Secjuice Squeeze Volume 24
Welcome to the 24th edition of the Secjuice Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, and upcoming events–lovingly prepared for you every week.
Welcome to the 24th edition of the Secjuice Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, lovingly prepared for you every week. This week's volume compiled by Secjuice writers Sinwindie, Mike Peterson, Thunder-Son, jtc94, Miguel Calles, and Hartoyo Wahyu.
Articles
Supercomputers hacked across Europe to mine cryptocurrency
Confirmed infections have been reported in the UK, Germany, and Switzerland. Another suspected infection was reported in Spain.
Source: zdnet.com
Curator: Mike Peterson
Innovative Spy Trojan Targets European Diplomatic Targets
A fresh malware trojan has emerged, built from the same code base as the stealthy COMPFun remote access trojan (RAT). The malware is using spoofed visa applications to hit diplomatic targets in Europe and may be the work of the Turla APT.
Source: https://threatpost.com/innovative-spy-trojan-european-diplomatic-targets/155763/
Curator: Mike Peterson
6 Serverless Security Mistakes You Should Never Make
By, Hillel Sollow, Serverless Security R&D, published May 15, 2020 Securing your serverless application can feel overwhelming, especially when there
Source: checkpoint.com
Curator: Miguel Calles
Ramsay: A cyber‑espionage toolkit tailored for air‑gapped networks
ESET researchers have discovered Ramsay, a previously unreported cyber-espionage framework that is tailored for collection and exfiltration of sensitive documents and is capable of operating within air-gapped networks.
Source: welivesecurity.com
Curator: Sinwindie
Russian hacker group using HTTP status codes to control malware implants
New Turla cyber-espionage operation targets diplomatic entities in Europe with new COMpfun malware.
Source: zdnet.com
Curator: Sinwindie
Air Force to Host Satellite Hacking Event Virtually
The Air Force will host a virtual satellite hacking challenge this summer to expose cybersecurity issues and vulnerabilities in space assets and ground control systems, a top service official said May 14.
Source: nationaldefensemagazine.org
Curator: Sinwindie
New Apple Security Blow: If You Have An iPhone, Look Away Now
Apple had been hoping to move past its recent run of dire security warnings—no such luck.
Source: forbes.com
Curator: Thunder-Son
Hackers Say They Have Trump's 'Dirty Laundry' and Want $42 Million to Keep It Secret
The anonymous hackers this week crippled the computer systems of high-profile celebrity law firm Grubman Shire Meiselas & Sacks claiming to have stolen 756GB of highly-confidential documents.
Source: vice.com
Curator: Sinwindie
Senate Votes to Allow FBI to Look at Your Web Browsing History Without a Warrant
The government just got even more power to spy on your internet habits as millions remain quarantined at home.
Source: vice.com
Curator: jtc94
DHS CISA and FBI share list of top 10 most exploited vulnerabilities
Office is the most exploited technology, followed by Apache Struts.
Source: zdnet.com
Curator: Hartoyo Wahyu
Interpol Teams Up With Kaspersky to Declare ‘Anti-Ransomware Day’
Both parties agreed to increase awareness of the ongoing threat of ransomware attacks across the globe.
Source: cointelegraph.com
Curator: Sinwindie
Criminal forum trading stolen data suffers ironic data breach
Someone on the dark web is touting for sale an unusual database a lot of people might pay handsomely to get their hands on.
Source: sophos.com
Curator: Sinwindie
Thunderbolt Flaws Expose Millions of PCs to Hands-On Hacking
The so-called Thunderspy attack takes less than five minutes to pull off with physical access to a device, and it affects any PC manufactured before 2019.
Source: wired.com
Curator: Sinwindie
Hackers are impersonating Zoom, Microsoft Teams, and Google Meet for phishing scams
Hackers have registered domains posing as Zoom, Microsoft Teams, and Google Meet-related URLs, according to a new report from Check Point Research. As significantly more people are using these videoconferencing services during the COVID-19 pandemic, the domains could be used to pose as official links, potentially tricking people into downloading malware or accidentally giving a bad actor access to personal information.
Source: theverge.com
Curator: Sinwindie
The Confessions of the Hacker Who Saved the Internet
At 22, Marcus Hutchins put a stop to the worst cyberattack the world had ever seen. Then he was arrested by the FBI. This is his untold story.
Source: wired.com
Curator: Mike Peterson
Leaked NHS Docs Reveal Roadmap, Concerns Around Contact-Tracing App
Future features include plenty of self-reporting options, and officials' fears the data could be misused.
Source: https://threatpost.com/leaked-nhs-docs-roadmap-concerns-contact-tracing-app/155719/
Curator: Mike Peterson
STAMINA, a new approach to malware detection by Microsoft, Intel
Microsoft and Intel have devised a new approach to malware detection, dubbed STAMINA, that involves deep learning and the representation of malware as images. STAtic Malware-as-Image Network Analysis (STAMINA) is a new approach to malware detection proposed by Microsoft and Intel.
