CISO Talk by James Azar
CyberHub Podcast
🚨 Cyber News: Apple Zeroday, NSA Zero Trust Guidelines, Sanctions on Predator Spyware, Consolidation & Cybersec Capital Raises
1×
0:00
Current time: 0:00 / Total time: -14:32
-14:32

🚨 Cyber News: Apple Zeroday, NSA Zero Trust Guidelines, Sanctions on Predator Spyware, Consolidation & Cybersec Capital Raises

Apple and Android Security Updates

Apple and Android have issued critical updates to patch several zero-day vulnerabilities that were actively exploited in the wild. For Apple devices, the updates include iOS and iPadOS versions 17.4 and 16.7.6, addressing kernel and RTKit issues that could bypass memory protections. Android's March update resolves 38 vulnerabilities, with two critical flaws in the system component that could allow for remote code execution and privilege escalation.

Action Points:

1. Ensure all Apple and Android devices are immediately updated to the latest versions.

2. Regularly monitor for and apply security patches to safeguard against known vulnerabilities.

Southern Company's Proactive Cybersecurity Measures

Southern Company took significant steps to enhance its cybersecurity by creating a comprehensive software bill of materials (SBOM) for one of its Mississippi substations. The initiative involved a meticulous inventory of all hardware, software, firmware, and their interdependencies, revealing potential exploitable vulnerabilities. This hands-on, ground-level approach exemplifies best practices in cybersecurity within the operational technology (OT) sector.

Action Points:

1. Consider implementing a similar SBOM project for critical infrastructure components to identify and mitigate security risks.

2. Adopt a hands-on approach to cybersecurity, emphasizing the importance of understanding and managing system interdependencies.

Emerging Threats: Malware Exploiting Misconfigured Servers

A new campaign has been discovered where attackers use Golang-based malware to exploit misconfigured servers running Apache Hadoop, Yarn, Docker, Confluence, or Redis. The malware automates the discovery and compromise of vulnerable systems, leveraging an old vulnerability in Confluence for code execution.

Action Points:

1. Conduct thorough audits to identify and rectify misconfigurations in server environments.

2. Stay informed about emerging threats and ensure that all software is up-to-date with the latest security patches.

Share

Advancing Zero Trust Principles

The NSA has released new guidance aimed at helping organizations limit adversary movement within their networks by adopting Zero Trust principles. This guidance outlines various components and pillars that could be exploited in an attack and provides recommendations for using Zero Trust to identify and mitigate malicious activities.

Action Points:

1. Review and incorporate the NSA's guidance on Zero Trust into your cybersecurity strategy.

2. Evaluate and enhance the maturity of your organization's Zero Trust implementation to address potential vulnerabilities.

Sanctions Against Predator Spyware Associates

The United States has imposed sanctions on individuals and entities associated with the development and distribution of Predator spyware, which has been used to target Americans, including government officials and journalists. The sanctions aim to disrupt the operations and distribution networks of this invasive software.

Action Points:

1. Assess and ensure compliance with the sanctions, particularly for organizations that may have business dealings with the targeted entities.

2. Remain vigilant about the use of commercial spyware technologies and their potential impact on privacy and security.

Investment and Innovation in Cybersecurity

The cybersecurity industry sees substantial investment and growth, with significant funding rounds for companies like Axanos and Team8. Additionally, CrowdStrike's acquisition of Float Security underscores the ongoing consolidation and innovation in the sector, promising enhanced capabilities for cloud security and data protection.

Action Points:

1. Explore opportunities for innovation and investment in cybersecurity to stay ahead of evolving threats.

2. Consider strategic partnerships or acquisitions to expand capabilities and address emerging security challenges.

Closing Remarks:

The latest episode of the CyberHub Podcast offers a comprehensive overview of the current cybersecurity landscape, highlighting the importance of timely updates, proactive defense strategies, and the impact of investments in shaping the future of cybersecurity. Stay tuned for more insights and actionable advice to navigate the complex world of cyber threats and defenses.

Share

Show Notes and Story Links:

https://www.securityweek.com/apple-blunts-zero-day-attacks-with-ios-17-4-update/

https://www.securityweek.com/androids-march-2024-update-patches-critical-vulnerabilities/

https://www.darkreading.com/ics-ot-security/southern-company-builds-a-power-substation-sbom

https://www.securityweek.com/cisa-warns-of-pixel-phone-vulnerability-exploitation/

https://www.bleepingcomputer.com/news/security/hackers-target-docker-hadoop-redis-confluence-with-new-golang-malware/

https://www.bleepingcomputer.com/news/security/nsa-shares-zero-trust-guidance-to-limit-adversaries-on-the-network/

https://www.bleepingcomputer.com/news/legal/us-sanctions-predator-spyware-operators-for-spying-on-americans/

https://www.securityweek.com/axonius-banks-200-million-in-late-stage-funding/

https://www.securityweek.com/crowdstrike-to-acquire-flow-security/

https://www.securityweek.com/investment-firm-team8-raises-additional-500-million/

Thank you for watching and Please Don't forget to Like this video and Subscribe to my Channel!

Apply now to be a featured partner on the show: https://www.cyberhubpodcast.com/contact

******

Listen here: https://linktr.ee/cyberhubpodcast

SubStack:

******

Website: https://www.cyberhubpodcast.com

Youtube: https://www.youtube.com/c/TheCyberHubPodcast

Rumble: https://rumble.com/c/c-1353861

Facebook: https://www.facebook.com/CyberHubpodcast/

Linkedin: https://www.linkedin.com/company/cyberhubpodcast/

Twitter: https://twitter.com/cyberhubpodcast

Instagram: https://www.instagram.com/cyberhubpodcast

The Hub of the Infosec Community.

Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.

Discussion about this podcast

CISO Talk by James Azar
CyberHub Podcast
Today’s top cybersecurity news and the latest from Practicing CISO James Azar, tune in to hear how practitioners read, view and work after hearing the latest headlines and how these stories help keep practitioners sharp and ready.