Logo

    bounties

    Explore "bounties" with insightful episodes like "Pro-Life Progress, Bogus Afghan Bounty Story, Markey's Massive Hypocrisy", "Pro-Life Progress, Bogus Afghan Bounty Story, Markey's Massive Hypocrisy", "2020-036-Katie Moussouris, Vulnerability Coordination Maturity Model, when are you ready for a bug bounty - Part 1", "28-1: Rewards" and "Hack Naked News #167 - April 3, 2018" from podcasts like ""3 Martini Lunch Podcast", "3 Martini Lunch Podcast", "Brakeing Down Security Podcast", "Plunders & Blunders" and "Security Weekly News (Audio)"" and more!

    Episodes (13)

    Pro-Life Progress, Bogus Afghan Bounty Story, Markey's Massive Hypocrisy

    Pro-Life Progress, Bogus Afghan Bounty Story, Markey's Massive Hypocrisy
    Join Jim and Greg as they welcome an appeals court decision upholding an Ohio ban on abortions because the unborn baby has Down Syndrome. They also fume as the intel community admits there is only low to moderate confidence in last year's reports that Russia was offering bounties to the Taliban and its allies for killing coalition forces in Afghanistan. And they shake their heads at the obvious court-packing hypocrisy of Massachusetts Sen. Ed Markey.


    Please visit our great sponsors:

    My Pillow
    https://mypillow.com/martini
    Use code ‘Martini” to the new MySlippers at 40% off.

    Moink Box
    https://moinkbox.com/martini
    Join the Moink Movement today! Go to MoinkBox.com/Martini right now and get free ground beef for a year.

    Pro-Life Progress, Bogus Afghan Bounty Story, Markey's Massive Hypocrisy

    Pro-Life Progress, Bogus Afghan Bounty Story, Markey's Massive Hypocrisy
    Join Jim and Greg as they welcome an appeals court decision upholding an Ohio ban on abortions because the unborn baby has Down Syndrome. They also fume as the intel community admits there is only low to moderate confidence in last year's reports that Russia was offering bounties to the Taliban and its allies for killing coalition forces in Afghanistan. And they shake their heads at the obvious court-packing hypocrisy of Massachusetts Sen. Ed Markey.


    Please visit our great sponsors:

    My Pillow
    https://mypillow.com/martini
    Use code ‘Martini” to the new MySlippers at 40% off.

    Moink Box
    https://moinkbox.com/martini
    Join the Moink Movement today! Go to MoinkBox.com/Martini right now and get free ground beef for a year.

    2020-036-Katie Moussouris, Vulnerability Coordination Maturity Model, when are you ready for a bug bounty - Part 1

    2020-036-Katie Moussouris, Vulnerability Coordination Maturity Model, when are you ready for a bug bounty - Part 1

    Introduce Katie (bio) (@k8em0) CEO and Owner, LutaSecurity

    The scope of the VCMM (what is it?)

    VCMM - Vulnerability Coordination Maturity Model 

    https://www.lutasecurity.com/vcmm

    Just covers the internal process? To ready an org for a bug bounty program or to accept vulns from security researchers?

    You mentioned not playing whack-a-mole, when it comes to responding at the beginning of a vuln disclosure program. Is the directing of different categories of bugs one of the things that goes into not having to just wait for the bugs to roll in?


    Will this work for internal security or red teams as well, or is this more suited to bug bounties?

    What’s the timeline for this process? “We need something for a product launch next week…”

    Stakeholders involved? CISO? Security team? IT? Devs?

    What precipitates the need for this? Maturity? Vuln Disclosure? 

    Are the ISO docs required for this to work, or will they assist in an easier outcome?

    https://blog.rapid7.com/2017/12/19/nist-cyber-framework-revised-to-include-coordinated-vuln-disclosure-processes/

    https://www.rsaconference.com/industry-topics/video/bug-bounty-programs-arent-enough-for-todays-cyber-threats-katie-moussouris-rsac 

    10 worst jobs (popsci article): https://web.archive.org/web/20070712070214/https://www.popsci.com/popsci/science/0203101256a23110vgnvcm1000004eecbccdrcrd.html

    https://www.nbcnews.com/tech/security/how-teenage-fortnite-player-found-apple-s-facetime-bug-why-n963961

    How does an org use this to communicate vulnerabilities in their own products? 

    What’s the bare minimum you need on this chart for a successful program? Are any facets more important than the others? Does anyone hit all 3s, or is that a pipedream?

    Incentive “no legal action will be taken”. People want money… not tours, not 10-point font. How do you convince ‘good’ bug writers to want to help you for a ‘thank you’? Should incentive be a ‘Level 3’ or would you consider it not ready for prime-time?

    https://www.zdnet.com/article/yahoo-changes-bug-bounty-policy-following-t-shirt-gate/

    Vuln reporting

    Lots of Twitter fodder of companies that handle vuln disclosure poorly, even folks say that you shouldn’t bother and deal with a 3rd party.

