<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Stories by Francesco Cipollone on Medium]]></title>
        <description><![CDATA[Stories by Francesco Cipollone on Medium]]></description>
        <link>https://medium.com/@FrankSEC42?source=rss-1cdabd7133a5------2</link>
        <image>
            <url>https://cdn-images-1.medium.com/fit/c/150/150/0*XyOazge8lcMGIkXX.jpg</url>
            <title>Stories by Francesco Cipollone on Medium</title>
            <link>https://medium.com/@FrankSEC42?source=rss-1cdabd7133a5------2</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Fri, 15 May 2026 15:51:30 GMT</lastBuildDate>
        <atom:link href="https://medium.com/@FrankSEC42/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[Is FaceApp stealing your identity? Let’s find it out…]]></title>
            <link>https://medium.com/@FrankSEC42/is-faceapp-stealing-your-identity-lets-find-it-out-241aa18c8402?source=rss-1cdabd7133a5------2</link>
            <guid isPermaLink="false">https://medium.com/p/241aa18c8402</guid>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[faceapp]]></category>
            <category><![CDATA[facebook]]></category>
            <category><![CDATA[privacy]]></category>
            <category><![CDATA[security]]></category>
            <dc:creator><![CDATA[Francesco Cipollone]]></dc:creator>
            <pubDate>Thu, 18 Jul 2019 19:02:27 GMT</pubDate>
            <atom:updated>2019-07-29T12:37:39.211Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/359/0*tdEb28UOs9AvFovv" /><figcaption>Credit the face app</figcaption></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/359/0*8KYLt1Hrosr8BX1g" /><figcaption>Credit the face app</figcaption></figure><p>Credit the face app</p><p>Is your social media feed full of old people? Are we turning into a dystopia a la ‘Walking Dead’ where everyone is ageing quickly?</p><p>No, it’s the latest epidemic called FaceApp</p><p>I’m a bit concerned about the massive rise in popularity of such an app and it has nothing to do with what my older self looks like.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*Ldr4Ml_hmHn8Ault" /><figcaption>credit Twitter Gordon Ramsay</figcaption></figure><p>The list of people using the face app includes a vast array of famous personalities, including Gordon Ramsay as above. I have refrained from downloading and using the app, as it sounds rather dubious.</p><p>The app uses artificial intelligence to change your photos — changing them so that users look younger or older, or swapping their genders. It also lets you remove facial hair, change your hairstyle or add makeup.</p><p>It might seem quite appealing to download a free trial of an app, but you have to ask what’s hidden behind a free service? The answer is you and your data, in this case, the use of your face. So I went through the T&amp;C and guess what? They can do whatever they want with your data.</p><p>Update 29/7/19</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/563/1*TP34_b9wD5eUOndqNrTGGQ@2x.jpeg" /></figure><p>Credit The hacker news</p><p>New ‘feature’ now enables you to download your picture for ‘free’ but in exchange it request unnecessarily request access to the contacts and request to authenticate with facebook account</p><p>This has been confirmed also by the well known security website The hacker news:</p><p>https://thehackernews.com/2019/07/faceapp-facebook-privacy.html?m=1</p><p>What does this mean? Fundamentally giving access to the app the right to authenticate using the Facebook token and gather information on your friends.</p><p>This create a list of profiles and a map of facebook in all effect providing invaluable insight in any intelligence service or product analytics.</p><p>Apparently the feature was supposed to support a feature called “social Stylyst” that now is disabled…but what do you know…the app still request the collection of users</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/442/0*OPOugMDZPbu18r-D" /></figure><p>Even more concerning is that the app has been created and launched by Russian firm <a href="https://theglobepost.com/2019/07/17/faceapp-russia-wireless-lab/">Wireless Lab.</a> Russia is renowned for adopting <a href="https://en.m.wikipedia.org/wiki/Hybrid_warfare">hybrid warfare</a>, which is the practice of using non-conventional weapons, like information and cyberspace, also known as the internet, to destabilise a country.</p><p>Another issue surrounding the app has been on the charges.</p><p>People are being charged the full annual charge on sign up — as they failed to honour the three-day free trial is offered. There is now no response to complaints and no refunds being issued.</p><p>This has sparked a huge debate online with articles on any significant outlets, including the likes of <a href="https://techcrunch.com/2019/07/16/ai-photo-editor-faceapp-goes-viral-again-on-ios-raises-questions-about-photo-library-access-and-clo/">TechCrunch</a>.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*3ZL1eyFV10L9e7r3" /></figure><h3>Dangerous Terms and Conditions</h3><p>The real danger of using such an app is in the subtle (or not so subtle)terms and conditions.</p><p><strong>Let me point out section 5 of the FaceApp t’s and c’s: use, reproduce, modify and adapt user content and media… in a nutshell, you are saying ‘here is my face do whatever you want with it’.</strong></p><p>You grant FaceApp a perpetual, irrevocable, nonexclusive, royalty-free, worldwide, fully-paid, transferable sub-licensable license to use, reproduce, modify, adapt, publish, translate, create derivative works from, distribute, publicly perform and display your User Content and any name, username or likeness provided in connection with your User Content in all media formats and channels now known or later developed, without compensation to you. When you post or otherwise share User Content on or through our Services, you understand that your User Content and any associated information (such as your [username], location or profile photo) will be visible to the public.</p><p>WOW…..</p><p>For a full list of the scary T&amp;C refer to <a href="https://faceapp.com/terms">https://faceapp.com/terms</a></p><p>But you don’t have to listen to my warnings, I’m no lawyer, but hopefully, you will trust a real one.</p><p>Tiffany Li, a technology attorney and legal scholar, who is a Postdoctoral Fellow at Yale Law School’s Information Society Project, said users should also be worried about the overall privacy protection model.</p><p>“Stop using FaceApp because there are no controls on how your face data is used. But also — walking around anywhere can get your face included in facial recognition databases. So … stop going outside? This privacy protection model doesn’t work,” she wrote on Twitter.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/706/0*IIsQ4A6aFN29b7zg" /></figure><p>Tiffany and Tech crunch are not the only ones complaining about the app publicly. Lisa Ventura, recent winner of Cybersecurity woman of the year, raise the awareness on the community</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*6Z37LXwty2SpnFTN" /></figure><p>All of this also throws up the issue of informed consent. Terms and conditions are commonly littered with such legal jargon that no one reads them, and as security professionals, we should all do more on informed consent and have a set of principles to inform the users on what their data will be used for, in clear terms anyone can understand.</p><h3>So should you use it?</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/397/0*SdvLP20mXhRANYbg" /><figcaption>credit the face app</figcaption></figure><p>I’d say no if you care about your face and your data!</p><p>Using AI to alter human faces is a well-known research method, and according to an <a href="https://www.ieee.org/">IEEE</a> research <a href="https://arxiv.org/abs/1901.07528.pdf">paper</a> this, typically, boils down two techniques</p><ul><li>Either having an algorithm to analyse pairs of images where a person differs in age,</li><li>Showing algorithm pictures of younger people and pictures of older people to identify similarities that are independent of a person’s identity.