A (62:02)
You all right? So threat actors continuing to use click fix style attacks. The click fix attacks have continued to evolve, but the TLD or tld, the top level domain nerd. The. The TLDR here is if you educate your workforce on what A click fix attacks. Looks like it doesn't matter what technique the attackers use to get the click fix in front of your victim or in front of their victim, your, Your end user, your. Your, Your mother. It won't, it won't be successful. Okay, so click fix attacks. If you're new here, a click fix attack is essentially convincing a human to open a command prompt, right? Essentially a command prompt or start run and then run a powershell command that'll basically go grab an initial payload. Why on earth would my Aunt Dorothea do this? Well, this is where the trick comes in, the fishing part of it. Okay? And classically it was the captcha. Like, are you a robot? Instead of clicking on fire extinguishers, you would run this code to prove you're a human. Okay, we got smart to that. Now what this ad blocker is doing, which is fake, is it'll pop up and say, oh, your, Your browser's screwed up. In order to fix it, do this. So if you're not paying attention or you're in a hurry or whatever, you're just going to do the thing it says because it looks legit and you just want to get back to back to work or back to whatever, back to searching, back to. Net Decking casually, Joseph. So educate your end users. You will never, ever. There will never be a time when you need to hit Windows key R and then paste in some code and make sure that you are including a screenshot. Because again, this is why I like infographics. The visual picture of showing it or will stick with the users on what it looks like if you tell them, oh, hey, don't, don't hit windows key R contrl V with PowerShell code. That means nothing to my Aunt Dorothea. That means nothing to your executive team. They already forgot what you just said. They already forgot it. Show them a picture and say, if you see this, we've got a big problem. Okay, Visually punch it in there, make it clear to them. I mean, shoot, shoot. You could even print it out and stick in the elevator. Don't be a victim. If you see this, stop. And here's the thing. Your, your power users, your IT users, your. Your developers, like, they know what Windows key are in a PowerShell is. They know what it is. So they're already predisposed to know that that's not okay. So you don't have to worry about being confusing and blanket saying that, start, run. PowerShell is bad because anyone that knows that the instances where it's not bad are going to know Already that it's all good. They'll like be on inside on the, on the joke. All right, again, I don't want to focus so much on this browser, fake ad blocker extension and this extra. It doesn't matter because next week it's going to be a different thing. The threat actors are continuing to use click fix because it works. It's just the initial trick to convince you to do it is what's changing. All right, let's cook. All right, we're a couple minutes over, but that's okay. Guys, it's Wednesday, so I'll be doing AMA jawjacking in a hot minute. If you got value from the show. Thank you. I like, like, literally the whole reason I do this is to deliver value. I love educating, I love mentoring, I love helping people. It makes me feel good to help other people. I didn't have anyone really helping me when I was coming up and, you know, it sucked. Right. So this is all about paying it, making it, making a, a change and helping people. So share it with your friends, share it with your network. Bring a friend tomorrow. I'm Jerry from Simply Cyber. Don't go anywhere because we're going to be doing jawjacking. I'm going to be mentoring at scale, continuing to melt your face. Until next time. I'll see you. I'll see you. All right. O. Oh, also really quickly, tomorrow is today Wednesday? Yeah, tomorrow. I'm pretty pumped. We actually have Bryson Bort coming on. Bryson Bort. If you don't know who he is, you know, I don't know what you've been up to, but you, you should know who he is. He's just a. He's a wonderful guy, really well known in the cyber security community. A lot of his focus was in icsot, but he's much bigger now. And like, this is cyber related. But a lot of people are interested in how to start and run a business. Your biz. I'm a one person business. Kathy and Kimberly helped me. But you know, effectively they're contractors. Right. So I'm like a one, one employee business. Well, I shouldn't say that my wife and kids are part of the business as well, but you get my point. You don't have to be a Fortune 5 company to start and run a