YusufOnSecurity.com

160 - The Hidden Risks of Default Configurations - Part 2


Listen Later

Enjoying the content? Let us know your feedback!

In this episode, we are continuing with part 2 of the risks paused by default configuration. As I said last week, while default config is convenient for initial setup, these  settings are may introduce significant security risks that can leave systems vulnerable to exploitation by malicious actors.  Please listen to the first episode before you listen to this episode. That way you will get the background and full context of the topic.

  • Well intended Network Traversal Tool is Being Abused for malicious gain. Where have we seen that beofore
  • Law enforcement from the UK and others disrupt Lockbit Ransomware group infrastructure


Having said that, lets turn to a couple of top trending news this week and they are:

- https://joshua.hu: SSH-Snake SSH network traversal discover SSH private keys network graph
- https://www.nationalcrimeagency.gov.uk/ NCA leads international investigation targeting worlds most harmful ransomware group
- https://www.chainalysis.com: LockBit takedown sanctions

Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.

...more
View all episodesView all episodes
Download on the App Store

YusufOnSecurity.comBy YusufOnSecurity.Com


More shows like YusufOnSecurity.com

View all
The Daily by The New York Times

The Daily

112,408 Listeners