Wednesday, October 9, 2024

CybersecurityDive.com

"Computer Ransomware Initiative Summit emphasizes arduous effort."

Views expressed in this cybersecurity, cyber crime update are those of the reporters and correspondents.   Accessed on 09 October 2024, 2211 UTC.

Content and Source:   https://www.cybersecuritydive.com/?utm_source=Sailthru&utm_medium=email&utm_campaign=Trial%20Blast:%20Issue:%202024-10-09%20Cybersecurity%20Dive%20%5Bissue:66660%5D&utm_term=Cybersecurity%20Dive%20Trial

Please check link or scroll down to read your selections.  Thanks for joining us today.

Russ Roberts (https://www.hawaiicybersecurityjournal.net).

The Latest

  • The White House in Washington, D.C.
    Image attribution tooltipImage attribution tooltip

Counter Ransomware Initiative summit emphasizes arduous effort

  • An international collective of cyber officials continued discussions with the White House on how to counter ransomware attacks, reduce payments and increase response capabilities.

  • An empty boardroom inside a corporate office, with an aerial view of New York City from the adjacent window
    Image attribution tooltipImage attribution tooltip

CISOs, C-suite remain at odds over corporate cyber resilience

  • Security and IT executives, more than a year after a SEC vote on incident disclosure, still face an uphill battle to articulate risk strategy.

  • Single person away from the crowd standing out with dark shadows 3d render render
    Image attribution tooltipImage attribution tooltip

Economic uncertainty cools CISO hiring and compensation growth

  • A report by IANS and Artico Search shows the pace of CISO hiring remained slow during the first half of 2024, but is beginning to ramp back up.

  • A United Airlines Airbus 320 loads up at the gate before a flight at George Bush International Airport, Houston, Texas on July 27, 2023.
    Image attribution tooltipImage attribution tooltip

United Airlines leaned on real-time data to recover from the CrowdStrike outage

  • The airline modernized its technology foundations with better customer experiences in mind. Then, a major software outage underscored the importance of live data.

  • Trendline

How CISOs are securing the cloud

  • A host of new technologies and a spate of incidents at top providers means businesses have even more cloud security conundrums to consider. 

  • CISA, cybersecurity, agency
    Image attribution tooltipImage attribution tooltip

CISA’s vulnerability management program spotted 250 critical CVEs in 2023

  • The 51 federal civilian agencies involved in the program remediated 872 vulnerabilities last year, up 78% increase from 2022, according to CISA.

  • Exterior of CrowdStrike office in Sunnyvale, California.
    Image attribution tooltipImage attribution tooltip

What’s next for CrowdStrike on the road to repair its reputation?

  • The cybersecurity vendor finds itself operating from a vulnerable position. Efforts to earn back trust are complex and some require industrywide support.

  • Cyberhackers-Ransomware
    Image attribution tooltipImage attribution tooltip

Ivanti up against another attack spree as hackers target its endpoint manager

  • Ivanti customers are facing a new series of exploitation attempts after the company pledged in April to launch a comprehensive overhaul of its internal security practices.

  • Illustrated man with fishing hook stealing key
    Image attribution tooltipImage attribution tooltip

Phishing remains cloud intrusion tactic of choice for threat groups

  • The long-lasting effectiveness and success of phishing campaigns underscores the most central challenge in cybersecurity — people are the weakest link.

  • Trendline

How CISOs are securing the cloud

  • A host of new technologies and a spate of incidents at top providers means businesses have even more cloud security conundrums to consider. 

  • New York Gov. Kathy Hochul at a podium.
    Image attribution tooltipImage attribution tooltip

State CISOs up against a growing threat environment with minimal funding, report finds

  • A report by Deloitte and NASCIO warns that states do not have the resources necessary to fight state-backed and criminal threat groups.

  • Matrix background of blurred programming code.
    Image attribution tooltipImage attribution tooltip

Two-thirds of healthcare organizations hit by ransomware in past year: survey

  • Nearly 40% of healthcare organizations reported it took more than a month to recover after an attack, according to the survey by cybersecurity firm Sophos.

  • T-Mobile storefront in San Francisco.
    Image attribution tooltipImage attribution tooltip

FCC reaches $31.5M settlement with T-Mobile over rash of data breaches

  • The company agreed to a major change in board-level governance and will make a series of upgrades to boost its cyber resilience.