    If a company is taking bugs and doing all the baseline items, what are some other things they could do to make security disclosure easier?

    Security.txt?

    Clearly stated bugs@ or Security@ (and not buried in 3 point font in the privacy policy, or ToS)

    SLA to reply to all bugs?

    Standardized disclosure form for discoveries?

    Slide Presentation Overview: https://7bb97855-c50f-4dce-9a1c-325268684c64.filesusr.com/ugd/ed9b4b_f04d16446542494887906777a39204bf.pdf

    ISO 29147:2018 - $150 USD

    https://www.iso.org/standard/72311.html

    ISO 30111:2019 - $95 USD

    https://www.iso.org/standard/69725.html

    ISO 27034-7:2018 - $150 USD

    https://www.iso.org/standard/66229.html 

    Check out our Store on Teepub! https://brakesec.com/store

    Join us on our #Slack Channel! Send a request to @brakesec on Twitter or email bds.podcast@gmail.com

    #AmazonMusic: https://brakesec.com/amazonmusic 

    #Brakesec Store!: https://brakesec.com/teepub 

    #Spotifyhttps://brakesec.com/spotifyBDS

    #Pandora: https://brakesec.com/pandora 

    #RSShttps://brakesec.com/BrakesecRSS

    #Youtube Channel:  http://www.youtube.com/c/BDSPodcast

    #iTunes Store Link: https://brakesec.com/BDSiTunes

    #Google Play Store: https://brakesec.com/BDS-GooglePlay

    Our main site:  https://brakesec.com/bdswebsite

    #iHeartRadio App:  https://brakesec.com/iHeartBrakesec

    #SoundCloudhttps://brakesec.com/SoundcloudBrakesec

    Comments, Questions, Feedback: bds.podcast@gmail.com

    Support Brakeing Down Security Podcast by using our #Paypalhttps://brakesec.com/PaypalBDS OR our #Patreon

    https://brakesec.com/BDSPatreon

    #Twitter@brakesec @boettcherpwned @bryanbrake @infosystir

    #Player.FM : https://brakesec.com/BDS-PlayerFM

    #Stitcher Network: https://brakesec.com/BrakeSecStitcher

    #TuneIn Radio App: https://brakesec.com/TuneInBrakesec

    28-1: Rewards

    28-1: Rewards
    Ch 28-1: A surprise gift leads to something of a wild goose chase, the crew say their final goodbyes to their fallen, and the Dead Tide makes landfall on the shores of Luckstone. With a bounty to collect, and ale to drink, the Deadites will have plenty to keep them occupied during their stay.

    Hack Naked News #167 - April 3, 2018

    Hack Naked News #167 - April 3, 2018

    This week, Drupal vulnerabilities, APT detection, DoD bug bounties, new DNS services and breaches galore from Under Armour, Saks, Lord and Taylor, and Panera! Jason Wood from Paladin Security joins us for expert commentary so stay tuned to this episode of Hack Naked News!

     

    Full Show Notes: https://wiki.securityweekly.com/HNNEpisode167

    Visit https://www.securityweekly.com/hnn for all the latest episodes!

    Visit https://www.activecountermeasures/hnn to sign up for a demo or buy our AI Hunter!!

    It's Just Beautiful - Application Security Weekly #06

    It's Just Beautiful - Application Security Weekly #06

    This week, Keith and Paul discuss Data Security and Bug Bounty programs! In the news, Lenovo warns of critical Wifi vulnerability, Russian nuclear scientists arrested for Bitcoin mining plot, remote workers outperforming office workers, and more on this episode of Application Security Weekly!

     

    Full Show Notes: https://wiki.securityweekly.com/ASW_Episode06

     

    Visit https://www.securityweekly.com/asw for all the latest episodes!

     

    It's Just Beautiful - Application Security Weekly #06

    It's Just Beautiful - Application Security Weekly #06

    This week, Keith and Paul discuss Data Security and Bug Bounty programs! In the news, Lenovo warns of critical Wifi vulnerability, Russian nuclear scientists arrested for Bitcoin mining plot, remote workers outperforming office workers, and more on this episode of Application Security Weekly!

     

    Full Show Notes: https://wiki.securityweekly.com/ASW_Episode06

     

    Visit https://www.securityweekly.com/asw for all the latest episodes!

    Dropbox, BeyondTrust, Marcus Hutchins, and DEF CON - Paul's Security Weekly #525

    Dropbox, BeyondTrust, Marcus Hutchins, and DEF CON - Paul's Security Weekly #525

    Mystery bug bounties, Marcus Hutchins pleads not guilty, a password guru regrets past advice, Dropbox and offline two-factor authentication, and more security news!

