CISO Talk by James Azar
CyberHub Podcast
🚨 Cyber News: Palo Alto Fixes ZeroDay, Israel-Iran War Features Cyber Warfare, SiSense Breach, Russian Microsoft Intel
1×
0:00
Current time: 0:00 / Total time: -12:28
-12:28

🚨 Cyber News: Palo Alto Fixes ZeroDay, Israel-Iran War Features Cyber Warfare, SiSense Breach, Russian Microsoft Intel

Today’s top cybersecurity news and the latest threats from Practicing CISO James Azar, tune in to hear how practitioners breakdown the latest to bolster their cybersecurity programs

Palo Alto Zero-Day Vulnerability Management

The episode kicks off with an in-depth discussion of Palo Alto's rapid response to a zero-day vulnerability (CVE-2024-3400) affecting their firewall appliances. Palo Alto has been proactive in releasing hotfixes to mitigate the risk posed by state-sponsored threat actors exploiting this vulnerability.

Action Points:

1. Organizations using Palo Alto appliances should immediately apply the provided hotfixes to vulnerable systems.

2. Monitor network activity for any signs of exploitation or unusual access patterns, especially from external sources.

Sisense Data Breach Update

The podcast addresses a significant breach involving Sisense, a business intelligence software provider. The breach, possibly involving leaked credentials from their GitLab code repository, has led to unauthorized access to customer data.

Action Points:

1. Sisense customers should follow the company’s instructions to rotate all credentials associated with their Sisense environments immediately.

2. Stay informed on updates from Sisense regarding the breach and implement additional security measures as recommended.

Microsoft and the Russian APT Exploit

Discussion then shifts to a recent directive from CISA following a breach of Microsoft by a Russian APT group, named Midnight Blizzard, which led to the theft of sensitive U.S. government data. This incident highlights the risks of nation-state cyber warfare tactics.

Action Points:

1. Federal agencies and other stakeholders should adhere to CISA’s emergency directive, inspecting their systems for indicators of compromise.

2. Strengthen cybersecurity practices around email and network administration, especially concerning sensitive communications.

Roku Account Breaches via Credential Stuffing

The episode also covers the recent Roku account breaches, where attackers used previously stolen credentials to access accounts in a credential stuffing attack.

Action Points:

1. Roku users should change their passwords and avoid using the same password across multiple services.

2. Enable two-factor authentication (2FA) on all online accounts to provide an additional layer of security.

Global Cybersecurity Developments

The final segment of the podcast delves into broader cybersecurity developments, including increased cyberattacks on Israel from Iranian and Hezbollah-backed groups, and the addition of new techniques to the MITRE ATT&CK database related to North Korean cyber operations.

Action Points:

1. Organizations should stay alert to the evolving threat landscape by updating their threat intelligence sources and security protocols regularly.

2. Implement and regularly review security measures designed to detect and mitigate the tactics, techniques, and procedures (TTPs) listed in the MITRE ATT&CK database.

This detailed rundown of the latest episode of the CyberHub Podcast provides not only insights into current cybersecurity threats but also actionable steps for organizations and individuals aiming to protect their digital infrastructures.

Leave a comment

Story Links:

https://www.securityweek.com/palo-alto-networks-releases-fixes-for-firewall-zero-day-as-first-attribution-attempts-emerge/

https://therecord.media/sisense-data-breach-customer-reaction

https://www.securityweek.com/us-government-on-high-alert-as-russian-hackers-steal-critical-correspondence-from-microsoft/

https://www.bleepingcomputer.com/news/security/roku-warns-576-000-accounts-hacked-in-new-credential-stuffing-attacks/

https://www.bleepingcomputer.com/news/mobile/former-atandt-customers-get-63-million-in-data-throttling-refunds/

https://www.darkreading.com/vulnerabilities-threats/dprk-exploits-mitre-sub-techniques-phantom-dll-hijacking-tcc-abuse

https://www.timesofisrael.com/cyberattacks-by-iran-hezbollah-have-tripled-during-the-war-says-israel-cyber-czar/

https://www.jpost.com/israel-news/article-796869

https://cybernews.com/cyber-war/iran-israel-cyberattacks-multiple-gangs-involved/

Apply now to be a featured partner on the show: https://www.cyberhubpodcast.com/contact

******

Listen here: https://linktr.ee/cyberhubpodcast

SubStack:

******

Website: https://www.cyberhubpodcast.com

Youtube: https://www.youtube.com/c/TheCyberHubPodcast

Rumble: https://rumble.com/c/c-1353861

Facebook: https://www.facebook.com/CyberHubpodcast/

Linkedin: https://www.linkedin.com/company/cyberhubpodcast/

Twitter: https://twitter.com/cyberhubpodcast

Instagram: https://www.instagram.com/cyberhubpodcast

The Hub of the Infosec Community.

Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.

Share

Discussion about this podcast

CISO Talk by James Azar
CyberHub Podcast
Today’s top cybersecurity news and the latest from Practicing CISO James Azar, tune in to hear how practitioners read, view and work after hearing the latest headlines and how these stories help keep practitioners sharp and ready.