Hey there,
I hope youâve been doing well!
Life Advice from VCs
This week I found myself at a dinner with a few VCs, founders, and other tech folks.
The conversation ranged from strangest start-up pitch (one founder who, wanting to remain anonymous, entered and remained in a mask throughout their pitch) to the origin of IPA beers.
At one point the conversation turned to relationship and life advice. Most of these will likely ring true, but I bet The Last One Will Shock Youâ˘.
- â Be with someone who makes the boring day-to-day stuff fun (e.g. grocery shopping or laundry).
- â If you meet your partnerâs friends and you donât like any of them. Who your partner chooses to spend time with is indicative of who they are, and youâre going to have to spend time with their friends.
- â If your partner has a close relationship with their parents and received a lot of love growing up.
- In life, Happiness = Expectations / Reality
Finally, this incredibly friendly Brazilian woman shared some advice that I hope you never have to use:
If someone asks you where you want to get kidnapped, Brazil or the U.S., definitely choose Brazil.
Why? Kidnapping in Brazil is purely economic, youâre going to exchange some money then get out fine.
In the U.S., itâs going to be about emotion, and the person may have some sort of mental illness, and you may end up⌠*chopping motions with hands*.
There you have it- never let it be said that tl;dr sec doesnât also give you practical street smarts đ
Sponsor
đ˘ 5 best practices for securing Kubernetes runtime workloads
A comprehensive Kubernetes security strategy requires a defense-in-depth approach that is able to detect attacks in-progress, unusual behavior, and attempts to exploit misconfigurations or vulnerabilities in running clusters.
While hardening Kubernetes workload configuration or Kubernetes Role-Based Access Controls (RBAC) is a necessary best practice, itâs just the tip of the iceberg when securing Kubernetes clusters.
Learn best practices for securing Kubernetes runtime workloads in this article by LaceworkÂŽ, the leader in cloud security that keeps you secure from code to cloud.
Read 5 best practices for securing Kubernetesđ In this newsletter...
- AppSec: Catching XXE bugs in Java with Semgrep taint labels, Mitigating Risky PRs with Monocle Risk Advisor
- Web Security: AngularJS gadget to bypass CSP in Piwik PRO, the dangers of not specifying the right Content-Type
- Cloud Security: AWS Nitro System API & Security Claims, An Adventure in Google Cloud threat detection, The Service Mesh Landscape, Awesome CloudSec Labs, My Love/Hate Relationship with Cloud Custodian
- Container Security: K8s operator for creating temporary resources, PrivEsc in EKS
- Blue Team: You can now use passkeys on your personal Google Account, Living Off The Land Drivers, Tailscale now supports network flow logs and log streaming
- Red Team: Building a Red Team Infrastructure in 2023, Introducing resocks - An Encrypted Back-Connect SOCKS Proxy for Network Pivoting
- Politics / Privacy: Chinese hackers outnumber FBI cyber agents by 'at least 50 to 1'
- Machine Learning: How to build a tool-using agent with LangChain, Hackers are increasingly using ChatGPT lures to spread malware on Facebook, FTC Chair says sheâs on alert for AI violating antitrust or consumer protection laws, Google "We Have No Moat, And Neither Does OpenAI", The Spherical Cow of ML Security
- Misc: The best picket signs of the Hollywood writers' strike, the best five books on any topic, eBPF for beginners
AppSec
Catching XXE bugs in Java with Semgrep taint labels
Great detailed video by Pieter De Cremer. See also Pieterâs videos:
- Transforming code with Semgrep autofixes
- Trying out the new Semgrep syntax - which has such a delightful thumbnail

Mitigating Risky Pull Requests with Monocle Risk Advisor
David Trejo discusses how Chime has introduced guardrails and security control checks in their GitHub PR workflow in a tool called Monocle Risk Advisor. Risk Advisor makes it easy for their auditors to track deviations from controls, and these are tracked as tickets in Jira. OPA is used to implement checks.