</li></ul><p>Looking at FaceApp’s creations, the app tends to whiten hair, add wrinkles and jowls, and redden the skin.</p><p>But the <a href="https://www.groundai.com/project/longitudinal-face-aging-in-the-wild-recent-deep-learning-approaches/1">age database</a> with millions of pictures already exists…the problem with that database is the T’s &amp; C’s does not consent for re-using or changing the image…</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*xGOXOYXdfLzmzTJz" /><figcaption>NBC News Article on IBM</figcaption></figure><p>Earlier this year, an <a href="https://www.nbcnews.com/tech/internet/facial-recognition-s-dirty-little-secret-millions-online-photos-scraped-n981921">NBC</a> News report detailed how IBM created a facial recognition dataset of more than a million people by scraping publicly available images.</p><p>If I’m honest sharing pictures on Instagram and Facebook is not that much different…</p><p>Facebook says in its usage policies that it uses and can similarly modify your data.</p><p>Facebook and Instagram are even more explicit in its privacy policy: “We use the information we have (including from research partners we collaborate with) to conduct and support research and innovation on topics of general social welfare, technological advancement, public interest, health, and well-being.”</p><p>Nonetheless, Facebook and FaceApp are very different in principle and nature. One is a shady, operating company, with shifting and dubious privacy policies and intent, under scrutiny from all media and the other is a Russian born app called FaceApp.</p><p>As Lauren Conrad once said: “Like everybody and trust no one.”</p><p>Should you use the app? Well, I’ll let you judge by yourself, but don’t trust anyone, read the T&amp;Cs and make your call.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=241aa18c8402" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Yubico from hell — my adventure with MFA]]></title>
            <link>https://medium.com/@FrankSEC42/yubico-from-hell-my-adventure-with-mfa-8e3eb2c87cc9?source=rss-1cdabd7133a5------2</link>
            <guid isPermaLink="false">https://medium.com/p/8e3eb2c87cc9</guid>
            <category><![CDATA[yubico]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[mac]]></category>
            <category><![CDATA[hell]]></category>
            <category><![CDATA[mfa]]></category>
            <dc:creator><![CDATA[Francesco Cipollone]]></dc:creator>
            <pubDate>Mon, 15 Jul 2019 22:00:28 GMT</pubDate>
            <atom:updated>2019-07-15T22:00:28.754Z</atom:updated>
            <content:encoded><![CDATA[<h3>Yubico from hell — my adventure with MFA</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/938/0*7JgQJfiYDIr_OP6e" /><figcaption>Credit Yubico &amp; modify by myself</figcaption></figure><p>So I have adopted yubico for few days…on the browser (chrome) quite a breeze…</p><p>Have used it to authenticate on devices all good…</p><p>Hence I said why not take it to the next level? What could go wrong…</p><p>And I have to admit I failed …I failed myself and I had to hack myself back or around the yubico (from hell)</p><p>Hell everything and at the time you need it most.</p><p><strong><em>Lesson learned:</em></strong></p><p><strong><em>Always backup, have an alternative account to login and never ever trust technology.</em></strong></p><p>Also, we are not there yet with the simplicity of interaction, at least for the smart card</p><p>Note — in those situations you need hand holding of some client trough recovery step…this could be misused but nonetheless required to help onboarding people.</p><h3>The setup:</h3><blockquote>MacOS X Mojave</blockquote><blockquote>Yubico 5 USBC</blockquote><p><a href="https://support.yubico.com/support/solutions/articles/15000006478-getting-started-with-the-yubikey-on-macos">https://support.yubico.com/support/solutions/articles/15000006478-getting-started-with-the-yubikey-on-macos</a></p><h3>The Setup in detail</h3><h4>Setup yubico on the browser -&gt; <a href="https://support.google.com/accounts/answer/6103523">https://support.google.com/accounts/answer/6103523</a></h4><p>Open the Chrome browser.</p><p>Go to your<a href="https://myaccount.google.com"> Google Account</a>.</p><p>On the left navigation panel, select <strong>Security</strong>.</p><p>In the “Signing in to Google” panel, select <strong>2-Step Verification</strong>.</p><ul><li>If you haven’t set up 2-Step Verification already, select <strong>Get started</strong>. Otherwise, move on.</li></ul><p>Select <strong>Choose another option</strong></p><p><strong>Security Key</strong>.</p><p>Follow the steps to add your security key.</p><ul><li>To help you sign in if your key is lost,<a href="https://support.google.com/accounts/answer/7684753"> add recovery info and backups</a>.</li></ul><h3>2. Setup yubico for MFA</h3><ul><li>Open Terminal.</li><li>Insert your YubiKey to an available USB port on your Mac.</li><li>Run: ykpamcfg -2</li><li>If you selected the Require touch option, touch the metal contact on your YubiKey when it begins flashing.</li><li>Repeat these steps for any additional YubiKeys you wish to associate with your account.</li></ul><h3>3. Setup Yubico for screensaver (safe)</h3><ul><li>Now the Mac can be configured to require two-factor authentication for the screensaver.</li><li>Open Terminal.</li><li>Run: sudo nano /etc/pam.d/screensaver</li><li>When prompted, type your password and press <strong>Enter</strong>.</li><li>Add the line below above the account required pam_opendirectory.so line.</li><li>auth required /usr/local/lib/security/pam_yubico.so mode=challenge-response</li></ul><h3>4. Setup yubico for authentication <strong>(be careful this is painful if fails)</strong></h3><ul><li><strong>Open Terminal.</strong></li><li><strong>Run: sudo nano /etc/pam.d/authorization</strong></li><li><strong>When prompted, type your password and press Enter.</strong></li><li><strong>Add the line below above the account required pam_opendirectory.so line.</strong></li><li><strong>auth required /usr/local/lib/security/pam_yubico.so mode=challenge-response</strong></li><li><strong>Press Ctrl+X, Y, and then Enter to save the file.</strong></li></ul><h3>Notes</h3><ol><li>Failvault password is still required</li><li>Enabling the macOS Login Tool is a system-wide change and will affect all accounts on the Mac. Unlike in Linux, it is not possible in macOS to apply PAM rules to select user accounts.</li><li>If Touch ID is enabled, it will bypass the macOS Login Tool due to how Touch ID was implemented.</li></ol><h3>The Fail</h3><p>After reboot, I’ve tried to log-in with yubico…first of all didn’t work and it was not that clear that you’d need to log in with file vault (of course disk is encrypted)</p><p>Once at the login screen was not prompted for a PIN when using the yubico and the certificate/key injected was not working.</p><h4>The panic</h4><h4>So what do I do?</h4><ul><li>Try credentials without the yubico (does not work due to the sequence of authentication and authorization)</li><li>Reboot and reset password — not working</li><li>Reboot and try a soft reset or reboot in user mode (command+s) — not working (thank god for file vault…or not in this case) — <a href="https://support.apple.com/en-gb/HT201573">https://support.apple.com/en-gb/HT201573</a></li><li>Hard reset (command+r) not working again — need to mount the disk…somehow the password was desync. <a href="https://support.apple.com/en-gb/HT201314">https://support.apple.com/en-gb/HT201314</a></li><li>Despair</li><li>Cry</li></ul><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fw.soundcloud.com%2Fplayer%2F%3Furl%3Dhttps%253A%252F%252Fapi.soundcloud.com%252Ftracks%252F95813642%26show_artwork%3Dtrue&amp;url=https%3A%2F%2Fsoundcloud.com%2Funcle-zygote%2Fbaby-do-cry-1-sound-fx&amp;image=http%3A%2F%2Fi1.sndcdn.com%2Fartworks-000049980421-svx5of-t500x500.