Week in Review: Microsoft deactivation flaw, BeyondTrust on KEV, LLM generated malware
Dec 27, 2024
auto_awesome
Steve Zalewski, a seasoned cybersecurity advisor and CISO in residence, joins to dive into the current landscape of cyber threats. He discusses the ongoing vulnerabilities in Microsoft 365, particularly concerning product deactivation and phishing risks. Zalewski also critiques traditional responses like rebooting systems to solve flaws, advocating for a more robust cybersecurity strategy. The conversation highlights the dangers of large language models creating malware and underscores the critical need for innovative defenses in today’s tech-driven world.
The phishing attack on General Dynamics underscores the persistent risk of human error in cybersecurity, necessitating ongoing training and communication for employees.
Japan Airlines' cyber incident highlights the vulnerabilities of essential services to attacks during peak periods, raising concerns about infrastructure resilience amidst rising cyber threats.
Deep dives
Phishing Attack Targeting General Dynamics Employees
General Dynamics experienced a phishing attack that compromised the accounts of 37 employees, highlighting the ongoing issue of social engineering in cybersecurity. The attackers deceived employees into revealing their usernames and passwords through a fraudulent advertising campaign, which led to unauthorized access to sensitive personal information, including PII and government IDs. Despite the company's efforts in cybersecurity training and protocols, human error remains a significant vulnerability, underscoring the importance of continuously addressing user behavior in security strategies. This case illustrates the persistent challenge organizations face in balancing security measures with user accessibility, emphasizing the need for effective communication and training around the necessity of such precautions.
Cyber Attack Affects Japan's Airline Operations
Japan Airlines reported a cyber attack that disrupted its operations by shutting down critical router systems, leading to delays and a temporary halt in ticket sales during a peak travel period. Thankfully, no customer data was compromised, and operations returned to normal quickly. This event coincides with another outage experienced by American Airlines, prompting concerns about the resilience of systems critical to public transportation infrastructure during busy travel times. The incident raises broader questions about the vulnerabilities of essential services to cyber threats, particularly during high-stress periods like holiday travel.
TechCrunch's Review of Poorly Managed Data Breaches
TechCrunch released a list of the most poorly handled data breaches of 2024, highlighting significant lapses in cybersecurity protocols at several organizations. Notable examples include 23andMe, which attributed the breach to customer negligence regarding password security, and Change Healthcare, which took months to acknowledge extensive data theft that stemmed from inadequate security measures. This list emphasizes recurring themes of human error and organizational failure to prioritize sufficient security measures, particularly in identity and access management. The pattern observed in these breaches underscores the critical need for stronger enforcement of multi-factor authentication and better communication of security responsibilities between companies and their customers.
This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Steve Zalewski, CISO in Residence
Thanks to our show sponsor, ThreatLocker
Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker.ThreatLocker helps you take a proactive, default-deny approach to cybersecurity and provides a full audit of every action, allowed or blocked, for risk management and compliance. Onboarding and operation are fully supported by their US-based support team.To learn more about how ThreatLocker can help keep your organization running efficiently and protected from ransomware, visit ThreatLocker.com.
All links and the video of this episode can be found on CISO Series.com
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.