Sponsor
đ˘ Tailscale, a frustratingly simple VPN
Tailscale is the simple and secure way to build and manage your teamâs network.
We handle network configurations on your behalf to navigate firewalls and routers, so you donât need to hassle with manual configuration or port forwarding. Authenticating is effortless with SSO, and Tailscale enables roaming so teammates stay connected wherever they go, even if they switch between Wi-Fi and cell networks.
Plus, you can get started in minutes. Just install and authenticate Tailscale on two or more devices, and youâre ready to roll.
Use Tailscale for freeWeb Security
Ambushed by AngularJS: a hidden CSP bypass in Piwik PRO
PortSwiggerâs Gareth Heyes discusses an AngularJS gadget that could be exploited as a CSP bypass in Piwik PRO, which could be turned into XSS if chained with an HTML injection.
Odoo: Get your Content Type right, or else!
Dennis Brinkrolf and Thomas Chauchefoin from Sonar Source discuss the security implications of the Content-Type header returned by web applications and discuss an XSS discovered in Odoo that resulted from a misconfigured Content-Type header set on an API endpoint.
Cloud Security
AWS Nitro System API & Security Claims
NCCâs John Redford has released a public report on an architecture review conducted on the AWS Nitro System design.
An Adventure in Google Cloud threat detection
DataDogâs Martin McCloskey and Day Johnson share common threats and exploits in Google Cloud, including techniques known to be used by threat actors (e.g. the creation or use of service account keys outside of Google Cloud) as well as likely techniques, such as data extraction via Google Cloud SQL or the creation of a privileged service account.
The Service Mesh Landscape
A comparison of various service meshes, including Linkerd, Istio, Consul, NGINX service mesh, and Network Service Mesh.
iknowjason/Awesome-CloudSec-Labs
Free cloud native security learning labs, including CTF, self-hosted workshops,
guided vulnerability labs, and research labs, by SANSâs Jason
Ostrom.
My Love/Hate Relationship with Cloud Custodian
Chandrapal Badshah writes about his experience using Cloud Custodian, a rules engine for cloud security, cost optimization, and governance. Chandrapal highlights its ability to detect misconfigurations in near-real-time or at periodic intervals and auto-mitigate those issues thanks to the customizable detection rules engine, while remaining cost-effective.
Areas for improvement: lack of documentation and its difficult to create custom notification messages.
Container Security
NCCloud/mayfly
A Kubernetes operator that enables you to create temporary resources on the
cluster that will expire after a certain period of time, by Namecheap.
Privilege escalation in AWS Elastic Kubernetes Service (EKS)
Califâs An Trinh on achieving privilege escalation from a compromised pod in EKS and how to defeat Kubernetes NodeRestriction, a security mechanism enabled by default on all EKS versions.
Sponsored Tool
đ˘ Salesforce Community site data leaks persist. Is your Salesforce instance secure?
Krebs on Security reported that significant Salesforce data leaks have exposed numerous customersâ sensitive data hosted in Salesforce Community websites. Since Krebs shared his findings, AppOmni Labs has noted a 300+% spike in threat activity on Salesforce Community sites and other major SaaS apps.
To help keep Salesforce data secure, AppOmni has launched a free Salesforce Community Cloud Scanner. AppOmni will evaluate your Salesforce instances for misconfigurations and data exposure risks, reveal if the recently disclosed issues are present, and provide clear steps for remediation.
Scan Your Salesforce Deployment NowBlue Team
So long passwords, thanks for all the phish
Googleâs Arnar Birgisson and Diana K. Smetters announce that you can now use passkeys on your personal Google Account, a more secure and convenient alternative to passwords and two-step verification. You can sign in by unlocking your computer or mobile device with your fingerprint, face recognition or a local PIN.
Living Off The Land Drivers
Michael Haag announces the LOLDrivers project, which aims to consolidate vulnerable and malicious Windows drivers that can be used by adversaries to bypass security controls into a single location.