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=soundcloud" width="800" height="166" frameborder="0" scrolling="no"><a href="https://medium.com/media/9f12463f15c94ee66b215ac54fdd45ef/href">https://medium.com/media/9f12463f15c94ee66b215ac54fdd45ef/href</a></iframe><ul><li>Call for a miracle</li></ul><p>I Started hearing this:</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fw.soundcloud.com%2Fplayer%2F%3Furl%3Dhttps%253A%252F%252Fapi.soundcloud.com%252Ftracks%252F58093219%26show_artwork%3Dtrue&amp;url=https%3A%2F%2Fsoundcloud.com%2Fvirtuosoclassics%2Fmozart-requiem-dies-irae-1&amp;image=http%3A%2F%2Fi1.sndcdn.com%2Fartworks-000029393318-8end55-t500x500.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=soundcloud" width="800" height="166" frameborder="0" scrolling="no"><a href="https://medium.com/media/841292767024b43235182d907a9a3f98/href">https://medium.com/media/841292767024b43235182d907a9a3f98/href</a></iframe><ul><li>Reset Credentials (with icloud) — not working</li><li>Resort to backup Time Capsule … frantically trying to find back the credentials and failed multiple times. Emergency reset of the network drive</li><li>After I’ve managed to get access to my network drive there was no backup</li><li>At this point I really was hoping someone would walk in and wake me up…</li><li>Ok no panic…i have to hack me back into working</li></ul><h3>Hacking myself back…or around yubico</h3><ul><li>Enable SSH daemon from command + r</li><li>Enable shell</li><li>Mount Disk (need to know the password) and unencrypted</li><li>gain back root</li><li>Mount the drive (from graphic or command prompt mount -rw drive name)</li><li>Navigate into the drive (cd. cd /Volumes/drive/etc…)</li><li>Modify back the auth and authorization files</li><li><strong>sudo vim </strong>/Volumes/<em>drive</em><strong>/etc/pam.d/authorization (nano does not work in recovery mode) — where the drive is the name of your drive</strong></li><li><strong>Remove the line below:</strong></li><li><strong>auth required /usr/local/lib/security/pam_yubico.so mode=challenge-response</strong></li><li>Modify back the auth for screensaver files</li><li><strong>sudo vim </strong>sudo vim /Volumes/<em>drive</em>/etc/pam.d/screensaver<strong> (nano does not work in recovery mode) — where the drive is the name of your drive</strong></li><li><strong>Remove the line below:</strong></li><li><strong>auth required /usr/local/lib/security/pam_yubico.so mode=challenge-response</strong></li><li>Reboot</li><li>Login with reset credentials</li></ul><p>Cry for joy, drink whiskey, be marry</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fw.soundcloud.com%2Fplayer%2F%3Furl%3Dhttps%253A%252F%252Fapi.soundcloud.com%252Ftracks%252F72293253%26show_artwork%3Dtrue&amp;url=https%3A%2F%2Fsoundcloud.com%2Ftamasborbely%2Fhallelujah-leonard-cohen&amp;image=http%3A%2F%2Fi1.sndcdn.com%2Fartworks-000036810253-p5f1z1-t500x500.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=soundcloud" width="800" height="166" frameborder="0" scrolling="no"><a href="https://medium.com/media/949ba637790ce197db95c8e13145a1f2/href">https://medium.com/media/949ba637790ce197db95c8e13145a1f2/href</a></iframe><h3>The lesson:</h3><ul><li>Keep the drive encrypted is more difficult to go around the password reset</li><li>There are multiple ways around yubico but you still need to know some of the credentials (file vault and admin)</li><li>Suggestion: Keep file vault and admin separate</li><li>The admin needs to be different from the sudoers/admin</li><li>Keep normal account not admin -&gt; sudo everything else</li><li>Keep Backup available on multiple drives on multiple locations (potentially one emergency one in geolocation separate)</li><li>Systematically backup your files with one backup option</li><li>Backup the files on cloud storage if possible</li></ul><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=8e3eb2c87cc9" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Did Google just got hacked?!]]></title>
            <link>https://medium.com/@FrankSEC42/did-google-just-got-hacked-8cb4e1037928?source=rss-1cdabd7133a5------2</link>
            <guid isPermaLink="false">https://medium.com/p/8cb4e1037928</guid>
            <category><![CDATA[google]]></category>
            <category><![CDATA[hacks]]></category>
            <category><![CDATA[cloud-computing]]></category>
            <category><![CDATA[cloud]]></category>
            <category><![CDATA[down]]></category>
            <dc:creator><![CDATA[Francesco Cipollone]]></dc:creator>
            <pubDate>Mon, 03 Jun 2019 22:05:04 GMT</pubDate>
            <atom:updated>2019-06-03T22:05:04.286Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*GHIyFGKa-cU8WkXt" /><figcaption>Credit to The Verge for the picture</figcaption></figure><p>Are you curious? is it possible? It is a potential and there is no clear statement out as we speak (2/6/19–2 PM GMT). Nonetheless, I don’t want to do another blog that slag Google… they offer a service and a bloody good one.</p><p>Think how much collaboration you get done through Gcloud, Gdocs etc… I do use it a lot and makes a brilliant writing experience across the board…</p><h3>The incident</h3><p>Now yesterday 02/06/2019 my google docs started acting up. I’ve rebooted half of the device in the house (turn it on and off anyone?), but nothing did seem to be working.</p><p>Around 9.45 PM GMT, I did go and checked the services and…holy, moly half of Google was down! Now at this point in time, it started getting hard working on a document with my team.</p><p>This made me realize how dependent my organization is on a number of easy to use services. Even having a solid plan for backup, and a fairly regular test and run I realize the alternatives were not as good. Will add some more comments and my 5 suggestion on the Backup and recovery options later.</p><ol><li>Decide how much data you want to lose</li><li>That drives the decision on how frequently you back up</li><li>Back up on a different cloud provider</li><li>Make sure you know how to access and use the other cloud provider (don’t just copy google drive documents in Dropbox)</li><li>Test the backup and recovery into google cloud once every 2–6 months depending on how risky you want to be</li></ol><h3>So what happened?</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*EK19d9EEyHX-N7Sg" /></figure><p>YouTube, Snapchat, Gmail, Nest, Discord, and a number of other web services suffered major outages in USA and Europe region.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*ZgqUb53cFHhOTuJD" /></figure><p>The root cause is still unknown and there are rumours on too much traffic….could be a nation-state hack? Could it be a misconfiguration? Could be a Hack? All is possible for now…</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*LH3S9Oogk1z6k5UH" /></figure><p>After 1 or 2 hours of frustration on google docs, I kick-started the backup plan (work on other providers and with another method). It was still possible to work on the text of the documents and extract them but was a painful experience.</p><p>I felt at this point in time the pain of the Google Operation Center</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*pyx-pxsFEDPgiJUe" /></figure><p>Speculation bingo was open and the conversation was on fire…</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*Ginn6y6jDS2mb2Jf" /></figure><p>And John did pick me up on the pool organizing a more serious one (DDoS and cert seem to be winning)…even if I’m sceptical about the DDoS as the capacity of Google datacenter is probably massive.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*nK3NRBA8qkMcxx4Q" /></figure><h3>Timeline</h3><p>Nonetheless, there was a serious issue across the board that affected all the services. This is the timeline just for google docs.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/750/0*M76Zr__4DM1DGdCK" /></figure><p>Statement from Google on <a href="https://www.theverge.com/2019/6/2/18649635/youtube-snapchat-down-outage">the verge</a>: ‘ Google’s issues started at around 3 PM ET /12 PM PT, and the company resolved them after more than four hours.’