Logo
    Search

    Bug bounty hunters’ attempt at patching zero day vulnerabilities

    enDecember 13, 2023

    Podcast Summary

    • The Danger of 0 Day Flaws in CybersecurityUnknown vulnerabilities (0 days) pose a significant threat as they can be exploited by bad actors before being discovered, leading to large-scale attacks. These vulnerabilities are the hardest to find and can be sold on the dark web for millions.

      While bug bounty hunters help companies patch known vulnerabilities in software, the existence of "0 day" flaws, which are unknown even to the software creators, poses a significant threat. These flaws can be exploited by bad actors, leading to large-scale attacks. Companies spend a lot of resources trying to stay ahead of these unknown threats, but they don't always succeed. For instance, a Russian ransomware group recently exploited a 0 day flaw in a popular file sharing service to steal data from 60 million users. Bug bounty hunters, like Dustin Childs at Trend Micro, help companies find and fix known vulnerabilities. However, the most dangerous vulnerabilities, the 0 days, are the ones that can cause the most damage and are the hardest to find. These vulnerabilities can be sold on the dark web for millions of dollars. For instance, a 0 day vulnerability in MoveIt software was at the center of a hack this past summer. It's a constant cat-and-mouse game between cybersecurity defenders and attackers, and the stakes are high.

    • Cybercriminals use zero day exploit to target MoveIt serversCybercriminals exploited a zero day vulnerability in MoveIt software to potentially impact hundreds of thousands of computer networks, highlighting the importance of keeping software updated to protect against known vulnerabilities.

      Cybercriminals, such as the ransomware group CLOP, are constantly seeking new ways to exploit vulnerabilities in commonly used software to carry out large-scale attacks. In this instance, they used a "zero day" exploit to gain access to MoveIt servers worldwide, potentially impacting hundreds of thousands of computer networks. This is concerning for cybersecurity experts like Dustin Chiles, who believes this could be a new trend among ransomware groups. The impact of such attacks can be significant, as traditional ransomware attacks typically target only a few victims per week. The US State Department has even offered a $10 million reward for information leading to the arrest of CLOP members. It's important to remember that many everyday software programs, like MoveIt, can be targets for these types of attacks, and it's crucial to keep them updated to protect against known vulnerabilities.

    Recent Episodes from Marketplace Tech

    Bytes: Week in Review — music biz vs. AI, social media moderation and Nvidia stock woes

    Bytes: Week in Review — music biz vs. AI, social media moderation and Nvidia stock woes

    In the past week or so, Nvidia’s stock finally encountered the law of gravity — what goes up must eventually come down, at least a little bit. And we look under the hood of artificial intelligence companies that aren’t necessarily making headlines. Plus, the Supreme Court ruled against Republican-led states that accused the federal government of coercing social media companies into suppressing content. But first, major music labels, including Universal, Sony and Warner, are suing two startups that produce AI-generated music. The labels accuse Suno and Udio of using copyrighted works scraped from the internet to train their AI models. Marketplace’s Lily Jamali speaks with Anita Ramaswamy, columnist at The Information, for her takes on these stories in this week’s Marketplace Tech Bytes: Week in Review.

    Marketplace Tech
    enJune 28, 2024

    The evolution of political messaging into the digital age

    The evolution of political messaging into the digital age

    It feels like eons ago, but during a town hall on violence in America in 1994, then-President Bill Clinton took to MTV to reach the nation’s youth. Clinton’s openness to MTV and what The New York Times called “other unconventional media” had helped pave his path to the White House two years earlier. Fast-forward to today, and even reluctant politicians use TikTok to reach younger voters — President Joe Biden is no exception. His first post came just ahead of this year’s Super Bowl. We invited Marketplace’s senior Washington correspondent, Kimberly Adams, and Joshua Scacco, professor of political communication and director of the Center for Sustainable Democracy at the University of South Florida, to discuss the evolution of political messaging with Marketplace’s Lily Jamali. Scacco said Clinton’s MTV moment informed how future presidents, including his successor, George W. Bush, have engaged with Americans.

    Marketplace Tech
    enJune 27, 2024

    How data generated by everyday apps can incriminate abortion seekers

    How data generated by everyday apps can incriminate abortion seekers

    This week, we’ve been taking stock of how tech has both helped and harmed Americans trying to get abortions in the two years since the U.S. Supreme Court overturned Roe v. Wade. After the Dobbs decision, some experts warned consumers that menstrual tracking apps would provide a means of surveilling abortion seekers. There was even a social media campaign on what was then Twitter advising people to delete their period trackers. But it’s turned out that the threat to privacy isn’t limited to those apps. Other digital data can actually be more likely to reveal an illegal abortion. That’s according to Albert Fox Cahn, founder of the Surveillance Technology Oversight Project. He told Marketplace’s Lily Jamali that everyday consumer apps generate sensitive data that can be used for abortion surveillance.

