CISO Talk by James Azar
CyberHub Podcast
🚨 Microchip Cyberattack Halts Production, Data Hashing Ruling, RFID Cards Backdoor, Secure Open Source
0:00
Current time: 0:00 / Total time: -16:51
-16:51

🚨 Microchip Cyberattack Halts Production, Data Hashing Ruling, RFID Cards Backdoor, Secure Open Source

Today’s top cybersecurity news and the latest threats from Practicing CISO James Azar, tune in to hear how practitioner’s breakdown the latest to bolster their cybersecurity programs

Microchip Technology Cyber Attack

Microchip Technology disclosed a cyberattack that impacted operations at some of its manufacturing facilities. The company detected suspicious activity on August 17 and shut down systems by August 19 to contain the issue. The extent of the breach is still under investigation, with no public attribution to ransomware groups yet.

Action Items:

  • Review and update incident response plans to ensure they are prepared for potential disruptions in manufacturing operations.

  • Monitor for suspicious activities, especially in supply chain partners, and ensure robust incident response measures are in place.

FTC Warning on Hashing Personal Data

The Federal Trade Commission (FTC) issued a caution that hashing does not render personal data anonymous and warned companies against making misleading claims about data security. The FTC emphasized that it will take action against companies that mislead consumers about their privacy practices.

Action Items:

  • Review and update data privacy practices, ensuring that any use of hashing is not misleading and complies with FTC guidelines.

  • Collaborate with cybersecurity departments to reassess privacy claims, particularly around data anonymization techniques.

Cannondesign Data Breach

Cannondeisgn, an architectural engineering and consulting firm, reported a breach that occurred in January 2023, where threat actors accessed personal information, including names, addresses, and Social Security numbers. The breach was linked to the AVOS Locker ransomware group.

Action Items:

  • Prioritize the completion and reporting of breach investigations in a timely manner. Ensure robust data protection measures are in place.

  • Conduct regular security audits and penetration testing, especially for outsourced IT services, to identify and mitigate vulnerabilities.

RFID Card Vulnerability Discovery

A French security firm, Quarkslab, discovered a backdoor in millions of RFID smart cards produced by Shanghai Fudan Microelectronics Group. The vulnerability could allow attackers to clone cards within minutes of physical proximity.

Action Items:

  • Assess the security of current RFID card systems and consider upgrading to more secure alternatives.

  • Educate employees on the risks associated with RFID card vulnerabilities and implement additional physical security measures.

Privilege Escalation Vulnerability in Microsoft Azure Kubernetes

Mandiant identified a privilege escalation vulnerability in Microsoft Azure Kubernetes that could allow attackers to access sensitive information. The flaw has since been patched by Microsoft.

Action Items:

  • Ensure all systems are patched promptly and regularly audit cloud infrastructure for security vulnerabilities.

  • Monitor for any unusual activity in Kubernetes clusters and enforce strict access controls.

TP-Link Routers Under Congressional Scrutiny

U.S. congressional representatives raised concerns about the security risks posed by TP-Link routers manufactured in China. The routers could potentially be compromised by state-sponsored attackers.

Action Items:

  • Evaluate the security risks of using TP-Link routers and consider alternative vendors with stronger security assurances.

  • Conduct a thorough risk assessment of all networking equipment used within the organization, focusing on potential supply chain vulnerabilities.

U.S. Government Investment in Open Source Software Security

The U.S. government announced an $11 million investment to improve security in open-source software, specifically in operational technology settings for critical infrastructure. I have a full report on the wasteful government spending and how talk is one thing and actions is another.

Action Items:

  • Stay informed about the latest security initiatives and participate in open-source projects that aim to enhance security.

  • Advocate for increased funding and support for cybersecurity initiatives that protect critical infrastructure.

Tragic Loss in the Tech Community

British tech entrepreneur Mike Lynch, co-founder of Darktrace, is among the six people presumed dead after a superyacht sank off the coast of Sicily. This tragedy has deeply affected the tech community.

The CyberHub Podcast will return tomorrow with more updates on the latest in cybersecurity.

Leave a comment

👀 SHOW Supporters:

Today’s Episode is supported by our friends at Nudge Security free 14-day trial to all CyberHub Podcast community members at https://www.nudgesecurity.com/cyberhub

✅ Story Links: 

https://www.securityweek.com/cyberattack-disrupts-microchip-technology-manufacturing-facilities/

https://www.ftc.gov/policy/advocacy-research/tech-at-ftc/2024/07/no-hashing-still-doesnt-make-your-data-anonymous

https://www.bleepingcomputer.com/news/security/cannondesign-confirms-avos-locker-ransomware-data-breach/

https://www.securityweek.com/major-backdoor-in-millions-of-rfid-cards-allows-instant-cloning/

https://www.securityweek.com/azure-kubernetes-services-vulnerability-exposed-sensitive-information/

https://thehackernews.com/2024/08/styx-stealer-creators-opsec-fail-leaks.html

https://www.darkreading.com/cyber-risk/chinese-wifi-router-vendor-draws-us-congressional-ire

https://www.cybersecuritydive.com/news/white-house-11-million-secure-open-source/724223/

https://www.securityweek.com/darktrace-co-founder-mike-lynch-presumed-dead-after-superyacht-sinks/

🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1  

✅ Important Links to Follow: 

👉Substack:

👉Listen here: https://linktr.ee/cyberhubpodcast   

Stay Connected With Us.

👉Facebook: https://www.facebook.com/CyberHubpodcast/ 

👉LinkedIn: https://www.linkedin.com/company/cyberhubpodcast/ 

👉Twitter (X): https://twitter.com/cyberhubpodcast 

👉Instagram: https://www.instagram.com/cyberhubpodcast 

✅ For Business Inquiries:  info@cyberhubpodcast.com

=============================

About The CyberHub Podcast.

The Hub of the Infosec Community. 

Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. 

Tune in to our podcast Monday through Thursday at 9AM EST for the latest news.

Discussion about this podcast

CISO Talk by James Azar
CyberHub Podcast
Today’s top cybersecurity news and the latest from Practicing CISO James Azar, tune in to hear how practitioners read, view and work after hearing the latest headlines and how these stories help keep practitioners sharp and ready.