ashar

joined 2 years ago
MODERATOR OF
 

FIRST Cyber Threat Intelligence Conference 2023 playlist

Program

The conference provides a gathering place for experts in the field to share knowledge, contribute ideas, and learn the latest in proactive approaches in relation to threat intelligence. The format is formal and includes management, technical, and hands-on components. Plenary content focuses on discussions that are more sensitive and related to the day-to-day work of participants. Workshops are interactive and taught by leading security experts in small workgroup settings.

While the event has evolved since its humble origins in 2016, the main goal of the gathering has stayed true: to unite diverse stakeholders and provide an open forum for the development of new ideas.

 

Defense in Depth podcast - Tracking Anomalous Behaviors of Legitimate Identities

The Verizon DBIR found that about half of all breaches involved legitimate credentials. It’s a huge attack surface that we’re only starting to get a handle of.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining me is our guest, Adam Koblentz, field CTO, Reveal Security.

In this episode:

  • Where are we in terms of monitoring anomalous behavior of our users?

  • Why are we still struggling to understand what happens after threat actors are in our networks?

  • How are new AI-based tools helping us to scale efforts?

  • What's working and where do we need to improve?

 

Risky Business podcast #736 - Azure misconfigurations are 2024's looming threat

In this week’s show Patrick Gray and Adam Boileau discuss the week’s security news. They talk about:

  • Somehow there are still more Ivanti and Fortinet exploits
  • Volt Typhoon have been at it for years
  • Starlink in Ukraine gets complicated -Canadians hate poor Flipper
  • Much, much more…-
 

CyberWire Daily podcast - Imitation game: LastPass vs LassPass

A LastPass imitator sneaks its way past Apple’s app store review. Bitdefender identifies a new macOS backdoor. The Air Force and Space Force collaborate for stronger cyber defense. CISA offers an election security advisory program. The FCC bans AI robocalls. The Feds put a bounty on the Hive ransomware group. Senators introduce a bipartisan drone security act. Cisco Talos IDs a new cyber espionage campaign. Fighting the good fight against software bloat. On our Solution Spotlight, N2K President Simone Petrella talks with Amy Kardel, Senior Vice President for Strategic Workforce Relationships at CompTIA about the cyber talent gap. And sports fans check your passwords.

 

The Cyberlaw Podcast Serious threats, unserious responses

It was a week of serious cybersecurity incidents paired with unimpressive responses. As Melanie Teplinsky reminds us, the U.S. government has been agitated for months about China’s apparent strategic decision to hold U.S. infrastructure hostage to cyberattack in a crisis. Now the government has struck back at Volt Typhoon, the Chinese threat actor pursuing that strategy. It claimed recently to have disrupted a Volt Typhoon botnet by taking over a batch of compromised routers. Andrew Adams explains how the takeover was managed through the court system. It was a lot of work, and there is reason to doubt the effectiveness of the effort. The compromised routers can be re-compromised if they are turned off and on again. And the only ones that were fixed by the U.S. seizure are within U.S. jurisdiction, leaving open the possibility of DDOS attacks from abroad. And, really, how vulnerable is our critical infrastructure to DDOS attack? I argue that there’s a serious disconnect between the government’s hair-on-fire talk about Volt Typhoon and its business-as-usual response.

Speaking of cyberstuff we could be overestimating, Taiwan just had an election that China cared a lot about. According to one detailed report, China threw a lot of cyber at Taiwanese voters without making much of an impression. Richard Stiennon and I mix it up over whether China would do better in trying to influence the 2024 outcome here.

While we’re covering humdrum responses to cyberattacks, Melanie explains U.S. sanctions on Iranian military hackers for their hack of U.S. water systems.

For comic relief, Richard lays out the latest drama around the EU AI Act, now being amended in a series of backroom deals and informal promises. I predict that the effort to pile incoherent provisions on top of anti-American protectionism will not end in a GDPR-style triumph for Europe, whose market is now small enough for AI companies to ignore if the regulatory heat is turned up arbitrarily.

2
BSides London 2023 (infosec.pub)
submitted 2 years ago* (last edited 2 years ago) by ashar to c/security_cpe
 

Global AppSec DC returns October 30 - November 3 2023. Designed for private and public sector infosec professionals, the two day OWASP conferences equip developers, defenders, and advocates to build a more secure web.

Global AppSec DC 2023 Schedule

Global AppSec DC 2023 Playlist

 

Security Now podcast SN959

  • OS to allow native Chromium and Firefox engines.
  • An OS immune to ransomware?
  • HP back in the doghouse over "anti-virus" printer bricking
  • The mother of all breaches
  • New "Thou shall not delete those chats" rules
  • Fewer ransoms are being paid
  • Verified Camera Images
  • More on the $15/month flashlight app
  • What happens when apps change publishers
  • Microsoft hating on Firefox
  • Credit Karma is storing 1GB of data on the iPhone
  • Staying on Windows 7
  • Sci-Fi recommendations
  • Windows 7 and HSTS sites
  • TOTP codes/secrets and Bitwarden
  • SpinRite on Mac
  • SpinRite v6.1 is done!
  • LearnDMARC.com
  • Alex Stamos on "Microsoft Security"

Show Notes - https://www.grc.com/sn/SN-959-Notes.pdf-

[–] ashar 36 points 2 years ago (1 children)

The Palestinian Authority signed up to a peace agreement, recognised Israel, renounced violence but the Israelis continued expanding settlements and their ethnic cleansing.

[–] ashar 12 points 2 years ago (1 children)

This is a proposal for ethnic cleansing by Israel of the population of Gaza.

[–] ashar 4 points 2 years ago

Gaza is under Israeli control even though Israel does not have any soldiers there. Under the Geneva Conventions, Israel is the occupying power. This is recognised by most governments in the world, the UN and all human rights organisations.

[–] ashar 18 points 2 years ago (6 children)

One does not declare war on a military occupation. You are already at war. Israel has been the occupying power for the past 50 years.

[–] ashar 7 points 2 years ago

haha, that is really silly propaganda

[–] ashar 6 points 2 years ago (1 children)

Trump could be right, you know.

[–] ashar 1 points 2 years ago* (last edited 2 years ago)

[edited this report to update with correct info] My workflow is I click on create post, post the URL of the media, upload a small image of the logo, add the body text with links to the conference information and meda.

The issue is that when I add the image, the URL of the image gets put into the URL field of the create post page.

Previously the URL in the create post page could be directly to the YouTube video. For example https://infosec.pub/post/3334303 worked fine.

[–] ashar 13 points 2 years ago (2 children)

The UN denied any knowledge of this.

[–] ashar 2 points 2 years ago

In Edinburgh it is difficult to drive in the dry.

[–] ashar 28 points 2 years ago

Important move by Finland.

[–] ashar 19 points 2 years ago (2 children)

Yes, that Kuwaiti story came to mind when I read the story about 40 children in a community of 160 people.

view more: ‹ prev next ›