business. And a lot of people in 2026 are interested in this. So I asked Bryson to come on and talk about it. Why not? The guy's got mad experience. I'm Jerry from Simply Cyber. Until next time, stay secure. Ever wonder what it takes to break into cyber security. Join us every weekday for Jawjacking, where industry experts answer your burning questions about the cyber security field live, unfiltered, and totally free. Let's level up together. It's time for some Jawjacking. Holla. What's up, everybody? Welcome to Jawjack, and I'm your host, Jerry Guy. If you're new here, a 30 minute show. You ask a question, I give an answer. If I don't have the answer, I do everything in my power to get you the answer by either querying the community, which is right here full of amazing professionals, or we try to Google it, right? We're not pretending to be the the Oracle of Deli here. We're like, literally just trying to cook and help people. All right, guys, if you got a question, put it in chat with a q. We got 21 minutes for you. Super exciting. Go. All right, let's see. Hello, Michael Vito, coming from the Philippines. Good to see you. Good morning. All right, the Mod Team. I do want to thank Justin Gold, Haircut, Fish, DJ B Sec. So many wonderful people. Kimberly can fix it. I think Daniel Lowry's in there. Maybe Tyler Ramsby's in there. Maybe. All right, Modern Rogue has entered the chat. Question, can I make a deep fake of you for learning purposes? Yes, you can. Modern Rogue and Modern Rogue, if you google James McQuiggin, Wild west hack infest 2020 or I believe he had a whole, he had a whole presentation on deep fakes and there was a deep fake of me in there. But yes, you can use a deep fake of me. Word of the week Wednesday instead of Worldwide Wednesday. Thank you, FedEx. We can develop our vernacular by increasing our lexicon by using interesting words to capture insights and value for practitioners. I will tell you guys. So I don't even know if you have to do this anymore, but if you don't know, I, I, I have master's degrees and in order to get apply to a master's program, I had to take these GREs, which is like, basically like SATs plus plus. And it's half math, half vocabulary. And I literally memorized 500 different words using flashcards for, for studying for the GREs. Now, spoiler alert. I, I did great on the GREs and I got accepted to master's programs, which is why I have multiple master's degrees. But I never forgot those words. They are baked into my brain. All right? Like dilettante. I know what a dilettante is. All right, next question. How is run Fish says how difficult is hacking TV stations in the U.S. good question. I don't know. Nowadays I would assume it's actually not trivial. I wonder, is Kathy Chambers in chat? Is Kathy Chambers in chat? Hey, Kathy. So Kathy Chambers worked in breaking news for like a long time and was right up in TV space. I would love to get her thoughts on this. Let me see if she can come online. Hey, hey, are you there? And answer this question. It's a fun question because hacking TVs, it happened in Iran just recently. It was in today's news and it was big. Like, it's like, I don't know, it's like one of those dream hacks where it's really cool because lots of people see it. I'm gonna flag this one, Run Fish and we'll come back to it. Okay. Modern rogue tech Run is sharing that James McQuiggin did a deep fake B sides Orlando talk as well. All right, let's see what else we got here. All right, Phil Stafford, is MCP security just about fixing bad code or are we looking at a whole new attack surface that we don't have real controls for yet? Solid question. You know, I, I want to say I don't think it's a whole new attack surface. I just think it's like really intense imported code risk. Right? So if you are writing software that uses APIs to pull into things, you know, if, if wherever the API is pulling into gets hacked or has compromises, you're importing that, if you import some Python library into your code and you don't validate it, it could be hacked. So I don't see it as a new attack surface, but I see it as more glorified because the MCP server you're not really going to have visibility into. Right? I mean, you could bake in some, some validations of the code or whatever. The returns are coming back from the mcp. As always, whatever you're putting into these MCP servers, from a data governance and data sovereignty perspective, you do want to make sure that you're managing that as well. Like a little teaser for everybody again, I'm doing a video every Sunday in 2026, a produced video for the Simply Cyber YouTube channel. And I. February 1st or February 8th, I'm actually doing a video