</p><p>Official statement: “high levels of network congestion in the eastern USA” for the issues. “We will conduct a post mortem and make appropriate improvements to our systems to prevent this from happening again,” says a Google spokesperson in a statement to The Verge. “We sincerely apologize to those that were impacted by today’s issues.”</p><p>Now on the facts, the service kept on working with glitches on the first hour, got really bad the second (unusable) and then annoying glitches for the other two hours…</p><p>the service was completely unusable for 2 or so hours, and very spotty for the remaining two (sometimes unusable).</p><p>I’ve invoked my Disaster Recovery plan at this point as the Business Continuity (keep on using the Google cloud with other integrated tools) was not working anymore.</p><p>I have lost some work and time since the last time I’ve backed up on another provider but not too much.</p><h3>The important of the plan</h3><p>Those are my 5 steps to have a pain free experience</p><ol><li>have a plan (continuity and disaster recovery)</li><li>test the plan regularly</li><li>do backup</li><li>test the backup regularly</li><li>Go back to 1 rinse and repeat, also update with the lesson learned</li></ol><p>When using google cloud services (drive, gdoc,…) you have two options:</p><ol><li>use the native format — this maximizes the use of collaboration services and notifications</li><li>use native Microsoft format (.docx, .ppt) and have limited functionalities but the easier method of backup</li></ol><p>Now is all good to have Business Continuity Plans but if you haven’t actually tested than they are pointless…</p><p>The testing part is not just performing a backup of your documents in some other cloud provider (this for drive/google docs) but also making sure the backups are regular, and that you actually have a way to use those backups.</p><p>Backing up from one cloud provider is not as easy it might sound and especially if you use google docs and drive sync is not always intuitive to extract document</p><p>If you want to backup your document in a usable form you’ll have to export in Microsoft format (.pptx or .docx) and then move to another cloud provider.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/926/0*xjyZfhDrYvhEteau" /></figure><p>This ensures that you will be able to open the document with MS-Word regardless of where you are.</p><p>Now if you want to be even more drastic and only work with Microsoft word in google cloud (option 2 mentioned above)</p><h3>Is all google fault if I couldn’t deliver that document in time!!!</h3><p>No, it was not, as cloud users, we shall be a bit lawyer and go through the terms and conditions of a cloud provider.</p><p>The cloud provider ensures that it will operate within certain Service Level Agreement in their Term and conditions (those lengthy legalese documents that no one reads)…</p><p><a href="https://gsuite.google.com/intl/en/terms/sla.html">https://gsuite.google.com/intl/en/terms/sla.html</a></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/750/0*OBs7fcfTfnbFPcdR" /></figure><p>Google simply will rebound you if those Service Level are breached…nonetheless you have to reflect (as an individual or more important as a business) how much downtime of service will affect you.</p><p>The Business Continuity and Disaster Recovery plan ensure exactly this. As users of a cloud provider we are responsible for putting one in place (that might account for the cloud provider one), test verify and use it at least once per year.</p><p>this leads to another one of my pet peeves: the cloud responsibility model</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*p2ntKFqNkukj2qtT" /></figure><p>With Google Gclud (docs, Gmail etc…) we are in a SaaS case. As a user of the cloud we are responsible for:</p><ul><li>Controlling the users (granting and revoking access)</li><li>Content what goes in the provider (harmful material and backup).</li><li>Overall usage (not abusing the term and conditions).</li></ul><p>There is no way out of those elements. you can delegate the responsibility of some of those but never the accountability as you, the customer, your revenues your brand will get affected.</p><p>For a more comprehensive overview of the division of responsibilities see below an extract of one of my upcoming talk: is the cloud secure? (you can find the others here <a href="https://www.nsc42.co.uk/press">NSC42 Press</a>)</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*wwm5ivgyV38zQOtx" /></figure><h3>Conclusions</h3><p>To recap what you should do to prevent those harmful events to affect you in the future?</p><ul><li>Understand the service credits</li><li>Understand the term and conditions of the cloud providers</li><li>Have an exit strategy (how to get out of a cloud provider)</li><li>Have tested disaster recovery plans and business continuity plan.</li></ul><p>Easy steps to have a piece of mind</p><ol><li>Decide how much data you want to lose</li><li>That drives the decision on how frequently you back up</li><li>Back up on a different cloud provider</li><li>Make sure you know how to access and use the other cloud provider (don’t just copy google drive documents in Dropbox)</li><li>Test the backup and recovery into google cloud once every 2–6 months depending on how risky you want to be</li></ol><p>Rinse and repeat :) and enjoy a happy cloud experience</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/882/0*DgaKbOJhHdrKd4lk" /></figure><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=8cb4e1037928" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Want to hack your life? it’s easy if you do it with books]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/nsc42/want-to-hack-your-life-its-easy-if-you-do-it-with-books-728345d3a0ea?source=rss-1cdabd7133a5------2"><img src="https://cdn-images-1.medium.com/max/970/1*7P656GiWyfozkLK6xqbkfQ.jpeg" width="970"></a></p><p class="medium-feed-snippet">Recently I got asked the question what are you reading and I&#x2019;ve noticed of late I&#x2019;ve been mostly focusing on soft skills rather than&#x2026;</p><p class="medium-feed-link"><a href="https://medium.com/nsc42/want-to-hack-your-life-its-easy-if-you-do-it-with-books-728345d3a0ea?source=rss-1cdabd7133a5------2">Continue reading on NSC42 »</a></p></div>]]></description>
            <link>https://medium.com/nsc42/want-to-hack-your-life-its-easy-if-you-do-it-with-books-728345d3a0ea?source=rss-1cdabd7133a5------2</link>
            <guid isPermaLink="false">https://medium.com/p/728345d3a0ea</guid>
            <category><![CDATA[books]]></category>
            <dc:creator><![CDATA[Francesco Cipollone]]></dc:creator>
            <pubDate>Mon, 20 May 2019 05:38:15 GMT</pubDate>
            <atom:updated>2019-06-18T07:06:44.650Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Anonymous attacks 1 Milion of israeli websites]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@FrankSEC42/nagich-plugin-compromise-4adbb99f88e1?source=rss-1cdabd7133a5------2"><img src="https://cdn-images-1.medium.com/max/862/0*mXnLC9kRLW5XGumM" width="862"></a></p><p class="medium-feed-snippet">using an unpatched vulnerability in nagaich Anonymous has defaced 1 mil Israeli websites</p><p class="medium-feed-link"><a href="https://medium.com/@FrankSEC42/nagich-plugin-compromise-4adbb99f88e1?source=rss-1cdabd7133a5------2">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@FrankSEC42/nagich-plugin-compromise-4adbb99f88e1?source=rss-1cdabd7133a5------2</link>
            <guid isPermaLink="false">https://medium.com/p/4adbb99f88e1</guid>
            <category><![CDATA[attack]]></category>
            <category><![CDATA[vulnerability]]></category>
            <category><![CDATA[dns]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[cloud]]></category>
            <dc:creator><![CDATA[Francesco Cipollone]]></dc:creator>
