Cool News Story Bro! Week of 2-24-2017

by Otakun
Categories: News
Tags: No Tags
Comments: Leave a Comment

Hi Guys,

Last news post of February is already upon us. How time flies. We do have some good stories for you this week though, so enjoy!

News Stories:

  1. How to Bury a Major Breach Notification

    1. First story of the week is an interesting one, brought to us by Krebs. He looks at a breach of “Altair Technologies Ltd” and more specifically the fact that their disclosure of said breach was not exactly ideal. The notification was buried, and vague.
    2. Read More @ https://krebsonsecurity.com/2017/02/how-to-bury-a-major-breach-notification/
  2. Fewer Than One-Fourth Of Cybersecurity Job Candidates Are Qualified

    1. Next, more on the not so great situation when it comes to Cybersecurity talent. This time though the narrative is a bit different as it talks about the available talent being largely under qualified. A report at RSA 2017 conference by ISACA mention that based on their report only about a 4th of the candidates seem to be qualified for the positions in question. Having conducted interviews and been a part of hiring for a major company I will say this is not terribly surprising. Worse yet, I believe the situation is likely to get worse before it gets better.
    2. Read More @ http://www.darkreading.com/vulnerabilities—threats/fewer-than-one-fourth-of-cybersecurity-job-candidates-are-qualified/d/d-id/1328244
  3. New(ish) Mirai Spreader Poses New Risks

    1. Next, a great report by Kaspersky on a not-so-new botnet spreading “Mirai” malware. Due to the “Mirai” source code becoming public, we were bound to see new variants come out and this is an example of someone taking the next step with the available source code.
    2. Read More @ https://securelist.com/blog/research/77621/newish-mirai-spreader-poses-new-risks/
  4. Announcing the first SHA1 collision

    1. Next, possibly the biggest story of the week. Google has long been advocating for a move away from using SHA-1 for certificate signing and now there is a good reason to listen as the folks at Google and CWI Institute in Amsterdam have created the first SHA1 collision. While the attack is not exactly practical at the moment, the fact that this succeeded at all is reason enough to start moving towards SHA-2, and SHA-3.
    2. Read More @ https://security.googleblog.com/2017/02/announcing-first-sha1-collision.html
  5. Yahoo and Verizon Agree $350m Price Reduction

    1. Last story of the day is one that we saw coming given the chain of events preceding this. But it looks like Yahoo and Verizon have agreed a $350m price reduction due to the breaches that have effected the Yahoo over the past few years. At this point, Yahoo should be happy the transaction is going through at all. For a while there I was fairly convinced Verizon would back out.
    2. Read More @ https://www.infosecurity-magazine.com/news/yahoo-and-verizon-agree-350m-price/


  1. Proactive Security: Building A Successful Threat Hunting Program

    1. First webcast is by Raytheon Foreground Security and is a great webcast on how to build a solid threat hunting team, process, etc. Some really great information here. Take a look.
    2. Watch @ https://www.brighttalk.com/webcast/288/230987
  2. PowerShell Audit Logging: Catch Intruders Living off the Land

    1. Next, a great webcast on how to audit and properly log PowerShell. Given the rising use of PowerShell in malware campaigns, knowing how to distinguish legitimate use of Powershell from malicious use is critical. This webcast provides a great look into how to do exactly this.
    2. Watch @ https://www.brighttalk.com/webcast/14907/233583


– Otakun –


Leave a Reply

Your email address will not be published. Required fields are marked *

Today is Tuesday