Podcasts about spiderlabs

  • 10PODCASTS
  • 19EPISODES
  • 27mAVG DURATION
  • ?INFREQUENT EPISODES
  • Jun 5, 2021LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about spiderlabs

Latest podcast episodes about spiderlabs

The CyberWire
Bad building blocks: a new and unusual phishing campaign.

The CyberWire

Play Episode Listen Later Jun 5, 2021 20:38


Guest Karl Sigler of Trustwave's SpiderLabs joins Dave Bittner to talk about their research: "Hidden Phishing at Free JavaScript Site". The research describes an interesting phishing campaign SpiderLabs encountered recently. In this campaign, the email subject pertains to a price revision, followed by some numbers. There is no email body, but there is an attachment about an ”investment.” The attachment’s convoluted filename contains characters the file-naming convention doesn’t allow, notably the vertical stroke, “|.” Even though "xlsx" is in the filename, double-clicking the attachment will prompt the user to open it with the default web browser. Thus, the file indeed appears to be an HTML document. Of course, it’s malicious. The research can be found here: HTML Lego: Hidden Phishing at Free JavaScript Site

Research Saturday
Bad building blocks: a new and unusual phishing campaign.

Research Saturday

Play Episode Listen Later Jun 5, 2021 20:38


Guest Karl Sigler of Trustwave's SpiderLabs joins Dave Bittner to talk about their research: "Hidden Phishing at Free JavaScript Site". The research describes an interesting phishing campaign SpiderLabs encountered recently. In this campaign, the email subject pertains to a price revision, followed by some numbers. There is no email body, but there is an attachment about an ”investment.” The attachment’s convoluted filename contains characters the file-naming convention doesn’t allow, notably the vertical stroke, “|.” Even though "xlsx" is in the filename, double-clicking the attachment will prompt the user to open it with the default web browser. Thus, the file indeed appears to be an HTML document. Of course, it’s malicious. The research can be found here: HTML Lego: Hidden Phishing at Free JavaScript Site

Cyber Work
Red team hacking in the age of COVID-19

Cyber Work

Play Episode Listen Later May 11, 2020 43:54


Dive back into the world of Red Team operations with today's guest, John Cartrett of the SpiderLabs team at Trustwave. He leads clandestine-style operations in simulated attacks on organizations to help them find their least expected and most dangerous vulnerability points and tighten them up. Despite being a newly hot practice that a lot of people are just getting into, John has been red teaming for five years, with another thirteen years before that of IT experience and other forms of offensive testing. Listeners are always asking how to get started in red teaming and what they need to know to get on that ladder, so we'll be talking about career strategies and skill sets — but I also want to know whether anything has changed or will now change in the light of the current global COVID-19 pandemic. With red team staffs currently scattered and isolating at home and the economy suffering, will this change the nature of red teaming now or in the years to come?– Get free training for your entire cybersecurity team (10 or more): https://www.infosecinstitute.com/cyberwork– Enter code “cyberwork” to get 30 days of free training with Infosec Skills: https://www.infosecinstitute.com/skills/– View transcripts and additional episodes: https://www.infosecinstitute.com/podcastJohn is a Principal Consultant and the Red Team lead for the SpiderLabs team at Trustwave. His responsibilities mainly include managing all red team services in the Americas from start to finish, as well as being a subject matter expert on red team services globally. He has eighteen years of information technology experience and ten years of offensive testing experience with the last five years focused on clandestine-style Red Teaming. He has directed and executed close to one hundred full-scope red team operations for organizations of all sizes and geographic locations. He has obtained many certifications from organizations such as Microsoft,Cisco, GIAC and Offensive Security, as well as attended thousands of hours of skills-based training.About InfosecAt Infosec, we believe knowledge is the most powerful tool in the fight against cybercrime. We help IT and security professionals advance their careers with a full regimen of certifications and skills development training. We also empower all employees with security awareness and training to stay cybersecure at work and home. Founded by smart people wanting to do good, Infosec educates entire organizations on how to defend themselves from cybercrime. That’s what we do every day — equipping everyone with the latest security skills so the good guys win.