Announcing network flow logs and log streaming
Tailscaleâs Pouyan Aminian and Jairo Camacho announce the release of network flow logs, a new Tailscale feature that records metadata about your network traffic to assist you in monitoring network activity in your tailnet, identifying threats, investigating security incidents, troubleshooting network issues, and maintaining compliance with your network security policies.
Red Team
Building a Red Team Infrastructure in 2023
Secure Systems Engineering GMBHâs AndrĂŠ Tschapeller explores the essential components needed for robust red teaming infrastructure. AndrĂŠ provides an overview of the system as a whole then dives into each separate element, including the C2 infrastructure, HTTPS and DNS redirectors, and using GoPhish in conjunction with a postfix redirector for the phishing server.

Introducing resocks - An Encrypted Back-Connect SOCKS Proxy for Network Pivoting
RedTeam Pentesting unveils their new tool: Resocks, a reverse/back-connect SOCK5 proxy tunnel that enables users to route traffic through an otherwise inaccessible system while ensuring the traffic is encrypted. Resocks uses mTLS and generates certificates based on a connection key to guarantee secure communication.

Politics / Privacy
Chinese hackers outnumber FBI cyber agents by âat least 50 to 1â
Says FBI Director Christopher Wray.
China has stolen more personal and corporate data from the U.S. than all other nations combined.
âA key part of the Chinese governmentâs multi-pronged strategy to lie, to cheat and to steal their way to surpassing us as the global superpower in cyber.â
Machine Learning
How to build a tool-using agent with LangChain
Jupyter notebook walkthrough by OpenAI on using LangChain to augment an OpenAI model
with access to external tools using an agent approach: allow it to do chain of reasoning,
search the Internet for answers, retain a memory of the conversation and use it
as context for subsequent steps, or reference a custom knowledge base using a
vectorstore like Pinecone.
Hackers are increasingly using ChatGPT lures to spread malware on Facebook
Meta has seen threat actors create malicious browser extensions available in official web stores that claim to offer ChatGPT-based tools, then theyâd promote these malicious extensions on social media and through sponsored search results to trick people into downloading malware.
FTC Chair Lina Khan says sheâs on alert for abusive A.I. use
The Federal Trade Commission is on alert for the ways that rapidly advancing artificial intelligence could be used to violate antitrust and consumer protection laws itâs charged with enforcing, Chair Lina Khan wrote in a New York Times op-ed on Wednesday.
Google âWe Have No Moat, And Neither Does OpenAIâ
Fascinating leaked internal Google document claims open source AI will
outcompete Google and OpenAI. Very much worth reading. The timeline at the
bottom is quite neat to see the pace of innovation.
Open-source models are faster, more customizable, more private, and pound-for-pound more capable. They are doing things with $100 and 13B params that we struggle with at $10M and 540B. And they are doing so in weeks, not months.
The barrier to entry for training and experimentation has dropped from the total output of a major research organization to one person, an evening, and a beefy laptop.
The Spherical Cow of ML Security
Sven Cattell shares his perspective on managing risks in a Machine Learning model, including:
- Measuring and externally auditing the modelâs efficacy guarantees.
- Real-world challenges include difficulties in accurately measuring the efficacy of the ML, addressing sampling bias, and guarding against privacy issues or model theft.
- Theoretical challenges, such as adversarial examples.
Misc
The best picket signs of the Hollywood writersâ strike
About ChatGPT, good memes, and more.
Five Books
The best five books on a variety of topics, selected by experts in those areas,
ranging from food to AI, science fiction, thrillers, history, and more.
lizrice/ebpf-beginners
Slides, videos, and code examples for learning eBPF, by Liz
Rice.
âď¸ Wrapping Up
Have questions, comments, or feedback? Just reply directly, I'd love to hear from you.
If you find this newsletter useful and know other people who would too, I'd really appreciate if you'd forward it to them đ
Thanks for reading!
Cheers,Clint
@clintgibler