- Reasonable Application Security
- Posts
- Reasonable ๐AppSec #63 - Slip and Fall, Five Security Articles and Podcast Corner
Reasonable ๐AppSec #63 - Slip and Fall, Five Security Articles and Podcast Corner
A review of application security happenings and industry news from Chris Romeo.
Hey there,
In this weekโs issue, please enjoy the following:
Five security articles ๐ฐ that are worth YOUR time
Featured focus: Slip and Fall
Application Security Podcast ๐๏ธCorner
Where to find Chris? ๐
Five Security Articles ๐ฐ that Are Worth YOUR Time
Smashing Runtime Application Self-Protection (RASP) โ This post explores why RASP, or Runtime Application Self-Protection, cannot always protect your Java applications and can be bypassed. [RASP has been a hot topic for the past few years, and I think of it as something cutting edge for an AppSec program. This one caught my attention as it posits that perhaps RASP is not as strong as the market believes.]
How a North Korean Fake IT Worker Tried to Infiltrate Us โ A North Korean agent attempted to infiltrate KnowBe4 by posing as a legitimate IT worker with a stolen identity and AI-enhanced photo. Still, the scheme was detected when malware was found on the employee's device. [This scenario happens more than anyone thinks โ interview well and check those references!]
Bitdefender Vulnerability Let Attackers Trigger SSRF Attacks โ A critical vulnerability in Bitdefender's GravityZone Update Server, identified as CVE-2024-6980, could allow attackers to execute server-side request forgery (SSRF) attacks, posing significant risks to affected systems. [SSRF is still up and coming, so I added this article as a case study into what SSRF looks like in the real world.]
Anyone can Access Deleted and Private Repository Data on GitHub โ GitHub repositories, including deleted and private ones, can still access their data through forks, posing a significant security risk by allowing unauthorized access to sensitive information. [Architecture is important, and a flaw like this is architectural, as a design decision that allowed this to happen was made somewhere in the past.]
Why are vulnerabilities out of control in 2024? โ Vulnerabilities are surging in 2024 due to the collapse of NVD, an overwhelming number of Linux kernel CVE IDs, and insufficient resources to handle the growing volume of open-source software issues. [Is there anything different for 2024? Vulns have been consistently reported for as long as I can remember.]
Featured Focus: Slip and Fall
Last week, I was out walking my dog. I believe in threat modeling and encourage people to do it for everything they do, whether building software or going on vacation. Threat modeling has a role in every situation.
Here is how the story goes โ Iโm walking down the sidewalk, not paying attention, enjoying my morning walk with my dog. Tropical storm Debby had made its way through our area and dumped a lot of rain. I walked the same path every morning. As I was walking down the sidewalk, not paying enough attention, I slipped on a thin amount of mud the storm had pushed across the sidewalk and smacked down on the ground.
As I was lying there assessing my injuries, including a nice cut on my leg, elbow, and shoulder and a muscle pull in the neck, I had a thought. There is a lesson to be learned from my experience and a good reminder: I should have threat modeled the situation. I should have looked at the sidewalk before me and analyzed that representation of a quarter inch of mud. So, at the end of the day, you can use threat modeling for everything, even keeping yourself from a slip and fall.
Podcast ๐๏ธ Corner
I love making podcasts. In Podcast Corner, you get a single place to see what Iโve put out this week. Sometimes, they are my podcasts. Other times, they are podcasts that have caught my attention.
Irfaan Santoe -- The Power of Strategy in AppSec (Audio only; YouTube)
We discuss measuring AppSec maturity, ROI, and bridging gaps between CISOs and AppSec knowledge.
Irfaan shares his journey from consulting to being an AppSec professional, offering insights for scaling AppSec programs and aligning them with business goals.
The Stages of Grief in Incident Response (Audio only; YouTube)
Chris, Izar, and Matt discuss the developer's stages of grief during incidents and analyze a recent large-scale IT incident.
They share insights from their extensive security experience, examining system fragility and the role of luck in security failures.
Gavin Klondike -- Threat modeling for large language model applications (Audio only)
Gavin Klondike discusses threat modeling, especially in AI and machine learning contexts.
Gavin shares a detailed case study, challenges of large language models (LLMs), and a comprehensive threat model for LLM applications.
Where to find Chris? ๐
Webinar: Secure by Design, August 29 @ 3 PM Eastern; register link coming soon.
Webinar: The Intersection of Security Champions and Threat Modeling, with Dustin Lehr โ Tuesday, September 10
Webinar: Threat Modeling and Secure Coding with Tanya Janca โ Thursday, September 19
InfoSec World, Sept 22-25, 2024
The Modern Application Security Rocket Ship โ Monday, Sept 23, 10:15 AM
The Paradox of Secure and Private By Design โ Tuesday, Sept 24, 1:30 PM
Workshop: Threat Modeling Championship: Breaker vs. Builder โ Sunday, Sept 22, 9 AM - 12 PM
๐ค Have questions, comments, or feedback? I'd love to hear from you!
๐ฅ Reasonable AppSec is brought to you by Kerr Ventures.
๐ค Want to partner with Reasonable AppSec? Reach out, and letโs chat.