Malware Devil

Monday, January 11, 2021

Why deepwatch Chose Splunk to Secure Customer Networks – Patrick Orzechowski – BSW #202

Learn why deepwatch chose Splunk as it’s one and only SIEM solution to deliver its Managed Detection & Response services to Fortune 2000 customers. Hear how deepwatch is leveraging a variety of Splunk capabilities and advanced API integrations to detect and respond to threats in customer environments.

This segment is sponsored by deepwatch.

Visit https://securityweekly.com/deepwatch to learn more about them!
Visit https://www.securityweekly.com/bsw for all the latest episodes!
Show Notes: https://securityweekly.com/bsw202

The post Why deepwatch Chose Splunk to Secure Customer Networks – Patrick Orzechowski – BSW #202 appeared first on Malware Devil.



https://malwaredevil.com/2021/01/11/why-deepwatch-chose-splunk-to-secure-customer-networks-patrick-orzechowski-bsw-202-2/?utm_source=rss&utm_medium=rss&utm_campaign=why-deepwatch-chose-splunk-to-secure-customer-networks-patrick-orzechowski-bsw-202-2

Why deepwatch Chose Splunk to Secure Customer Networks – Patrick Orzechowski – BSW #202

Learn why deepwatch chose Splunk as it’s one and only SIEM solution to deliver its Managed Detection & Response services to Fortune 2000 customers. Hear how deepwatch is leveraging a variety of Splunk capabilities and advanced API integrations to detect and respond to threats in customer environments.

This segment is sponsored by deepwatch.

Visit https://securityweekly.com/deepwatch to learn more about them!
Visit https://www.securityweekly.com/bsw for all the latest episodes!
Show Notes: https://securityweekly.com/bsw202

The post Why deepwatch Chose Splunk to Secure Customer Networks – Patrick Orzechowski – BSW #202 appeared first on Malware Devil.



https://malwaredevil.com/2021/01/11/why-deepwatch-chose-splunk-to-secure-customer-networks-patrick-orzechowski-bsw-202/?utm_source=rss&utm_medium=rss&utm_campaign=why-deepwatch-chose-splunk-to-secure-customer-networks-patrick-orzechowski-bsw-202

Aliens and UFOs: A Final Frontier for Social Engineers

The release of a CIA archive on UFOs is exactly the kind of headline-making event that phishing and scam actors long for.
Read More

The post Aliens and UFOs: A Final Frontier for Social Engineers appeared first on Malware Devil.



https://malwaredevil.com/2021/01/11/aliens-and-ufos-a-final-frontier-for-social-engineers/?utm_source=rss&utm_medium=rss&utm_campaign=aliens-and-ufos-a-final-frontier-for-social-engineers

Millions of Social Profiles Leaked by Chinese Data-Scrapers

A cloud misconfig by SocialArks exposed 318 million records gleaned from Facebook, Instagram and LinkedIn.
Read More

The post Millions of Social Profiles Leaked by Chinese Data-Scrapers appeared first on Malware Devil.



https://malwaredevil.com/2021/01/11/millions-of-social-profiles-leaked-by-chinese-data-scrapers/?utm_source=rss&utm_medium=rss&utm_campaign=millions-of-social-profiles-leaked-by-chinese-data-scrapers

Google 2FA Cloning, Speed vs. Security, & “Hack The Army” Bug Bounty 3.0 – ASW #136

Significant source code leak from misconfigured repo, side-channel attack on hardware authentication keys, a third bug bounty for the U.S. Army, the cost of poor software quality, the benefits of DevOps approaches to building systems.
Visit https://www.securityweekly.com/asw for all the latest episodes!
Show Notes: https://securityweekly.com/asw136

The post Google 2FA Cloning, Speed vs. Security, & “Hack The Army” Bug Bounty 3.0 – ASW #136 appeared first on Malware Devil.



https://malwaredevil.com/2021/01/11/google-2fa-cloning-speed-vs-security-hack-the-army-bug-bounty-3-0-asw-136/?utm_source=rss&utm_medium=rss&utm_campaign=google-2fa-cloning-speed-vs-security-hack-the-army-bug-bounty-3-0-asw-136

Ubiquiti: Change Your Password, Enable 2FA

Ubiquiti, a major vendor of cloud-enabled Internet of Things (IoT) devices such as routers, network video recorders, security cameras and access control systems, is urging customers to change their passwords and enable multi-factor authentication. The company says an incident at a third-party cloud provider may have exposed customer account information and credentials used to remotely manage Ubiquiti gear.

