Slack Faces Backlash Over AI Data Training
Slack has come under fire for automatically opting users into a program that uses their data to train AI models. Despite promises of technical controls to prevent data leaks, the company has now decided to switch to an opt-in system following significant public outcry.
Action Points:
Review and Adjust Settings: Corporate admins should review and adjust their Slack settings to ensure they opt out of any unwanted data sharing.
Stay Informed: Regularly check for updates from Slack regarding data privacy policies to ensure compliance and user privacy.
SEC Amends Regulation SP
The SEC has adopted amendments to Regulation SP, requiring financial institutions to notify impacted individuals of data breaches within 30 days of discovery. This regulation aims to enhance the protection of consumer financial information.
Action Points:
Update Compliance Procedures: Financial institutions should update their data breach response plans to ensure timely notifications within the new 30-day window.
Implement Stronger Data Protection: Develop and maintain robust policies to detect, respond to, and recover from unauthorized access to sensitive information.
WebTPA Data Breach Affects Millions
WebTPA has disclosed a data breach impacting over 2.4 million individuals. The breach, discovered in December, involved unauthorized access to PII, including names, contact info, and Social Security numbers.
Action Points:
Monitor Personal Information: Affected individuals should monitor their personal information and financial accounts for suspicious activity.
Enhance Security Measures: Organizations should strengthen their cybersecurity measures to prevent similar breaches in the future.
Grandiorio Banking Trojan Resurfaces
The Grandiorio banking trojan is back with a large-scale phishing campaign targeting 1,500 banks in over 60 countries. Despite previous disruptions, the malware has returned with new features and improved encryption.
Action Points:
Educate Employees Conduct training sessions to educate employees about phishing threats and how to recognize them.
Deploy Advanced Security Tools: Utilize advanced security tools to detect and prevent malware infections.
GitHub Targeted by Software Supply Chain Attacks
A new campaign, dubbed "Get Caught," is targeting GitHub with software supply chain attacks. These attacks misuse authentic internet services and involve multiple malware variants targeting various operating systems.
Action Points:
Secure Code Repositories: Implement stringent security measures for code repositories to prevent unauthorized access and malicious modifications.
Regularly Audit Dependencies: Conduct regular audits of software dependencies to identify and mitigate potential vulnerabilities.
Concerns Over NYPD's Use of Chinese-Made Drones
Congressional leaders have raised concerns about the NYPD's use of Chinese-made drones, citing potential national security risks. The NYPD defended the use, stating the effectiveness and affordability of these drones.
Action Points:
Evaluate Alternatives: Explore and evaluate alternative drone suppliers to mitigate potential security risks.
Strengthen Data Security: Implement robust data security measures to protect sensitive information collected by drones.
Nigeria Halts Cybersecurity Tax Amid Public Outcry
The Nigerian government has suspended a proposed tax on domestic electronic transactions intended to fund a national cybersecurity program. The decision followed widespread public criticism amid economic challenges.
Action Points:
Seek Alternative Funding: Explore alternative funding mechanisms to support national cybersecurity initiatives without burdening the public.
Engage with Stakeholders: Engage with stakeholders to understand their concerns and develop more acceptable solutions.
Palo Alto and IBM Announce Strategic Partnership
Palo Alto and IBM have announced a significant partnership to jointly provide cybersecurity solutions. IBM will also expand its deployment of Palo Alto security platforms and train consultants on Palo Alto products.
Action Points:
Leverage New Services: Businesses should consider leveraging the new joint cybersecurity solutions and consulting services offered by Palo Alto and IBM.
Stay Updated: Keep informed about the latest developments in this partnership to benefit from new security innovations.
Conclusion:
Stay informed, stay prepared, and stay cyber safe. Tune in tomorrow for more updates and insights. Remember to subscribe to our podcast and follow us on social media for the latest cybersecurity news.
✅ Story Links:Â
https://www.securityweek.com/user-outcry-as-slack-scrapes-customer-data-for-ai-model-training/
https://www.securityweek.com/2-4-million-impacted-by-webtpa-data-breach/
https://thehackernews.com/2024/05/cyber-criminals-exploit-github-and.html
https://therecord.media/congress-concerned-by-nypd-drone-use
https://www.darkreading.com/cyber-risk/nigeria-halts-cybersecurity-tax-after-public-outrage
https://www.securityweek.com/palo-alto-networks-teams-up-with-ibm-acquires-qradar-saas-assets/
🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1 Â
✅ Important Links to Follow:Â
👉Website:
https://www.cyberhubpodcast.com
👉Substack:
👉Listen here: https://linktr.ee/cyberhubpodcast  Â
✅ Stay Connected With Us.
👉Website:
https://www.cyberhubpodcast.com
Â
👉Rumble: https://rumble.com/c/c-1353861Â
👉Facebook: https://www.facebook.com/CyberHubpodcast/Â
👉Linkedin: https://www.linkedin.com/company/cyberhubpodcast/Â
👉Twitter (X): https://twitter.com/cyberhubpodcastÂ
👉Instagram: https://www.instagram.com/cyberhubpodcastÂ
✅ For Business Inquiries: info@cyberhubpodcast.com
=============================
✅ Other Videos You Might Be Interested In Watching:Â
👉 My thoughts on Israel from this morning's episode and the current state of cybersecurity attacks Â
👉 A Deep Dive into the MGM Resorts Ransomware - An Inside look into the current FACTS Â
👉 The Latest on the MGM Resorts Ransomware Attack & its impact on Vegas and Cybersecurity overall Â
👉 What Does Omer Adam & Tel Aviv have to do with Cybersecurity? Find out on CISO Talk Â
👉 Iran is targeting Israel using its proxies that are Hamas & Hizballah & using cyber-warfare Â
 =============================
✅ About The CyberHub Podcast.
The Hub of the Infosec Community.Â
Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.Â
Tune in to our series of podcasts that provide everything from highlighting CISO in our CISOTalk Podcast or our signature CyberHub Podcast giving you the latest news live daily.
For Collaboration and Business inquiries, please use the contact information below:
📩 Email: info@cyberhubpodcast.comÂ
Share this post