Source: https://securityaffairs.co/wordpress/103043/malware/stamina-malware-detection.html
Curator: Thunder-Son
Upcoming Events, Webcasts, Conferences, etc.
Infosec Rock Star 2020: How to Accelerate Your Career
When: May 18, 2020 at 1:00 PM EDT (2020-05-18 17:00:00 UTC)
Location: Online
Source: sans.org
Curator: Miguel Calles
Attack Simulation: Docker Application
When: May 19, 2020 at 3:30 PM EDT (2020-05-19 19:30:00 UTC)
Location: Online
Source: sans.org
Curator: Miguel Calles
Tech Tuesday Workshop - O Hacker, Where Art Thou?: A Hands-On Python Workshop for Geolocating Attackers
When: May 19, 2020 at 1:00 PM EST (2020-05-19 17:00:00 UTC)
Location: Online
Source: sans.org
Curator: Miguel Calles
10 Measures and KPIs for ML Success
When: May 20, 2020 @ 01:00 PM in Eastern Time (05:00 PM UTC)
Location: Online
Source: zoom.us
Curator: Miguel Calles
How to manage access control with Zero Trust
When: May 20, 2020 @ 12:00 PM in Central Time (05:00 PM UTC)
Location: Online
Source: cybersecurity.att.com
Curator: Miguel Calles
SANS @MIC Talk - Find_Evil - Threat Hunting
When: May 20, 2020. 1pm Hong Kong, 3pm Sydney.
Location: Online
Source: sans.org
Curator: Miguel Calles
SANS @MIC Talk - Moving Past Just Googling It: Harvesting and Using OSINT
When: May 20, 2020 at 8:30 PM EDT (2020-05-21 00:30:00 UTC)
Location: Online
Source: sans.org
Curator: Miguel Calles
Five Ways To Cut Costs in Your SOC
When: May 21, 2020 at 3:30 PM EDT (2020-05-21 19:30:00 UTC)
Location: Online
Source: sans.org
Curator: Miguel Calles
Open Season: Building a Threat Hunting Program with Open Source Tools
When: May 22, 2020 at 10:30 AM EDT (2020-05-22 14:30:00 UTC)
Location: Online
Source: sans.org
Curator: Miguel Calles
DockerCon LIVE 2020 with theCUBE
When: May 28, 2020 @ 09:00 AM - 05:00 PM Pacific (04:00 PM to 12:00 AM UTC)
Location: Online
Source: cube365.net
Curator: Hartoyo Wahyu
Zero Trust: Fast forwarding into working without boundaries
When: May 29, 2020 at 10:30 AM EDT (2020-05-29 14:30:00 UTC)
Location: Online
Source: sans.org
Curator: Miguel Calles
The State of AI in Financial Services
When: Jun 2, 2020 @ 01:00 PM in Eastern Time (05:00 PM UTC)
Location: Online
Source: zoom.us
Curator: Miguel Calles
Winning in the Dark - Defending Serverless Infrastructure in the Cloud
When: June 03, 2020 at 10:30 AM EDT (2020-06-03 14:30:00 UTC)
Location: Online
Source: sans.org
Curator: Miguel Calles
Shift Left: Integrate security in your DevOps lifecycle
When: June 04, 2020 at 1:00 PM EDT (2020-06-04 17:00:00 UTC)
Location: Online
Source: sans.org
Curator: Miguel Calles
CSA EU Summit 2020
When: June 9-12, 2020
Location: Online
Source: cvent.com
Curator: Miguel Calles
Putting Your SOC to the Test
Source: June 10, 2020 at 10:30 AM EDT (2020-06-10 14:30:00 UTC)
Location: Online
Source: sans.org
Curator: Miguel Calles
SANS@MIC - Shellcode Analysis 101
Source: June 10, 2020 at 3:30 PM EDT (2020-06-10 19:30:00 UTC)
Location: Online
Source: sans.org
Curator: Miguel Calles
SANS@MIC - Leveraging Telegram for OSINT purposes
Source: June 10, 2020 at 8:30 PM EDT (2020-06-11 00:30:00 UTC)
Location: Online
Source: sans.org
Curator: Miguel Calles
DevSecCon24
When: June 15-16, 2020
Location: Online
Source: devseccon.com
Curator: Miguel Calles
You Can Write an Infosec Book!
When: June 15, 2020 at 1:00 PM EDT (2020-06-15 17:00:00 UTC)
Location: Online
Source: sans.org
Curator: Miguel Calles
SANS@MIC - The 14 Absolute Truths of Security
When: July 06, 2020 at 8:30 PM EDT (2020-07-07 00:30:00 UTC)
Location: Online
Source: sans.org
Curator: Miguel Calles
Ai4 2020
When: September 1-2, 2020
Location: MGM Grand, Las Vegas
Cost: $595 (early registration)
Source: ai4.io
Curator: Miguel Calles
Open Source Digital Forensics Conference
When: October 20-22, 2020
Location: Herndon, VA
Cost: $0-$350 + $499 optional training
Source: osdfcon.org
Curator: Hartoyo Wahyu