Logo

    100: NSO

    en-usAugust 31, 2021
    What is Magic Lantern used for by the FBI?
    How did McAfee initially respond to Magic Lantern detection?
    What impact does NSO's Pegasus spyware have on civil society?
    Why is NSO Group criticized for its transparency report?
    Who was targeted by Pegasus spyware in Mexico?

    Podcast Summary

    • Antivirus vs. FBI: Allies or Enemies?The use of malware by law enforcement agencies raises questions about the trustworthiness of antivirus software. Consumers must be aware of potential security breaches and make informed decisions about their technology use.

      The FBI used malware called Magic Lantern to capture keystrokes on target computers, but it sparked a debate in the security community on whether antivirus and security companies should detect and report on this activity. The FBI may want to go unnoticed in any kind of stealth mission, but antivirus software exists to alert when something shouldn't be happening. McAfee initially said it would not alert the user if Magic Lantern triggered and would ignore it, but later claimed it would alert when detected. This opens a door to a strange world of allies and enemies, making it difficult to know who to trust when the software you buy may be lying to you or when the FBI is infecting people with malware to spy on them.

    • Citizen Lab's investigative efforts in protecting digital rights.Citizen Lab's work sheds light on surveillance targeting civil society and emphasizes the need for organizations to defend digital rights.

      Citizen Lab investigates and reports on those in civil society who are targeted, raising public awareness of such targeting. Human rights activist Ahmed Mansoor was targeted multiple times and reached out to Citizen Lab for help. In 2016, when Mansoor contacted Citizen Lab again, they had previously found links to infrastructure of the NSO Group, which was thought to be used for targeted digital attacks. Mansoor provided a list of domains related to one of the attacks he received, which led to the discovery of Pegasus spyware. Citizen Lab had to set up careful monitoring to capture all network traffic when testing the link. The team's efforts showcase the importance of organizations like Citizen Lab in protecting digital rights.

    • The sophisticated exploit chain of the Pegasus malware on iPhones.The Pegasus malware marked a significant breakthrough in remote jailbreaking, using three zero-day exploits and exploiting unknown vulnerabilities in Apple's kernel to listen to calls, track location and read messages.

      The discovery of the Pegasus malware on iPhones marked a major breakthrough in remote jailbreaking. The sophisticated exploit chain involved three zero-day exploits, one of which enabled the attacker to download and run a malicious program after the victim clicked a link. The malicious program could not execute on an iPhone unless it was jailbroken, which the attacker achieved by exploiting two unknown vulnerabilities in Apple’s kernel. Once jailbroken, the program could turn on the microphone and camera, read WhatsApp messages, listen to calls, and track location without the victim's knowledge. This elegant and slick attack was particularly dangerous as it was easy to use, and it marked an order of magnitude more sophisticated than previous attempts at hacking.

    • Citizen Lab's Role in Exposing NSO Group's Pegasus SpywareCitizen Lab's collaboration with targeted individuals and quick action in characterizing and reporting malware is critical in uncovering potentially harmful spyware like Pegasus that could impact the privacy of ordinary citizens.

      Citizen Lab played a crucial role in discovering the NSO Group's Pegasus spyware malware from Ahmed Mansoor's text messages. The malware could target an arbitrary cell phone and gain access and persistence, which is the flagship software that NSO sells to governments. Citizen Lab worked quickly to characterize the malware and inform Apple to patch it. The organization's partnership and synergy with groups like Mansoor's, along with their intuition, are essential in their investigations. Beyond Pegasus, the NSO Group sells powerful mobile phone hacking solutions to governments, enabling them to regain visibility on encrypted mobile devices. The exploit became highly influential in the gaming community, where individuals used it to jailbreak their Nintendo Switches. The NSO Group's business model is a combination of hacking as a service and software provision.

    • The Dark Side of NSO Group's Spyware TechnologyNSO Group's spyware technology, touted as a means to prevent crime and terrorism, has been accused of violating human rights and imprisoning journalists and activists. The focus should be on responsible use of technology by security services to prevent future harm.

      NSO Group, a technology firm that sells spyware to governments and intelligence agencies for preventing crime and terrorism, has been accused of abusing its power by violating human rights and imprisoning journalists and activists. Despite multiple opportunities to have their voice in this episode, the company refused. The measure of any technology is how it is being used against vulnerable people and how it helps. The NSO Group has made several claims about saving lives, but the concern is papering over the problematic cases of abuse. We need to focus on ensuring responsible use of technology by security services and prevent any future harm to people. Victims, researchers, and news agencies have reported against NSO, while the company can only rely on its management's claim of doing good.

