Logo

    moveit

    Explore " moveit" with insightful episodes like "2024 Cyber Trends & Threats - Ep 78", "Private Electronic Graffiti Tags with Graham Cluley from Smashing Security", "Storm-0558", "Focus on student privacy and breaches" and "516: The Fixer-Upper" from podcasts like ""Reimagining Cyber - real world perspectives on cybersecurity", "Random but Memorable", "State of Cybercrime", "Talk Out of School" and "LINUX Unplugged"" and more!

    Episodes (10)

    2024 Cyber Trends & Threats - Ep 78

    2024 Cyber Trends & Threats - Ep 78

    In this episode, hosts Stan Wisseman and Rob Aragao reflect on the cybersecurity landscape of 2023 and discuss its potential impacts on the upcoming year, 2024. They delve into the alarming increase in incidents and breaches, noting a 30% rise. The conversation covers major breaches, such as the MOVEit and Okta incidents, emphasizing the growing threat of ransomware across various sectors.

    The hosts highlight the interconnectedness of organizations, raising concerns about dependency on common platforms and the resulting ripple effect during security breaches. They stress the importance of reevaluating security controls and adopting a layered approach to mitigate vulnerabilities.

    The episode also explores the escalating cyber warfare between nation-states, citing the ongoing conflict between Ukraine and Russia. Stan and Rob anticipate an increase in nation-state cyber threats, emphasizing the need for enhanced threat intelligence and proactive cyber defense measures.

    Regulations, including the SEC cyber rule and the EU Act, are discussed as significant factors shaping the cybersecurity landscape. The hosts predict a continued evolution of regulations, emphasizing the need for organizations to adapt to changing compliance requirements.

    The conversation touches on the emergence of generative AI and its impact on various industries, especially in cybersecurity. Stan and Rob acknowledge the dual nature of AI as both a tool for efficiency and a potential threat in the hands of malicious actors. They predict ongoing discussions about the regulation of AI and its implications.

    Other topics include cyber insurance, where the hosts anticipate increased scrutiny and tighter requirements, and the importance of leveraging insurance requirements to drive cybersecurity improvements within organizations.

    As the hosts look ahead to 2024, they emphasize the race between cybersecurity defenders and threat actors, acknowledging the potential for increased efficiency on the defenders' side but recognizing the challenges posed by the evolving threat landscape.

    Other episodes mentioned in this edition:
    Time to Take Them More Seriously - What's Iran Doing in Cyber?  - EP 11
    https://www.buzzsprout.com/2004238/episodes/10791018

    Progress Over Perfection - Implementing the Executive Order - EP18
    https://www.buzzsprout.com/2004238/episodes/10791011

    SEC Cyber Rules Just Got Real - EP 69
    https://www.buzzsprout.com/2004238/episodes/13875180

    SEC Cyber Rules Forcing Boards to Pivot - EP 57
    https://www.buzzsprout.com/2004238/episodes/12344694

    US National Cybersecurity Strategy and EU Cyber Resilience Act - EP 61
    https://www.buzzsprout.com/2004238/episodes/12532348

    NIS2 Directive: Cyber Insights - EP 76
    https://www.buzzsprout.com/2004238/14173706

    AI and ChatGPT - Security, Privacy and Ethical Ramifications - EP 62


    Follow or subscribe to the show on your preferred podcast platform.
    Share the show with others in the cybersecurity world.
    Get in touch via reimaginingcyber@gmail.com

    Private Electronic Graffiti Tags with Graham Cluley from Smashing Security

    Private Electronic Graffiti Tags with Graham Cluley from Smashing Security

    How has the cybersecurity landscape changed since the days of the floppy-disc? 💾 This week, we sit down with Smashing Security's Graham Cluley, to reflect on how threats have evolved. Graham also dishes his top security tips and explains why celebrating infamous hackers angers him. 🤬

    Tune in for our favorite ways to use tags with 1Password in Did You Know? Plus, Roo hosts HackerNoHacker for a Matt vs Sara showdown. 🥊💥

    🎉  Giveaway - Cybersecurity Awareness Month

    We’re running a giveaway!

    In celebration of Cybersecurity Awareness Month during the month of October, we're giving you the chance to win 1 free year of 1Password.  Write into the show with your favorite 1Password tip or fun use-case – No matter how weird and wonderful we still want to hear from you! Any we read out will win 1 year of 1Password free. 

    You can write into the show at podcast@1password.com or send us a tweet/X with the hashtag: #rbmgiveaway

    Entries close by October 25th 2023 and we’ll announce winners on October 31st 2023.

