CISO Talk by James Azar
CyberHub Podcast
🚨 Cyber News: NIST CSF 2.0 Released, ThyssenKrupp cyberattack, MGM Woes, HHS Settlement, China & Russia News
1×
0:00
Current time: 0:00 / Total time: -14:31
-14:31

🚨 Cyber News: NIST CSF 2.0 Released, ThyssenKrupp cyberattack, MGM Woes, HHS Settlement, China & Russia News

Today’s top cybersecurity news and the latest from Practicing CISO James Azar, tune in to hear how practitioners read, view and work after hearing the latest headlines

Good morning, security enthusiasts and practitioners! In this episode of the CyberHub Podcast, hosted by James Azar on February 27, 2024, we delve into a range of crucial topics impacting the cybersecurity landscape.

From the eagerly anticipated NIST CSF 2.0 release to significant data breaches, regulatory fines, and evolving cyber threats, this episode is packed with insights and actionable advice for cybersecurity professionals.

NIST CSF 2.0: A New Era of Cybersecurity Framework

The release of the NIST Cybersecurity Framework (CSF) 2.0 marks a significant evolution in cybersecurity standards. Addressing feedback on its predecessor's operational limitations, the new framework introduces "Govern" as a sixth function, enhancing its applicability to corporate governance of security. This addition underscores the framework's transition from mere guidance to a more operational tool for practitioners.

Action Points:

1. Review and integrate the "Govern" function into existing cybersecurity strategies to align with NIST CSF 2.0.

2. Attend discussions and webinars, such as the one hinted by James Azar with Chris Folan, to gain deeper insights into leveraging NIST 2.0 effectively.

Data Breaches and Cyber Incidents: A Persistent Threat

- Tyson Krupp's IT Shutdown: Following a security breach in its automotive division, Tyson Krupp, a leading steel producer, was forced to shut down its IT systems. The nature of the breach remains undisclosed, highlighting the constant vigilance required in monitoring and securing corporate networks.

- Optum and Change Healthcare Under Siege: The United Healthcare subsidiary, Optum, fell victim to the Black Cat ransomware group, causing significant disruptions not only to its operations but also to Change Healthcare's services. This incident, overshadowed by an AT&T outage, had profound implications on healthcare service delivery.

Action Points:

1. Implement rigorous incident response plans to swiftly address potential breaches.

2. Enhance monitoring and security measures, especially for organizations within the healthcare sector, to mitigate the impact of ransomware attacks.

Adapting to the Cloud: The Rise of Cyber Espionage

Russian cyber espionage actors, notably Cozy Bear, are shifting their focus to cloud services, employing brute force and sophisticated techniques to bypass security measures like MFA. This strategic pivot underscores the need for robust cloud security protocols.

Action Points:

1. Strengthen cloud service accounts with advanced security measures to thwart brute force and password-spraying attacks.

2. Educate staff on the risks of MFA fatigue and implement security solutions that can resist such tactics.

The Subdued Mailing Campaign: A Call for Domain Vigilance

An ad fraud campaign named "Subdued Mailing" is exploiting legitimate domains to conduct scams, affecting notable brands. This campaign highlights the importance of domain security and the potential reputational damage from such frauds.

Action Points:

1. Regularly audit and secure domains and subdomains to prevent hijacking.

2. Implement robust email filtering and verification technologies to detect and block fraudulent activities.

Regulatory Actions and Patches: Keeping Pace with Compliance

MGM's Regulatory Scrutiny: Following a ransomware attack, MGM faces investigations, spotlighting the regulatory repercussions of cybersecurity lapses.

Zyxel's Proactive Patching: Zyxel addresses vulnerabilities in its products, emphasizing the critical nature of timely software updates.

Action Points:

1. Ensure compliance with industry regulations to avoid financial and reputational damage.

2. Prioritize and expedite the application of security patches to protect against known vulnerabilities.

China's Data Security Initiatives: A Double-Edged Sword

China's ambitious plan to bolster data security in its industrial sector by 2026 reveals a dual focus on enhancing protection while also raising concerns about increased surveillance and insider threats.

Action Points:

1. Monitor and assess the implications of China's data security initiatives on global cybersecurity practices.

2. Implement insider threat programs to detect and mitigate risks from within the organization.

Conclusion

This episode of the CyberHub Podcast provides a comprehensive overview of the current cybersecurity landscape, highlighting the evolution of standards, the persistence of cyber threats, and the importance of regulatory compliance and proactive security measures. By adopting the outlined action points, cybersecurity practitioners can navigate these challenges effectively, ensuring robust defense mechanisms in an ever-evolving digital world. Stay tuned for more insights and discussions, and remember to stay cyber safe!

Share

Show Notes and Story Links:

https://www.securityweek.com/nist-cybersecurity-framework-2-0-officially-released/

https://www.bleepingcomputer.com/news/security/steel-giant-thyssenkrupp-confirms-cyberattack-on-automotive-division/

https://www.bleepingcomputer.com/news/security/unitedhealth-subsidiary-optum-hack-linked-to-blackcat-ransomware/

https://www.securityweek.com/russian-cyberspies-targeting-cloud-infrastructure-via-dormant-accounts/

https://www.bleepingcomputer.com/news/security/hijacked-subdomains-of-major-brands-used-in-massive-spam-campaign/

https://www.cybersecuritydive.com/news/mgm-resorts-federal-state-probes-cyberattack/708494/

https://www.securityweek.com/zyxel-patches-remote-code-execution-bug-in-firewall-products/

https://www.cybersecuritydive.com/news/hhs-ransomware-settlement/708236/

https://www.darkreading.com/cybersecurity-operations/china-rolls-out-strategy-to-prevent-hacking-from-foreign-entities

Thank you for watching and Please Don't forget to Like this video and Subscribe to my Channel!

Apply now to be a featured partner on the show: https://www.cyberhubpodcast.com/contact

******

Listen here: https://linktr.ee/cyberhubpodcast

SubStack:

******

Website: https://www.cyberhubpodcast.com

Youtube: https://www.youtube.com/c/TheCyberHubPodcast

Rumble: https://rumble.com/c/c-1353861

Facebook: https://www.facebook.com/CyberHubpodcast/

Linkedin: https://www.linkedin.com/company/cyberhubpodcast/

Twitter: https://twitter.com/cyberhubpodcast

Instagram: https://www.instagram.com/cyberhubpodcast

The Hub of the Infosec Community.

Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.

Discussion about this podcast

CISO Talk by James Azar
CyberHub Podcast
Today’s top cybersecurity news and the latest from Practicing CISO James Azar, tune in to hear how practitioners read, view and work after hearing the latest headlines and how these stories help keep practitioners sharp and ready.