackerOne platform. Improving the integrity of all connected software is to the benefit of the digital society.”

A lot of people, myself included, didn’t react so well to that line of thinking. HackerOne CTO Alex Rice suggested he come on the show to talk about the company’s stance. As you’ll hear, Alex is pushing a much softer line than his CEO, but still says this is complicated. Stay tuned for that, at times, excruciating interview.

This week’s sponsor interview is with Signal Sciences CSO and co-founder Zane Lackey. Zane was the head of security at Etsy, but he moved on to found Signal Sciences, a company that is making webapp security software that by all reports is pretty damn good.

He joins us in the sponsor slot this week to talk about Devops, WAFs and a whole bunch of other fun stuff.

Adam Boileau, as usual, drops by to discuss the week’s news.

Links to items discussed in this week’s show have moved – they’re now included in this post, below.

Oh, and do add Patrick, or Adam on Twitter if that’s your thing.

Show notes Intel Patches Nine-Year-Old Critical CPU Vulnerability | Threatpost | The first stop for security news Intel patches remote hijacking vulnerability that lurked in chips for 7 years | Ars Technica Hacker leaks Orange is the New Black new season after ransom demands ignored | Ars Technica Meet the Hackers Holding Netflix to Ransom - Motherboard All your Googles are belong to us: Look out for the Google Docs phishing worm | Ars Technica Facebook enters war against “information operations,” acknowledges election hijinx | Ars Technica Russian-controlled telecom hijacks financial services’ Internet traffic | Ars Technica Thieves drain 2fa-protected bank accounts by abusing SS7 routing protocol | Ars Technica WikiLeaks Reveals CIA Tool 'Scribbles' For Document Tracking | Threatpost | The first stop for security news Blind Trust in Email Could Cost You Your Home — Krebs on Security Google and Facebook scammed out of $100M in elaborate phishing attack New COOP Attack Method Highlights Weaknesses In Microsoft's CFG Defenses | Threatpost | The first stop for security news Watch Hackers Sabotage an Industrial Robot Arm | WIRED Proposed NIST Password Guidelines Soften Length, Complexity Focus | Threatpost | The first stop for security news geer.tinho.net/geer.source.27iv17.txt A vigilante is putting a huge amount of work into infecting IoT devices | Ars Technica An Obscure App Flaw Creates Backdoors In Millions of Smartphones | WIRED Apple Revokes Certificate Used By OSX/Dok Malware | Threatpost | The first stop for security news IBM: Destroy USBs Infected with Malware Dropper | Threatpost | The first stop for security news Google Patches Six Critical Mediaserver Bugs in Android | Threatpost | The first stop for security news Picture this: Senate staffers’ ID cards have photo of smart chip, no security | Ars Technica nomx: The world's most secure communications protocol Wanna Know If Someone Planted Spyware on Your Computer? - Motherboard Winston Smith on Twitter: "@x0rz @cryptoishard Sorry that was me lol" FlexiSPY on Twitter: "In the interest of transparency, we're moving the bounty program to @Hacker0x01 ..." Modern Application Security from Signal Sciences
Risky Business #452 -- Are Wikileaks charges a threat to press freedom?  

Risky Business #452 – Are Wikileaks charges a threat to press freedom? Brookings fellow and former NSA attorney Susan Hennessey joins the show…

Over the last week or so there’s been mounting speculation that the US government is getting serious about preparing charges against Wikileaks founder Julian Assange. The question is, could these charges threaten press freedom?

Joining us to discuss that this week is Lawfare’s managing editor Susan Hennessey.

This week’s show is brought to you by Senetas. Senetas makes layer two encryption equipment, but today they’re joining us to talk about some work it’s doing with ADVA Optical Networks in marrying its tech with some SDN stuff done at the telco level.

Links to items discussed in this week’s show have moved – they’re now included in this post, below.

Oh, and do add Patrick, or Adam on Twitter if that’s your thing.