    🏰  Watchtower Weekly

    🎙  Guest Interview – Graham Cluley

    Did You Know?

    🗣 Want more Random but Memorable?

    📲  Follow Us…

    ❤️  Review Us...

    If you're loving the show, please leave us a review on Apple Podcasts or wherever you listen to podcasts.

    Storm-0558

    Storm-0558
    A Microsoft zero-day vulnerability has allowed hacking group Storm-0558 to forge Azure AD authentication tokens, and breach organizations — including U.S. government agencies — in the past week. Watch this State of Cybercrime episode to hear our experts break down how this attack happened, see the discoveries made by the Varonis Threat Labs team, and learn what you can do to make sure your data is safe and secure.

    Focus on student privacy and breaches

    Focus on student privacy and breaches

    NY Daily News, NYC school officials were warned of cybersecurity flaws weeks before attack on student data, July 9, 2023; https://www.nydailynews.com/new-york/education/ny-state-comptroller-warned-schools-of-cybersecurity-issues-before-nyc-breach-20230709-5nxdgo724rg3fi5mvpbt7lrzy4-story.html •

    Audit from the Office of the State Comptroller, Privacy and Security of Student Data, May 2023;  https://www.osc.state.ny.us/files/state-agencies/audits/pdf/sga-2023-21s29.pdf

    To contact the State Comptroller's State Government Accountability office with concerns about NYSED and/or NYC lack of compliance with the state student privacy law; contact Audit Director: Nadine Morrell;  Phone: (518) 474-3271 Email: StateGovernmentAccountability@osc.ny.gov

    The Journal,  K–12 Ransomware Attacks Rose 43% in 2022, Encryption Used More Often, Survey Shows, June 8. 2023; https://thejournal.com/articles/2023/06/08/k12-ransomware-attacks-rose-43-percent-in-2022-encryption-used-more-often.aspx

    Sophos, The State of Ransomware 2023; https://assets.sophos.com/X24WTUEQ/at/c949g7693gsnjh9rb9gr8/sophos-state-of-ransomware-2023-wp.pdf

    EdSurge, Student Privacy Is at More Risk Than Ever Before. Can K-12 Schools Keep It Safe? April, 17, 2023; https://www.edsurge.com/news/2023-04-17-student-privacy-is-at-more-risk-than-ever-before-can-k-12-schools-keep-it-safe

     74 Interview: Cybersecurity Expert Doug Levin on the Harms of Student Data Hacks, May 31, 2022; https://www.the74million.org/article/74-interview-cybersecurity-expert-levin-on-the-harms-of-student-data-hacks/

     K12 Security Information Exchange (K12 SIX). “The State of K-12 Cybersecurity: Year in Review – 2022 Annual Report.” https://static1.squarespace.com/static/5e441b46adfb340b05008fe7/t/6228bfe3f412c818293e16e1/1646837732368/StateofK12Cybersecurity2022.pdf

     EdWeek Market Brief: K-12 Dealmaking: Frontline Acquired for $3.7B; Illuminate Education Bought by Renaissance; https://marketbrief.edweek.org/marketplace-k-12/k-12-dealmaking-frontline-acquired-3-7b-illuminate-bought-renaissance/

    The MOVEit Exploit

    The MOVEit Exploit
    Across the globe, CL0P ransomware group is extorting hundreds of organizations after exploiting an unknown SQL injection vulnerability in file transfer service MOVEit. The victims need to contact the ransomware group by June 14 or their stolen data will be published publicly on the group’s extortion site. Join Matt Radolec, David Gibson, and special guest Dvir Sason to learn more about how the ransomware group exploited the critical flaw in the transfer application, which they were likely experimenting with since 2021.

    Episode 155 - The Really Late Show

    Episode 155 - The Really Late Show

    This week in InfoSec (10:21)

    With content liberated from the “today in infosec” twitter account and further afield

    8th June 1989: The beta release of the Bourne Again SHell (Bash) was announced as version 0.99. 2 months later Shellshock was introduced into the Bash source code and persisted in subsequent versions for over 25 years.

    v0.99 release announcement

    https://twitter.com/todayininfosec/status/1666487525320318988

    3rd June 1983: Would You Like to Play a Game?

    The science fiction film WarGames is released. Notable for bringing the hacking phenomena to the attention of the American public, it ignites a media sensation regarding the hacker sub-culture. The film’s NORAD set is the most expensive ever built at the time at a cost of $1 million dollars. 

    Not widely known is that the movie studio provided the film’s star, Matthew Broderick, with the arcade games Galaga and Galaxian so he could get first-hand experience before shooting the film’s arcade scenes.

