Podcast Image

Security Serengeti

A news analysis focused information security podcast dedicated to getting you the actionable information and analysis you need to improve your company's posture and response!
Categories

Last Episode Date: No Date found.

Total Episodes: Not Available

Collaboration
Podcast Interviews
Affiliate and Join Ventures
Sponsorships
Promo Swaps
Feed swaps
Guest/Interview swaps
Monetization
Advertising and Sponsors
Affiliate and JVs
Paid Interviews
Products, Services or Events
Memberships
Donations
SS-NEWS-154 - Salt Typhoon and MS MFA Brute Forcing
16 December 2024
SS-NEWS-154 - Salt Typhoon and MS MFA Brute Forcing

This week we discuss Salt Typhoon and the terrible idea of backdoors (and I mis-remember the backdoor discussion in 2008 - encryption vs. telcos!) and the Microsoft MFA brute forcing.   Article 1 - Salt Typhoon forces FCC's hand on making telcos secure their networksSupporting Articles: China's Salt Typhoon recorded top American officials' calls, says White HouseUS alleges China hacked calls of 'very senior' political figures, official saysUS lawmakers seek answers on alleged Salt Typhoon breach of telecom giantsWyden legislation would mandate FCC cybersecurity rules for telecomsWiretap Telecom Article 2 - Microsoft MFA AuthQuake Flaw Enabled Unlimited Brute-Force Attempts Without Alerts If you found this interesting or useful, please follow us on Twitter @serengetisec and subscribe and review on your favorite podcast app!

42 min
SS-NEWS-153 - Lawyers will Inherit Cyber
18 November 2024
SS-NEWS-153 - Lawyers will Inherit Cyber

This week we discuss an academic paper through Venture in Security talking about how companies will rely more and more on legal reasoning and decision making vs. technical reasoning and decision making, and we quickly hit on ATT&CK v16. Article 1 - Venture in Security Response - Blessed are the lawyers, for they shall inherit cybersecuritySupporting Articles:Original Paper - Blessed Are The Lawyers, For They Shall Inherit Cybersecurity Article 2 - V16 Brings (Re)Balance: Restructured Cloud, New Analytics, and More Cybercriminals If you found this interesting or useful, please follow us on Twitter @serengetisec and subscribe and review on your favorite podcast app!

45 min
SS-DISC-152 - Detection Engineering Behavior Maturity Model
4 November 2024
SS-DISC-152 - Detection Engineering Behavior Maturity Model

Today we discuss the Detection Engineering Behavior Maturity Model, which is a new Capability Maturity Model for Detection Engineering (surprise!) from Elastic.  It seems a little overly complicated to me (M.) but super useful despite that! Article that we originally saw  Direct link to Elastic Blog Post If you found this interesting or useful, please follow us on Twitter @serengetisec and subscribe and review on your favorite podcast app!

40 min
SS-NEWS-151: AI Companions Hacked
21 October 2024
SS-NEWS-151: AI Companions Hacked

This week we discuss an attempted kidnapping and ransom of the parents of someone connected to a multi million dollar theft, stolen prompts and responses from Muah.ai's "companions", and how much attention should be paying low severity alerts? Article 1 - Lamborghini Carjackers Lured by $243M Cyberheist Article 2 - AI girlfriend site breached, user fantasies stolen Article 3 - Have you been keeping up with your low confidence detections? If you found this interesting or useful, please follow us on Twitter @serengetisec and subscribe and review on your favorite podcast app!

37 min
SS-NEWS-150 - T-Mobile Consent Decree and Kia Hacking
7 October 2024
SS-NEWS-150 - T-Mobile Consent Decree and Kia Hacking

Does the T-Mobile Consent Decree mean that the government is going to get more involved in breaches?  Additionally, Kia closes a gap in it's dealership API which allowed researchers to geolocate and lock/unlock cars.  Finally, we briefly discuss a new method attackers are monetizing AWS credentials... it's not pretty. Article 1 -  T-Mobile US to cough up $31.5M after that long string of security SNAFUsSupporting Articles:The Cost of Doing BusinessT-Mobile hit with $60M fine over data security violationsT-Mobile to take $400M hit from hacking settlementT-Mobile Consent Decree Article 2 - Hacking Kia: Remotely Controlling Cars With Just a License PlateSupporting Articles:Plate to VINCar Companies Know When You Speed. Then They Sell That Data Article 3 - A Single Cloud Compromise Can Feed an Army of AI Sex Bots If you found this interesting or useful, please follow us on Twitter @serengetisec and subscribe and review on your favorite podcast app!