Cracking Cyber Security Podcast from TEISS
What are the benefits of red teaming?

Cracking Cyber Security Podcast from TEISS

Play Episode Listen Later Nov 27, 2019 20:37


Red teaming is one of the most fascinating activities an ethical hacker can be involved in. The practice usually involves an independent group that assumes the role of a hacker to show organisations what vulnerabilities or backdoors pose a threat to their cyber security. Sounds like every organisation should employ one…but is it always necessary? And if so, how do you know if your organisation is ready for red teaming? On this episode of the teissPodcast I speak with Ed Williams, EMEA director at SpiderLabs, Trustwave, about red teaming and deciding when is the right time for an organisation to engage a red team. Ed, a patriotic Welshman and ardent rugby enthusiast, explains some common tactics hackers use to manipulate people, where red teaming should sit in the overall cyber security strategy and how can cyber maturity be achieved through red teaming.

Tradecraft Security Weekly (Video)
Black Hat & DEF CON 2017 - Tradecraft Security Weekly #13

Tradecraft Security Weekly (Video)

Play Episode Listen Later Aug 3, 2017 12:00


There were a lot of amazing new tools and techniques released at Hacker Summer Camp 2017. In this week's episode of Tradecraft Security Weekly Beau Bullock (@dafthack) talks about some of the more interesting items he saw at the Black Hat and DEF CON conferences. Full Show Notes: https://wiki.securityweekly.com/TS_Episode13 LINKS:  Kali Linux Revealed - https://www.kali.org/download-kali-linux-revealed-book/ Spiderlabs Portia - https://github.com/SpiderLabs/portia Duo isthislegit and phimm - https://duo.com/blog/new-open-source-phishing-tools-isthislegit-and-phinn Revoke-obfuscation - https://www.fireeye.com/blog/threat-research/2017/07/revoke-obfuscation-powershell.html & https://github.com/danielbohannon/Revoke-Obfuscation EAPHammer - https://github.com/s0lst1c3/eaphammer Kwetza - https://github.com/sensepost/kwetza Koadic - https://github.com/zerosum0x0/koadic SRDI - https://github.com/monoxgas/sRDI Yasuo - https://github.com/0xsauby/yasuo Printer Exploit Kit - https://www.pcmag.com/news/355256/your-printer-can-steal-and-deface-your-documents & https://github.com/RUB-NDS/PRET

Cyber Security Interviews
#004 – Nicholas Percoco: Don’t Second Guess Yourself

Cyber Security Interviews

Play Episode Listen Later Dec 12, 2016 86:11


Uptake (https://uptake.com/) . Prior to Uptake, Nicholas was the Vice President of Global Services at Trustwave (https://www.trustwave.com/home/) where he led more than 2000 incident response and forensic investigations globally, ran thousands of ethical hacking & application security tests for clients, and conducted bleeding-edge security research to improve Trustwave's products. Before Trustwave, Nick ran the security consulting practices at VeriSign, & Internet Security Systems. In 2004, he drafted an application security framework that became known as the Payment Application Best Practices (PABP). In 2008, this framework was adopted as a global standard called Payment Application Data Security Standard (PA-DSS). As a speaker, he has provided unique insight around security breaches, malware, mobile security and InfoSec trends to public ( OWASP (https://www.owasp.org/) ) & private audiences (Including DHS, US-CERT, Interpol, United States Secret Service) throughout the world. Nick's research has been featured by media including: The Washington Post, eWeek, PC World, CNET, Wired, Network World, Dark Reading, Fox News, USA Today, Forbes, Computerworld, CSO Magazine, CNN, The Times of London, NPR, Gizmodo, Fast Company, Financial Times & The Wall Street Journal. Nick is also the creator of The Cavalry (https://www.iamthecavalry.org/about/overview/) movement. In this interview we discuss his early start with computers, what is a hacker, developing a methodology for penetration testing, how he developed the SpiderLabs name, analytics and automation, when you should evaluate opportunities, moving past the fear of public speaking, his personal "drink-a-different-beer-a-day" contest, research and public disclosure of vulnerabilities, how to secure Internet connected devices, where he recruits talent, and much more. I hope you enjoy this discussion. Please leave your comments below! Where you can find Nick: LinkedIn (https://www.linkedin.com/in/c7five) Twitter (https://twitter.com/c7five) THOTCON (http://thotcon.org/) I am the Cavalry (https://www.iamthecavalry.org/about/overview/)