    • Pegasus - Potential for Good and HarmTechnologies like Pegasus must be supervised and regulated, just like the police, to avoid abuse and ensure legal accountability. The Mexican incident indicates that Pegasus was exploited to target innocent individuals advocating for public health.

      While Pegasus has been used for potential good, such as capturing drug lord El Chapo in Mexico, it has also been susceptible to abuse, as seen in instances where innocent people advocating for public health were targeted. Any technology that has the potential for both good and harm needs to be carefully overseen to prevent abuse and ensure legal accountability, just like the police. The shady instances of the use of Pegasus in Mexico show that someone linked to the Mexican Pegasus operator likely did a favor for business by targeting those advocating for more taxes on soda as a means to reduce childhood obesity.

    • Misuse of Pegasus Spyware by Governments and its OperatorsThe Pegasus spyware, sold to governments, has been used to target innocent people including journalists, lawyers, and others. The operators were brazen, and NSO claims to be unaware of its misuse. Vigilant research approach is crucial in identifying suspect messages.

      The Pegasus spyware has been used by law enforcement entities, military, and intelligence agencies after being sold by NSO to governments around the world. It is being misused to target innocent people, journalists, lawyers representing the families of victims of cartel kidnappings, and others. The research approach undertaken by the lab, where they worked closely with local organizations, helped them identify potentially suspect messages and compare them against lists that were previously developed of NSO exploit infrastructure. The operators of the Pegasus spyware were incredibly brazen and sent messages that were tailored, relevant, and at times, gross. NSO claims they don't know how the tool is used or who it's being used on.

    • The Misuse of Pegasus Spyware in Mexico and Saudi ArabiaThe unethical use of Pegasus spyware by Mexican authorities and its sale to the Saudi Arabian government highlights the need for stronger regulations and oversight of surveillance tools to protect individuals and their rights.

      The Pegasus spyware was used by Mexican authorities to target civil society members, including journalists and activists who were advocating for justice and accountability. Their targeting included crude and emotional messages that aimed to get the target to click a link on their phone without any ethical line. The victimization didn't stop even after the death of journalist Javier Valdez, whose colleagues and widowed wife were targeted by Pegasus. The blame can be shared between the government and NSO, whose product was purchased by Tomas Zeron, who subsequently fled to Israel after being charged for torture and enforced disappearance. NSO also sold Pegasus to the Saudi Arabian government, which is linked to the murder of journalist Jamal Khashoggi.

    • Link between Pegasus Spyware and Physical ViolenceThe use of Pegasus spyware in the assassination of journalist Jamal Khashoggi demonstrates the dangerous connection between targeted spyware and violent acts. The accountability and transparency of companies like NSO Group must be questioned.

      The use of Pegasus spyware has been linked to cases of physical violence, including the assassination of journalist Jamal Khashoggi. Pegasus was likely used to gather information on Khashoggi's activities and connections to ultimately plan his murder. While the company behind Pegasus, NSO Group, denies involvement in the murder or spying on Khashoggi, there is evidence that phones of his family and friends were targeted with Pegasus. This highlights the troubling nexus between targeted spyware and physical violence. NSO Group claims they have the technology to shut down the system if it is misused, but there are doubts about their accountability and transparency in the use of their product.

    • Lack of regulations on mobile spyware sales raise ethical concernsNSO Group's lack of clear regulations and false denials for misuse of mobile spyware highlight the urgency for tighter regulations and holding companies accountable for the misuse of their technology.

      NSO Group, a for-profit company that sells mobile spyware, has faced scrutiny over the misuse of their technology as there are no good regulations on who can sell or buy them. While the company claims to have three layers of vetting potential customers and clear definitions of terrorism, concerns remain around governments using the technology to spy on opposition groups, and NSO's credibility has been affected by repeatedly issuing denials that were later proven false. The lack of international laws means that ethical and moral judgments made by NSO's staff and leadership are relied upon, but the concept of what is considered terrorism is not universally agreed upon. This all highlights the need for tighter regulations and accountability for the use of such technology.