Show notes >10,000 Windows computers may be infected by advanced NSA backdoor | Ars Technica NSA backdoor detected on >55,000 Windows boxes can now be remotely removed | Ars Technica Windows bug used to spread Stuxnet remains world’s most exploited | Ars Technica Tanium CEO admits using real hospital data in sales demos [Updated] | Ars Technica AV provider Webroot melts down as update nukes hundreds of legit files | Ars Technica BrickerBot, the permanent denial-of-service botnet, is back with a vengeance | Ars Technica The Backstory Behind Carder Kingpin Roman Seleznev’s Record 27 Year Prison Sentence — Krebs on Security UK Man Gets Two Years in Jail for Running ‘Titanium Stresser’ Attack-for-Hire Service — Krebs on Security Tracing Spam: Diet Pills from Beltway Bandits — Krebs on Security Researchers claim China trying to hack South Korea missile defense efforts | Ars Technica Russian Hackers ‘Fancy Bear’ Targeted French Presidential Candidate Macron - Motherboard Man sues Confide: I wouldn’t have spent $7/month if I’d known it was flawed | Ars Technica Radio Attack Lets Hackers Steal Cars With Just $20 Worth of Gear | WIRED Chrome, Firefox, and Opera users beware: This isn’t the apple.com you want | Ars Technica https://pastebin.com/raw/Y1yf8kq0 A Week Later, Hacked Spyware Vendors Haven't Warned Their 130,000 Customers - Motherboard Stalkerware Company FlexiSpy Calls Catastrophic Hack ‘Just Some False News' - Motherboard Here's an IRS Contract With a Dark Web Intel Firm - Motherboard A London Police Officer Bought Malware That Can Intercept Calls, Steal Emails, And More - Motherboard 'I'm Going to Burn Them to the Ground': Hackers Explain Why They Hit the Stalkerware Market - Motherboard Zimperium Publishes Exploits for Patched Android Bugs | Threatpost | The first stop for security news No Fix for SquirrelMail Remote Code Execution Vulnerability | Threatpost | The first stop for security news ColdFusion Hotfix Resolves XSS, Java Deserialization Bugs | Threatpost | The first stop for security news The US Charging Julian Assange Could Put Press Freedom on Trial | WIRED ADVA Optical Networking Adds New Members to Its Ensemble Harmony Ecosystem
REPOSTED (SEE NOTE): Risky Biz Snake Oilers: Roll up roll up! We've got a fix for what ails ya!  

NOTE: We had to re-post this. Originally we linked to the wrong mp3 (soapbox1 instead of snakeoilers1). It was rectified within about five minutes, but caches gonna cache, so we’ve reposted it. Sorry if you downloaded it twice!

This is the first ever Snake Oilers podcast from Risky.biz. It’s a wholly sponsored podcast in which vendors pop in and take 10 minutes each to pitch the audience on their stuff. The idea behind this whole thing is so that infosec buyers can actually hear a bunch of ten minute pitches without having to go to lunch with a salesperson with giant shiny teeth who doesn’t really understand what they’re selling.

These are product pitches from people who actually get the technology. And you know what? Even if you’re not a technology buyer, you’ll probably still find a lot of this interesting – it’s good to know how vendors are slicing and dicing some of the challenges we all face in security.

In this edition:

Exabeam says it can save you buttloads of cash compared to other SIEM solutions like Splunk or ArcSight. Senetas urges you not to use babby’s first encryptor cards and opt for its 100gbps full line rate layer 2 encryptor instead Kolide pitches its osquery-based EDR solution. If it’s good enough for Facebook, it’s good enough for you! Senrio pitches its impressive IoT network sensor and developer tools.

Links below!

Show notes Security Intelligence | SIEM & UEBA | Exabeam CN9000 Ultra-Fast 100Gbps Ethernet Encryptor | Senetas Kolide - Black Box Security. Unboxed. Senrio Sponsorship - Risky Business
Risky Business #451 -- Shadowbrokers nothingburger edition  

On this week’s show we talk about the latest Shadowbrokers shenanigans with Adam, as well as all the other major security news of the last couple of weeks.

After that we’ll be chatting with Adam’s colleague at Insomnia Security, Pipes, about the interesting aspects to the dump – what did it teach us about how NSA rolls? Well quite a lot, as it turns out. And yeah, the N0day bugs aren’t the interesting bit.

This week’s show is sponsored by Tenable Network Security. This week Tenable’s VP of federal, Darron Makrokanis, will be along to talk about how to speed up federal government adoption of new tech – what’s the best way for that to happen? That’s this week’s sponsor interview!