Seginfocast - Segurança da Informação - podcast
SegInfocast #40 - Gerenciando seus eventos do Windows com a pilha Elastic - Webinar#31

Seginfocast - Segurança da Informação - podcast

Play Episode Listen Later Aug 1, 2016 52:03


SegInfocast #40 – Faça o download aqui. (42:56 min, 36 MB) Nesta nova edição do SegInfocast, apresentamos o áudio do Webinar #31 cujo tema foi o gerenciamento de eventos no Windows usando a pilha Elastic. O webinar foi apresentado por Rodrigo Montoro, instrutor da Clavis Segurança da Informação. Qual o objetivo deste novo webinar da Clavis Segurança da Informação? Em um sistema Windows existem milhares de eventos, que são divididos em 9 categorias e mais de 50 sub categorias. Os eventos registram diversas ações, como login/logoff, execução de comandos, modificações de arquivos/registros, filtros de pacotes entre outras. O Windows, por padrão, armazena esses eventos somente por um curto período de tempo (dependendo da configuração), o que dificulta ações complexas de monitoração e forense. No nosso dia a dia, usamos a pilha Elastic e scripts em Python para otimizar a agregação de dados e criação de alertas. Esse processo gera inteligência relevante para uso em análises históricas e telemetria de milhares de eventos diários, ajudando a atuar de forma proativa em caso de ataques. Nesse podcast, Rodrigo Montoro também explicou como configurar a sua política de auditoria no Windows e a pilha Elastic para processar e arquivar todas as informações, compartilhando algumas ideias para análise de dados. Sobre o instrutor Rodrigo Montoro é certificado LPI, RHCE e SnortCP com 15 anos de experiência em Open Source. Atualmente trabalha como pesquisador na Clavis e é sócio da Green Hat Segurança da Informação. Anteriormente trabalhou na Sucuri Security e Spiderlabs. Já palestrou em inúmeros eventos no Brasil (FISL, CONISLI, Latinoware, H2HC, BSides), EUA (Source Boston / Seattle, Toorcon, Bsides Las Vegas) e Canadá (SecTor). Possui 2 patentes na detecção de Malwares (PDF e cabeçalhos HTTP), resultados de suas pesquisas. Fundador e evangelista da comunidade Snort no Brasil desde 2003. Nas horas vagas faz triathlon e corrida em trilhas.

Seginfocast - Segurança da Informação - podcast
SegInfocast #31 - Octopus - Security Information and Event Management