that is going to be dropping a brand new free enterprise grade tool that can help you legitimately manage data sovereignty and data governance. It's like unbelievable. Like I've already filmed the A roll. I've gotta, I've got to do like the tech demo Stuff, Phil, but it's sick. So I do think we have controls for this right now. Unfortunately, it's more. There's a lot of human controls around managing this risk. What kind of human controls? You might be asking yourself? Well, number one, like WordPress, right? WordPress, the server that has a million plugins and some are vulnerable. Or your Chrome browser. Right. And extensions that are vulnerable. You have to make sure that you kind of keep your code clean, right? So if you interface with MCP servers and then you don't end up using it, you might want to clean it up, right? Because you could have some, like, janky, you know, call to an MCP server that you forgot about, or it's not there and it causes an issue downstream. Again, if you're not. If you leave it in your code, but you're not actually reaching out and touching the MCP server, you don't have to worry because that's like, static, right? It's only when you. It's like having malware on your desktop. It's not a problem until you execute the code and have it sit in memory and touch your processor. All right, fun question. Phil Stafford. Phil Stafford is also like an AI superhero. So I would love Phil's thoughts on this, too. I mean, I. I appreciate Phil asking the question and getting my thoughts on it, but Phil, as a superhero in AI, let me know your thoughts. Also, Phil, I might be going to rsa. I. It's ridiculous that I don't know already, because I'm sure I'm gonna have to stay in, like, San Jose because all the hotels are taken. Still pay 800 bucks a night. But. But if I get to RSA, Phil, I hope you can come out to the Simply Cyber meetup. Continuing to look at questions. All right, Cyber Risk, which is. Paging Kathy. That's funny. All right. Cyber Risk, which says advice for developing as a new manager when also carrying a full analyst workload on top of leading leadership responsibilities. Yeah, that's asking a lot. I mean, honestly, for me, I've always tried to avoid managing people. I guess if you really break it down, I'm not great at confrontation. I don't enjoy it. I don't like how it makes me feel. So I've always tried that. But I have managed people before because, you know, at a certain level, you have to manage people. What I always like to do is two things. Cyber risk. Rich. You could take these, you could leave these. And if people in chat have thoughts on answering this question, drop it in chat. But for me, the Two things that I like to do as a manager because they align with like how, how I like avoiding a confrontation. Number one, I view managing as the following. My, like the team that I'm managing, they are the, the worker bees. They're executing work, they're delivering on objectives. My entire function is to make sure they have what they need in order to be successful. That's how I see being a manager. Do you have what you need? So when I, oh, and also regularly meeting with them and making sure that they're good, right? Not just being like, like do your work, right? So like, hey, do you have what you need? Okay. The second thing I like to do when it's possible is I like to allow them to set the deadlines, right? So hey, hey Catherine. Like I need, I need you to, to make this piece of code or I need you to develop an awareness training deck or whatever, right? I need you to do this thing because I'm being told that our team needs to do this. I need you to do this thing. Do you understand what the ask is? And if you, if you don't, then I didn't give you what you need to be successful. So I will clarify until we get to a point where you understand what the ask is. Then I'll say, when do you think you can have it by? So instead of me saying have it by Friday, I say when do you think you can have it by? And this way you have buy in in stake in the deadlines. So if you say I'll have it later today, I, I might say like that's great, but I mean it, it, I don't need it today. Like, do you know, I don't want you to set unrealistic expectations. Also if you're like, it's going to take me two months and I'm like, come on, it's like three slide PowerPoint. Two months. Can, you know, let's. So usually in my opinion when someone sets their own deadlines, they have buy in and they're more likely to, you know, just execute on it. So those are my tips. Christian Fernandez says. Good morning Doc. So recently I got my SEC plus last week. Very good, Congratulations. And I was wondering what would be some good