CISO Talk by James Azar
CyberHub Podcast
🚨 Zscaler Confirms Breach, Vermont Data Privacy Law, Another Chrome Zeroday, NATO Redline
1×
0:00
-16:28

🚨 Zscaler Confirms Breach, Vermont Data Privacy Law, Another Chrome Zeroday, NATO Redline

Today’s top cybersecurity news and the latest threats from Practicing CISO James Azar, tune in to hear how practitioners breakdown the latest to bolster their cybersecurity programs

Good morning, security gang!

Welcome to another episode of the CyberHub Podcast. Today is Tuesday, May 14, 2024, and we have a jam-packed show for you. We're thrilled to announce our new show partners, Nudge Security. You'll hear more about them later in the episode.

Make sure to subscribe to the show and follow us on social media for the latest updates. Now, let's dive into today's headlines.

Zscaler Investigation Update

Zscaler has completed its investigation into a recent incident where an intel broker claimed to have accessed one of their systems. The broker sold credentials, PASCIs, and certificates for $20,000 in crypto, later confirming Zscaler as the target. Fortunately, the compromised data was from a test environment, not affecting production, corporate, or customer environments. Zscaler can breathe a sigh of relief but will likely implement stricter internal controls to prevent future incidents.

Action Points:

  1. Ensure internal controls and monitoring of test environments.

  2. Regularly review and update security protocols to prevent unauthorized access.

Vermont's New Data Privacy Law

Vermont has passed one of the most comprehensive data privacy laws in the U.S., allowing individuals to sue companies for privacy rights violations. The law includes data minimization requirements and bans the sale of sensitive consumer data. This legislation will be reauthorized in two years and currently applies to large data brokers.

Action Points:

  1. Review and update privacy policies to comply with Vermont's new law.

Apple Urgent Patches

Apple has rolled out urgent patches for its OSs, addressing a critical code execution flaw (CVE-2024-23296) in the RTK-IT database. This bug may have been exploited prior to the availability of patches. Users are advised to update their devices immediately.

Action Points:

  1. Update all Apple devices to the latest versions to patch the vulnerability.

Google Chrome Zero Day Vulnerability

Google has patched another Chrome vulnerability (CVE-2024-4761), the second zero-day flaw exploited in attacks within a week. This high-severity issue in the V8 JavaScript and WebAssembly engine was reported on May 9th and has been promptly addressed by Google.

Action Points:

  1. Ensure Chrome browsers are updated to the latest version.

  2. Stay informed about new vulnerabilities and apply patches quickly.

    Share

Bluetooth Tracking Device Detection

Apple and Google have introduced a new feature to notify users if a Bluetooth tracking device is being used without their consent. This cross-platform solution aims to enhance user privacy and safety, now available on both iOS and Android devices.

Action Points:

  1. Enable and familiarize yourself with the new tracking detection feature.

  2. Educate users about the importance of privacy and security settings.

DNS Tunneling in Spam Campaigns

Threat actors are using DNS tunneling to track spam email delivery and scan victim networks, according to Palo Alto Networks. This method allows attackers to covertly transmit malware and data, bypassing traditional firewalls.

Action Points:

  1. Monitor for DNS tunneling activities and implement detection measures.

  2. Educate employees about the risks of phishing and malicious emails.

MITRE's Embed Threat Model

MITRE has released its Embed Threat Model for public use, designed for embedded devices in critical infrastructure. This tool provides a heat map to identify vulnerabilities and mitigation strategies, useful for companies like Schneider Electric, GE, and Siemens.

Action Points:

  1. Utilize MITRE's Embed Threat Model to assess and mitigate risks in embedded devices.

  2. Stay updated on new tools and resources for improving cybersecurity.

INC Ransomware Source Code for Sale

A cybercriminal claims to be selling the source code of the INC ransomware gang for $300,000. This gang has targeted notable organizations, including Xerox Business Solutions and Yamaha Motor Philippines. The sale includes technical details aligning with public analyses of the ransomware.