     

    Marketplace Tech
    enJune 26, 2024

    Protecting abortion patients’ digital data in the post-Roe era

    Protecting abortion patients’ digital data in the post-Roe era

    After the U.S. Supreme Court took away the federal right to abortion two years ago, telehealth has helped provide ongoing access, including to people in states where abortion is now banned. That was our subject Monday. Now we are looking into apps that link patients with abortion providers. Julie F. Kay, executive director at the Abortion Coalition for Telemedicine, told Marketplace’s Lily Jamali that digital privacy protections are far from equal across these services.

    Marketplace Tech
    enJune 25, 2024

    Telehealth widens access to abortion care as lawmakers restrict it

    Telehealth widens access to abortion care as lawmakers restrict it

    Two years ago this week, the Supreme Court ruled that abortions are not constitutionally protected in the U.S., a decision that would draw protests across the country. Since then, 14 states have outlawed abortions. Still, some people in those states have been able to cut through barriers to get abortions via telehealth, according to a recent report from the research project #WeCount. Usually, this requires a virtual visit with a telehealth care provider. The provider assesses the patient and gets their information, then can mail them mifepristone and misoprostol, which aid in ending a pregnancy. The Supreme Court preserved access to mifepristone in a ruling this month, which means it can still be prescribed and mailed to patients. Marketplace’s Lily Jamali discussed the increase in telehealth abortions with Ushma Upadhyay, professor of OB-GYN and reproductive sciences at the University of California, San Francisco, and a coauthor of the #WeCount report.

    Marketplace Tech
    enJune 24, 2024

    Bytes: Week in Review — Warning labels for social media, Adobe’s hidden fees and a less open OpenAI

    Bytes: Week in Review — Warning labels for social media, Adobe’s hidden fees and a less open OpenAI

    Big Tech subscription services are once again in the crosshairs of the Federal Trade Commission, nonprofits with links to OpenAI are becoming less transparent, and Surgeon General Vivek Murthy is urging Congress to require warning labels on social media. Marketplace’s Lily Jamali speaks with Paresh Dave, senior writer at Wired magazine, for this week’s Tech Bytes: Week in Review

    Marketplace Tech
    enJune 21, 2024

    2014: The year that shaped social media

    2014: The year that shaped social media

    Picture this: The year is 2014. The song “Happy” by Pharrell Williams is playing on every top 100 station, and the Ellen DeGeneres star-studded Oscars selfie has just “broken Twitter.” As all of this is happening, a bunch of content creators in certain corners of social media are about to start making a whole lot of money. Culture reporter Steffi Cao recently wrote in The Ringer that 2014 was the year that shaped the internet we know today. Marketplace’s Lily Jamali spoke to her about what happened online 10 years ago.

    Marketplace Tech
    enJune 20, 2024

    Juneteenth’s viral moment and its future

    Juneteenth’s viral moment and its future

    Shortly after the Union won the Civil War in 1865, a union major general issued an order: “The people of Texas are informed that, in accordance with a proclamation from the Executive of the United States, all slaves are free.” June 19, known as Juneteenth, has long been celebrated by African Americans. But in 2020, in the thick of the Covid-19 pandemic and the protests that followed the murder of George Floyd, Juneteenth took the internet by storm. Marketplace’s Lily Jamali spoke with Brandon Ogbunu, professor in the Department of Ecology and Evolutionary Biology at Yale, who wrote about that moment for WIRED back then. He revisited what was happening at that time a year before Juneteenth became a national holiday.

    Marketplace Tech
    enJune 19, 2024

    Meet the man who combines science, technology and magic to understand proteins

    Meet the man who combines science, technology and magic to understand proteins

    Marketplace’s Lily Jamali recently visited the headquarters of Nautilus Biotechnology to meet with Parag Mallick, the company’s founder and chief scientist, who is also a magician and an associate professor at Stanford University. Since 2016, Mallick and his team have been building a machine that they say will revolutionize biomedicine by unlocking the secrets of the “dark proteome.”

    Marketplace Tech
    enJune 18, 2024

    How to find a mailbox in Sao Paulo’s favelas

    How to find a mailbox in Sao Paulo’s favelas

    Brazil has densely populated low-income communities living on the outskirts of many cities like Rio de Janeiro and Sao Paulo. Ordering online shopping just isn’t an option for residents as these towns don’t have an official address, but that may be changing. The BBC’s Ben Derico reports.