    • The Danger of Language and Accountability in the Hacking IndustryBe aware of language used to promote authoritarianism and nationalism, and question the accountability of players in the hacking industry such as NSO. They may have more power and oversight than previously thought.

      The language used to promote authoritarianism and nationalism is the same language used to push for the Patriot Act after 9/11. It is important to be critical of this language and think critically to avoid supporting such a world. NSO is a player in the hacking industry that is totally unaccountable. They are currently in court denying accountability for hacking a US company and its users. WhatsApp sued NSO and discovered that NSO owned and operated servers used for exploitation, challenging the idea that NSO wouldn't know what its customers are doing and wouldn't exercise oversight. NSO may be able to look over its customer's shoulders and see who they were infecting with the technology.

    • Major tech companies and civil society organizations support lawsuit against NSO amid new allegations of Pegasus spyware targeting.Despite NSO's denials and attempts to dismiss the lawsuit, major tech companies and civil society organizations remain committed to holding the company accountable for its alleged role in the development and deployment of spyware targeting prominent individuals.

      The lawsuit between WhatsApp/Facebook and NSO is yet to go to trial as NSO is currently trying to get the case dismissed. Many major tech companies and civil society organizations including Microsoft, Cisco, GitHub, Google, LinkedIn, and VMware are supporting the case and have urged the judge to not dismiss it. However, NSO recently hit the news again with the Pegasus Project where a leaked list of 50,000 phone numbers were claimed to be potential targets for Pegasus spyware, targeting activists, journalists, government officials, and people like the daughter of the manager of the hotel in the Hotel Rwanda case. NSO denies having such a list or the theft of their target list, but doubts remain as the company's first transparency and responsibility report suggests they do have access to customer logs.

    • The Dark Side of NSO's Pegasus SpywareNSO's lack of transparency and accountability raises concerns about how their spyware is being used to infringe on human rights and harm civil society.

      NSO's Pegasus spyware is being used by various governments to spy on activists and individuals who are outspoken against the government. The NSO Group claims to have a list of fifty-five countries they won't do business with due to human rights abuse, corruption or regulatory restrictions. However, their transparency report seems like PR fluff because they do not highlight the instances of abuse or name the countries they cut ties with. Moreover, the NSO Group is not willing to be transparent about their customers and their data usage. Although the tool is used for good purposes like preventing terror attacks and protecting airspace, it still harms civil society. NSO should be held accountable for getting their tool into the wrong hands.

    • NSO Group's Malware for Oppressive RegimesNSO Group has been accused of creating malware to hack into people's phones and selling it to oppressive regimes. Despite being audited by the Israeli government, they continue to sell their products, ignoring potential harm to human rights.

      NSO Group, a cyber intelligence firm, has been accused of creating malware to hack into people's phones which has been used by oppressive regimes. The Israeli government has audited NSO Group in July 2021 to review their export licenses and investigate if the firm has done anything wrong. Although Pegasus vulnerabilities have been fixed, NSO has a new version of the spyware. Cowboy capitalists firms like NSO view the exposure of exploits as part of the cost of doing business and continue to sell their products even if they know it might be used to commit non-lawful activities. Citizen Lab and other organizations have exposed NSO's spyware and human rights violations. The recent Black Cube spying operation on John Scott-Railton and Citizen Lab was part of a coordinated effort to frustrate the ability of victims to get justice.

    • NSO Group accused of unethical behavior and potential US law violationsNSO Group's actions highlight the inherent dangers of surveillance technology and raise questions about the accountability of companies that sell it, as well as the governments that use it.

      NSO Group, a spy tool selling company that claims to not engage in spying themselves, may have paid Black Cube to spy on Citizen Lab and lawyers of victims of the Pegasus software. This clearly shows a case of unethical behavior from NSO Group, raising doubts about their trustworthiness and ability to make ethical choices regarding who to sell their spyware to. Additionally, the NSO Group has attempted to sell their spyware to police departments in the US and FBI is investigating if any of its exploits were used by Americans. While NSO claims to be selling lawful intercept technology, the lack of consequences for governments abusing this tool raises concerns about citizens' safety and privacy.

    Recent Episodes from Darknet Diaries

    149: Mini-Stories: Vol 3

    149: Mini-Stories: Vol 3

    In this episode we hear EvilMog (https://x.com/Evil_Mog) tell us a story about when he had to troubleshoot networks in Afghanistan. We also get Joe (http://x.com/gonzosec) to tell us a penetration test story.

