Opens profile photo
Follow
Jeremiah Grossman
@jeremiahg
Black Belt in Jiu-Jitsu. Unemployed, no college degree, drives used cars, and holding out for a management position. Founded WhiteHat Security & Bit Discovery.
Boise, ID & Maui, Hijeremiahgrossman.comJoined March 2008

Jeremiah Grossman’s posts

Not so long ago there was something called a "telephone book" that published effectively everyone’s name, address, and telephone number — PUBLICLY. Today, when that same data is [mistakely] made available online it’s called a data breach. Culturally, what changed?
308
1,482
Seeing is believing. Video or it didn’t happen. In the very near future, we won’t say or believe those things anymore.
Quote
Another great paper from Samsung AI lab! @egorzakharovdl et al. animate heads using only few shots of target person (or even 1 shot). Keypoints, adaptive instance norms and GANs, no 3D face modelling at all. ▶️ youtu.be/p1b5aiTrGzY 📝 arxiv.org/abs/1905.08233
22
932
I’ll tell you exactly why many of us in Tech and InfoSec are especially sensitive about complete BS like this and react accordingly. Aaron Swartz.
Quote
Through a multi-step process, an individual took the records of at least three educators, decoded the HTML source code, and viewed the SSN of those specific educators. We notified the Cole County prosecutor and the Highway Patrol’s Digital Forensic Unit will investigate.
Image
Readers added context
The Governor is inferring the journalist hacked information (social security numbers) that is readily available to anyone on an webpage by viewing source code or pressing the F12 button.
26
979
InfoSec is ~$127B industry, yet there’s no price tags on any vendor website. For some reason it’s easier to find out what a private plane costs than a ‘next-gen’ security product. Oh yah, and let’s not forget the lack of warranties.
62
905
Spoke to CISO who said when Merck was impacted by ransomware, his firm also lost $1.5 billion ... even though they themselves weren’t infected. Merck’s ships couldn’t / didn’t deliver goods they need to operate their business. Perfect example of the impact of 3rd party risk.
20
660
InfoSec is a place where vendors don't publish their prices, make outlandish claims, don't warranty their products, don't allow customers to test their products without speaking to a sales person first, and then complain when people don’t want to listen to them.
55
621
$120B+ a year spent on InfoSec, everything still hacked. If the spend were doubled, would the breaches or their impact be halved? I think no. I think we largely continue to have an alignment of interests and a spending priority issue.
91
577
Many people attend BlackHat / Defcon solo, and dont really know anyone. For newcomers the conferences can feel a bit overwhelming. If you notice someone standing around alone, looking lost, take a moment to introduce yourself. Ask if they need anything. It’d mean a lot to them.
18
486
Generally people prefer an insecure product that works over a secure product that doesn’t. This is why we’re talking about Zoom at all right now.
24
482
InfoSec: Software will always have bugs, and therefore always have vulnerabilities. Also InfoSec: Protect your insecure software with our insecure software.
23
482
I appreciate when people say, “I don’t know” when they don’t know something. It shows confidence in themselves and respect towards others in not trying to waste people's time.
16
442
Just another day in InfoSec: -Facebook leaves millions of user passwords exposed in plain text for years. -Google fined €1.5bn by EU regulator for blocking competitor’s ads. -UK's Police Federation infected with ransomware, deleting DBs, email systems, and their backups.
18
428
Let me get this straight, a couple old school hackers from w00w00 and the adm crew are now billionaires, and someone who used to be a cDc member is a legit democratic presidential candidate. Is this real life?
36
429
Some days in InfoSec you can’t believe someone is paying you to do this work. Other days you feel like there’s no amount of money that’s worth the job.
16
422
Hey Everyone. My son (11yr) could use some get well wishes. He’s going into surgery today to repair a badly broken leg. He’s been holding incredibly strong, but it’s been a rough week.
133
410
There are generally 3 InfoSec personas… - Builder of secure systems - Defender of secure systems - Breaker of secure systems … everyone else is in sales, marketing, or a thought-leader. ;)
27
375
I’ve worked some amazing security pros whose skills made me feel like an intellectual chimp, but nothing compared to those I’ve seen who have somehow mastered Microsoft Excel.
13
350
For months, years actually, I've looked very closely at the external attack surface of every Fortune 500 company and well beyond. I’ve learned that almost none, "moved to the cloud.” That’s a falacy. Instead the added stuff to the cloud and left the legacy where it always was.
18
383
Journalists covering InfoSec, when covering breaches, please ask what security control(s) should have prevented the incident but didn’t. It’s a common question asked in every other comparable area.
27
393
IMHO, the cause of InfoSec burnout isn’t so much the long hours … it’s when you grow weary of the endless search for anything that’s wrong with everything. Burnout is when this inherently negative mindset impacts your personal life — perhaps inevitably so.
17
360
InfoSec says the first steps of any security program are: 1) Create a list of assets needing protection. 2) Place a value on those assets, to avoid over or under spending. 3) THEN see what those assets are vulnerable to. In your experience, how many go directly to step 3?
45
356
Now that the USGOV has banned Kaspersky software in federal agencies, perhaps now they can go ahead and block the arguably far great computer security threat. Online ads.