In an email sent to customers today, Ubiquiti Inc. [NYSE: UI] said it recently became aware of “unauthorized access to certain of our information technology systems hosted by a third party cloud provider,” although it declined to name that provider.

The statement continues:

“We are not currently aware of evidence of access to any databases that host user data, but we cannot be certain that user data has not been exposed. This data may include your name, email address, and the one-way encrypted password to your account (in technical terms, the passwords are hashed and salted). The data may also include your address and phone number if you have provided that to us.”

Ubiquiti has not yet responded to requests for more information, but the notice was confirmed as official in a post on the company’s user support forum.

The warning from Ubiquiti carries particular significance because the company has made it fairly difficult for customers using the latest Ubiquiti firmware to interact with their devices without first authenticating through the company’s cloud-based systems.

This has become a sticking point for many Ubiquiti customers, as evidenced by numerous threads on the topic in the company’s user support forums over the past few months.

“While I and others do appreciate the convenience and option of using hosted accounts, this incident clearly highlights the problem with relying on your infrastructure for authenticating access to our devices,” wrote one Ubiquiti customer today whose sentiment was immediately echoed by other users. “A lot us cannot take your process for granted and need to keep our devices offline during setup and make direct connections by IP/Hostname using our Mobile Apps.”

To manage your security settings on a Ubiquiti device, visit https://account.ui.com and log in. Click on ‘Security’ from the left-hand menu.

1. Change your password
2. Set a session timeout value
3. Enable 2FA

Image: twitter.com/crosstalksol/

According to Ubiquiti’s investment literature, the company has shipped more than 85 million devices that play a key role in networking infrastructure in over 200 countries and territories worldwide.

This is a developing story that may be updated throughout the day.

Read More

The post Ubiquiti: Change Your Password, Enable 2FA appeared first on Malware Devil.



https://malwaredevil.com/2021/01/11/ubiquiti-change-your-password-enable-2fa-3/?utm_source=rss&utm_medium=rss&utm_campaign=ubiquiti-change-your-password-enable-2fa-3

Ubiquiti: Change Your Password, Enable 2FA

Ubiquiti, a major vendor of cloud-enabled Internet of Things (IoT) devices such as routers, network video recorders, security cameras and access control systems, is urging customers to change their passwords and enable multi-factor authentication. The company says an incident at a third-party cloud provider may have exposed customer account information and credentials used to remotely manage Ubiquiti gear.

In an email sent to customers today, Ubiquiti Inc. [NYSE: UI] said it recently became aware of “unauthorized access to certain of our information technology systems hosted by a third party cloud provider,” although it declined to name that provider.

The statement continues:

“We are not currently aware of evidence of access to any databases that host user data, but we cannot be certain that user data has not been exposed. This data may include your name, email address, and the one-way encrypted password to your account (in technical terms, the passwords are hashed and salted). The data may also include your address and phone number if you have provided that to us.”

Ubiquiti has not yet responded to requests for more information, but the notice was confirmed as official in a post on the company’s user support forum.

The warning from Ubiquiti carries particular significance because the company has made it fairly difficult for customers using the latest Ubiquiti firmware to interact with their devices without first authenticating through the company’s cloud-based systems.

This has become a sticking point for many Ubiquiti customers, as evidenced by numerous threads on the topic in the company’s user support forums over the past few months.

“While I and others do appreciate the convenience and option of using hosted accounts, this incident clearly highlights the problem with relying on your infrastructure for authenticating access to our devices,” wrote one Ubiquiti customer today whose sentiment was immediately echoed by other users. “A lot us cannot take your process for granted and need to keep our devices offline during setup and make direct connections by IP/Hostname using our Mobile Apps.”

To manage your security settings on a Ubiquiti device, visit https://account.ui.com and log in. Click on ‘Security’ from the left-hand menu.

1. Change your password
2. Set a session timeout value
3. Enable 2FA

Image: twitter.com/crosstalksol/

According to Ubiquiti’s investment literature, the company has shipped more than 85 million devices that play a key role in networking infrastructure in over 200 countries and territories worldwide.

This is a developing story that may be updated throughout the day.