    Sponsors
    Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet.

    Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.

    Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.

    Darknet Diaries
    en-usSeptember 03, 2024

    148: Dubsnatch

    148: Dubsnatch

    Ever wondered how far a fan would go to get a sneak peek of their favorite artist’s unreleased tracks? In this episode, we uncover the audacious story of some teens bent on getting their hands on the newest dubstep music before anyone else.

    Sponsors
    Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet.

    Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.

    Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.


    Darknet Diaries
    en-usAugust 06, 2024

    147: Tornado

    147: Tornado

    In this episode, Geoff White (https://x.com/geoffwhite247) tells us what happened to Axie Infinity and Tornado cash. It’s a digital heist of epic proportions that changes everything.

    This story comes from part of Geoff’s book “Rinsed” which goes into the world of money laundering. Get yours here https://amzn.to/3VJs7pb.

    Darknet Diaries
    en-usJuly 02, 2024

    146: ANOM

    146: ANOM

    In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of anom. A secure phone made by criminals, for criminals.

    This story comes from part of Joseph’s book “Dark Wire” which you should definitely read. Get yours here https://www.hachettebookgroup.com/titles/joseph-cox/dark-wire/9781541702691.

    Darknet Diaries
    en-usJune 04, 2024

    145: Shannen

    145: Shannen
    Shannen Rossmiller wanted to fight terrorism. So she went online and did. Read more about her from her book “The Unexpected Patriot: How an Ordinary American Mother Is Bringing Terrorists to Justice”. An affiliate link to the book on Amazon is here: https://amzn.to/3yaf5sI. Thanks to Spycast for allowing usage of the audio interview with Shannen. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    144: Rachel

    144: Rachel
    Rachel Tobac is a social engineer. In this episode we hear how she got started doing this and a few stories of how she hacked people and places using her voice and charm. Learn more about Rachel by following her on Twitter https://twitter.com/RachelTobac or by visiting https://www.socialproofsecurity.com/ Daniel Miessler also chimes in to talk about AI. Find out more about him at https://danielmiessler.com/. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    143: Jim Hates Scams

    143: Jim Hates Scams
    Jim Browning has dedicated himself to combatting scammers, taking a proactive stance by infiltrating their computer systems. Through his efforts, he not only disrupts these fraudulent operations but also shares his findings publicly on YouTube, shedding light on the intricacies of scam networks. His work uncovers a myriad of intriguing insights into the digital underworld, which he articulately discusses, offering viewers a behind-the-scenes look at his methods for fighting back against scammers. Jim’s YouTube channel: https://www.youtube.com/c/JimBrowning Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. This episode is sponsored by Intruder. Growing attack surfaces, dynamic cloud environments, and the constant stream of new vulnerabilities stressing you out? Intruder is here to help you cut through the chaos of vulnerability management with ease. Join the thousands of companies who are using Intruder to find and fix what matters most. Sign up to Intruder today and get 20% off your first 3 months. Visit intruder.io/darknet. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    142: Axact

    142: Axact
    Axact sells fake diplomas and degrees. What could go wrong with this business plan? Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    141: The Pig Butcher

    141: The Pig Butcher
    The #1 crime which results in the biggest financial loss is BEC fraud. The #2 crime is pig butchering. Ronnie Tokazowski https://twitter.com/iHeartMalware walks us through this wild world. Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from Drata. Drata streamlines your SOC 2, ISO 27001, PCI DSS, HIPAA, GDPR & many other compliance frameworks, and provides 24-hour continuous control monitoring so you focus on scaling securely. Listeners of Darknet Diaries can get 10% off Drata and waived implementation fees at drata.com/darknetdiaries. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    iOS RCE, Pegasus Spyware Leak, Florida Victims Targeted, & Debugging MosaicLoader - SWN #135

    iOS RCE, Pegasus Spyware Leak, Florida Victims Targeted, & Debugging MosaicLoader - SWN #135

    This week in the Security News: Billionaires in Space again, grayware, Candiru fish, iOS, China, Mosaic, and of course the returning Expert Commentary of Jason Wood!

     

    Show Notes: https://securityweekly.com/swn135

    Visit https://www.securityweekly.com/swn for all the latest episodes!

