In the Security News, the US government issues a light aircraft cyber alert, thieves steal a laptop with 30 years of Data from University of Western Australia, RCE is possible by exploiting flaws in Vxworks, and the alleged Capital One hacker is barely bothered to hide!
- Black Hat USA 2019 Preview
- Remote code execution is possible by exploiting flaws in Vxworks
- Researchers Are Sounding the Alarm on a Little-Known Risk of Connected Cars
- Alleged Capital One Hacker Barely Bothered to Hide | SecurityWeek.Com
- A Realistic Path Forward for Security Orchestration and Automation
- Until airbags are fitted to email apps to stop staff opening bad messages, what else can a small biz do to protect itself?
- SecOps Success Through Employee Retention
- Microsoft Seriously Beefs Up Security in Windows Server 2019
- Google Releases Beta of Anomaly Detection for G Suite Customers | SecurityWeek.Com
- New Mirai botnet lurks in the Tor network to stay under the radar | ZDNet
- Cisco pays $8.6M to settle security-software whistleblower lawsuit
- Researcher Find Open ‘Road Map’ to Honda Computers
- Scientists Find Key to Sending Data Trhough Music: Van Halen Audio Stenography works best with rock music. Encode message (e.g. URL) so human ear cannot decode, but any device with app can.
- 7.5TB Breach Reveals Secret Russian IT Projects Twitter account @0v1ruS seems to be tied to @D1G1R3V (DigitalRevolution) who is motivated by information freedom in Russia.
- Silk Road Drug Dealer caught when converting bitcoin to cash Poor operational security choices exposed the blockchain to DHS who traced the Bitcoin origins to Silk Road rather than claimed successful Bitcoin Mining.
- Former Cloud Worker Hacks into Capital One, takes data for 106 million people Hacker was outed after complaining on social media. OPSEC matters. If you applied for a Cap One card between 2006 and 2019 you’re in this group.
- 200 million Devices Have VxWorks Vulnerabilities 11 Vulnerabilities discovered, 6 critical in VxWorks OS, while patches are out or available soon, as many as 2 billion discoverable impacted devices are online.
- Thieves Steal Laptops with 30 Years of Data from UWA Growing trend of Australian universities reporting compromises. Laptops belong to students at the University of Western Australia (UWA) containing 30 years of of PII data were stolen. Universities collect a lot of PII and financial data and are challenged to secure it.
- Linus Torvalds prepares to wave goodbye to Linux floppy drives Lack of working hardware and someone to actively take over maintaining the driver will see floppy disk support depricated.
- Hack Breaks Visa Card’s Contactless Payment Limit Researchers in the UK found they could take more than the limit (30 pounds/$38 USD) without fraud detection. The limit in US is $100.
- North Carolina County lost $1.7M in BEC Scam $2.5M fraudulently deposited after Phishing scam. $.7M recovered through bank. Insurance paid $75,000.
- US Government issues Light Aircraft Cyber Alert Vulnerabilities in avionic equipment exploited over CAN bus. Mitigation: Physical Access controls. Most devices lack encryption or authentication.
- Verizon 5G Goes Live in more major US Cities Washington DC, Indianapolis IN, Atlanta GA & Detroit MI join Denver, Chicago, Minneapolis, St. Paul and Providence RI.
- Armis found 11 critical vulnerabilities in the VxWorks OS – a platform found in 2 billion devices, including medical equipment and IoT devices; officials say patching will be long and difficult.
- Filecoder.C is targeting Android devices – through malicious links in online forums and then spreading via contact lists through SMS messages that attempt to entice others to install an app, according to research published Monday by the security firm ESET. And this is why I find the Android ecosystem to be a shitshow.
- BEC scam hits NC, losing 1.7 million – Security is just not an IT problem. Other areas of the organizations can put protective controls in process in place to prevent issues as well.
- What’s in your S3 buckets?
- defrauding contactless cards over the predefined limits without “authentication” – It requires MiTM, which tells the terminal and the card, ‘no, no, it is ok, no authorization is required, or it is already complete. These are not the droids you’re looking for.”
Full Show Notes: https://wiki.securityweekly.com/Episode614
Visit https://www.securityweekly.com/psw for all the latest episodes!
To learn more about our sponsors visit: The Security Weekly Sponsor’s Page
- We have exciting news about the Security Weekly webcast program: We are now partnered with (ISC)2 as an official CPE provider! If you attend any of our webcasts, you will be receiving 1 CPE credit per webcast! Register for our upcoming webcasts with (ISC)2 by going to securityweekly.com/webcasts If you have missed any of our previously recorded webcasts, you can find our on-demand library at securityweekly.com/ondemand
- If you’re trying to make a big splash at BlackHat this year, we will be live-streaming Paul’s Security Weekly for the first time ever on-location! To sponsor an interview please go to securityweekly.com/booking and submit your request!
- Security Weekly will be at Hacker Halted in Atlanta, GA this October 10th-11th! EC-Council is offering our listeners a $100 discount to attend the two day conference. Use discount code HH19SW when you register or go to securityweekly.com/hackerhalted and register there! Make sure you checkout the keynote (Paul Asadoorian) and Mr. Jeff Man’s talk as well!