CISO Talk by James Azar
CyberHub Podcast
🚨 CrowdStrike Root Cause Released, Microsoft Hits Back, Criminals Remote Wipe Devices, Interpol Recovery
1×
0:00
-18:40

🚨 CrowdStrike Root Cause Released, Microsoft Hits Back, Criminals Remote Wipe Devices, Interpol Recovery

Today’s top cybersecurity news and the latest threats from Practicing CISO James Azar, tune in to hear how practitioner’s breakdown the latest to bolster their cybersecurity programs

Welcome to another exciting episode of the CyberHub Podcast from Hacker Summer Camp.

Brought to you by our friends at Nudge Security: Nudge Security free 14-day trial to all CyberHub Podcast community members at https://www.nudgesecurity.com/cyberhub

We have a packed show today with crucial updates on cybersecurity incidents and industry developments.

CrowdStrike's Root Cause Analysis

CrowdStrike has released a detailed root cause analysis on a mishap that significantly disrupted the global economy. The issue stemmed from an out-of-bounds read in the content interpreter of the Falcon EDR sensor, caused by a mismatch between inputs validated by a content validator and those provided to a content interpreter. This resulted in a system crash.

Mobile Guardian Breach

UK-based Mobile Guardian suffered a breach, leading to the remote wiping of thousands of devices. The incident involved unauthorized access to iOS and Chrome OS devices, primarily impacting the education sector, including 13,000 student devices in Singapore.

Action Items:

  • Reassess the use of Mobile Guardian applications and consider alternative solutions for managing devices.

Interpol's Global Stop Payment Mechanism

Interpol successfully recovered over $40 million stolen in a business email compromise (BEC) attack on a Singapore-based company. The funds were wired to attacker-controlled bank accounts but were recovered through Interpol's intervention.

CISO Talk by James Azar is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.

Elastic Security's Study on Reputation-Based Security

Elastic Security researchers found that reputation-based security controls might not be as effective as assumed. Attackers use techniques like digitally signed malware, reputation hijacking, and specially crafted LNK files to bypass these controls.

Action Items:

  • Continuously improve defense-in-depth strategies and ensure regular updates to security mechanisms.

  • Stay informed about emerging threats and adapt security measures accordingly.

APT28's Car Sales Scam

APT28, a Russian-linked hacking group, has been distributing headless malware through fake car sales advertisements targeting diplomats. The malware is hidden in deceptive ads and uses public services to host malicious elements.

NHS Ransomware Attack Fine

Advance, an NHS software supplier, faces a £6 million fine for failing to protect data, resulting in a ransomware attack that disrupted services. The attack exfiltrated personal information and critical service details.

Action Items:

  • Implement stronger cybersecurity measures and ensure compliance with data protection regulations.

  • Regularly review and update security protocols to protect sensitive information.

Samsung Bug Bounty Program

Samsung announced payouts of nearly $5 million through its bug bounty program since 2017. This initiative rewards researchers for responsibly disclosing vulnerabilities in Galaxy mobile devices.

Stay tuned for more updates and insights on the latest in cybersecurity. Enjoy Hacker Summer Camp, and stay cyber safe! Connect with us on social media and subscribe to our podcast for more information.

Share

✅ Story Links: 

https://www.securityweek.com/crowdstrike-releases-root-cause-analysis-of-falcon-sensor-bsod-crash/

https://www.securityweek.com/microsoft-hits-back-at-delta-after-the-airline-said-last-months-tech-outage-cost-it-500-million/

https://www.securityweek.com/thousands-of-devices-wiped-remotely-following-mobile-guardian-hack/

https://www.bleepingcomputer.com/news/security/interpol-recovers-over-40-million-stolen-in-a-bec-attack/

https://www.darkreading.com/application-security/attackers-use-multiple-techniques-to-bypass-reputation-based-security

https://thecyberexpress.com/apt28-groups-fake-car-ads-headlace-malware/

https://therecord.media/nhs-software-supplier-hit-with-6-million-fine

https://www.securityweek.com/samsung-bug-bounty-program-payouts-reach-5m-top-reward-increased-to-1m/

🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1  

✅ Important Links to Follow: 

👉Substack:

👉Listen here: https://linktr.ee/cyberhubpodcast   

✅ Stay Connected With Us.

👉Facebook: https://www.facebook.com/CyberHubpodcast/ 

👉LinkedIn: https://www.linkedin.com/company/cyberhubpodcast/ 

👉Twitter (X): https://twitter.com/cyberhubpodcast 

👉Instagram: https://www.instagram.com/cyberhubpodcast 

✅ For Business Inquiries:  info@cyberhubpodcast.com

=============================

✅ About The CyberHub Podcast.

The Hub of the Infosec Community. 

Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. 

Tune in to our podcast Monday through Thursday at 9AM EST for the latest news.

Discussion about this podcast

CISO Talk by James Azar
CyberHub Podcast
Today’s top cybersecurity news and the latest from Practicing CISO James Azar, tune in to hear how practitioners read, view and work after hearing the latest headlines and how these stories help keep practitioners sharp and ready.