     

    Follow us on Twitter: https://www.twitter.com/securityweekly

    Like us on Facebook: https://www.facebook.com/secweekly

    Attack Surface Management, Monitoring, & Mapping - Jeff Foley - ESW #219

    Attack Surface Management, Monitoring, & Mapping - Jeff Foley - ESW #219

    The OWASP Amass Project has developed a tool to help information security professionals perform network mapping of attack surfaces and perform external asset discovery using open source information gathering and active reconnaissance techniques.

     

    https://github.com/OWASP/Amass

    https://owasp.org/www-project-amass/

    https://vimeo.com/481985359

     

    Visit https://www.securityweekly.com/esw for all the latest episodes!

    Show Notes: https://securityweekly.com/esw219

    Archived Report From Seattle CHOP Zone Part 1 2020-10-09

    Archived Report From Seattle CHOP Zone Part 1  2020-10-09

    Democracy Watch News Executive Director Mark Taylor-Canfield reports from Seattle on the 

    Capitol Hill Organized Protest (CHOP) and Mayor Jenny Durkan’s Executive Order directing police to raid the site and arrest protesters who refuse to leave the area. She then imposed a 10 day moratorium on protests in Cal Anderson Park and the surrounding area near the Seattle Police Department’s East Precinct Station which police had previously abandoned in the face of 24/7 protests for many weeks.  

     

    MTC reports on the history of protests in Seattle, including the famous Pink Umbrella Riot, Demonstrations vs the World Trade Organization, Occupy Wall Street movement, etc. He also reports on past efforts to reform the SPD and current attempts at demilitarization and defunding. 

     

    Mark’s article at The Seattle Star: https://www.seattlestar.net/2020/07/seattle-mayor-jenny-durkans-crackdown-on-chop-is-politically-motivated/

     

    MTC Reports on Protests in Seattle Vs Racism And Police Brutality

     

    #Seattle #BlackLivesMatter #BLM #CivilRights #HumanRights #Racism #Police #Protest #Non-LethalWeapons #Accountability #Jenny Durkan #CarmenBest #DOJ #TearGas #CSGas

    #BlastBalls #PepperSpray #PepperBalls #OCSpray #WTO #OccupySeattle #OWS #PinkUmbrellaRiot #CalAndersonPark #CHOP #SeattleAutonomousZone #OmariSalisbury #Livestream #GeorgeFloyd #BreonnaTaylor

    S1 Ep05: The Future of Multilateralism

    S1 Ep05: The Future of Multilateralism

    Recent events in the world, along with the global pandemic have forced us to look at the complex relationships between nation states. In this timely discussion with Lopa Banerjee we discuss the possibilities and challenges of this uncertain and emergent moment in our human history.

    Lopa Banerjee is the Director of the Civil Society Division at UN Women, and leads the agency’s work on strengthening civil society contribution, participation and influence in the global, intergovernmental policy discussion and decision processes.

    ***

    This series is supported by the BUILD program of the Ford Foundation.

     “Inter-Connected Theme” composed by Devadas,  (c) Mallika Dutt, LLC 2021. 

    Production team: Mallika Dutt, Devadas Labrecque, Ambika Pressman.

    If you enjoy the podcast, please share. I’d also appreciate a short review. It takes less than 60 seconds and helps us reach more people.  Thank you.

    For show notes and past guests and transcripts, please visit mallikadutt.com/podcast/

    Sign up for Mallika’s email newsletter at mallikadutt.com/join

    Follow Mallika:

    Twitter: twitter.com/mallikadutt

    Instagram: instagram.com/mallikadutt

    Facebook: facebook.com/mallikadutt

    YouTube: https://www.youtube.com/c/MallikaDutt-IC

     

    Ransomware Research, Threats, and Futures - Assaf Dahan - PSW #686

    Ransomware Research, Threats, and Futures - Assaf Dahan - PSW #686

    Assaf Dahan, Sr Director, Head of Threat Research at Cybereason, discusses current trends in ransomware research. What happens when we're not watching or watching the wrong indicators? And threat actor handoff off pillaging to Cyber Merenaries.

     

    Visit https://www.securityweekly.com/psw for all the latest episodes!

    Show Notes: https://securityweekly.com/psw686

    Logo

    © 2024 Podcastworld. All rights reserved

    Stay up to date

    For any inquiries, please email us at hello@podcastworld.io