Seginfocast - Segurança da Informação - podcast

Play Episode Listen Later Apr 4, 2016 30:11


Paulo Sant’anna reencontra o especialista em Segurança da Informação Rodrigo Montoro (@spookerlabs), da área de Pesquisa, Desenvolvimento e Inovação da Clavis, para uma conversa sobre o Octopus. Quais foram as motivações para a criação do Octopus? Rodrigo comenta que uma situação comum em muitas empresas é o orçamento limitado para compra de soluções de segurança, estas com valores altamente elevados. Paralelo aos orçamentos apertados, os produtos de SIEM foram muitas vezes vendidos como “caixas mágicas”, no qual você plugaria ela na sua rede e teria relatórios alertandos para seus problemas de segurança, fraudes e atividades maliciosas, fazendo com que projetos onde foram investidos milhões sem resultado esperado. E para finalizar, sempre temos que pensar que conhecimento e experiência trarão resultados e não o produto em si. Octopus-Clavis-SIEM É mais um produto SIEM tradicional de mercado? O Octopus não é um produto de prateleira tradicional, mas sim uma solução que visa entregar inteligência na correlação de eventos e análise de ameaças. A empresa adquire o expertise da Clavis. A solução utiliza várias ferramentas open-source, como o ELK, tema do SegInfocast #25, o que torna possível até um entusiasta montar um Octopus próprio, se desejar. Quais as funcionalidades? O Octopus é um serviço, totalmente escalável e customizável. Ele também consegue extrair informações de diversas fontes para correlação de eventos sem cobrança adicional de conectores. E os benefícios? Trata-se de um serviço contínuo (24×7) e se beneficia da proteção ativa contra novas ameaças com a combinação de fontes diversas e proporciona aos clientes, visibilidade do ambiente através de dashboards. Se você quer saber mais detalhes sobre a solução, visite o site da Clavis! Rodrigo “Sp0oKeR” Montoro é certificado LPI, RHCE e SnortCP com 15 anos de experiência em Open Source. Atualmente trabalha como pesquisador na Clavis. Anteriormente trabalhou na Sucuri Security e Spiderlabs. Já palestrou em inúmeros eventos no Brasil (FISL, CONISLI, Latinoware, H2HC, BSides), EUA (Source Boston / Seattle, Toorcon, Bsides Las Vegas) e Canadá (SecTor). Possui 2 patentes na detecção de Malwares (PDF e cabeçalhos HTTP), resultados de suas pesquisas. Fundador e evangelista da comunidade Snort no Brasil desde 2003. Nas horas vagas faz triathlon e corrida em trilhas.

Seginfocast - Segurança da Informação - podcast
SegInfoCast #25 - Análise de Logs com ELK

Seginfocast - Segurança da Informação - podcast

Play Episode Listen Later Dec 15, 2015 34:33


Paulo Sant’anna recebe o especialista em Segurança da Informação Rodrigo Montoro (@spookerlabs), da área de Pesquisa, Desenvolvimento e Inovação da Clavis, para bater um papo sobre análise de logs. Problemas no mercado brasileiro ligados à análise de logs O profissional da Clavis fala sobre as dificuldades encontradas no mercado atual como a alta do dólar, orçamentos limitados e falta de conhecimento em relação ao assunto (logs). Conselhos importantes para especialistas da área de TI ou gestores de um negócio Montoro (conhecido como “Sp0oKeR”) oferece dicas de extrema relevância para quem deseja alavancar seus negócios, com gastos enxugados e com melhor eficiência frente a má utilização das ferramentas disponíveis no mercado atual. Parada obrigatória para estudantes Ele ainda, com sua vasta experiência, comenta sobre as ferramentas “open source“, que muitas vezes não são aproveitadas por falta de conhecimento dos profissionais. Utilizando a pilha ELK Nesse podcast conversamos também sobre análise de logs utilizando a pilha ELK (Elasticsearch, Logstash, Kibana), com dicas de como escolher fontes de dados e o funcionamento do ELK. Rodrigo “Sp0oKeR” Montoro é certificado LPI, RHCE e SnortCP com 15 anos de experiência em Open Source. Atualmente trabalha como pesquisador na Clavis. Anteriormente trabalhou na Sucuri Security e Spiderlabs. Já palestrou em inúmeros eventos no Brasil (FISL, CONISLI, Latinoware, H2HC, BSides), EUA (Source Boston / Seattle, Toorcon, Bsides Las Vegas) e Canadá (SecTor). Possui 2 patentes na detecção de Malwares (PDF e cabeçalhos HTTP), resultados de suas pesquisas. Fundador e evangelista da comunidade Snort no Brasil desde 2003. Nas horas vagas faz triathlon e corrida em trilhas.