projects to work on. I have a Proxmox instance where I'm planning to do some home labbing. Well Christian, the number one question is what do you want to do? Right? Like, so if you want to be a sock analyst, sure you could do some GRC related labs, but does that necessarily help you get to the sock analyst role. I don't know. So first of all, pick. Pick a role you want. Now, if you don't know what role you want and you're like, jesus, Jerry, like, can you just not give me a problem? Like, just answer my question. Here's what I would say. Okay? This is a great lab. Yeah. Proxmont, right? Set up a. A Windows vm. Make it vulnerable af, okay? Get like some type of, you know, like lightweight SIM or something. Like something very lightweight sim, okay? Put some type of agent that can do logging, like Sysmon or something on, on the Windows vulnerable vm. Have the logs go to the sim, then stand up another box that. Or, you know, use Atomic. Like, so look up red canaries, Atomic Red Team, okay? Then detonate. Atomic Red Team basically does axiomatic hacks on an endpoint which would map to like, Miter Attack framework. So you can literally do this exact technique, right? So here's the deal. Execute one of the axiomatic techniques on the vulnerable system and confirm it worked. Okay? Then go look in the SIM and see if you see it. Then use Atomic Red Team allows you to like, reverse basically the attack. So reverse it. Then try to write like a little detection and then execute it again and see if it like fires off in your sim. Now, this is a very SOC analyst focused lab, but the reason I like it is because of the following. Number one, you are setting up kind of a complex lab, right? You've got multiple systems, vulnerable endpoints. You're seeing attacks and stuff like that. Number two, if you want to get into pen testing, you are looking at axiomatic attacks. You can read the attack, you can see it, you can study it, you can understand it. You're executing it on a victim machine. You're seeing what a compromised victim machine looks like. You're seeing what it looks like when you detect it through logs. You're also going to be. You should be looking at MITRE ATT and CK Framework. And then once you get a little comfortable, start picking attacks that are directly related to very popular threat actor groups like APT 28 or APT 41, like or, or Lazarus Group or, or Scattered Spider or Lapses, like one of these threat actor groups that's got like a big, big splashy name that everybody that's interviewing you has heard and knows about. This is going to be good for like, GRC jobs. So then when you're like, getting experience, seeing how it all works, and understanding the kill chain and what things look like and all these things in an interview you could talk about Miter attack framework. You could talk about Atomic Red Team. You could talk about detection, engineering and tuning. You could talk about home labs that are complicated and set up very nicely. It'll give you a lot of different avenues to explore. Shoot. You could even take like one of these, you know, recent, like if, say there's a big story in the news, right? Like this threat actor group, right? Like I'm trying to think of, like, what's a threat actor? Well, black boss that just. Oh, oh, oh, there's Safe Pay Ransomware. Yesterday's news, it was reported that Safe Pay Ransomware group is like the new kid on the block. Like the hotness, right? Like Bo Jackson, future all Star baseball card, if you're picking up what I'm putting down. Or the Mark McGuire Jr Olympics team baseball card. Those were like the hotness in the 80s when I was a kid, by the way, drinking. And if you know those baseball cards, the future all stars, Bo Jackson one where he's like running back in the center field. Let me know in chat, but go like, once you get a little comfortable. Christian, say you had an interview on Friday this week. Go find some Safe Pay techniques, detonate them, detection, engineer them, learn them, and then just casually drop that, you know, like, oh, yeah. The newest threat actor group, Safe Pay. I actually in my home lab executed some of their techniques to see what it looks like. Like, you will absolutely jaw drop people in that interview. Come on down. All right, all right. What would, what would be good experiment? Okay, I already answered this question. Cryptic roses. If I wanted to write a LinkedIn post about a home router V without exposing my home network stack. I mean, just, I mean, just. I just don't say it's your home stack. What? You know what I mean? Like, whether, whether what your post is about. No one's gonna know it's your home stack. Just, just pose it as. I