Read More

The post Ubiquiti: Change Your Password, Enable 2FA appeared first on Malware Devil.



https://malwaredevil.com/2021/01/11/ubiquiti-change-your-password-enable-2fa-2/?utm_source=rss&utm_medium=rss&utm_campaign=ubiquiti-change-your-password-enable-2fa-2

Ubiquiti: Change Your Password, Enable 2FA

Ubiquiti, a major vendor of cloud-enabled Internet of Things (IoT) devices such as routers, network video recorders, security cameras and access control systems, is urging customers to change their passwords and enable multi-factor authentication. The company says an incident at a third-party cloud provider may have exposed customer account information and credentials used to remotely manage Ubiquiti gear.

The post Ubiquiti: Change Your Password, Enable 2FA appeared first on Security Boulevard.

Read More

The post Ubiquiti: Change Your Password, Enable 2FA appeared first on Malware Devil.



https://malwaredevil.com/2021/01/11/ubiquiti-change-your-password-enable-2fa/?utm_source=rss&utm_medium=rss&utm_campaign=ubiquiti-change-your-password-enable-2fa

2021 Cyber Predictions

In 2020, we saw the healthcare industry change immensely under the pressure of COVID-19. Not only did hospitals have to adapt overnight to increased patient loads, but researchers also raced for a cure and manufacturers readied production lines. But when we look beyond the pandemic that dominated much of 2020, there is more change taking […]

The post 2021 Cyber Predictions appeared first on Forescout.

The post 2021 Cyber Predictions appeared first on Security Boulevard.

Read More

The post 2021 Cyber Predictions appeared first on Malware Devil.



https://malwaredevil.com/2021/01/11/2021-cyber-predictions/?utm_source=rss&utm_medium=rss&utm_campaign=2021-cyber-predictions

Researcher Builds Parler Archive Amid Amazon Suspension

A researcher scraped and archived public Parler posts before the conservative social networking service was taken down by Amazon, Apple and Google.
Read More

The post Researcher Builds Parler Archive Amid Amazon Suspension appeared first on Malware Devil.



https://malwaredevil.com/2021/01/11/researcher-builds-parler-archive-amid-amazon-suspension/?utm_source=rss&utm_medium=rss&utm_campaign=researcher-builds-parler-archive-amid-amazon-suspension

Security Mindset, Indeed

Image Source: Wikimedia

Image Source: Wikimedia

via The Grugq, come’s an enlightening view focusing on the security mindset of the original architects of the now ubiquitous internet.

If you can tear your sequestered, hunkered-down or quarantined eyeballs away from doomscrolling the truly horrific and saddening news of the day, you may be surprised by the information The Grugq conveys in short order. Enjoy.

The post Security Mindset, Indeed appeared first on Security Boulevard.

Read More

The post Security Mindset, Indeed appeared first on Malware Devil.



https://malwaredevil.com/2021/01/11/security-mindset-indeed/?utm_source=rss&utm_medium=rss&utm_campaign=security-mindset-indeed

Win at Remediation with Quality over Quantity

The post Win at Remediation with Quality over Quantity appeared first on Digital Defense, Inc..

The post Win at Remediation with Quality over Quantity appeared first on Security Boulevard.

Read More

The post Win at Remediation with Quality over Quantity appeared first on Malware Devil.



https://malwaredevil.com/2021/01/11/win-at-remediation-with-quality-over-quantity/?utm_source=rss&utm_medium=rss&utm_campaign=win-at-remediation-with-quality-over-quantity

Fuzz Testing – Andrei Serban – ASW #136

Fuzzing can be successful AppSec strategy for finding software bugs. And deploying a fuzzer no longer needs to be a cumbersome process. Find out how fuzzing can help secure software beyond just memory safety issues and what the future holds for making this strategy more effective for modern apps.

Visit https://www.securityweekly.com/asw for all the latest episodes!

Show Notes: https://securityweekly.com/asw136

The post Fuzz Testing – Andrei Serban – ASW #136 appeared first on Malware Devil.



https://malwaredevil.com/2021/01/11/fuzz-testing-andrei-serban-asw-136-2/?utm_source=rss&utm_medium=rss&utm_campaign=fuzz-testing-andrei-serban-asw-136-2

Fuzz Testing – Andrei Serban – ASW #136

Fuzzing can be successful AppSec strategy for finding software bugs. And deploying a fuzzer no longer needs to be a cumbersome process. Find out how fuzzing can help secure software beyond just memory safety issues and what the future holds for making this strategy more effective for modern apps.

