Cyber Security Weekly Podcast

Episode 64 - Secure Application Access, DDoS & WPAD - Akamai's move to secure the modern enterprise with a modern approach


Listen Later

An insightful discussion with Akamai’s Fernando Serto, Head of Security Technology & Strategy and James Tin, Principal Enterprise Security Architect each working in the Asia Pacific & Japan region. Following Fernando’s Summit presentation – ‘Securing the modern enterprise with a modern approach’, Fernando outlines Akamai's enterprise security solutions, with a focus on secure application access. We also discuss the Akamai 2018 State of the Internet Report, dive into current trends around Web Proxy Auto-Discovery (WPAD), Distributed Denial of Service (DDoS) and enterprise security architecture requirements.
WPAD is a protocol that allows computers in a local network to automatically discover which web proxy they should use. The web proxy is defined through a JavaScript file called proxy auto-config (PAC). The risk posed by the WPAD protocol is that attackers can abuse it to discover the location of the PAC file on a local machine. With this information, attackers can then replace it with an “alternative” PAC file, which specifies a rogue web proxy address under the attacker’s control. When that occurs, all communication from the device can be intercepted and modified (including encrypted HTTPS traffic). In other words, WPAD opens the door for a Man-in-the-Middle attack.
2018 State of the Internet-Security (https://www.asiapacificsecuritymagazine.com/akamais-state-of-the-internet-security-carrier-insight-report-highlights-the-importance-of-information-sharing-in-battle-against-cyber-threats/)Report (https://www.asiapacificsecuritymagazine.com/akamais-state-of-the-internet-security-carrier-insight-report-highlights-the-importance-of-information-sharing-in-battle-against-cyber-threats/) highlights:
* The report analysed data from more than 14 trillion DNS queries collected by Akamai between September 2017 and February 2018 from communications service provider (CSP) networks around the world.
* “Javascript Cryptominers: A Shady Business Model” - Akamai observed two distinct business models for large-scale crypto-mining, one of them that uses code embedded into content sites that make devices that visit the site work for the cryptomine.
* Malware authors are branching out to the collection of social media logins in addition to financial information - Terdot, a branch of the Zeus botnet, creates a local proxy and enables attackers to perform cyber-espionage and promote fake news in the victim’s browser.
* The Lopai botnet is an example of how botnet authors are creating more flexible tools - This mobile malware mainly targets Android devices and uses a modular approach that allows owners to create updates with new capabilities.
Recorded at the Cyber Threat Intelligence Summit 2018, Grace Hotel, Sydney 3 May 2018 #CTI2018
...more
View all episodesView all episodes
Download on the App Store

Cyber Security Weekly PodcastBy MySecurity Media

  • 3.9
  • 3.9
  • 3.9
  • 3.9
  • 3.9

3.9

19 ratings


More shows like Cyber Security Weekly Podcast

View all
Security Now (Audio) by TWiT

Security Now (Audio)

1,979 Listeners

Risky Business by Patrick Gray

Risky Business

365 Listeners

Future Tense by ABC listen

Future Tense

73 Listeners

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

366 Listeners

Politics Now by ABC listen

Politics Now

104 Listeners

Smashing Security by Graham Cluley & Carole Theriault

Smashing Security

312 Listeners

Click Here by Recorded Future News

Click Here

413 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

7,879 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

166 Listeners

If You're Listening by ABC listen

If You're Listening

313 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

189 Listeners

Hacking Humans by N2K Networks

Hacking Humans

314 Listeners

A Bit of Optimism by Simon Sinek

A Bit of Optimism

2,190 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

127 Listeners

The TED AI Show by TED

The TED AI Show

46 Listeners