15
306
It’ll take a few years before it becomes necessary, but the insider threat of bribing or planting developers in key positions in the software supply chain designed to implant weaknesses will become a thing. And, it’ll be incredibly hard to defend against.
41
338
In InfoSec we often hear, “Why don’t organizations just do or fix … X?” As a thought exercise, ask the opposite. “Why should businesses do or fix… X?”, and do so in dollars and cents terms. It’s often surprisingly difficult.
35
311
Stay in InfoSec for any length of time and you’ll probably come across a few jerks. They don’t matter in the least. Fortunately, you’re far more likely to find A LOT of super cool people. People willing and eager to help when asked nicely. My personal experience.
10
300
Often organizations are hacked because a machine wasn't patched. What we’re noticing at Bit Discovery is many times the org actually DID properly patch other systems, just NOT the one that was hacked. Turns out the exploited system would've been patched if they knew it existed.
22
308
Why do people attend InfoSec conferences when so much of the content becomes freely available soon after? I’m thinking it’s... 1) a large block of time dedicated to learning and NOT be distracted by ‘work.’ 2) peer networking opportunities. How off am I? What else?
114
309
Old Way: 1. Select Target 2. Reconnaissance 3. Identify Vulnerability(ies) 4. Exploit New Way: 1. Reconnaissance 2. Identify Vulnerability(ies) 3. Select Target 4. Exploit This is the problem for patch management.
5
285
Hard lessons that are unfortunately necessary to share with all non-InfoSec people. • 'Your data' is not your data, and it will be sold for a buck. • The cloud doesn't have a delete button. • Ads are dangerous, block them.
2
261
Replying to
And furthermore, what every security researcher will tell you… if view-source: was enough to comprormise data on the website, you know there’s likely to be many other ACTUAL vulnerabilities.
3
270
Replying to
Google blog post didn’t say how they found the infected website(s) using the iOS zero-days. But I’m sitting here thinking, again, that after $127B in annual InfoSec spending, it was an advertising platform that found it... and not a security vendor. Threat intel or otherwise.
12
266
Told ya! The National Cyber Security Month kicked off with a bang. 50M Facebook users hacked, Chinese spies reportedly hacked 30 U.S. by compromising their hardware supply chain, and US DoJ filed charges against Russian GRU officers for hacking. And week 1 ain’t even over.
11
264
Many InfoSec industry reports state that exposed Remote Desktop Protocol (RDP) ports are a leading cause of breaches. One cyber-insurance carrier told me they will not write policies for those with open RDP. So, I was curious how prevalent RDP is across top U.S. companies. /1
10
269
For many companies, the first time the Execs sat down and had to put a hard monetary value on their data and infrastructure is when they get ransomware’d.
6
260
I always thought it odd that Silicon Valley, the center of the hi-tech world, has such an awful traffic problem. You drive 1hr+ from home to sit behind a computer screen and sometimes meet with people in little rooms. This is how we know telepresence is not yet a thing.
16
231
Google’s ReCaptcha is a free service w/ no support and heavily relied upon by basically the entire internet. They [temporarily] went down, impacting critical flows like auth, account reg, purchasing, etc for a lot of people. Weird how little coverage there has been.
7
228
I’ve spent last year creating asset inventories of the world's largest organizations (via Bit Discovery). It’s absolutely crazy to see just how many assets they have connected to the Internet — many have hundreds of thousands. You can’t secure what you don’t know you own.
14
229
~23 years of CVEs. Tens of thousands of new vulns published each year. Anyone ever analyze the characteristics of the vulnerabilities that are never exploited?
28
240
I’ve learned that if someone is being unusually nice, for long periods of time, it means they are likely Canadian. There’s no other explanation.
23
218
$120 billion a year in InfoSec spend: Someone’s corp email is compromised, which leads to an adversary planting a backdoor on a build server of an IT management software product. Leads to a breach of ~18,000 companies, including large swaths of the US Federal GOV.
17
226
If auto insurance worked like cyber insurance: Agent: How many cars? Customer: 🤷 Agent: What kind of cars? Customer: 🤷 Agent: Where are they? Customer: 🤷 Agent: What are they worth? Customer: 🤷 Agent: Who drives them? Customer: 🤷 Agent: Great! Here’s policy quote. 📝
4
231
A high functioning team following a good-enough plan will easily outperform a low functioning team following the best plan. Every. Single. Time.
13
221
Sep 7 2017, Equifax (EFX) announced a major breach impacting the personal information of 143M people. Within days their stock crashed from $141 to $92. 13mo later, it’s up to $129 and just slightly off a 52-week high. I think just about everyone can learn a lesson here.
Image
22
205
When interviewed by mainstream media, generally following a large breach, I’m often asked … “why do these hacks keeping happening?” At this point, what would your best answer be?
209
221
A security researcher informed USPS of the vuln a year ago, but they never responded. reaches out and they fix it in under 48 hours. Idea: Start disclosing vulns as a ‘journalist’ instead of a ‘security researcher’ and let’s see what happens.
Quote
Exclusive: USPS fixes flaw that exposed data on 60 million usps.com users krebsonsecurity.com/2018/11/usps-s
Image
8
213