            <pubDate>Mon, 04 Mar 2019 12:24:29 GMT</pubDate>
            <atom:updated>2019-06-18T07:10:03.130Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[AppSec Cali 19 — Sun…Beach…Warm and infosec]]></title>
            <link>https://medium.com/nsc42/appsec-cali-19-sun-beach-warm-and-infosec-f6ca519f157d?source=rss-1cdabd7133a5------2</link>
            <guid isPermaLink="false">https://medium.com/p/f6ca519f157d</guid>
            <category><![CDATA[conference]]></category>
            <category><![CDATA[california]]></category>
            <category><![CDATA[appsec]]></category>
            <category><![CDATA[security]]></category>
            <dc:creator><![CDATA[Francesco Cipollone]]></dc:creator>
            <pubDate>Mon, 04 Feb 2019 10:06:00 GMT</pubDate>
            <atom:updated>2019-02-04T10:06:00.811Z</atom:updated>
            <content:encoded><![CDATA[<h3>AppSec Cali 19 — Sun…Beach…Warm and infosec</h3><p>The article as appears on NSC42 Blog: <a href="https://www.nsc42.co.uk/blog/appsec-cali-19-sun-beach-warm-and-infosec">https://www.nsc42.co.uk/blog/appsec-cali-19-sun-beach-warm-and-infosec</a></p><p>also on LinkdIn: <a href="https://www.linkedin.com/pulse/appsec-cali-sunbeachwarm-infosec-francesco-cipollone/">https://www.linkedin.com/pulse/appsec-cali-sunbeachwarm-infosec-francesco-cipollone/</a></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/555/0*hIgB8lWd1GVBT-Lj" /></figure><h3>About Francesco the author</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*9EGP9ZX0Zsq6bITM" /></figure><p><a href="https://www.linkedin.com/in/francesco-cipollone-5b560915">Francesco Cipollone</a> is the director <a href="https://www.nsc42.co.uk/">NSC42</a> is a public speaker and attends conferences, this year will report on Appsec California. If you’d like to hear more of this and other conferences get in touch on <a href="https://www.nsc42.co.uk/blog">NSC42 Blog</a> page, Linkedin and medium. Francesco is an active researcher and director of events for the <a href="http://www.cloudsecurityalliance.org.uk">Cloud Security Alliance</a> and part of <a href="https://www.isc2.org/">ISC2</a>.</p><p>Francesco and <a href="https://www.nsc42.co.uk/">NSC42</a> can help to improve and align your organisation security, cybersecurity strategy cloud and traditional security architecture and DEVSECOPS offering a range of dedicated consultancy, webinar, guide and other materials. Get in touch with me on <a href="https://www.linkedin.com/in/fracipo/">Linkedin</a> or via email at Francesco.cipollone @ NSC42.co.uk for collaboration or more information.</p><p>Note — most of the picture in this website are mine, but feel free to reuse them under creative common as long as the author and the article are cited.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/176/0*wEBpKhTYbW17XKhp" /></figure><p>CC licence — BY-SA — Attribution + ShareAlike</p><h3>Intro</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*JX2ok_bIsFtBC79-" /></figure><p>Picture from Appsec Cali website</p><p>What a refreshing conference….that’s, in a nutshell, was my thinking on the last day of AppSec Cali 2019 conference. Logistics were flawless, thanks to the volunteers, and the location was terrific with the Annenberg Community Beach House overlooking the Santa Monica beach and the calm “winter” Pacific Ocean. The schedule of the event was well paced and packed with exciting talks and keynote that I will briefly summarise in this article.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*1nrWOlENYH5cBZBm" /></figure><p>The view from the Santa Monica beach</p><p>Nevertheless, those are not the key things that made AppSec Cali different from other great conferences (like <a href="https://www.blackhat.com/">Black Hat</a>, <a href="https://www.defcon.org/">Defcon</a>, <a href="http://www.securitybsides.com/">BSides</a> ….).</p><p>What made the difference, aside from the climate and the view, was the small and collected nature of the conference.</p><p>Throughout the whole conference, I felt like I was amongst a group of a friend coming together and discussing ideas and collectively progressing infosec.</p><p>Maybe it was the relaxed nature of Southern California (read it as SoCal), perhaps it was the beach, but the conference has been a fantastic and relaxed way to network, discuss and share ideas with fellow Infosec professionals.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*4P0aupVgblWTYfSl" /></figure><p>Sundown from the conference center</p><h3>Call to actions:</h3><p><strong>I’d love to hear from you! Only with your feedback, we will improve infosec.</strong> Leave a comment and engage in the conversation at the bottom of this article.</p><p>This report represents my view of the conference, but I’d love to hear your opinion on the other application-specific conference. Things I’d like to hear from you:</p><ul><li><strong>What conference (Appsec and DEV) did you enjoy this year</strong></li><li><strong>What do you think of AppSec Cali or similar conference</strong></li><li><strong>How to include DEV teams into the Security discussion</strong></li></ul><p>Most of the pictures in the conference are mine, but where they are not, I’ll mention the author.</p><h3>Speakers:</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/606/0*RkdEnJGwkbRpVIUE" /></figure><p>The organizer <a href="https://www.linkedin.com/in/richardagreenberg">Richard Greenberg</a> that keeps on putting effort to improve cybersecurity in the application word by organizing events like this and <a href="https://www.eventbrite.com/e/issa-la-summit-xi-healthcare-forum-women-in-security-forum-tickets-51104191011?err=29">ISSA-LA</a></p><p>The speaker lineup was broad with a top line of speakers and subject matter experts</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*qolsSUrJka0snjVm" /></figure><p>Nonetheless, the other speaker was not less than the headline speakers.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*wnfoWpIVOWBxUQ2P" /><figcaption>Some of the other speakers</figcaption></figure><h3>The Conference:</h3><p>The bright day started with a short commute through the beach toward the convention center. The ride of choice was the Uber electric scooter due to the inclement weather … 20 degrees and sunny…</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*WxHwLFKwKagRxCqd" /></figure><p>One of the many ride options available in Santa Monica</p><p>After a short fun ride, the path to the convention center is through the Santa Monica beach skirting Pacific Coast Highway (PCH)</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*MA-bLQkwowWH6aVh" /><figcaption>Walk to the conference center</figcaption></figure><p>Richard Greenberg kicked off the conference with a nice invite to the various sponsors.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/900/0*yRwwBMesA547VQTm" /><figcaption>Opening Pitch</figcaption></figure><p>Also a gentle reminder from Richard of the OWASP core values:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*IWqmtbMBmsGt3Gwj" /></figure><p>Like any other convention, the sponsors and vendors were there but it was not intrusive, and the poolside view is a nice perk</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/900/0*A1s5yGmOeZDz2LuA" /></figure><p>Nonetheless, Richard allows time to recognize the effort and the contribution of the various sponsors/vendors.</p><p>To cite and thanks just a few sponsors: netsparker , <a href="https://appseccalifornia2019.sched.com/sponsor/shiftleft.1z1z9b00">Shiftleft</a>, <a href="https://appseccalifornia2019.sched.com/sponsor/this_could_be_your_company.jlu0dgis">Checkmark</a>, <a href="https://appseccalifornia2019.sched.com/sponsor/qualys.1yshn8dr">Qualys</a>, <a href="https://appseccalifornia2019.sched.com/directory/sponsors">and many others</a>)</p><p>After an excellent introduction from Richard, a round of talks started; I’ll offer some highlights on the one that I attended and my opinion on the one I did like the most.</p><p>A note for the folks those are purely my opinion, and my view does not represent one of my employees (yadda yadda yadda)…</p><h3>CISO Panel</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*I-DLA-DI2EfCURaj" /></figure><p>The CISO panel had two key ingredients: from startups to financials CISO as well as well seasoned CISO.</p><p>The panel was formed (left to right):</p><ul><li><a href="https://appseccalifornia2019.sched.com/speaker/bruce_phillips.1yt0vlxu">Bruce Phillips</a> SVP &amp; CISO of <a href="https://national.wfgnationaltitle.com/williston-financial/">Williston Financials</a></li><li><a href="https://appseccalifornia2019.sched.com/speaker/martin_mazor.1yuu6gdt">Martin Mazor</a> Senior VP and CISO at <a href="https://www.ep.com/">Entertainment Partners</a></li><li><a href="https://appseccalifornia2019.sched.com/speaker/shyama.rose">Shyama Rose</a> CISO at <a href="https://www.avant.com/">Avant</a></li><li><a href="https://appseccalifornia2019.sched.com/speaker/coleen11">Coleen Coolidge</a> Head of security at <a href="https://segment.com/">Segment</a></li></ul><p>The panel went on quite flawlessly explaining the modern challenges of CISOs establishing an AppSec program. The nice part of the panel is that it mixed up different genders and different organisation sizes (from well established to startups). Richard did a great job moderating and pacing the questions.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/900/0*WkgNSwWPI7OB4MjI" /></figure><p>One interesting concept that I got from the whole talk was the struggle with the DEV-SEC-OPS definition that I believe is a big dilemma those days.</p><blockquote>The DEV-OPS concept is still maturing, and the DEV-SEC-OPS is an evolution on this with a natural consequence of the DEV-BIZ-SEC-OPS. In the latter, proposed in the CISO panel, the Business becomes an integral part of the development and operational process.</blockquote><p>Also to note the nice gender balance and the effort AppSec is making to sponsor women in Cybersecurity.</p><h3>Adrienne Porter opens with the chrome improvements on web security</h3><p>2019 marked the year where half of the web pages turned HTTPs on. There is still a lot to do though.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/200/0*CYYaZiM7Kk810Jhh" /></figure><p><a href="https://twitter.com/__apf__">Adrienne Porter Felt</a> Google Engineer and manager for chrome explained the challenges faced by the public with “secure” web pages.</p><p>When HTTPs has introduced the visualisation of the page in the URL has been debated. Initially, people thought if the URLs is green, and the color green was long discussed, the page content is safe. The use of HTTPs will guarantee client-server safeties of communication not the content of the page.</p><p>Also, Google is having a series of phishing test campaign to raise the awareness and ultimately working to kill the URL (read the interesting <a href="https://www.wired.com/story/google-chrome-kill-url-first-steps/amp">wired article</a> for more info).</p><p>Nonetheless, there is an inherited perception of safeties of a page when the URL is displayed in green.</p><p>Slack had similar challenges when presenting the apps in their store (see below my take on Slack’s talk)</p><h3>Netflix and the security pizza</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/900/0*91pLKQCsh5CuN1LB" /></figure><p><a href="https://appseccalifornia2019.sched.com/speaker/will_bengtson.1yopazfd">William Bengtson</a> and <a href="https://appseccalifornia2019.sched.com/speaker/travis.mcpeak1">Travis McPeak</a> gave, in my opinion, one of the best presentations. The speech on the security layers deployed by Netflix was a step onward from the presentation William gave at Black hat 2018 on credential compromise detection.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*YegkKas6G8sCe0o6" /><figcaption>William’s Presentation at blackhat USA 2018</figcaption></figure><p>The talk had the pizza analogy, and William was wearing the “you got me at pizza” T-shirt (nice prop). The speech had the ingredient analogy for each layer of security. The speech was well paced, and the exchange between Travis and William was smooth.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*5Jsrc9lJU8oHzHsF" /></figure><p>Considering the challenges of a two-person presentation, I have to say William and Travis handled the introduction calmly and appeared well prepared on their speech.</p><p>Sorry for the speech analysis but my toastmaster club teaching nags at me sometimes.</p><p>The talk presented the various layers with the metadata proxy and the different scenario of attacks leveraging metadata.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*UHs7bNxPNAUrYTSG" /></figure><p>Another interesting topic is the temporary key issued to DEV and the privilege, sometimes higher, but with access control…Netflix almost got on AWS the <a href="https://azure.microsoft.com/en-gb/blog/just-in-time-vm-access-is-generally-available/">on-time access</a> that Azure is working on with security center.</p><p>The other layer added on top of the security pizza is the collection and reduction of roles and permission one VM has…</p><p>Last but not last the level of monitoring and alerting Netflix does is terrific. Rarely I’ve seen an organization that knows their infrastructure to the degree where they can detect so carefully when something deviates from the norm…nonetheless, this comes at a cost (and William buzzer in the middle of the night).</p><p>Aside from the structure of the talk I’ve been amazed by the level of sharing and giving back to the community Netflix is doing.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*uKyWgt4Wy-2DC3km" /></figure><h3>Flee talks about powerlifting and AppSec</h3><p>Following the CISO talk, another heavyweight in security <a href="https://appseccalifornia2019.sched.com/speaker/fredrick_flee_lee.1yjwzy4e">Frederick Lee (flee)</a> head of Information Security at Square had a flawless take on an appsec programme.</p><p>Aside from the content, that was easy to understand and well-paced; I have to say I’ve admired the talk as it was well structured. Flee introduced the topics and the key elements at the beginning, narrated them with analogies and concluded with the same themes he started with.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*HJ16lhy2nJ7ioTzX" /></figure><p>The talk had a nice touch of analogies between powerlifting, Flee passion and an AppSec Programme.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*N4NCeAh86w8bjcbM" /></figure><p>The talk revolved around the three fundamental of powerlifting and the appsec programme.</p><ul><li>Code review of the critical code (prioritize)</li><li>Training for developers that is specific to their dev language</li><li>Threat modeling of the essential applications</li></ul><p>In conclusion, a well structured AppSec program is challenging to kill (as strong people are).</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*nuCHNgMmsIurfuKf" /></figure><h3>The honesty of slack — AppStore security challenges</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*hXyAxhaodkOispgI" /><figcaption>Credit to ITSP Magazine</figcaption></figure><p><a href="https://appseccalifornia2019.sched.com/speaker/nbrandt2">Nikki Brandt</a> and <a href="https://appseccalifornia2019.sched.com/speaker/kellyann3">Kelly Ann</a> presented the problems slack security had in introducing the apps to the AppStore.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*5e7876ywSxX8b5ve" /></figure><p>Like any other startup, there are some challenges in security and the balance an organization at the inception has to have when doing pentest or bug bounty</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*zSceCJXMxARKGC93" /></figure><p>Nonetheless, there is an inherited “trust” of people when selecting an app in a store part of your application…</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*Dj6GzAaKyddY85ji" /></figure><p>Despite the best disclaimer that might impact the brand of slack and there was no solution yet…but they are getting there</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*D4yJ7bxuTm-YBOS_" /></figure><p>Despite the closure on the uncertain note, I appreciate the honesty of the talk and the challenges faced.