hachyderm.io is one of the many independent Mastodon servers you can use to participate in the fediverse.
Hachyderm is a safe space, LGBTQIA+ and BLM, primarily comprised of tech industry professionals world wide. Note that many non-user account types have restrictions - please see our About page.

Administered by:

Server stats:

9.6K
active users

#bluehat

0 posts0 participants0 posts today
Replied in thread

@cryptax I'm very interested in this topic. I have two (ZScaler and CrowdStrike). CS said: "can't fix; that's just how it works" and ZScaler quietly fixed it over a weekend. Thanks, I guess?

But both of these vendor issues could be present in other EDRs and proxies. Not like I have access to S1, Cortex, Defender and Netskope.

New to this coordinated disclosure thing. But going to #bluehat helped.

Thrilled to share my BlueHat keynote is now live! 🎤

"A Clash of Cultures Comes Together to Change Software" dives into how early hacker groups like the L0pht began collaborating with tech companies, reshaping software security.

Watch here: youtube.com/watch?v=w6SAqT4ZQi

Something quite wonderful occurred at #bluehat 2024.

Caught up with a former mentee I worked with on getting their #OSCP. They shared they are now in a masters program and doing amazing things at work, and loving it. This lit up my heart and sparkles.

Helping others achieve their goals and reach for things they might not have, is an honor and a privilege to be a part of.

Needless to say.. an excellent time at #bluehat. Great to reconnect with good humans, some good content, and a whole heap of recharging my hacker heart.

Jason Haddix, former CISO of Ubisoft, shared tremendous lessons-learned from his own experience and those of his network hit by #Lapsus$ at Microsoft's #BlueHat conference.

These attackers focused on creds and cookies sold on the dark web on sites such as Genesis, then purposely avoided EDR by targeting web-based apps such as Slack and Confluence. They bypassed authentication controls with the end goal of VPN access.

Lessons learned:
- Add mitigation controls for stolen creds and cookies including shortening session length, monitoring dark market sales, and adding a bug bounty for leaked creds.
- Add a team for secrets management: "You definitely have hard-coded creds somewhere in your network."
- Additional authentication controls such as tighter impossible travel settings and maps showing geographic location of login requests
- Set up jump hosts and network segmentation to access infrastructure and security products