meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, September 21st 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 21 September 2018

⏱️ 13 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. OSSEC Hunting; NSSLabs; Bitcoin DoS; WebAuthn

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Friday, September 21st, 2018 edition of the Sansonet Storm Center's

0:06.4

Stormcast. My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida.

0:12.8

One tool that I don't see used as much as it probably should be used is OSEC. OSEC is an open source

0:19.9

log monitoring system first of all, but it can do

0:23.6

a lot more than just collect logs and parse them. For example, it can also check file integrity,

0:30.3

and as pointed out in Xavier's diary today, it can also monitor the output of scripts that you are running.

0:38.3

And with that you can, for example, keep an easy look on the output of, for example, PS,

0:44.3

the script that will tell you all the processes running currently on a Unix system in order to identify known malicious software.

0:53.3

Pretty neat little trick, so if you are running OSEC, take a look at this.

0:58.0

If not, well, maybe your monitoring system has a similar solution

1:03.0

where you can monitor what processes are running on your systems.

1:08.0

And usually I don't talk much about politics or legal issues, they like, but NS Labs did sue a number

1:17.1

of antivirus vendors, anti-malware vendors, because of a new testing standard that these

1:23.3

vendors agreed on.

1:24.9

Now, NS Labs is a fairly reputable testing company that tests various

1:30.6

security software hardware packages and, well, it has run into vendors in the past, of course,

1:37.3

whenever it came out with less than favorable reviews. In this particular case, the problem is that these vendors agreed to only allow

1:48.4

their software to be tested using a very specific testing procedure. And while there may be

1:56.1

nothing fundamentally wrong with this testing procedure, Whenever you define a very specific testing procedure

2:03.1

like this, then of course software starts to get optimized for the test and not necessarily

2:09.0

for real-world applications. To make things worse, the Yula that came with these products,

2:15.4

then outright forbade to actually run any other tests

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.