Artwork

Content provided by YusufOnSecurity.Com. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by YusufOnSecurity.Com or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

160 - The Hidden Risks of Default Configurations - Part 2

45:21
 
Share
 

Manage episode 403187171 series 2872461
Content provided by YusufOnSecurity.Com. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by YusufOnSecurity.Com or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

We love to hear from you!

In this episode, we are continuing with part 2 of the risks paused by default configuration. As I said last week, while default config is convenient for initial setup, these settings are may introduce significant security risks that can leave systems vulnerable to exploitation by malicious actors. Please listen to the first episode before you listen to this episode. That way you will get the background and full context of the topic.

  • Well intended Network Traversal Tool is Being Abused for malicious gain. Where have we seen that beofore
  • Law enforcement from the UK and others disrupt Lockbit Ransomware group infrastructure

Having said that, lets turn to a couple of top trending news this week and they are:
- https://joshua.hu: SSH-Snake SSH network traversal discover SSH private keys network graph
- https://www.nationalcrimeagency.gov.uk/ NCA leads international investigation targeting worlds most harmful ransomware group
- https://www.chainalysis.com: LockBit takedown sanctions

Be sure to subscribe!
If you like the content. Follow me @iayusuf or read my blog at https://yusufonsecurity.com
You will find a list of all previous episodes in there too.

  continue reading

177 episodes

Artwork
iconShare
 
Manage episode 403187171 series 2872461
Content provided by YusufOnSecurity.Com. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by YusufOnSecurity.Com or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

We love to hear from you!

In this episode, we are continuing with part 2 of the risks paused by default configuration. As I said last week, while default config is convenient for initial setup, these settings are may introduce significant security risks that can leave systems vulnerable to exploitation by malicious actors. Please listen to the first episode before you listen to this episode. That way you will get the background and full context of the topic.

  • Well intended Network Traversal Tool is Being Abused for malicious gain. Where have we seen that beofore
  • Law enforcement from the UK and others disrupt Lockbit Ransomware group infrastructure

Having said that, lets turn to a couple of top trending news this week and they are:
- https://joshua.hu: SSH-Snake SSH network traversal discover SSH private keys network graph
- https://www.nationalcrimeagency.gov.uk/ NCA leads international investigation targeting worlds most harmful ransomware group
- https://www.chainalysis.com: LockBit takedown sanctions

Be sure to subscribe!
If you like the content. Follow me @iayusuf or read my blog at https://yusufonsecurity.com
You will find a list of all previous episodes in there too.

  continue reading

177 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide