CISO Talk by James Azar
CyberHub Podcast
Deloitte Data Breach, MoneyGram Event, Star Health Data Breach, US to Ban Chinese & Russian Car Components
0:00
-17:00

Deloitte Data Breach, MoneyGram Event, Star Health Data Breach, US to Ban Chinese & Russian Car Components

Today’s top cybersecurity news and the latest threats from Practicing CISO James Azar, tune in to hear how practitioner’s breakdown the latest to bolster their cybersecurity programs

👀 SHOW Supporters:

Today's episode is supported by our friends at Nudge Security. All CyberHub Podcast community members can get a free 14-day trial of their solution for securing SaaS and genAI at https://www.nudgesecurity.com/cyberhub

Deloitte Breach: A Hacker's Claim and Early Investigation

Deloitte, the global consultancy giant, has been implicated in a potential data breach, as claimed by a hacker on the notorious Breach Forums. The hacker alleges that they have stolen internal data, including email addresses and communications. While Deloitte has confirmed they are aware of the situation, they emphasize that the impact is still being investigated and appears limited. There has been no official filing yet, suggesting the company is still assessing the breach's scope.

MoneyGram Faces Outage Due to Cyber Incident

MoneyGram, a well-known money transfer service, has confirmed that a recent cybersecurity incident was the cause of widespread network outages affecting users. The company, now owned by Madison Dearborn Partners, has since been working to restore operations while conducting a thorough investigation. The outage primarily impacted customers attempting to send money internationally and within the U.S.

Arkansas City Water Treatment Facility Hit by Cyberattack

Arkansas City's water treatment facility experienced a cybersecurity incident, forcing it to switch to manual operations. Local officials have reassured residents that the water supply remains safe and uninterrupted. While the attack is still under investigation, it appears to be an IT issue rather than an OT (Operational Technology) breach. This incident highlights the ongoing vulnerability of critical infrastructure, particularly for underfunded municipal utilities.

India's Largest Health Insurer Faces Major Data Breach

Star Health and Allied Insurance, India's largest health insurer, has been the victim of a significant data breach. Sensitive customer information, including medical records, personal identification numbers, and tax details, has surfaced on Telegram chatbots and is being sold on Breach Forums. The breach, potentially ongoing since August, has exposed the data of millions of customers, raising questions about the company's cybersecurity measures.

Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.

Share

Google Play Hit by Malware Loader Affecting Millions of Devices

A new version of the Necro malware loader has been discovered on Google Play, infecting over 11 million Android devices through a supply chain attack. The malware, embedded in apps like the Wuta Camera by BenQ and Max Browser, installs malicious payloads that facilitate adware, subscription fraud, and proxy routing. Google has since removed the affected apps, but the incident underscores the persistent security challenges in the open-source app ecosystem.

Commerce Department Aims to Ban Chinese and Russian Tech in U.S. Cars

The U.S. Commerce Department has proposed a ban on vehicles equipped with Chinese and Russian software or hardware to protect national security. While Chinese and Russian software is minimally present in U.S. vehicles, hardware poses a greater challenge. The ban, set to take effect in 2029, highlights growing concerns over foreign adversaries using connected vehicles as potential security threats.

Microsoft Cleans House in the Wake of Major Cyber Incidents

Microsoft has launched a major security initiative, the "Secure Future" plan, in response to recent cyber intrusions. This initiative includes the removal of 730 unused applications, the deactivation of 5.75 million inactive cloud tenants, and deploying 15,000 lockdown devices. Microsoft has also made strides in enhancing identity verification and token management. These moves follow a string of cyber incidents, including the infamous breach of Exchange Online by Chinese hackers last year.

Iranian APT Group Provides Access for State-Sponsored Attacks

An Iranian state-backed APT (Advanced Persistent Threat) group, UNC-1860, has been identified as providing initial access for other state-sponsored hacking groups. Known for targeting networks in the Middle East and Europe, this group has facilitated attacks by notorious Iranian cyber actors. Recent attacks have included wiper malware, continuing Iran’s destabilizing cyber activities in the region.

Action Item for Cybersecurity and IT Professionals

  • Ensure your organization is utilizing a robust cloud management system. Regularly audit and remove inactive accounts, applications, and cloud tenants to reduce the attack surface, similar to Microsoft’s recent security house cleaning efforts.

CISO Talk by James Azar is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.

✅ Story Links: 

https://www.securityweek.com/deloitte-says-no-threat-to-sensitive-data-after-hacker-claims-server-breach/

https://therecord.media/moneygram-cybersecurity-incident-network-outages

https://www.securityweek.com/kansas-water-facility-switches-to-manual-operations-following-cyberattack/

https://thecyberexpress.com/star-health-data-breach-exposes/

https://www.bleepingcomputer.com/news/security/android-malware-necro-infects-11-million-devices-via-google-play/

https://www.securityweek.com/ban-sought-for-chinese-russian-software-and-hardware-used-in-autonomous-vehicles-on-us-roads/

https://www.darkreading.com/cloud-security/microsoft-trims-cloud-cyberattack-surface-security-push

https://www.cybersecuritydive.com/news/microsoft-deputy-cisos-security/727763/

https://www.securityweek.com/cert-cc-warns-of-unpatched-critical-vulnerability-in-microchip-asf/

https://www.darkreading.com/threat-intelligence/meet-unc1860-irans-access-broker-state-hackers

🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1  

✅ Important Links to Follow: 

👉Substack:

👉Listen here: https://linktr.ee/cyberhubpodcast   

Stay Connected With Us.

👉Facebook: https://www.facebook.com/CyberHubpodcast/ 

👉LinkedIn: https://www.linkedin.com/company/cyberhubpodcast/ 

👉Twitter (X): https://twitter.com/cyberhubpodcast 

👉Instagram: https://www.instagram.com/cyberhubpodcast 

✅ For Business Inquiries:  info@cyberhubpodcast.com

=============================

About The CyberHub Podcast.

The Hub of the Infosec Community. 

Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. 

Tune in to our podcast Monday through Thursday at 9AM EST for the latest news.

Discussion about this podcast

CISO Talk by James Azar
CyberHub Podcast
Today’s top cybersecurity news and the latest from Practicing CISO James Azar, tune in to hear how practitioners read, view and work after hearing the latest headlines and how these stories help keep practitioners sharp and ready.