התחל במצב לא מקוון עם האפליקציה Player FM !
160 - The Hidden Risks of Default Configurations - Part 2
Manage episode 403187171 series 2872461
Enjoying the content? Let us know your feedback!
In this episode, we are continuing with part 2 of the risks paused by default configuration. As I said last week, while default config is convenient for initial setup, these settings are may introduce significant security risks that can leave systems vulnerable to exploitation by malicious actors. Please listen to the first episode before you listen to this episode. That way you will get the background and full context of the topic.
- Well intended Network Traversal Tool is Being Abused for malicious gain. Where have we seen that beofore
- Law enforcement from the UK and others disrupt Lockbit Ransomware group infrastructure
Having said that, lets turn to a couple of top trending news this week and they are:
- https://joshua.hu: SSH-Snake SSH network traversal discover SSH private keys network graph
- https://www.nationalcrimeagency.gov.uk/ NCA leads international investigation targeting worlds most harmful ransomware group
- https://www.chainalysis.com: LockBit takedown sanctions
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
235 פרקים
Manage episode 403187171 series 2872461
Enjoying the content? Let us know your feedback!
In this episode, we are continuing with part 2 of the risks paused by default configuration. As I said last week, while default config is convenient for initial setup, these settings are may introduce significant security risks that can leave systems vulnerable to exploitation by malicious actors. Please listen to the first episode before you listen to this episode. That way you will get the background and full context of the topic.
- Well intended Network Traversal Tool is Being Abused for malicious gain. Where have we seen that beofore
- Law enforcement from the UK and others disrupt Lockbit Ransomware group infrastructure
Having said that, lets turn to a couple of top trending news this week and they are:
- https://joshua.hu: SSH-Snake SSH network traversal discover SSH private keys network graph
- https://www.nationalcrimeagency.gov.uk/ NCA leads international investigation targeting worlds most harmful ransomware group
- https://www.chainalysis.com: LockBit takedown sanctions
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
235 פרקים
כל הפרקים
×
1 235 - The Microsoft SharePoint vulnerability 27:51

1 234 - Protecting the Invisible-How to Secure Infrastructure without Agents 27:49

1 233 - CI-CD Pipelines and Associated Security Risks 27:33


1 231 - A Crash Course in Vendor Risk, Lessons from the CrowdStrike Outage 29:15



1 228 - How the Emergence of AI-Powered Malware works 26:19


1 226 - Inside A Stealthy Malware Powering Modern Cyber Attacks 47:28

1 225 - What Is a Content Delivery Network—And Do They Really Protect Businesses? 24:29

1 224 - Cisco Talos Year 2024 In Review 34:38



1 221 - FBI’s 2024 Annual Internet Crime Report 32:16
ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.