    Full Show Notes: https://wiki.securityweekly.com/Episode525

    Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg

    Security Weekly Website:
    http://securityweekly.com

    Follow us on Twitter:
    @securityweekly

    Dropbox, BeyondTrust, Marcus Hutchins, and DEF CON - Paul's Security Weekly #525

    Dropbox, BeyondTrust, Marcus Hutchins, and DEF CON - Paul's Security Weekly #525

    Mystery bug bounties, Marcus Hutchins pleads not guilty, a password guru regrets past advice, Dropbox and offline two-factor authentication, and more security news!

    Full Show Notes: https://wiki.securityweekly.com/Episode525

    Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg

    Security Weekly Website:
    http://securityweekly.com

    Follow us on Twitter:
    @securityweekly

    2016-011-Hector Monsegur, deserialization, and bug bounties

    2016-011-Hector Monsegur, deserialization, and bug bounties

    Download Here: http://traffic.libsyn.com/brakeingsecurity/2016-011-Hector_Monsegur-bug_bounties-serialization.mp3

    iTunes Direct Link: https://itunes.apple.com/us/podcast/2016-011-hector-monsegur-serialization/id799131292?i=364768504&mt=2

    Hector Monsegur has had a colorful history. A reformed black hat who went by the name 'Sabu' when he was involved in the hacker collectives "Lulzsec" and "Anonymous", he turned state's evidence for the FBI, working to stop further hacking attempts by the same people he was working with.

    https://en.wikipedia.org/wiki/Hector_Monsegur

    This week, we got to sit down with Hector, to find out what he's been doing in the last few years. Obviously, a regular job in the security realm for a large company is not possible for someone with a colorful past that Mr. Monsegur has. So we discuss some of the methods that he's used to make ends meet.

    Which brings us to the topic of bug bounties. Do they accomplish what they set out to do? Are they worth the effort companies put into them? And how do you keep bounty hunters from going rogue and using vulnerabilities found against a company on the side?

    In an effort to satisfy my own curiosity, I asked Hector if he could explain what a 'deserialization' vulnerability is, and how it can be used in applications. They are different than your run of the mills, every day variety OWASP error, but this vulnerability can totally ruin your day...

    https://www.contrastsecurity.com/security-influencers/java-serialization-vulnerability-threatens-millions-of-applications

    https://securityintelligence.com/one-class-to-rule-them-all-new-android-serialization-vulnerability-gives-underprivileged-apps-super-status/

    Finally, we ask Hector some advice for that 'proto black hat' who is wanting to head down the road that Hector went. The answer will surprise you...

    We hope you enjoy this most interesting interview with a enigmatic and controversial person, and hope that the information we provide gives another point of view into the mind of a reformed "black hat" hacker...

     

    Comments, Questions, Feedback: bds.podcast@gmail.com

    Support Brakeing Down Security using Patreon: https://www.patreon.com/bds_podcast

    RSS FEED: http://www.brakeingsecurity.com/rss

    On #Twitter: @brakesec @boettcherpwned @bryanbrake

    #Facebook: https://www.facebook.com/BrakeingDownSec/

    #Tumblr: http://brakeingdownsecurity.tumblr.com/

    Google Play Store: https://play.google.com/music/podcasts/portal/#p:id=playpodcast/series&a=100584969

    Player.FM : https://player.fm/series/brakeing-down-security-podcast

    Stitcher Network: http://www.stitcher.com/s?fid=80546&refid=stpr

    TuneIn Radio App: http://tunein.com/radio/Brakeing-Down-Security-Podcast-p801582/

    #infosec, #blackhat, hector #monsegur, #hacker, #anonymous, #lulzsec, #FBI, #Sabu, #deserialization, #bug #bounties, #hackerone, #bugcrowd, #podcast, #de-serialization, #penetration tests, #social #engineering, #CISSP

    SecuraBit Episode 120: Nonprofits and Bounties!

    SecuraBit Episode 120: Nonprofits and Bounties!

    Hosts

    Guests

    Topics

    • Securing Change

      • Volunteer time and money to secure nonprofits

    • Bugcrowd

      • Get paid to find vulnerabilities

      • Start a bounty for your own product

    News Items

    • Adobe hacked

    • Govt Shutdown

    Use Our Discount Codes

    • Use code SecuraBit_5 to get 5 percent off of ANY training course. The discount code is good for all SANS courses in all formats.

    • Register for any SANSFIRE 2013 course and receive 5% off using coupon code SecuraBit_05 The training event takes place in Washington, DC – June 15-22, 2013.

    Upcoming events

    Links

    Chat with us on IRC at irc.freenode.net #securabit

    iTunes Podcast – http://itunes.apple.com/us/podcast/securabit/id280048405

    Logo

    © 2024 Podcastworld. All rights reserved

    Stay up to date

    For any inquiries, please email us at hello@podcastworld.io