Links to items discussed in this week’s show have moved – they’re now included in this post, below.

Oh, and do add Patrick, or Adam on Twitter if that’s your thing.

Show notes NSA-leaking Shadow Brokers just dumped its most damaging release yet | Ars Technica In slap at Trump, Shadow Brokers release NSA EquationGroup files | Ars Technica Shadow Brokers Leak Shows NSA Hacked Middle East Banking System and Had Major Windows Exploits | WIRED Alleged NSA Victim Denies Hackers Ever Broke In - Motherboard Mysterious Microsoft patch killed 0-days released by NSA-leaking Shadow Brokers | Ars Technica We Can Calm Down: Microsoft Already Patched Most of the Shadow Brokers Exploits - Motherboard The New Shadow Brokers Leak Connects the NSA to the Stuxnet Cyber Weapon Used on Iran - Motherboard Newly Leaked Hacking Tools Were Worth $2 Million on the Gray Market - Motherboard WikiLeaks just dropped the CIA’s secret how-to for infecting Windows | Ars Technica Found in the wild: Vault7 hacking tools WikiLeaks says come from CIA | Ars Technica Researchers find China tried infiltrating companies lobbying Trump on trade | Ars Technica Brexit: foreign states may have interfered in vote, report says | Politics | The Guardian North Korea: Can the US take out its missiles before launch? - CNN.com Feds deliver fatal blow to botnet that menaced world for 7 years | Ars Technica Rash of in-the-wild attacks permanently destroys poorly secured IoT devices | Ars Technica New processors are now blocked from receiving updates on old Windows | Ars Technica Microsoft Word 0-day was actively exploited by strange bedfellows | Ars Technica Why Did Microsoft Wait Six Months To Patch a Critical Word Zero-Day? - Motherboard Microsoft Word 0-day used to push dangerous Dridex malware on millions | Ars Technica Critical Word 0-day is only 1 of 3 Microsoft bugs under attack | Ars Technica Office Zero Day Delivering FINSPY Spyware to Victims in Russia | Threatpost | The first stop for security news Microsoft Patches Word Zero-Day Spreading Dridex Malware | Threatpost | The first stop for security news Breaking Signal: A Six-Month Journey | Threatpost | The first stop for security news F8 2017: Facebook's Delegated Recovery Will Make It Easier to Get Back Into Locked Accounts | WIRED Charlie Miller on Why Self-Driving Cars Are So Hard to Secure From Hackers | WIRED Meet PINLogger, the drive-by exploit that steals smartphone PINs | Ars Technica Fake News at Work in Spam Kingpin’s Arrest? — Krebs on Security
Risky Business #450 -- From Mirai to mushroom clouds in five easy steps  

This week’s show is a fun one! We’ll be chatting with Josh Corman, the Atlantic Council’s Director of Cyber Statecraft. We’ll be speaking with him about an exercise he did recently with a whole bunch of students. Basically the whole thing was a simulation where students walked through various scenarios and had to respond. Unfortunately, Josh discovered that most students had a predisposition to escalating things unnecessarily. From Mirai to mushroom clouds, that’s this week’s feature interview.

This week’s sponsor interview is also an absolute corker. Rapid7 is this week’s sponsor. In addition to making enterprise security software and running a pentest practice, Rapid7 also spends a considerable amount of time and money on developing Metasploit.

Rapid7 research director Tod Beardsley and director of transportation security Craig Smith join the show this week to talk about some recent changes to Metasploit that I’m amazed haven’t made a bigger splash. You can now run Metasploit against a CAN bus and they’ve built an RF module as well. That is absolutely awesome stuff, coming up in this week’s sponsor interview, with special thanks to Rapid7!

Adam Boileau, as always, joins us to talk about the week’s security news.

Links to items discussed in this week’s show have moved – they’re now included in this post, below.

Oh, and do add Patrick, or Adam on Twitter if that’s your thing.