Action Points:

  1. Monitor for potential ransomware threats and ensure robust defenses.

  2. Consider threat intelligence services to stay informed about emerging cyber threats.

NATO's Cyber Red Line to Russia

NATO has issued a red line to Russia following Fancy Bear's cyber attacks on Germany and the Czech Republic. While NATO's statement aims to deter further attacks, its effectiveness remains uncertain.

Action Points:

  1. Enhance cybersecurity measures against potential state-sponsored attacks.

  2. Stay informed about geopolitical developments affecting cybersecurity.

Conclusion:

That's it for today's episode. Remember to update your devices, check out Nudge Security, and stay vigilant. We'll be back tomorrow at 9 a.m. Eastern with the latest updates. Have a great day, stay cyber safe, and connect with us on social media for more insights.

👀 SHOW Supporters:

Today’s Episode is supported by our friends at Nudge Security free 14-day trial to all CyberHub Podcast community members at https://www.nudgesecurity.com/cyberhub  

✅ Story Links: 

https://www.securityweek.com/zscaler-confirms-only-isolated-test-server-was-hacked/

https://therecord.media/vermont-passes-data-privacy-law

https://www.securityweek.com/apple-patch-day-code-execution-flaws-in-iphones-ipads-macos/

https://www.securityweek.com/google-patches-second-chrome-zero-day-in-one-week/

https://thehackernews.com/2024/05/apple-and-google-launch-cross-platform.html

https://www.securityweek.com/attackers-use-dns-tunneling-to-track-victim-activity-scan-networks/

https://www.securityweek.com/mitre-emb3d-threat-model-officially-released/

https://www.bleepingcomputer.com/news/security/inc-ransomware-source-code-selling-on-hacking-forums-for-300-000/

https://www.securityweek.com/nato-draws-a-cyber-red-line-in-tensions-with-russia/

https://www.darkreading.com/cyberattacks-data-breaches/ukrainian-latvian-tv-hijacked-to-broadcast-russian-celebrations

🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1  

✅ Important Links to Follow: 

👉Substack:

👉Listen here: https://linktr.ee/cyberhubpodcast   

✅  Stay Connected With Us.

👉Website: https://www.cyberhubpodcast.com

👉Rumble: https://rumble.com/c/c-1353861 

👉Facebook: https://www.facebook.com/CyberHubpodcast/ 

👉Linkedin: https://www.linkedin.com/company/cyberhubpodcast/ 

👉Twitter (X): https://twitter.com/cyberhubpodcast 

👉Instagram: https://www.instagram.com/cyberhubpodcast 

✅ For Business Inquiries:  info@cyberhubpodcast.com

=============================

✅ Other Videos You Might Be Interested In Watching: 

👉 My thoughts on Israel from this morning's episode and the current state of cybersecurity attacks  

 👉 A Deep Dive into the MGM Resorts Ransomware - An Inside look into the current FACTS  

 👉 The Latest on the MGM Resorts Ransomware Attack & its impact on Vegas and Cybersecurity overall  

 👉 What Does Omer Adam & Tel Aviv have to do with Cybersecurity? Find out on CISO Talk  

 👉 Iran is targeting Israel using its proxies that are Hamas & Hizballah & using cyber-warfare  

  =============================

✅ About The CyberHub Podcast.

The Hub of the Infosec Community. 

Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. 

Tune in to our series of podcasts that provide everything from highlighting CISO in our CISOTalk Podcast or our signature CyberHub Podcast giving you the latest news live daily.

For Collaboration and Business inquiries, please use the contact information below:

📩 Email:  info@cyberhubpodcast.com 

Discussion about this podcast

CISO Talk by James Azar
CyberHub Podcast
Today’s top cybersecurity news and the latest from Practicing CISO James Azar, tune in to hear how practitioners read, view and work after hearing the latest headlines and how these stories help keep practitioners sharp and ready.