49 min
SS-DISC-149 - Does the Security Job Gap Exist?
23 September 2024
SS-DISC-149 - Does the Security Job Gap Exist?

Spoiler alert - Not in the way the mass media is discussing it, and it's doing a disservice to aspiring security analysts and engineers. Supporting Articles:Packed. Crowded. Bursting. Crammed. Glutted. Jammed. Teeming. Saturated. Chock-full. Jam-packed. Brimming. Overflowing. Fungible Tokens Let’s get real: there is no such thing as “gatekeeping” in cybersecurity The ghost jobs haunting your career search Are We Now Living in a Parasite Culture? Is there really an information security jobs crisis? Defensive Security Podcast Episode 279 Global cybersecurity workforce growth flatlines, stalling at 5.5M pros If you found this interesting or useful, please follow us on Twitter @serengetisec and subscribe and review on your favorite podcast app!

35 min
SS-RPRT-148: Picus Blue Report 2024
9 September 2024
SS-RPRT-148: Picus Blue Report 2024

This week, David and I review the 2024 Picus Blue Report, in a more timely fashion than the last one.  As always, interesting insights. Link to Report If you found this interesting or useful, please follow us on Twitter @serengetisec and subscribe and review on your favorite podcast app!

54 min
SS-NEWS-147 - Does Phishing Education need to mature like Fire Drills did?
29 July 2024
SS-NEWS-147 - Does Phishing Education need to mature like Fire Drills did?

This week David and I talk about how current phishing tests closely resemble early attempts at fire drills, through the Google Security Blog, and then we discuss a Schneier post about what the recent CS failure says about the resiliency of the internet. Article 1 - On Fire Drills and Phishing Tests Article 2 - The CrowdStrike Outage and Market-Driven Brittleness If you found this interesting or useful, please follow us on Twitter @serengetisec and subscribe and review on your favorite podcast app!

49 min
SS-NEWS-146 - Sysmon usable as EDR?
16 July 2024
SS-NEWS-146 - Sysmon usable as EDR?

This week we discuss two articles - One about how the Technology Adoption Cycle applies to companies and how they acquire a new security capability, and a second about how Sysmon isn't a replacement for EDR, mostly due to the time commitment required. Article 1 - Cybersecurity technology adoption cycle and its implications for startups and security teams Article 2 - Sysmon: a viable alternative to EDR?Supporting Articles:Getting Started with ATT&CK: Detection and Analytics If you found this interesting or useful, please follow us on Twitter @serengetisec and subscribe and review on your favorite podcast app!

35 min
SS-NEWS-145 - Snowflakes are not unique, summary of incidents at .gov
17 June 2024
SS-NEWS-145 - Snowflakes are not unique, summary of incidents at .gov

This week we discuss the FY23 incidents in the US Government's annual report, and then we discuss Snowflake a bit, and some of the issues around SAAS and Malware Remediation (infostealers steal more than just the work accounts!) Article 1 - White House report dishes deets on all 11 major government breaches from 2023Supporting Article:Microsoft breach led to theft of 60,000 US State Dept emails Article 2 - Snowflake customers not using MFA are not unique – over 165 of them have been compromisedSupporting Articles:UNC5537 Targets Snowflake Customer Instances for Data Theft and ExtortionNo Snow, No Flakes: Pondering Cloud Security Shared Responsibility, Again!Mapping Snowflake’s Access Landscape If you found this interesting or useful, please follow us on Twitter @serengetisec and subscribe and review on your favorite podcast app!

44 min
Contact Us
First
Last
Discover New Podcast Partnerships

Subscribe To Our Weekly Newsletter

Get notified about new partnerships

Enter your name and email For Gifts, Deals and Prizes