CISO Talk by James Azar
CyberHub Podcast
🚨 Cyber News: ZenHammer Attacks on AMD, China Behind 2021 Breach, SharePoint Flaw Exploited, Ray Framework Attack
1×
0:00
Current time: 0:00 / Total time: -18:55
-18:55

🚨 Cyber News: ZenHammer Attacks on AMD, China Behind 2021 Breach, SharePoint Flaw Exploited, Ray Framework Attack

Today’s top cybersecurity news and the latest from Practicing CISO James Azar, tune in to hear how practitioners read, view and work after hearing the latest headlines

In today's episode of the CyberHub Podcast, we delve into a range of critical cybersecurity topics, offering insights into recent vulnerabilities, emerging threats, and strategic responses to safeguard digital assets.

Let's unpack the key stories covered:

SharePoint Vulnerabilities and Federal Mandates

Researchers have uncovered significant vulnerabilities in SharePoint, prompting the Cybersecurity and Infrastructure Security Agency (CISA) to mandate federal government organizations to patch these flaws by April 16. Given SharePoint's widespread use for data and information storage, exploiting these vulnerabilities could grant attackers deep insights into organizational processes, making subsequent attacks more credible.

Action Points:

1. Organizations should prioritize patching the identified SharePoint vulnerabilities immediately.

2. Conduct regular security audits of SharePoint and other critical systems to ensure compliance with the latest security standards.

Microsoft Exchange Server Exposures in Germany

The German National Cybersecurity Authority has issued a warning regarding 17,000 exposed Microsoft Exchange servers vulnerable to critical security flaws. With a significant percentage of servers running outdated or unpatched versions, the potential for exploitation is high.

Action Points:

1. Update and patch Exchange servers, especially those accessible from the internet.

2. Consider restricting access to web-based Exchange services or securing them through VPNs.

AMD CPUs and Rowhammer Attacks

Researchers at ETH Zurich have demonstrated that Rowhammer attacks, which exploit vulnerabilities in dynamic random access memory, can affect systems with AMD Zen 2 and Zen 3 CPUs. Despite the complexity of such attacks, the findings highlight the need for ongoing vigilance and mitigation strategies.

Action Points:

1. Stay informed about the latest research and developments in hardware security.

2. Implement recommended hardware and firmware updates from manufacturers to mitigate potential vulnerabilities.

Rockwell Automation's Security Enhancements

Rockwell Automation has responded to 10 vulnerabilities in its Factory Talk, PowerFlex, and Arena Simulation products by releasing security advisories. The appointment of a new VP and CISO, Stephen Ford, signals the company's commitment to addressing these challenges amidst broader concerns, including a DOJ investigation into its supply chain practices.

Action Points:

1. Users of Rockwell Automation's products should apply the provided patches to address the vulnerabilities.

2. Monitor updates and advisories from Rockwell Automation and other technology providers to stay ahead of potential threats.

Ray Framework Exploitation

The Ray open-source AI framework has been found vulnerable to an exploit dubbed "ShadowRay," which could allow attackers to hijack computational resources and leak sensitive data. Despite AnyScale's stance that Ray should not be used outside controlled environments, the exploit's existence underscores the importance of secure deployment practices.

Action Points:

1. Ensure secure configuration and deployment of AI frameworks like Ray, particularly when used in internet-exposed environments.

2. Conduct regular security assessments of AI and machine learning infrastructure to prevent unauthorized access.

China's Cyber Espionage Activities

Recent reports have highlighted China's extensive cyber espionage efforts, including the targeting of the Finnish Parliament by APT31 and surveillance operations against US and Western individuals critical of Chinese policies. These activities raise concerns about the ethics and reach of state-sponsored cyber operations.

Action Points:

1. Strengthen defenses against state-sponsored cyber threats, including advanced persistent threat (APT) groups.

2. Enhance awareness and training for individuals and organizations likely to be targeted by foreign espionage efforts.

Agenda Ransomware's Focus on VMware ESXi Servers

The Agenda ransomware group has intensified its attacks on VMware ESXi servers, leveraging a new Rust-based variant of its malware. The targeting of critical virtualized environments underscores the need for robust security measures in virtual infrastructure.

Action Points:

1. Engage with EDR and XDR providers to ensure protection against ransomware threats targeting virtualized environments.

2. Regularly back up and secure virtual machines and associated data to mitigate the impact of potential ransomware attacks.

In summary, today's podcast episode highlights the dynamic and challenging nature of the cybersecurity landscape.

From addressing critical vulnerabilities and responding to hardware-based threats to countering state-sponsored espionage and ransomware attacks, organizations and individuals must remain vigilant and proactive in their cybersecurity efforts.

Stay connected with the CyberHub Podcast for the latest insights and strategies in cybersecurity.

Share

Story Links:

https://www.securityweek.com/cisa-second-sharepoint-flaw-disclosed-at-pwn2own-exploited-in-attacks/

https://www.bleepingcomputer.com/news/security/germany-warns-of-17k-vulnerable-microsoft-exchange-servers-exposed-online/

https://www.securityweek.com/zenhammer-attack-targets-dram-on-systems-with-amd-cpus/

https://www.securityweek.com/organizations-informed-of-10-vulnerabilities-in-rockwell-automation-products/

https://therecord.media/thousands-exposed-to-ray-framework-vulnerability

https://www.bleepingcomputer.com/news/security/finland-confirms-apt31-hackers-behind-2021-parliament-breach/

https://cyberscoop.com/china-hacking-family-members/

https://www.darkreading.com/cloud-security/agenda-ransomware-vmware-esxi-servers

Apply now to be a featured partner on the show: https://www.cyberhubpodcast.com/contact

******

Listen here: https://linktr.ee/cyberhubpodcast

SubStack:

******

Website: https://www.cyberhubpodcast.com

Youtube: https://www.youtube.com/c/TheCyberHubPodcast

Rumble: https://rumble.com/c/c-1353861

Facebook: https://www.facebook.com/CyberHubpodcast/

Linkedin: https://www.linkedin.com/company/cyberhubpodcast/

Twitter: https://twitter.com/cyberhubpodcast

Instagram: https://www.instagram.com/cyberhubpodcast

The Hub of the Infosec Community.

Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.

Discussion about this podcast

CISO Talk by James Azar
CyberHub Podcast
Today’s top cybersecurity news and the latest from Practicing CISO James Azar, tune in to hear how practitioners read, view and work after hearing the latest headlines and how these stories help keep practitioners sharp and ready.