SpiderLabs Radio
SpiderLabs Radio for the Week of November 2, 2015 - Final Episode

SpiderLabs Radio

Play Episode Listen Later Nov 8, 2015 7:33


In this week’s episode: Carder Scams Zerodium and iOS 9 jailbreak So Long, and Thanks for All the Fish! This episode marks the last SpiderLabs Radio podcast so I can focus on other Trustwave projects like our popular SpiderLabs blog. Thanks to all of our loyal listeners and I hope to see you over on the blog!

fish ios trustwave spiderlabs spiderlabs radio
SpiderLabs Radio
SpiderLabs Radio for the Week of October 19, 2015

SpiderLabs Radio

Play Episode Listen Later Oct 25, 2015 5:43


Two separate SpiderLabs vulnerabilities released: Assi Barak Discovers Magmi Zero Day Asaf Orpani Discovers Critical Joomla SQL injection Also A New IoT Vulnerability In Your Connected Tea Kettle Links mentioned in the show: Assi Barak - Zero-day in Magmi database client for popular e-commerce platform Magento targeted in the wild Asaf Orpani - Joomla SQL Injection Vulnerability Exploit Results in Full Administrative Access

magento spiderlabs spiderlabs radio
DEF CON 22 [Materials] Speeches from the Hacker Convention.
Joshua Corman and Nicholas J Percoco - The Cavalry Year[0] & a Path Forward for Public Safety

DEF CON 22 [Materials] Speeches from the Hacker Convention.

Play Episode Listen Later Dec 13, 2014


Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Corman-Percoco/DEFCON-22-Josh-Corman-Nicholas-Percoco-Cavalry-Year-0-UPDATED.pdf The Cavalry Year[0] & a Path Forward for Public Safety Joshua Corman CTO, SONATYPE Nicholas J Percoco VP STRATEGIC SERVICES, RAPID7 At DEF CON 21, The Cavalry was born. In the face of clear & present threats to "Body, Mind & Soul" it was clear: The Cavalry Isn't Coming... it falls to us... the willing & able... and we have to try to have impact. Over the past year, the initiative reduced its focus and increased its momentum. With a focus on public safety & human life we did our best "Collecting, Connecting, Collaborating" to ensure the safer technology dependence in: Medical, Automotive, Home Electronics & Public Infrastructure. We will update the DEF CON hearts & minds with lessons learned from our workshops & experiments, successes & failures, and momentum in industry and with public policy makers. Year[0] was encouraging. Year[1] will require more structure and transparency if we are to rise to these challenges... As a year of experimentation comes to an end, we will share where we've been, take our licks, and more importantly outline a path forward... Joshua Corman is the Chief Technology Officer for Sonatype. Previously, Corman served as a security researcher and strategist at Akamai Technologies, The 451 Group, and IBM Internet Security Systems. A respected innovator, he co-founded Rugged Software and IamTheCavalry to encourage new security approaches in response to the world’s increasing dependence on digital infrastructure. Josh's unique approach to security in the context of human factors, adversary motivations and social impact has helped position him as one of the most trusted names in security. He is also an adjunct faculty for Carnegie Mellon’s Heinze College, IANS Research, and a Fellow at the Ponemon Institute. Josh received his bachelor's degree in philosophy, graduating summa cum laude, from the University of New Hampshire. Twitter: @joshcorman Nicholas J. Percoco is vice president of strategic services at Rapid7. In his role he leads a team that advises customers on how to mitigate and respond to threats using data driven analysis to empower more relevant, timely, and impactful decisions. Over the past decade, Nicholas has presented security research with a focus on custom malware, mobile devices, and data breach trends to audience all over the world including a Keynote at RSA Conference 2013, TEDx Naperville, and eights previous talks at DEF CON. When he is not on an airplane or working with customers, he enjoys running the THOTCON hacking conference in Chicago, trying new and interesting craft beers, and being a founding member of the Cavarly movement. Prior to Rapid7, he ran SpiderLabs at Trustwave before taking a few months off to explore the Great Pit of Carkoon on Tatooine. Now that he is back on planet Earth, you can find him on Twitter as "c7five". Follow @iamthecavalry on Twitter.

