CISO Talk by James Azar
CyberHub Podcast
Finastra Investigates Data Breach, 2024 25 Most Dangerous Software Weaknesses, HHS & TSA Cyber Woes
0:00
Current time: 0:00 / Total time: -18:12
-18:12

Finastra Investigates Data Breach, 2024 25 Most Dangerous Software Weaknesses, HHS & TSA Cyber Woes

Cyber Threats Unveiled: Finestra's Data Breach, Federal Cybersecurity Failures, and MITRE's Top Software Weaknesses – Actionable Insights for Protecting Critical Systems

Good morning, Security Gang! This Thursday’s episode of the CyberHub Podcast was packed with critical updates on cyberattacks, vulnerability management, and federal cybersecurity dysfunction. As always, we delved into pressing issues, including breaches affecting major industries, federal agencies failing to prioritize cybersecurity, and top vulnerabilities outlined by MITRE. Grab your espresso and join me as I recap this information-packed session.

Finastra Cyberattack: Financial Industry Faces Another Breach

Finastra, a prominent financial software provider, confirmed a cyberattack involving its secure file transfer platform on November 7. The attacker accessed credentials and claimed to steal 400 GB of data, allegedly being sold online. While Finastra's security operations detected the breach, vulnerability management criticisms emerged, with reports highlighting outdated Pulse Secure VPN and Citrix servers in use. Finestra defended its vulnerability management, citing its internal and external bug bounty programs as evidence of robust strategies.

French Hospital Data Breach Exposes 750,000 Patients

An unnamed French hospital suffered a breach, compromising the medical records of over 750,000 patients. The attacker exploited a privileged account in the hospital's infrastructure linked to MediBoard software. The breach sparked debates over responsibility, with MediBoard distancing itself, citing a shared responsibility model. The incident underlined the urgent need for robust identity and access management.

MITRE’s 2024 Software Weaknesses Report

MITRE released its list of the 25 most dangerous software weaknesses, highlighting flaws behind over 31,000 vulnerabilities disclosed between June 2023 and June 2024.

Top 5 Weaknesses:

  1. Path Traversal

  1. Cross-Site Request Forgery

  1. SQL Injection

  1. Out-of-Bounds Write

  1. Cross-Site Scripting

The report urges organizations to prioritize secure software design and implementation practices.

Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.

Share

Federal Cybersecurity Dysfunction: Who’s Responsible?

The Government Accountability Office (GAO) revealed gaps in federal cybersecurity:

HHS: Struggling to mitigate ransomware and IoT risks in healthcare. The agency lacks coordination with CISA, sparking calls for cybersecurity centralization under CISA's leadership.

TSA: Failed to address ransomware risks in transportation, leaving critical infrastructure vulnerable.

These inefficiencies highlight the need for unified cybersecurity governance and accountability at the federal level.

Crane Vulnerabilities and Port Security Risks

A troubling report by the U.S. Coast Guard revealed that 80% of port gantry cranes, primarily sourced from Chinese manufacturers, are vulnerable to remote access and control. This vulnerability poses significant risks to national security and underscores the urgent need for robust security protocols.

Citrix and Oracle Patch Alerts

Active exploitation of vulnerabilities in Citrix’s session recording and Oracle’s Agile Product Lifecycle Management has been reported. Organizations using these solutions should patch immediately to avoid potential breaches.

Password Spraying Attacks Ramp Up

Password spraying attacks surged across North America and Europe, targeting cloud systems like Microsoft 365, Okta, and AWS. Sectors such as education, energy, and transportation were hardest hit, showcasing the importance of comprehensive monitoring and multi-factor authentication.

Scattered Spider Cybercrime Group Indicted

The Justice Department indicted five individuals from the Scattered Spider cybercrime group, notorious for attacks on MGM Resorts. The group stole sensitive employee credentials and accessed critical systems, causing millions in damages. Those charged face up to 25 years in federal prison.

One U.K. national — 22-year-old Tyler Robert Buchanan — and four Americans were named in the indictments: 

  • Ahmed Hossam Eldin Elbadawy, 23, of College Station, Texas;

  • Noah Michael Urban, 20, of Palm Coast, Florida;

  • Evans Onyeaka Osiebo, 20, of Dallas, Texas; and

  • Joel Martin Evans, 25, of Jacksonville, North Carolina 

Practitioner Key Takeaways

  1. Strengthen Identity Management: Identity is the new perimeter; ensure privileged accounts are well-secured and monitored for irregular activity.

  2. Patch Regularly: Address vulnerabilities in critical systems like Citrix and Oracle products.

  3. Centralize Federal Cybersecurity: Advocate for CISA to oversee critical infrastructure security, leaving agencies like HHS and TSA to focus on compliance.

  4. Review MITRE’s Top Weaknesses: Integrate the list into software security strategies to mitigate risks.

  5. Prepare for Emerging Threats: Monitor password spraying tactics and prioritize MFA implementation.

For Businesses:

  • Review vulnerability management programs and patch known weaknesses immediately.

  • Implement identity-centric security frameworks.

For Federal Leaders:

  • Centralize cybersecurity efforts under CISA’s authority.

  • Establish cross-agency accountability for critical infrastructure protection.

For Individuals:

  • Use strong, unique passwords and enable MFA across all accounts.

  • Stay informed about the latest cyber risks by subscribing to trusted sources like this podcast.

Thank you for tuning in to today’s CyberHub Podcast. Stay cyber-safe, and don’t forget to check out our Substack for detailed resources and updates. See you Monday at 9 a.m. EST for another packed episode!

Leave a comment

✅ Story Links: 

https://www.bleepingcomputer.com/news/security/fintech-giant-finastra-investigates-data-breach-after-sftp-hack/

https://www.bleepingcomputer.com/news/security/cyberattack-at-french-hospital-exposes-health-data-of-750-000-patients/

https://www.bleepingcomputer.com/news/security/mitre-shares-2024s-top-25-most-dangerous-software-weaknesses/

https://www.cybersecuritydive.com/news/healthcare-cybersecurity-policy-challenges/733466/

https://www.bankinfosecurity.com/coast-guard-warns-continued-risks-in-chinese-port-cranes-a-26865

https://therecord.media/tsa-not-monitoring-transportation-ransomware-efforts-hearing-gao

https://www.securityweek.com/oracle-patches-exploited-agile-plm-zero-day/

https://www.securityweek.com/exploitation-attempts-target-citrix-session-recording-vulnerabilities/

https://www.cybersecuritydive.com/news/password-spray-attacks-targeted/733460/

https://therecord.media/five-scattered-spider-members-charged-breaches-11-million-theft

🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1  

✅ Important Links to Follow: 

👉Substack:

👉Listen here: https://linktr.ee/cyberhubpodcast   

Stay Connected With Us.

👉Facebook: https://www.facebook.com/CyberHubpodcast/ 

👉LinkedIn: https://www.linkedin.com/company/cyberhubpodcast/ 

👉Twitter (X): https://twitter.com/cyberhubpodcast 

👉Instagram: https://www.instagram.com/cyberhubpodcast 

✅ For Business Inquiries:  info@cyberhubpodcast.com

=============================

About The CyberHub Podcast.

The Hub of the Infosec Community. 

Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. 

Tune in to our podcast Monday through Thursday at 9AM EST for the latest news.

Discussion about this podcast

CISO Talk by James Azar
CyberHub Podcast
Today’s top cybersecurity news and the latest from Practicing CISO James Azar, tune in to hear how practitioners read, view and work after hearing the latest headlines and how these stories help keep practitioners sharp and ready.