Cybersecurity Headlines

CISO Series
undefined
Aug 25, 2023 • 32min

Week in Review: Health hackers evolve, generative AI cyberattacks, NK spooks drills

Guest Gerald Auger joins the podcast to discuss the shift in hacker entry points, the rise of generative AI-fueled cyber attacks. They also discuss the UK's early warning system for ransomware targets, a recent ransomware attack on Danish hosting firms, and the exciting era of quantum computing.
undefined
Aug 25, 2023 • 8min

Lazarus exploits ManageEngine, Rockwell ThinManager vulnerabilities, Mississippi hospital attack

Lazarus Group exploits ManageEngine and Rockwell ThinManager vulnerabilities, Mississippi hospital attack. Topic includes cyberattacks, rat malware delivery, vulnerable XMPP servers, and new features in Chrome.
undefined
Aug 24, 2023 • 7min

Tornado Cash indictment, UN cybercrime treaty, Lazarus crypto cashout

Topics discussed include the indictment of Tornado Cash developers, UN cybercrime treaty talks, FBI's warning on North Korean crypto cash out, and the importance of strategic risk management. Other highlights include ransomware attacks, encryption expansion by Meta, and a campaign targeting Roblox developers. Additionally, the podcast covers an NPM campaign, IBM's Cobol to Java translation efforts, and promoting secure behavior.
undefined
Aug 23, 2023 • 9min

CISOs' cybersecurity confidence, Healthcare cyberbreach report, Duo outage

CISOs proclaim cybersecurity confidence, but majority admit to SaaS incidents Cyber Health Report: Hacker entry point shifts from email to network Duo outage causes Azure Auth authentication errors Huge thanks to our sponsor, HyperProof We get it. You're a risk manager or compliance professional, and you're overworked. You're trying to do the right thing by keeping your company safe and secure, but your technology is holding you back. Why not upgrade to Hyperproof? Hyperproof is a platform that not only eliminates the manual tasks you dread, but helps you scale security. Get a demo today at hyperproof.io. For the stories behind the headlines, head to CISOseries.com.
undefined
Aug 22, 2023 • 7min

ChatGPT botnet, Brits tip ransomware targets, Tesla's insider breach

ChatGPT used in crypto botnet, Brits tip off ransomware targets, Tesla's insider breach, Seiko's ransomware attack, Brazilian President's alleged involvement, UK government's recruitment drive, cybersecurity education, rural broadband funding, Citrix's Share File response
undefined
Aug 21, 2023 • 7min

NK attacks drills, Android APK malware, space industry warning

North Korean hackers suspected of targeting S. Korea-US drills Android malware apps use APK compression to evade detection Security agencies warn space industry of increased attacks Huge thanks to our sponsor, HyperProof Tired of managing risk and compliance in spreadsheets? Sick of tracking down stakeholders to find evidence? Worried about whether that evidence is up to date for your next audit? Hyperproof has you covered. With Hyperproof, you can efficiently manage multiple compliance frameworks and risks in a single place so you can focus on what matters most: keeping your company secure and growing. Visit hyperproof.io to get a demo. For the stories behind the headlines, head to CISOseries.com.
undefined
Aug 18, 2023 • 26min

Week in Review: Ford WiFi vulnerability, LockBit's publication struggle, Government ZeroTrust confidence

Link to blog post This week's Cyber Security Headlines – Week in Review, is hosted by Rich Stroffolino with guest, Jon Oltsik, distinguished analyst and fellow, Enterprise Strategy Group Thanks to our show sponsor, Veza 75% of breaches happen because of bad permissions. The problem is that you don't know exactly WHO has access to WHAT data in your environment. For example, roles labeled as "read-only" can often edit and delete sensitive data. Veza automatically finds and fixes every bad permission—in every app—across your environment. All links and the video of this episode can be found on CISO Series.com
undefined
Aug 18, 2023 • 7min

Cybercriminals finetune AI, Government ZeroTrust confidence, Citrix vulnerability warning

Cybercriminals exploiting AI, government agencies confident in Zero Trust, urgent Citrix vulnerability warning, and the problem of bad permissions leading to breaches.
undefined
Aug 17, 2023 • 7min

LockBit struggles, Google's quantum resilient key, orgs excitedly unprepared for AI

LockBit struggles to publish leaked data Google's quantum resilient security key Organizations optimistic and unprepared for AI Huge thanks to today's episode sponsor, Veza 75% of breaches happen because of bad permissions. The problem is that you don't know exactly WHO has access to WHAT data in your environment. For example, roles labeled as "read-only" can often edit and delete sensitive data. Veza automatically finds and fixes every bad permission—in every app—across your environment.
undefined
Aug 16, 2023 • 7min

LinkedIn accounts hijacked, Chinese spies hack US congressman's email, US watchdog plans to regulate data brokers

Huge thanks to today's episode sponsor, Veza 75% of breaches happen because of bad permissions. The problem is that you don't know exactly WHO has access to WHAT data in your environment. For example, roles labeled as "read-only" can often edit and delete sensitive data. Veza automatically finds and fixes every bad permission—in every app—across your environment. For the stories behind the headlines, visit CISOseries.com.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app