Visit https://www.securityweekly.com/asw for all the latest episodes!

Show Notes: https://securityweekly.com/asw136

The post Fuzz Testing – Andrei Serban – ASW #136 appeared first on Malware Devil.



https://malwaredevil.com/2021/01/11/fuzz-testing-andrei-serban-asw-136/?utm_source=rss&utm_medium=rss&utm_campaign=fuzz-testing-andrei-serban-asw-136

DEF CON 28 Safe Mode Lock Picking Village – N∅thing’s ‘How I Defeated The Western Electric 30C’

Many thanks to DEF CON and Conference Speakers for publishing their outstanding presentations; of which, originally appeared at the organization’s DEFCON 28 SAFE MODE Conference, and on the DEF CON YouTube channel. Enjoy!

Permalink

The post DEF CON 28 Safe Mode Lock Picking Village – N∅thing’s ‘How I Defeated The Western Electric 30C’ appeared first on Security Boulevard.

Read More

The post DEF CON 28 Safe Mode Lock Picking Village – N∅thing’s ‘How I Defeated The Western Electric 30C’ appeared first on Malware Devil.



https://malwaredevil.com/2021/01/11/def-con-28-safe-mode-lock-picking-village-n%e2%88%85things-how-i-defeated-the-western-electric-30c/?utm_source=rss&utm_medium=rss&utm_campaign=def-con-28-safe-mode-lock-picking-village-n%25e2%2588%2585things-how-i-defeated-the-western-electric-30c

Q&A: Here’s why securing mobile apps is an essential key to tempering political division

Finally, Facebook and Twitter muzzled Donald Trump, preventing him from using his favorite online bully pulpits to spread disinformation. It only took Trump inciting a failed coup d’état that cost five lives.

Related: How a Russian social media app(more…)

The post Q&A: Here’s why securing mobile apps is an essential key to tempering political division appeared first on Security Boulevard.

Read More

The post Q&A: Here’s why securing mobile apps is an essential key to tempering political division appeared first on Malware Devil.



https://malwaredevil.com/2021/01/11/qa-heres-why-securing-mobile-apps-is-an-essential-key-to-tempering-political-division/?utm_source=rss&utm_medium=rss&utm_campaign=qa-heres-why-securing-mobile-apps-is-an-essential-key-to-tempering-political-division

Naked Security Live – HTTPS: do we REALLY need it?

Here’s the latest Naked Security Live video talk – watch now, and please share with your friends!
Read More

The post Naked Security Live – HTTPS: do we REALLY need it? appeared first on Malware Devil.



https://malwaredevil.com/2021/01/11/naked-security-live-https-do-we-really-need-it/?utm_source=rss&utm_medium=rss&utm_campaign=naked-security-live-https-do-we-really-need-it

SolarWinds Hack Potentially Linked to Turla APT

Researchers have spotted notable code overlap between the Sunburst backdoor and a known Turla weapon.
Read More

The post SolarWinds Hack Potentially Linked to Turla APT appeared first on Malware Devil.



https://malwaredevil.com/2021/01/11/solarwinds-hack-potentially-linked-to-turla-apt/?utm_source=rss&utm_medium=rss&utm_campaign=solarwinds-hack-potentially-linked-to-turla-apt

XKCD ‘Steepen The Curve’

via the comic delivery system monikered Randall Munroe resident at XKCD !

via the comic delivery system monikered Randall Munroe resident at XKCD!

Permalink

The post XKCD ‘Steepen The Curve’ appeared first on Security Boulevard.

Read More

The post XKCD ‘Steepen The Curve’ appeared first on Malware Devil.



https://malwaredevil.com/2021/01/11/xkcd-steepen-the-curve-2/?utm_source=rss&utm_medium=rss&utm_campaign=xkcd-steepen-the-curve-2

XKCD ‘Steepen The Curve’

via the comic delivery system monikered Randall Munroe resident at XKCD !

via the comic delivery system monikered Randall Munroe resident at XKCD!

Permalink

The post XKCD ‘Steepen The Curve’ appeared first on Security Boulevard.

Read More

The post XKCD ‘Steepen The Curve’ appeared first on Malware Devil.



https://malwaredevil.com/2021/01/11/xkcd-steepen-the-curve/?utm_source=rss&utm_medium=rss&utm_campaign=xkcd-steepen-the-curve

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...