</p><h3>Closing Day 1 with Bryan on what improves in appsec</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/320/0*b-cxckeI7zlraoTb" /></figure><p><a href="https://appseccalifornia2019.sched.com/speaker/bryan_payne.1yktjwpo">Bryan Payne</a> <a href="https://twitter.com/bdpsecurity/status/992194149628575745?lang=en">@bdpsecurity</a>, Netflix’s director of Engineering, Product &amp; Application Security, delivered a remarkable closing note on the history of application security and the learnings.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*kyzJXmUalPmq6Ot7" /></figure><p>Netflix has given a lot in this conference, and each talk was polished, well presented and gave something back to the community.</p><p>So we keep on making the same mistakes as we were doing a long time ago…and for one reason, the basic stuff is also the hardest to implement…</p><p>Nonetheless, Bryan has given us a few essential items that did work in the past and will keep on improving in the future.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*Cr6W-FdYUtcGMJG1" /></figure><p>The two most important is learning from mistakes… better and sharing the knowledge with the community (one of the critical thing Netflix does brilliantly)</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*YgpYQ2qkmICltLLW" /></figure><p>The other important one was improving fixes to the code, and with this Bryan stressed a pragmatic approach to the code: you can’t fix and review it all so prioritize the fixes what is vital and critical.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*KgoE43zNzaix_BRL" /></figure><p>Also, Bryan shared few open source tool that can make the code review an easier job. One open source project mentioned was <a href="https://spiffe.io/spiffe/">SPIFFE</a> : a set of open-source standards for securely identifying software systems in dynamic and heterogeneous environments.</p><h3>Threat Modeling and the game of infosec</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*xq6IjkR4hRiUbuar" /></figure><p>Aside from the Capture The Flag (CTF) I’ve also appreciated the talk on threat modeling and the idea of gamification introduced into the threat modeling.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*OX7pVSjsHcmRZS4W" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*ISWbFjNgAsKNIwEg" /></figure><p>Ultimately some process that could end up being complicated and difficult like threat modeling could be turned into something fun with a card game.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*iKqi6vSxnUVfGJ7b" /></figure><h3>AppSec and CTF lots of other talks in appsec Cali</h3><p>Aside from the main talks, appsec Cali had CTF and pentest basic open to all the skill set.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*F6sWDR5prisG49_K" /></figure><p>Most important the conference and the training were oriented to Infosec people but most importantly to DEV.</p><p>The whole effort is to improve the overall security in the development process.</p><p>Others talks have been remarkable but will just mention them:</p><h3>The vulnerability management from a Security PM Prospective</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*flCsBSvjieN7Xs3g" /></figure><p><a href="https://appseccalifornia2019.sched.com/speaker/anassar?iframe=yes&amp;w=100%&amp;sidebar=yes&amp;bg=no">Alexandra Nassar</a> and Harshil Parikh (absent) walks us through the challenges of security in an organization that perceives security as a blocker. Also how perks personalization (the logo is her creation) and the branding can massively help an appsec programme.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*JcMU8KEIYpWtl_Je" /></figure><h3>William from Netflix on Identifying lost keys in the cloud</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*HsxyTLlODLXXw6YC" /></figure><p>William has delivered once again the overview of how to prevent AWS credentials exfiltration</p><h3>Closing Speech from Jim Manico</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*9tb5-kgGaUbnjDku" /></figure><p><a href="https://appseccalifornia2019.sched.com/speaker/jim245">Jim Manico</a> founder of Manicode Security is a well known and respected contributor to the OWASP chapter. Jim delivered the closing talk of the second day with the history of application security.</p><p>The stage presence and the way Jim talks about application security is amazing and shows what a seasoned developer, and most crucial security-oriented developer he is.</p><p>Also, he is funny and solid tough out the talk.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*Wzml-ohpBB8DeQav" /></figure><p>Jim has become kind of a rockstar with people asking to take a picture with him (photo taken for Daniel <a href="https://twitter.com/danielblqz?lang=en">@danielblqz</a>)</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*Cn9pyiKrzcu-9tJF" /></figure><h3>Conclusions</h3><p>Appsec Cali 19 has been a refreshing conference and will definitely come back and possibly send across a Call For Paper next year.</p><p>The conference would have never happened without the effort of all the volunteers and Richard stringing it up</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*hGQImPohgLoZMLoj" /><figcaption>Picture from Appsec Cali Twitter</figcaption></figure><p>Aside from the environment, the climate, the people I’ve appreciate the effort that the OWASP chapter and the fellow infosec people have put into improving the overall quality of the code by bringing the DEV community closer to the SEC community.</p><blockquote>The DEV-OPS concept is still maturing, and the DEV-SEC-OPS is an evolution on this with a natural consequence of the DEV-BIZ-SEC-OPS. In the latter, proposed in the CISO panel, the Business becomes an integral part of the development and operational process.</blockquote><p>Aside from everything Santa Monica is a fantastic place for conference and overall for the viewers and will come back for more INFOSEC in Santa Monica (see you at <a href="https://www.eventbrite.com/e/issa-la-summit-xi-ciso-forum-tickets-52975929431">ISSA XI</a> in May)</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/882/0*0-KjwR65K-va5yl6" /></figure><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=f6ca519f157d" width="1" height="1" alt=""><hr><p><a href="https://medium.com/nsc42/appsec-cali-19-sun-beach-warm-and-infosec-f6ca519f157d">AppSec Cali 19 — Sun…Beach…Warm and infosec</a> was originally published in <a href="https://medium.com/nsc42">NSC42</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[IE Emergency patch — Patch Under-Attack IE Zero Day]]></title>
            <link>https://medium.com/nsc42/ie-emergency-patch-patch-under-attack-ie-zero-day-d684a623eabc?source=rss-1cdabd7133a5------2</link>
            <guid isPermaLink="false">https://medium.com/p/d684a623eabc</guid>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[microsoft]]></category>
            <category><![CDATA[security-vulnerabilities]]></category>
            <category><![CDATA[internet-explorer]]></category>
            <dc:creator><![CDATA[Francesco Cipollone]]></dc:creator>
            <pubDate>Thu, 20 Dec 2018 09:28:00 GMT</pubDate>
            <atom:updated>2018-12-22T15:03:15.271Z</atom:updated>