Show notes Wikileaks releases code that could unmask CIA hacking operations | Ars Technica Smart TV hack embeds attack code into broadcast signal—no access required | Ars Technica Project Zero: Over The Air: Exploiting Broadcom’s Wi-Fi Stack (Part 1) Here's How Not to Get Doxed Like FBI Director James Comey - Motherboard Reinhold Niebuhr on Twitter: "https://t.co/L5ehuMFGat https://t.co/x53gCG7Nvc" Verizon Rebuts Critics of Data-Collecting App | Threatpost | The first stop for security news An Update on Verizon's AppFlash: Pre-Installed Spyware Is Still Spyware | Electronic Frontier Foundation New Mirai Variant Roars into Action With 54 Hour DDoS Attacks | Threatpost | The first stop for security news Publicly Attacked Microsoft IIS Zero Day Unlikely to be Patched | Threatpost | The first stop for security news Microsoft Offers Analysis of Zero-Day Exploited By Zirconium Group | Threatpost | The first stop for security news Hackers Are Emptying ATMs With a Single Drilled Hole and $15 Worth of Gear | WIRED Russian Hackers Have Used the Same Backdoor for Two Decades | WIRED Operation Cloud Hopper Pegasus for Android: the other side of the story emerges | Lookout Blog Someone is putting lots of work into hacking Github developers | Ars Technica FBI Arrests Hacker Who Hacked No One - The Daily Beast Hackers Hit Islamic State Site, Use It to Spread Malware - Motherboard UK Cops Arrest Man Potentially Linked to Apple Extortion - Motherboard Patrick Gray on Twitter: "Heh. I think you could call this "high confidence". https://t.co/zDCbiPmJXV" An Unprecedented Heist Hijacked a Brazilian Bank’s Entire Online Operation | WIRED Samsung's Android Replacement Is a Hacker's Dream - Motherboard Patrick Gray on Twitter: "This is interesting. Apparently RU bots hammer Trump's account with conspiracy-related material when they know he's likely to be using it. https://t.co/f38WB9uIsS" McAfee is once again an independent company - CSO | The Resource for Data Security Executives Fake SEO Plugin Used In WordPress Malware Attacks | Threatpost | The first stop for security news Hackers Can Easily Hijack This Dildo Camera and Livestream the Inside of Your Vagina (Or Butt) - Motherboard Rebuttal to Pen Test Partners Exiting the Matrix: Introducing Metasploit's Ha... |
Risky Biz Soap Box: Senrio tackles IoT problem for CISOs, developers  

Soap Box is back! This time we’re chatting with Stephen Ridley and Jamison Utter about the tech Stephen has launched: Senrio Insight and Senrio Trace!

This is a fully sponsored blabfest about IoT security. Specifically, we drill into two different problems Senrio is trying to solve. The first is how the hell you deal with monitoring IoT on your network, especially when you can’t do DPI because of HIPAA. If you’re a CISO from a hospital, you will be very interested in this part of the podcast.

Then we talk about IoT security approaches for developers. Not only has Senrio developed a boring old network sensor to remedy the dumb but profitable-to-solve problem, they’ve also created a developer toolkit for manufacturers of IoT devices who need to be able to monitor them in the field.

Stephen Ridley is a bona fide expert on IoT. So much so, he used to actually train NSA staff on hacking IoT devices. Personally I think when you’re training NSA on how to own stuff, that makes you a genuine expert.

Jamison Utter, Senrio’s VP of Field Operations, also joins us for this podcast. I hope you enjoy it!

To book a demo with Senrio, click here.

Risky Business #449 -- Machine Learning: Woot or woo?  

On this week’s show I’ll be playing part two of my interview with In-Q-Tel’s chief security officer Dan Geer. That’s all about machine learning in infosec. Is it actually going to turn into something? Or is it just another infosec thought bubble?

This week’s sponsor interview is with Dan Guido of Trail of Bits.

Trail of Bits is a New York-based security engineering and testing company that does very interesting work. They don’t just break apps, they actually work on securing them. With that in mind, Dan’s team has been looking at implementing control flow integrity protections to various software projects. So we speak to him about the llvm versus Microsoft control flow guard approach, which is achievable. We also speak to him about mcsema, a tool they developed for reversing binaries into an intermediate language.

Adam Boileau, as always, joins us to talk about the week’s security news.

Links to items discussed in this week’s show have moved – they’re now included in this post, below.

Oh, and do add Patrick, or Adam on Twitter if that’s your thing.

