

Cybersecurity Headlines
CISO Series
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
Episodes
Mentioned books

Aug 25, 2023 • 32min
Week in Review: Health hackers evolve, generative AI cyberattacks, NK spooks drills
Guest Gerald Auger joins the podcast to discuss the shift in hacker entry points, the rise of generative AI-fueled cyber attacks. They also discuss the UK's early warning system for ransomware targets, a recent ransomware attack on Danish hosting firms, and the exciting era of quantum computing.

Aug 25, 2023 • 8min
Lazarus exploits ManageEngine, Rockwell ThinManager vulnerabilities, Mississippi hospital attack
Lazarus Group exploits ManageEngine and Rockwell ThinManager vulnerabilities, Mississippi hospital attack. Topic includes cyberattacks, rat malware delivery, vulnerable XMPP servers, and new features in Chrome.

Aug 24, 2023 • 7min
Tornado Cash indictment, UN cybercrime treaty, Lazarus crypto cashout
Topics discussed include the indictment of Tornado Cash developers, UN cybercrime treaty talks, FBI's warning on North Korean crypto cash out, and the importance of strategic risk management. Other highlights include ransomware attacks, encryption expansion by Meta, and a campaign targeting Roblox developers. Additionally, the podcast covers an NPM campaign, IBM's Cobol to Java translation efforts, and promoting secure behavior.

Aug 23, 2023 • 9min
CISOs' cybersecurity confidence, Healthcare cyberbreach report, Duo outage
CISOs proclaim cybersecurity confidence, but majority admit to SaaS incidents Cyber Health Report: Hacker entry point shifts from email to network Duo outage causes Azure Auth authentication errors Huge thanks to our sponsor, HyperProof We get it. You're a risk manager or compliance professional, and you're overworked. You're trying to do the right thing by keeping your company safe and secure, but your technology is holding you back. Why not upgrade to Hyperproof? Hyperproof is a platform that not only eliminates the manual tasks you dread, but helps you scale security. Get a demo today at hyperproof.io. For the stories behind the headlines, head to CISOseries.com.

Aug 22, 2023 • 7min
ChatGPT botnet, Brits tip ransomware targets, Tesla's insider breach
ChatGPT used in crypto botnet, Brits tip off ransomware targets, Tesla's insider breach, Seiko's ransomware attack, Brazilian President's alleged involvement, UK government's recruitment drive, cybersecurity education, rural broadband funding, Citrix's Share File response

Aug 21, 2023 • 7min
NK attacks drills, Android APK malware, space industry warning
North Korean hackers suspected of targeting S. Korea-US drills Android malware apps use APK compression to evade detection Security agencies warn space industry of increased attacks Huge thanks to our sponsor, HyperProof Tired of managing risk and compliance in spreadsheets? Sick of tracking down stakeholders to find evidence? Worried about whether that evidence is up to date for your next audit? Hyperproof has you covered. With Hyperproof, you can efficiently manage multiple compliance frameworks and risks in a single place so you can focus on what matters most: keeping your company secure and growing. Visit hyperproof.io to get a demo. For the stories behind the headlines, head to CISOseries.com.

Aug 18, 2023 • 26min
Week in Review: Ford WiFi vulnerability, LockBit's publication struggle, Government ZeroTrust confidence
Link to blog post This week's Cyber Security Headlines – Week in Review, is hosted by Rich Stroffolino with guest, Jon Oltsik, distinguished analyst and fellow, Enterprise Strategy Group Thanks to our show sponsor, Veza 75% of breaches happen because of bad permissions. The problem is that you don't know exactly WHO has access to WHAT data in your environment. For example, roles labeled as "read-only" can often edit and delete sensitive data. Veza automatically finds and fixes every bad permission—in every app—across your environment. All links and the video of this episode can be found on CISO Series.com

Aug 18, 2023 • 7min
Cybercriminals finetune AI, Government ZeroTrust confidence, Citrix vulnerability warning
Cybercriminals exploiting AI, government agencies confident in Zero Trust, urgent Citrix vulnerability warning, and the problem of bad permissions leading to breaches.

Aug 17, 2023 • 7min
LockBit struggles, Google's quantum resilient key, orgs excitedly unprepared for AI
LockBit struggles to publish leaked data Google's quantum resilient security key Organizations optimistic and unprepared for AI Huge thanks to today's episode sponsor, Veza 75% of breaches happen because of bad permissions. The problem is that you don't know exactly WHO has access to WHAT data in your environment. For example, roles labeled as "read-only" can often edit and delete sensitive data. Veza automatically finds and fixes every bad permission—in every app—across your environment.

Aug 16, 2023 • 7min
LinkedIn accounts hijacked, Chinese spies hack US congressman's email, US watchdog plans to regulate data brokers
Huge thanks to today's episode sponsor, Veza 75% of breaches happen because of bad permissions. The problem is that you don't know exactly WHO has access to WHAT data in your environment. For example, roles labeled as "read-only" can often edit and delete sensitive data. Veza automatically finds and fixes every bad permission—in every app—across your environment. For the stories behind the headlines, visit CISOseries.com.