            <content:encoded><![CDATA[<h3>IE Emergency patch — Patch Under-Attack IE Zero Day</h3><p><strong>Reported</strong>: <a href="https://twitter.com/_clem1">Clement Lecigne</a> of Google’s Threat Analysis Group</p><p><strong>Category</strong>: Microsoft/IE/RCE</p><p><strong>Date</strong>: 19/12/2018</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1000/0*Q32KuKnwPpuE6e-N" /></figure><h3>Overview:</h3><p>Microsoft has released an emergency security update to patch an Internet Explorer (IE) critical zero-day vulnerability.</p><p>Discovered by researcher <a href="https://twitter.com/_clem1">Clement Lecigne</a> of Google’s Threat Analysis Group. <br>The vulnerability tracked as vulnerability tracked as CVE-2018–8653 is a remote code execution (RCE) flaw in the IE browser’s scripting engine.</p><h3>Patches</h3><p>The patch for this vulnerability is available on the <a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8653">Microsoft Website</a>.</p><p>The vulnerability comes after the following zero days (that can be chained together previous zero-days (CVE-2018–8611, CVE-2018–8589, CVE-2018–8453, CVE-2018–8440). You can manually download these updates via the <a href="https://catalog.update.microsoft.com/">Microsoft Catalog website</a>.</p><h3>Mitigation</h3><p>Patching is always the best method to fix the vulnerability.</p><p>Users who can’t immediately patch, not recommended, can mitigate the threat by restricting access to the jscript.dll file by running following command in the command prompt using admin privileges.</p><ul><li>For 32-bit System — cacls %windir%\system32\jscript.dll /E /P everyone:N</li><li>For 64-bit System — cacls %windir%\syswow64\jscript.dll /E /P everyone:N</li></ul><p>The above command will force the web browser to use Jscript9.dll and but any website that relies on Jscript.dll will fail to render. <br>The above is just temporary mitigation and the patching the application remains best practice</p><h3>Vulnerability Details</h3><p>The vulnerability affects the following installations of IE: Internet Explorer 11 from Windows 7 to Windows 10 as well as Windows Server 2012, 2016 and 2019; IE 9 on Windows Server 2008; and IE 10 on Windows Server 2012.</p><p>An unspecified memory corruption vulnerability, as per the advisory, resides in the scripting engine JScript component of Microsoft Internet Explorer. This engine is deemed to handle execution of scripting languages.</p><p>If exploited successfully, the vulnerability could allow attackers to execute arbitrary code in the context of the current user.<br>The vulnerability is even more dangerous if an attacker can chain previous zero days vulnerabilities (as consequences of unpatched IE).</p><p>Microsoft has realised patches for four other zero-days. Exploiting all these zero-days will result in “<a href="https://en.wikipedia.org/wiki/Privilege_escalation">elevation of privilege</a>.”</p><p>This means that if a victim has missed any of the previous four Windows Patch Tuesday patches, an attacker can chain the IE zero-day with one of the earlier zero-days (CVE-2018–8611, CVE-2018–8589, CVE-2018–8453, CVE-2018–8440) to gain SYSTEM-level access, and immediately take over a targeted computer.</p><p>You can manually download these updates via the <a href="https://catalog.update.microsoft.com/">Microsoft Catalog website</a>.</p><p>Even worse if the user is logged on with administrative privileges, in fact, the attacker can piggyback on the user rights, by exploiting the vulnerability, escalate privileges and could potentially take control of an affected system. As a consequence of this the attacker can deploy payloads with more malware, install shell, view, change, or delete data; ultimately for persistence, the attacker can create new accounts with full administrative privileges (as per the advisory).</p><p>Besides the above exploit, an attacker can also target victims by convincing them into viewing a specially crafted HTML document (e.g., a web page or an email attachment), MS Office document, PDF file or any other document that supports embedded IE scripting engine content.</p><p>Despite the fact that the exploit available in the wild Neither Google nor Microsoft has yet publicly disclosed any technical details about the IE zero-day vulnerability.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=d684a623eabc" width="1" height="1" alt=""><hr><p><a href="https://medium.com/nsc42/ie-emergency-patch-patch-under-attack-ie-zero-day-d684a623eabc">IE Emergency patch — Patch Under-Attack IE Zero Day</a> was originally published in <a href="https://medium.com/nsc42">NSC42</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[What is CoAP and is it the next DDoS for IoT]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/nsc42/what-is-coap-and-is-it-the-next-ddos-for-iot-de8ee97e57e6?source=rss-1cdabd7133a5------2"><img src="https://cdn-images-1.medium.com/max/1000/1*Y274fZXB7dCIeBSUk1dhbA.jpeg" width="1000"></a></p><p class="medium-feed-snippet">Weaponizing IoT new protocol CoAP for DDoS</p><p class="medium-feed-link"><a href="https://medium.com/nsc42/what-is-coap-and-is-it-the-next-ddos-for-iot-de8ee97e57e6?source=rss-1cdabd7133a5------2">Continue reading on NSC42 »</a></p></div>]]></description>
            <link>https://medium.com/nsc42/what-is-coap-and-is-it-the-next-ddos-for-iot-de8ee97e57e6?source=rss-1cdabd7133a5------2</link>
            <guid isPermaLink="false">https://medium.com/p/de8ee97e57e6</guid>
            <category><![CDATA[iot]]></category>
            <category><![CDATA[security-vulnerabilities]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[internet]]></category>
            <category><![CDATA[ddos]]></category>
            <dc:creator><![CDATA[Francesco Cipollone]]></dc:creator>
            <pubDate>Tue, 11 Dec 2018 22:20:27 GMT</pubDate>
            <atom:updated>2018-12-22T15:12:38.058Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[What did I learn from running and how can I apply this to the business ideas]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/nsc42/what-did-i-learn-from-running-and-how-can-i-apply-this-to-the-business-ideas-84e955ed457c?source=rss-1cdabd7133a5------2"><img src="https://cdn-images-1.medium.com/max/2000/1*1ZY4VFOvr4RAkj8jAH073A.jpeg" width="2000"></a></p><p class="medium-feed-snippet">Photo by kinkate from Pexels</p><p class="medium-feed-link"><a href="https://medium.com/nsc42/what-did-i-learn-from-running-and-how-can-i-apply-this-to-the-business-ideas-84e955ed457c?source=rss-1cdabd7133a5------2">Continue reading on NSC42 »</a></p></div>]]></description>
            <link>https://medium.com/nsc42/what-did-i-learn-from-running-and-how-can-i-apply-this-to-the-business-ideas-84e955ed457c?source=rss-1cdabd7133a5------2</link>
            <guid isPermaLink="false">https://medium.com/p/84e955ed457c</guid>
            <category><![CDATA[failure]]></category>
            <category><![CDATA[running]]></category>
            <category><![CDATA[life-lessons]]></category>
            <category><![CDATA[fail]]></category>
            <category><![CDATA[entrepreneurship]]></category>
            <dc:creator><![CDATA[Francesco Cipollone]]></dc:creator>
            <pubDate>Sun, 28 Oct 2018 20:03:53 GMT</pubDate>
            <atom:updated>2018-12-22T15:40:57.669Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Keeping productivity up during busy periods]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/nsc42/intro-f6e499c7f089?source=rss-1cdabd7133a5------2"><img src="https://cdn-images-1.medium.com/max/2600/1*pdyQJ6wIgt5The15sGs0Rw@2x.jpeg" width="4032"></a></p><p class="medium-feed-snippet">Intro</p><p class="medium-feed-link"><a href="https://medium.com/nsc42/intro-f6e499c7f089?source=rss-1cdabd7133a5------2">Continue reading on NSC42 »</a></p></div>]]></description>
            <link>https://medium.com/nsc42/intro-f6e499c7f089?source=rss-1cdabd7133a5------2</link>
            <guid isPermaLink="false">https://medium.com/p/f6e499c7f089</guid>
            <category><![CDATA[technology]]></category>
            <category><![CDATA[productivity]]></category>
            <category><![CDATA[information-technology]]></category>
            <category><![CDATA[tips]]></category>
            <category><![CDATA[information-security]]></category>
            <dc:creator><![CDATA[Francesco Cipollone]]></dc:creator>
            <pubDate>Wed, 10 Oct 2018 09:27:29 GMT</pubDate>
            <atom:updated>2019-08-27T15:01:09.244Z</atom:updated>
        </item>
    </channel>
</rss>