Show notes Google takes Symantec to the woodshed for mis-issuing 30,000 HTTPS certs [updated] | Ars Technica Here’s the Data Republicans Just Allowed ISPs to Sell Without Your Consent - Motherboard Did China Just Help North Korea Steal $81M From The Fed? New WikiLeaks dump: The CIA built Thunderbolt exploit, implants to target Macs | Ars Technica WikiLeaks Dark Matter Release Shows CIA Interdiction of iPhone Supply Chain | Threatpost | The first stop for security news Think Tank: Cyber Firm at Center of Russian Hacking Charges Misread Data Cyber Firm Rewrites Part of Disputed Russian Hacking Report Michael Koziarski on Twitter: "FedEx’s web tech is so old they’re offering you $5 to enable flash… https://t.co/HRAj1Qgrjq cc @riskybusiness" eBay Asks Users to Downgrade Security — Krebs on Security Doxed by Microsoft’s Docs.com: Users unwittingly shared sensitive docs publicly | Ars Technica Android Security Is Better But Still Has a Long Way to Go | WIRED Shielding MAC addresses from stalkers is hard and Android fails miserably at it | Ars Technica Ransomware scammers exploited Safari bug to extort porn-viewing iOS users | Ars Technica Potent LastPass exploit underscores the dark side of password managers | Ars Technica APT29 Used Domain Fronting, Tor to Execute Backdoor | Threatpost | The first stop for security news Experts Doubt Hacker’s Claim Of Millions Of Breached Apple Credentials | Threatpost | The first stop for security news Whoops: The DOJ May Have Confirmed Some of the Wikileaks CIA Dump - Motherboard Apple Just Banned the App That Tracks US Drone Strikes, Again - Motherboard A Hackable Dishwasher Is Connecting Hospitals to the Internet of Shit - Motherboard McSema: I’m liftin’ it | Trail of Bits Blog The Challenges of Deploying Security Mitigations | Trail of Bits Blog
Risky Business #448 -- Dan Geer on cloud providers: Too big to fail?  

We’ve got a great show for you this week. In-Q-Tel CSO Dan Geer will be along for a very interesting conversation about the major cloud providers. Are they too big to fail the same way some banks are? Does the efficiency of highly concentrated ownership of a large chunk of the world’s Internet service capacity make it less resilient? We talk about that and more in this week’s feature interview.

This week’s sponsor interview is also an absolute cracker. We’re speaking with Mike Hanley of Duo Security. Mike is the senior director of security at Duo, and he’s along this week to talk about Google’s BeyondCorp initiative.

BeyondCorp is Google’s vision for the next generation of enterprise environments and it has a lot to do with deperimiterisation. Mike is along this week to talk about that concept and how solid authentication is basically the first step in moving towards that vision. It’s really, really solid stuff, so do stick around for that one.

Adam Boileau, as always, joins us to talk about the week’s security news.

Links to items discussed in this week’s show have moved – they’re now included in this post, below.

Oh, and do add Patrick, or Adam on Twitter if that’s your thing.

Show notes Comey Confirms a Trump-Russia FBI Investigation Began Last July | WIRED Laptop ban: UK, US ban electronics in carry-on luggage from Middle East airports amid terrorist bomb fears - ABC News (Australian Broadcasting Corporation) Patrick Gray on Twitter: "I've seen a couple of people float this theory and FWIW I think it's bullshit. https://t.co/8PeV3IxdVJ" WikiLeaks Won’t Tell Tech Companies How to Patch CIA Zero-Days Until Its Demands Are Met - Motherboard Patrick Gray on Twitter: "Staff holding clearances didn't stop Microsoft fixing Stuxnet 0days or the Flame md5 collision. More grandstanding bullshit from Assange.
Risky Business #447 -- Struts bug owns everyone, RAND 0day report and more  

On this week’s show Patrick and Adam have a look at the surprisingly great report about 0day prepared by RAND Corporation, as well as the other security news of the week. How ‘bout dat Struts bug, eh?

Dr. Vanessa Teague of the University of Melbourne also joins the show to talk about the latest developments around computerised voting. Vanessa is an expert on e-voting and she’s been in the space for a long time – she’ll be joining us this week to talk about how European authorities have been responding to the risks posed to their elections by outside parties, and we take a look at some voting security ideas for America.

