Risky Business

Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.

https://risky.biz/

subscribe
share






Risky Business #475 -- Matt Tait: US gov needs to put up or shut up on Kaspersky claims


On this week’s show we’re catching up with Matt Tait. Matt’s better known as @pwnallthethings on Twitter. He’s joining us this week to talk about the claims various sources have made against Kaspersky. I say sources because up to this point the only thing we’ve seen is various officials saying people shouldn’t use it. There’s been no official statement from the government or the intelligence community that actually says “don’t use it”.

And the situation is getting ridiculous. It’s as clear as mud right now, basically, so Matt will be along later to argue the US government really just needs to back the claims in an official way if they’re to be taken seriously.

This week’s show is brought to you by Cylance. This week we’re chatting to Chris Coulter, a seasoned IR professional who’s recently moved from the services arm of Cylance to the product side. We’ll be talking to Chris about IR and where EDR software is going. That one is really worth listening to. It’s easy to look at Cylance today and just see another antivirus company. People have forgotten that they basically shook up the biggest market in infosec and I think they have a solid chance of doing the same thing with a few of their upcoming releases in the EDR and UBA space. So yeah, check out that sponsor interview with Chris Coulter, coming up towards the back of the show!

Links to everything are below, and you can follow Patrick or Adam on Twitter if that’s your thing.

Show notes 'BadRabbit' ransomware spreading across Ukraine, Russia Reaper: Calm Before the IoT Security Storm? — Krebs on Security Cisco's Talos Intelligence Group Blog: “Cyber Conflict” Decoy Document Used In Real Cyber Conflict How Russian Firm Might Have Siphoned Tools From the NSA Senator questions DHS's handling of Kaspersky software ban in federal agencies Your ID number may be public - SA data leak is worse than you think - htxt.africa Revealed: the real source of SA's massive data breach - TechCentral Whois Maintainer Accidentally Makes Password Hashes Available For Download | Threatpost | The first stop for security news Beaumont Porg, Esq. on Twitter: "Remember the Word DDE issue found by @sensepost? Copy the DDE from Word into Outlook, then email it to somebody.. No attachment -> calc. https://t.co/jw03p5hTZV" DUHK Attack Exposes Gaps in FIPS Certification | Threatpost | The first stop for security news New OWASP Top 10 includes Apache Struts-type vulns, XXE and poor logging High-severity vulnerability found in SecureDrop system China's vulnerability disclosure system twice as fast as U.S. version The Dark Web’s Most Notorious Thief, Phishkingz, Gets Doxxed Hackers Steal Photos From Plastic Surgeon to the Stars, Claim Trove Includes Royals DHS Alert on Dragonfly APT Contains IOCs, Rules Likely to Trigger False Positives | Threatpost | The first stop for security news The hacker known as "Alex" — Operation Luigi: How I hacked my friend without her noticing


fyyd: Podcast Search Engine
share








 October 25, 2017  1h4m