SpiderLabs Radio
SpiderLabs Radio: October 22, 2014

SpiderLabs Radio

Play Episode Listen Later Oct 25, 2014 5:35


In this episode: Google offering Security Key for 2FA New Microsoft OLE vulnerability Ebola Phishing Campaign   Here are some of the links discussed in this weeks show: SpiderLabs writeup of CVE-2014-4114Microsoft advisory for CVE-2014-6352  

google cve security key spiderlabs spiderlabs radio
SpiderLabs Radio
SpiderLabs Radio: July 31, 2014

SpiderLabs Radio

Play Episode Listen Later Aug 1, 2014 0:36


Hello loyal listeners. I just wanted to let you know that this is not the podcast you were looking for. With all of the preparations being done to get ready for BlackHat and DefCon I'm forced to delay the podcast this week. But stay tuned, because with convention season upon us, all the news that researchers have been holding on to all year is starting to see the light of day. I'll be discussing a new PoS malware family dubbed Backoff that my colleagues here at SpiderLabs recently discovered and we'll probably have a couple of surprises up our sleeve then. I'll catch you next week in Vegas, so until then, stay safe! 

las vegas pos black hat spiderlabs spiderlabs radio
SpiderLabs Radio
SpiderLabs Radio: May 1, 2014

SpiderLabs Radio

Play Episode Listen Later May 1, 2014 6:27


In this episode: Tails 1.0 is released Hacker creeps out the world by yelling at a baby through a baby monitor AOL admits that the spoof was really a hack IE & Flash 0 days Plus upgrade XP already Links mentioned in this podcast:https://tails.boum.orghttps://www3.trustwave.com/spiderLabs-advisories.php We'd love to hear what you think or what you'd like to hear in future episodes. Please feel free to leave comments below!

tails spiderlabs spiderlabs radio
SpiderLabs Radio
SpiderLabs Radio August 2, 2013

SpiderLabs Radio

Play Episode Listen Later Aug 2, 2013 57:01


In honor of craziness that is the security week in vegas of Blackhat, BSides and Defcon there will be no news broadcast this week, instead we bring you the soothing sounds of the Defcon 21 Spiderlabs mix as featured during the Spiders R Fun party. See you there.

fun mix spiders defcon black hat b sides spiderlabs spiderlabs radio
SpiderLabs Radio
SpiderLabs Radio July 26, 2013

SpiderLabs Radio

Play Episode Listen Later Jul 26, 2013 10:53


Barnaby Jack RIP, Apple Dev site rotten to the core, 2M Ubuntus owned, broken SIMs, Paypal youngun's, Touring Not Guilty, Syrian Electronic Army goes mobile, OVH Down, Japan and Poker and malware, Cisco/Sourcefire and the SpiderLabs talk round up.

SpiderLabs Radio
SpiderLabs Radio July 19, 2013

SpiderLabs Radio

Play Episode Listen Later Jul 19, 2013 10:15


Tumblr tumbles, Konami follows Nintendo, Guccifer and the Syrian Electronic Army returns, femtocalls still vulnerable, SCADA bug bounty that isn't, Morningstar, Roys of Hawaii, Cedars-Sinai,  India/Pakistan  trading defacements, SpiderLabs in Vegas.

SecuraBit
SecuraBit EP53: Thotcon If you think it you will go to Chicago!

SecuraBit

Play Episode Listen Later Mar 28, 2010 61:13


SecuraBit Episode 53:  Thotcon If you think it you will go to Chicago thotcon - http://www.thotcon.org/ Trustwave's Spider Labs - https://www.trustwave.com/spiderLabs.php Chat with us on IRC at   irc.freenode.net #securabit Hosts: Anthony Gartner – @anthonygartner Christopher Mills – @thechrisam Andrew Borel –  @andrew_secbit Guests: Nick Percoc - Thotcon & Trustwave's Spider Labs Zach Fasel - Thotcon & Trustwave's Spider Labs Links: http://www.thotcon.org/ https://www.trustwave.com/spiderLabs.php SpiderLabs Radio - http://itunes.apple.com/podcast/spiderlabs-radio/id300567984 https://www.trustwave.com/spiderLabs-tools.php lacking Chris Gerling  – @chrisgerling Jason Mueller – @securabit_jay

chicago irc christopher mills thotcon spiderlabs chris gerling spiderlabs radio