This week’s show is brought to you by Netsparker. Netsparker is a black-box web application testing tool that aims to speed up webapp tests through automation. Netsparker’s creator Ferruh Mavituna is this week’s sponsor guest. He’s joining us to basically talk about what you can actually automate in webapp testing, but also about what you can’t automate. That’s a really interesting chat, one that the pentesters will love I’m sure.

Links to items discussed in this week’s show have moved – they’re now included in this post, below.

Oh, and do add Patrick, or Adam on Twitter if that’s your thing.

Show notes Critical vulnerability under “massive” attack imperils high-impact sites [Updated] | Ars Technica In-the-wild exploits ramp up against high-impact sites using Apache Struts | Ars Technica Zero Day Exploits Rarely Discovered By More Than One Group, Study Finds - Motherboard Wikileaks' Cache of Alleged CIA Files Includes Unredacted Names - Motherboard WikiLeaks: We’ll Work With Software Makers on Zero-Days — Krebs on Security Apple Says Many of the CIA's Alleged iPhone Hacks Have Already Been Patched - Motherboard After NSA hacking exposé, CIA staffers asked where Equation Group went wrong | Ars Technica FBI Director Tells Companies Not to 'Hack Back' Against Hackers - Motherboard Dutch Cops Say They've Decrypted PGP Messages On Seized Server - Motherboard Dear Confide: “We would never” isn’t the same as “we can’t” | Ars Technica
Risky Business #446 -- CIA tools doxed, plus osquery with Mike Arpaia  

On this week’s news we put Wikileaks’ latest dumps under the microscope and offer a few theories on what’s really going on.

We also have a chat with Mike Arpaia, the creator of osquery. osquery is host-based instrumentation software put together by Mike and his team when they worked at Facebook. It’s open source these days and now Mike is trying to get it adopted.

This week’s show is brought to you by Cyberark! And we’ll be chatting with Cyberark’s Chief Architect Gerrit Lansing. Cyberark makes software that manages privileged accounts, and we’ll be talking to Gerrit about privileged account management automation in this week’s sponsor interview.

Adam Boileau is along to discuss the week’s news.

Links to items discussed in this week’s show have moved – they’re now included in this post, below.

Oh, and do add Patrick, or Adam on Twitter if that’s your thing.

Show notes Trump's Claims That Feds Wiretapped Trump Tower Could Backfire Bigly | WIRED Wikileaks Just Dumped a Cache of Information on Alleged CIA Hacking Tools - Motherboard WikiLeaks publishes docs from what it says is trove of CIA hacking tools | Ars Technica The WikiLeaks CIA Dump Shows Hacking Secrets of Spies | WIRED WikiLeaks: CIA Uses 'Stolen' Malware to 'Attribute' Cyberattacks to Nations Like Russia - Breitbart The CIA Allegedly 'Borrows' Code From Public Malware Samples - Motherboard Trump Inherits a Secret Cyberwar Against North Korean Missiles - The New York Times DOJ Dismisses Playpen Case to Keep Tor Hack Private | Threatpost | The first stop for security news The Fed-Proof Online Market OpenBazaar Is Going Anonymous | WIRED Dark Web Market AlphaBay Staff to Alleged Extortionist: Don't Dox Us, Here's Some Money - Motherboard Users Say They'll Pay for Vanished Dark Web Email Service 'Sigaint' to Return - Motherboard S
Risky Business #445 -- Amazon, CloudFlare and Microsoft join "having a bad week club"  

We’ve got a real bread and butter show for you this week. Troy Hunt will be along to talk about the Cloudflare bug and why everyone freaked out about it, and Haroon Meer of Thinks Canary will be along to talk about RSA.

This week’s show is, of course, brought to you by Canary.Tools, and Haroon will tell us about his first ever RSA conference experience. That’s actually a really fun chat. Funny in parts, too.

Adam Boileau is along to discuss the week’s news. Microsoft, Amazon and a handful of Russians are all having an awful, awful week, and he’ll be talking all about that.

Links to items discussed in this week’s show have moved – they’re now included in this post, below.

