Risky Business #500 -- Web asset discovery is getting useful

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

In this week’s feature interview we’ll be chatting with Shubham Shah and his friend Lord Tuskington about continuous asset discovery’s impact on testing methodologies. Shubs has worked as both a pentester and as a very successful bug bounty hunter. In fact he’s built an entire asset discovery platform that he and his buddies have been using to rip crazy amounts of cash out of bounty programs over the last few years and he’s turning that platform into a product. So I wanted to talk to him about that, but I also wanted to get a pentester’s perspective on how this type of continuous asset discovery tech could change the testing industry.

This week’s show is brought to you by Exabeam, a next generation SIEM company! And it’s amazing how nicely this week’s feature and sponsor interviews dovetail actually, because Exabeam’s Steve Gailey will be along in this week’s sponsor interview to have a chat about how SIEM technology has changed much faster than SOC operations methodologies. Because basically everyone has structured their operations around three levels of response and the workflows are so ingrained, nobody seems to know know what to do with a next generation SIEM.

Adam Boileau is also along, like always, to talk about the week’s security news.

The show notes/news items are below, and you can follow Adam or Patrick on Twitter if that’s your thing.

Risky Business #500 -- Web asset discovery is getting useful
0:00 / 0:00

Show notes

Alleged CIA Leaker Joshua Schulte Has Some of the Worst Opsec I’ve Ever Seen - Motherboard

Accused CIA leaker Joshua Schulte accused of more leaks

Alleged CIA Leaker Tweeted That Chelsea Manning ‘Should Be Executed’ - Motherboard

Trump feels presidential smartphone security is “too inconvenient” | Ars Technica

Trump, Chinese leaders moving forward on deal to save ZTE - The Washington Post

House measure asks DHS to share info on potential ZTE cyberthreat

Potential Trump deal to ease sanctions on China's ZTE riles Congress

Revealed: Pentagon Push to Hack Nuke Missiles Before They Launch

Banks Adopt Military-Style Tactics to Fight Cybercrime - The New York Times

Inside 'Project Indigo,' the quiet info-sharing program between banks and U.S. Cyber Command

Hacker Breaches Securus, the Company That Helps Cops Track Phones Across the US - Motherboard

LocationSmart bug allowed for leak of location data for nearly any U.S. phone - CyberScoop

Who's Afraid of Kaspersky? - Motherboard

New speculative-execution vulnerability strikes AMD, ARM, and Intel | Ars Technica

After Arrest in Serbia, Netflix Hackers ‘The Dark Overlord’ Say They’re Still Going - Motherboard

Cisco's Talos Intelligence Group Blog: TeleGrab - Grizzly Attacks on Secure Messaging

North Korea-tied hackers used Google Play and Facebook to infect defectors | Ars Technica

The Wayback Machine is Deleting Evidence of Malware Sold to Stalkers - Motherboard

Latvian national convicted of running 'VirusTotal-for-criminals' malware scanner

Alphabet's Jigsaw offers political campaigns free DDoS protection

T-Mobile Employee Made Unauthorized ‘SIM Swap’ to Steal Instagram Account — Krebs on Security

Karin Kosina on Twitter: "So the guy behind the Carbanak malware that stole hundreds of millions of dollars? He was caught because he bought a car for 70k and didn't pay the bill. Can't make this sh** up :) #opsec #fail https://t.co/rRmFzywmVI"

GPON Routers Attacked With New Zero-Day

Cisco fixes critical ‘DNA’ software flaws

Pakistan: Campaign of hacking, spyware and surveillance targets human rights defenders | Amnesty International

AUSTRALIA'S DEADLIEST ANIMALS - SONG - YouTube