  • People enjoy the warm weather outside the White House on April 28, 2024 in Washington, DC.
    Image attribution tooltipImage attribution tooltip

Ransomware attacks surge despite international enforcement effort

  • Progress remains elusive as federal authorities point to ransomware payments inhibiting progress to reduce the volume and impact of attacks.

  • People walk past a sign for RSA Conference 2023
    Image attribution tooltipImage attribution tooltip

Top cybersecurity conferences to attend in 2025

  • Security experts from across sectors will come together to hear about the latest risk management strategies, novel hacking techniques, cyber governance and the technologies enterprises need to defend their networks. 

  • Close-up Focus on Person's Hands Typing on the Desktop Computer Keyboard
    Image attribution tooltipImage attribution tooltip

CUPS vulnerability, a near miss, delivers another warning for open source

  • While a major crisis was averted, the disclosures may open up needed conversations about transparency and coordination, according to researchers.

  • A over the shoulder shot of woman using smartphone with Two-Factor Authentication security while logging to laptop.
    Image attribution tooltipImage attribution tooltip

Customers are done with passwords. Do businesses have a solution?

  • Research shows customers are frustrated with the login experience, and the friction can cost businesses customers.

  • Printer
    Image attribution tooltipImage attribution tooltip

A quartet of Linux CVEs draws exploit fears among open source community

  • Attackers can use the chained vulnerabilities to execute remote commands after a user initiates a print job.

  • MoneyGram telephone sits on store counter.
    Image attribution tooltipImage attribution tooltip

MoneyGram faces backlog after cyberattack

  • The international wire transfer company has restarted some services since the incident, but is battling to fulfill transactions after taking its systems offline for much of the week.

  • Man studying see-through display depicting computer code.
    Image attribution tooltipImage attribution tooltip

For Google to reduce memory-safety defects, it focused on new code

  • Google’s experience provides software developers a roadmap to address one of the most persistent security problems: memory-safety CVEs.

  • CrowdStrike booth at Black Hat USA 2023 in Las Vegas.
    Image attribution tooltipImage attribution tooltip

CrowdStrike CEO pushes ‘resilient by design’ framework, promising changes

  • The cybersecurity vendor is embracing a new business framework to address security deployment lapses and the fragility of interconnected systems.

  • Anne Neuberger, deputy national security advisor for cyber and emerging technology, speaks at the White House.
    Image attribution tooltipImage attribution tooltip

CISA again raises alarm on hacktivist threat to water utilities

  • The alert comes just days after an attack against a water treatment facility in Kansas.

  • CrowdStrike SVP Adam Meyers testifies to the House Subcommittee on Cybersecurity and Infrastructure Protection.
    Image attribution tooltipImage attribution tooltip

CrowdStrike’s mea culpa: 5 takeaways from the Capitol Hill testimony

  • CrowdStrike was quick to apologize after a faulty content update triggered a global IT network outage. An executive detailed internal changes designed to prevent it from happening again.

  • Sen. Angus King discussed a report on the implementation of cybersecurity recommendations during a presentation on Sept. 19, 2024 in Washington D.C.
    Image attribution tooltipImage attribution tooltip

Cyber commission seeks detailed plan to secure high-risk infrastructure

  • A report said most recommendations from the Cyberspace Solarium Commission are near completion, but also called for greater private-sector collaboration and insurance reforms.

  • an employee looks into a screen showing a chatbot interface
    Image attribution tooltipImage attribution tooltip

Data privacy concerns swirl around generative AI adoption

  • IT and business professionals fear the technology’s adoption can lead to data leakage, according to a Deloitte report.

  • CISA, cybersecurity, agency
    Image attribution tooltipImage attribution tooltip

CISA catalog falls short on CVEs targeted by Flax Typhoon

  • A report by VulnCheck highlights the ongoing backlog in identifying active exploitation of CVEs.

  • Abstract black and white monochrome art with surreal funnel.
    Image attribution tooltipImage attribution tooltip

Major companies keep hiring North Korean IT workers

  • Dozens of Fortune 100 organizations have inadvertently hired workers from North Korea applying for remote jobs, Mandiant said.

No comments:

Post a Comment

Please leave a comment about our recent post.

Security Affairs.

"A flaw in the W3 Total Cache plugin exposes hundreds of thousands of wordpress sites to attacks." Views expressed in this cyberse...