Oh, and do add Patrick, or Adam on Twitter if that’s your thing.

Show notes Amazon S3 Outage Has Broken A Large Chunk Of The Internet Amazon Web Services on Twitter: "The dashboard not changing color is related to S3 issue. See the banner at the top of the dashboard for updates." Treason charges against Russian cyber experts linked to seven-year-old accusations | Reuters At death’s door for years, widely used SHA1 function is now dead | Ars Technica Watershed SHA1 collision just broke the WebKit repository, others may follow | Ars Technica Police Have Arrested a Suspect in a Massive ‘Internet of Things’ Attack - Motherboard BKA - List page for press releases 2017 - The prosecutor's office in Cologne and the Federal Criminal Police Office have been arrested with suspected telecom hackers in London Google reports “high-severity” bug in Edge/IE, no patch available | Ars Technica Unpatched SMB Zero Day Easily Exploitable | Threatpost | The first stop for security news Troy Hunt: Data from connected CloudPets teddy bears leaked and ransomed, exposing kids' voice messages Apple deleted server supplier after finding infected firmware in servers [Updated] | Ars Technica
Risky Business #444 -- $350m! Wiped! Off! Yahoo! Over! Breach!  

<p>On this week’s show we’re chatting with Peter Gutmann about a couple of things that have combined to form a legit problem: The abuse of the Lets-Encrypt domain validated certificate authority combined with recent UI changed in Chrome are a phishers wet dream. We chat with Peter about that. The tl;dr is the browser makers need to get off their asses and do something about that, pronto.</p> <p>This week’s show is sponsored by Exabeam. They just took $30m in funding from a VC and Cisco and they’re looking at doing some really interesting stuff in the SIEM world with, you guessed it, machine learning! In this week’s sponsor interview we’re chatting with Exabeam co-founder Sylvain Gil about a few things – the conversation does veer a bit into their products but it actually stays interesting, mostly because he discusses things like Exabeam’s roadmap in terms of problems they’re trying to solve. So even if you have no desire to buy a new SIEM, you’ll still probably find that one interesting from an academic point of view.</p> <p>Adam Boileau, as always, stops in to discuss the week’s news, and Jake Davis is back with a… reinterpretation(?!) of the Hacker Manifesto.</p> <p>Links to items discussed in this week’s show have moved – they’re now included in this post, below.</p> <p>Oh, and do add <a href="https://twitter.com/riskybusiness">Patrick</a>, <a href="https://twitter.com/doublejake">Jake</a> or <a href="https://twitter.com/metlstorm">Adam</a> on Twitter if that’s your thing.</p> Show notes Hacks all the time. Engineers recently found Yahoo systems remained compromised | Ars Technica Verizon and Yahoo amend terms of definitive agreement Yahoo reveals more breachiness to users victimized by forged cookies [Updated] | Ars Technica JavaScript Attack Breaks ASLR on 22 CPU Architectures Kim Dotcom and co-accused eligible for extradition to US, says High Court - National - NZ Herald News Who Ran Leakedsource.com? — Krebs on Security How to Bury a Major Breach Notification — Krebs on Security Hackers who took control of PC microphones siphon >600 GB from 70 targets | Ars Technica Trump’s apparent security faux-pas-palooza triggers call for House investigation | Ars Technica Trump Cybersecurity Head Tom Bossert Could Be a Voice of Reason | WIRED

Risky Business #443 -- CrowdStrike and NSS face off, Hal Martin charged and more  

On this week's show we'll be chatting with two of the organisers of an event that was held here in Australia -- PlatyPus con. As you'll hear, it wasn't really a typical security con -- attendees had to bring laptops and had to participate. The whole thing was centred around workshops. Everyone I know who went said it was brilliant, and I personally think this is an idea that is going to catch on outside of Australia. We'll be speaking with Snail and Lin_s about that one in this week's feature interview.