    Marketplace Tech
    enJune 17, 2024

    Related Episodes

    CMMC - Part 1 - Chris Golden - SCW #23

    CMMC - Part 1 - Chris Golden - SCW #23

    Chris Golden, Board Member for the Accreditation Body, will answer questions surrounding the DOD's release of the CMMC program to keep the amount of false information to a minimum.

     

    To view the CMMC Model, visit: https://www.acq.osd.mil/cmmc/docs/CMMC_v1.0_Public_Briefing_20200131_v2.pdf

    Visit https://www.securityweekly.com/scw for all the latest episodes!

    Show Notes: https://wiki.securityweekly.com/SCWEpisode23

    The Cyber Risk/Compliance Transformation Solution - Padraic O'Reilly - SCW #55

    The Cyber Risk/Compliance Transformation Solution - Padraic O'Reilly - SCW #55

    In this segment, we discuss how COVID-19 and rapid Digitalization have pushed risk and compliance teams to innovate internally, and how they’re doing so with real-life examples. How is it even possible to eliminate nearly all manual effort around IT GRC? What is the latest strategy behind cross-walking frameworks and dynamically lighting up controls in an environment? You’ll learn how some of the largest organizations in the world are proving compliance in real-time, empowering their teams to manage even the most unprecedented risks, and how risk and compliance programs get a clear view into risk likelihood, impact, solution-cost modeling and more.

     

    This segment is sponsored by CyberSaint. Visit https://securityweekly.com/cybersaintsecurity to learn more about them!

     

    Visit https://www.securityweekly.com/scw for all the latest episodes!

    Show Notes: https://securityweekly.com/scw55

    Sexy Knowledge - PSW #633

    Sexy Knowledge - PSW #633

    This week, we welcome Kavya Pearlman, CEO at XR Safety Initiative, to talk about Who is going to protect the Brave New Virtual Worlds, and HOW?! In our second segment, we welcome Chris Painter, Commissioner at the Global Commission on the Stability of Cyberspace, to discuss Diplomacy, Norms, and Deterrence in Cyberspace! In the security news, mysterious Drones are Flying over Colorado, 7 Tips for Maximizing Your SOC, The Most Dangerous People on the Internet This Decade, North Korean Hackers Stole 'Highly Sensitive Information' from Microsoft Users, Critical Vulnerabilities Impact Ruckus Wi-Fi Routers, & The Coolest Hacks of 2019!

     

    Show Notes: https://wiki.securityweekly.com/PSWEpisode633

    Visit https://www.securityweekly.com/psw for all the latest episodes!

     

    Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter!

    Follow us on Twitter: https://www.twitter.com/securityweekly

    Like us on Facebook: https://www.facebook.com/secweekly

    Information Sharing - A 360 Degree View, Part 1 - Errol Weiss - SCW #68

    Information Sharing - A 360 Degree View, Part 1 - Errol Weiss - SCW #68

    Errol will talk about his experiences with information sharing and building the world's first Information Sharing & Analysis Center in 1999. Errol brings unique perspective to the table as he was the service provider behind the Financial Services ISAC, then a subscriber and ISAC member for 13 years in the banking and finance sector.

    Segment Resources: Errol's Testimony Before the House Financial Services Subcommittee Transcript - https://www.sifma.org/wp-content/uploads/2012/06/WeissCitionbehalfofSIFMAHFSsubchrgcybersecurity20120601.pdf

    Video - https://www.c-span.org/video/?306361-1/cyberthreats-us-financial-industry

    (Errol Weiss - 30:03)

     

    Visit https://www.securityweekly.com/scw for all the latest episodes!

    Show Notes: https://securityweekly.com/scw68

    Information Sharing - A 360 Degree View, Part 1 - Errol Weiss - SCW #68

    Information Sharing - A 360 Degree View, Part 1 - Errol Weiss - SCW #68

    Errol will talk about his experiences with information sharing and building the world's first Information Sharing & Analysis Center in 1999. Errol brings unique perspective to the table as he was the service provider behind the Financial Services ISAC, then a subscriber and ISAC member for 13 years in the banking and finance sector.

    Segment Resources: Errol's Testimony Before the House Financial Services Subcommittee Transcript - https://www.sifma.org/wp-content/uploads/2012/06/WeissCitionbehalfofSIFMAHFSsubchrgcybersecurity20120601.pdf

    Video - https://www.c-span.org/video/?306361-1/cyberthreats-us-financial-industry (Errol Weiss - 30:03)

     

    Visit https://www.securityweekly.com/scw for all the latest episodes!

    Show Notes: https://securityweekly.com/scw68