     

    Rant of the Week (17:16)

    Barracuda Urges Replacing — Not Patching — Its Email Security Gateways

    It’s not often that a zero-day vulnerability causes a network security vendor to urge customers to physically remove and decommission an entire line of affected hardware — as opposed to just applying software updates. But experts say that is exactly what transpired this week with Barracuda Networks, as the company struggled to combat a sprawling malware threat which appears to have undermined its email security appliances in such a fundamental way that they can no longer be safely updated with software fixes.

    Barracuda tells its ESG owners to 'immediately' junk buggy kit

     

    Billy Big Balls of the Week (24:45)

    US govt now bans TikTok from contractors' work gear

    BYODALAINGTI (as long as it's not got TikTok installed)

    The US federal government's ban on TikTok has been extended to include devices used by its many contractors - even those that are privately owned. The bottom line: if some electronics are used for government work, it better not have any ByteDance bits on it. 

    The interim rule was jointly issued by NASA, the Department of Defense and the General Services Administration, which handles contracting for US federal agencies. The change amends the Federal Acquisition Regulation to prohibit TikTok, any successor application, or any software produced by TikTok's Beijing-based parent ByteDance from being present on contractor devices. 

    "This prohibition applies to devices regardless of whether the device is owned by the government, the contractor, or the contractor's employees. A personally-owned cell phone that is not used in the performance of the contract is not subject to the prohibition," the trio said in their update notice published in the Federal Register. 

    The rule would apply to all contracts, even those below the "simplified acquisition threshold" of $250,000, purchases of commercial and off-the-shelf equipment, and commercial services so get ready to wipe those company phones, cloud services providers and MSPs that do business with Uncle Sam. 

    AND 

    British Airways, Boots, BBC payroll data stolen in MOVEit supply-chain attack

    British Airways, the BBC, and UK pharmacy chain Boots are among the companies whose data has been compromised after miscreants exploited a critical vulnerability in deployments of the MOVEit document-transfer app.

    Microsoft reckons the Russian Clop ransomware crew stole the information.

    British Airways, the BBC, and Boots were not hit directly. Instead, payroll services provider Zellis on Monday admitted its MOVEit installation had been exploited, and as a result "a small number of our customers" – including the aforementioned British trio – had their information stolen.

    Zellis claims to be the largest payroll and human resources provider in the UK, and its customers include Sky, Harrods, Jaguar, Land Rover, Dyson, and Credit Suisse. In a statement posted on its website, Zellis blamed the MOVEit vulnerability for the security breach, and noted "all Zellis-owned software is unaffected and there are no associated incidents or compromises to any other part of our IT estate."

     

    Industry News  (34:33)

    Clop Ransom Gang Breaches Big Names Via MOVEit Flaw

    FBI Warns of Surge in Deepfake Sextortion Attempts

    Cisco Counterfeiter Pleads Guilty to $100m Scheme

    Cyber Extortionists Seek Out Fresh Victims in LatAm and Asia

    Lazarus Group Blamed for Atomic Wallet Heist

    Interpol: Human Trafficking is Fueling Fraud Epidemic

    Microsoft Brings OpenAI Tech to US Agencies

    Pharmaceutical Giant Eisai Hit By Ransomware Incident

    Espionage Attacks in North Africa Linked to "Stealth Soldier" Backdoor

     

    Tweet of the Week (43:58)

    https://twitter.com/elonmusk/status/1666964082363371520

    https://twitter.com/sawaba/status/1666930930714279942

    https://www.forbes.com/lists/most-cybersecure-companies/

    Come on! Like and bloody well subscribe!

    Outlook.com igen nede, Clop tager ansvar for angreb på MOVEit, GIGABYTE patcher for 270 motherboards

    Outlook.com igen nede, Clop tager ansvar for angreb på MOVEit, GIGABYTE patcher for 270 motherboards

    Tre nyheder dækker dagens udsendelse: Ransomwaregruppen Clop har taget ansvar for det nylige angreb på MOVEit.

    GIGABYTE har udgivet kritiske opdateringer til over 270 motherboard-modeller.

    Outlook.com har oplevet nedbrud, og brugere har ikke kunnet tilgå deres onlinekonti.

    Vært: Omar Hawwash, Cybersikkerhedskonsulent og journalist, LEVEL7

    ISC StormCast for Monday, June 5th, 2023

    Logo

    © 2024 Podcastworld. All rights reserved

    Stay up to date

    For any inquiries, please email us at hello@podcastworld.io