read more

Risky Business #443 -- CrowdStrike and NSS face off, Hal Martin charged and more  

<p>On this week’s show we’ll be chatting with two of the organisers of an event that was held here in Australia – PlatyPus con. As you’ll hear, it wasn’t really a typical security con – attendees had to bring laptops and had to participate. The whole thing was centred around workshops. Everyone I know who went said it was brilliant, and I personally think this is an idea that is going to catch on outside of Australia. We’ll be speaking with Snail and Lin_s about that one in this week’s feature interview.</p> <p>This week’s show is brought to you by Veracode, big thanks to them. In this week’s sponsor interview we’ll be chatting with Veracode’s senior product innovation manager Colin Domony about a couple of things. Veracode did a pretty interesting survey recently that really shows that developers are, in fact, finally, becoming security aware in a big way. Not only that, but Veracode has made some pretty significant changes to its products to reflect this switch. Static analysis software security tools are becoming something the developers themselves use, they’re not just for the security teams these days. So we’ll talk about the rationale behind Veracode’s recent release of a scanner that plugs into IDEs: Veracode Greenlight.</p> <p>Adam Boileau joins us, as always, to talk about the week’s security news.</p> <p>Links to everything are in this week’s <a href="http://risky.biz/RB443_notes">show notes</a>.</p> <p>Oh, and do add <a href="https://twitter.com/riskybusiness">Patrick</a>, <a href="https://twitter.com/doublejake">Jake</a> or <a href="https://twitter.com/metlstorm">Adam</a> on Twitter if that’s your thing.</p> Show notes The Alleged NSA Thief Stole Information Impacting At Least Five US Agencies - Motherboard CrowdStrike Initiates Legal Action Against NSS Labs For Misappropriation of Intellectual Property and Engaging in a Sham Transaction to Illegally Obtain Access To Our Falcon Software CrowdStrike attempts to sue NSS Labs to prevent test release, court denies request | CSO Online Explain! yourself! US! senators! yell! at! Yahoo! • The Register Senators Question Yahoo’s Candor on Data Breach - WSJ How to not do presidential opsec: Crisis management over dinner in public | Ars Technica The Cybersecurity Executive Orders: A Tale of Two Trumps | Amnesty International uncovers phishing campaign against human rights activists | Ars Technica A rash of invisible, fileless malware is

Risky Business #442 -- A bad week for Freedomhosting II, Cellebrite and Polish banks  

There's no feature interview in this week's show. Instead, we're going to spend a bit more time with Adam Boileau talking about the week's news, and there's plenty to chew through.

read more

Risky Business #442 -- A bad week for Freedomhosting II, Cellebrite and Polish banks  

<p>There’s no feature interview in this week’s show. Instead, we’re going to spend a bit more time with Adam Boileau talking about the week’s news, and there’s plenty to chew through.</p> <p>This week’s show is brought to you by Tenable Network Security! In this week’s sponsor interview we’ll be chatting with Amit Yoran, Tenable’s new-ish CEO. Amit has an interesting background in infosec and he’ll be joining us to talk about a few things – Tenable’s just launched a whole new platform, which is interesting from a sign-of-the-times perspective. We’ll also get his thoughts on where he sees things going in the industry more generally. This isn’t Amit’s first CEO post – he was previously the big cheese at Netwitness then RSA, so he certainly has the experience to weigh in on trends.</p> <p>Links to everything are in this week’s <a href="http://risky.biz/RB442_notes">show notes</a>.</p> <p>Oh, and do add <a href="https://twitter.com/riskybusiness">Patrick</a>, <a href="https://twitter.com/doublejake">Jake</a> or <a href="https://twitter.com/metlstorm">Adam</a> on Twitter if that’s your thing.</p> Show notes Prosecutors to seek indictment against former NSA contractor as early as this week - The Washington Post Hacker Dumps iOS Cracking Tools Allegedly Stolen from Cellebrite - Motherboard Not Just Windows: Hackers Are Using Mac Malware to Track Iranian Activists - Motherboard Egyptian Human Rights Activists Are Being Targeted in 'Dangerous' Hacking Campaign - Motherboard We Talked to the Hacker Who Took Down a Fifth of the Dark Web - Motherboard Hello? Police? My darknet drug market was just hacked by criminals • The Register Polish banks hit by malware sent through hacked financial regulator • The Register Vizio smart TVs tracked viewers around the clock without consent | Ars Technica The Data That Turned the World Upside Down - Motherboard Google Brain super-resolution image tech makes “zoom, enhance!” real | Ars Technica

0:00/0:00
Video player is in betaClose