mean, if you want, just say that you bought this home router off of ebay or off of Amazon and. And tested it. No one's gonna know it's your home router. Just don't say it's your home router. Do you plan on attending RSA this year? Yep. I mean, we'll see. Right now. We'll see right now I'm in conversations with a company to do work at RSA with them. And you know, RSA is incredibly expensive. I'm not, I'm not paying to send myself to rsa, I guess, to put it plainly. All right, Ross, the boss says I May be let go soon after two decades. Oh, God dang, dude, that sucks. What are some personal branding tips while the clock ticks? Okay, dude, here we go. Ross the boss. Number one, I'm glad you're asking this question now. Number two, I'm sorry that you're having to ask this question. All right, here we go. I'm gonna drop links in chat number one. I did this. Where is it? This? I did this talk with Mike Miller the other day, literally. Ross the boss. The name of this one hour, very valuable practical session is called personal branding for your Cyber career in 2026. So this is a one hour answer to your question. All right. There's a one hour answer to your question. I just tagged you in chat number two. Ross the boss. I don't, I don't know if you want to do this, but. And I don't even know if I'm going to be able to do this. Hold on one second. If you go to Simply Cyber IO schedule, it's my upcoming events. I'm actually running a four hour workshop on. What the hell? All right, hold on one second. I'm running a four hour workshop on amplifying your cyber career for free. So really quickly, I'm. We're doing workshops through Simply Cyber Academy one a month, every month. And the workshops are going to be multiple hours taught by very awesome senior industry professionals. They are paid, but they're very reasonably priced. Since I'm doing the first one, I have waived the registration fee entirely. So you can take this webinar for free now. I will tell you, Ross, this is around building, like, basically I built a YouTube platform that's been very successful and helped me network and brand and all these other things. And there's, there's tangential benefits from it. So that's really what this is all about. So if you're not into that, I wouldn't do that. The other thing I would start doing right now, just as like a final tip for you, Ross the boss is in your two decades, you've probably met a lot of people. I would start reaching out to people and just reconnecting with them. Do not reach out to them and say, hey, I think I'm gonna get laid off. Do you have any jobs? Don't do that. Okay? Just reach out. You probably have developed relationships over the years with people you worked with that you've lost contact with. So reach out to them and just say, hey, you know, I, like, literally, this is not disingenuous. Hey, like I. Okay, so let me Give you an example personally, so it can, it can be relatable. I worked with a guy named Jacob Neal at Booz Allen. He's the guy that I went to Antarctica with a bunch of times. Okay. Now we work in different spaces now. He's, he's a government employee. And I do all this right. Every once in a while, I'll reach out to him. Like simply, cybercon is in. What happened? And I hadn't seen him in a minute, so I called him and I was like, dude, we're hosting a conference. Would love for you to come. I'll pay for your ticket and buy you a T shirt. What do you think? And he's like, yeah, I'll be there. And he came and we, he got a lot of value. We hung out some, and then it was off and running. Now, I didn't invite him or reach out to him for a job, but I did. I, I am nurturing that relationship because I, I like the guy and I don't want always to have a deliberate purpose for doing that. So reach out and reconnect and just ask people how they're doing. Think about it this way, really quickly. Everybody, if you have a neighbor or a friend, that the only time you hear from them is when they want to borrow your wheelbarrow or they need help moving or they want to borrow your, whatever, your pickup truck. What? Like, how does that taste? That tastes like butt, right? You're like, oh, yeah, of course. Like, you see the phone ringing and you're like, oh, I know what this is about. No one likes that. But if it's like, hey, what's up? I just, or even just text them, right? Hey, what's going on? So start building those relationships back up, okay? Because, because then you could be like, oh, I just got laid off. You know, like, sucks, you know? Hey, if you know of anything, let me know. Okay? All right, I'm gonna speed run now. I think we needed to design a Simply Cyber shirt contest with the winner getting a free one.