Tuesday, June 4, 2024

CyberWire Daily

"Things aren't so Shiny (Hunters) at cloud provider Snowflake."

Views expressed in this cybersecurity, cyber crime update are those of the reporters and correspondents.  Accessed on 04 June 2024, 1448 UTC.

Content and Source:  https://thecyberwire.com/podcasts/daily-podcast/CyberWire Daily.

Please scroll down to read your selections. Thanks for joining us today.

Russ Roberts (https://www.hawaiicybersecurityjournal.net).

CyberWire Daily

The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also included interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
Join Pro Today
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today.

RECENT EPISODES

Ep 2080 | 6.3.24

Things aren’t looking so Shiny(Hunters) at cloud provider Snowflake.

Signs point to a major cybersecurity event at cloud provider Snowflake. Hugging Face discloses "unauthorized access" to its Spaces platform. Australian legislation seeks jail time for deepfake porn. CISA adds two vulnerabilities to the KEV catalog. Spanish police investigate a potential breach of drivers license info. NSA shares mobile device best practices. Everbridge crisis management software company reports a data breach. N2K’s CSO, Chief Analyst, and Senior Fellow, Rick Howard joins us to preview CSO Perspectives Season 14 which launches today! Google tries to explain those weird AI search results.

TranscriptTranscript
Ep 2079 | 5.31.24

New cybersecurity bill aims to untangle federal regulations.

Draft legislation looks to streamline federal cybersecurity regulations. Clarity.fm exposed personal information of business leaders and celebrities. Researchers find european politicians’ personal info for sale on the dark web. The BBC’s pension scheme suffers a breach. OpenAI disrupts covert influence operations making use of their platform. Hackers brick over 600,000 routers. Cracked copies of Microsoft office deliver a malware mix. A senator calls for accountability in the Change Healthcare ransomware attack. On our Industry Voices segment, we hear from SpyCloud’s Chip Witt, on navigating the threat of digital identity exposure. Florida man becomes Moscow’s fake-news puppet.

TranscriptTranscript
Ep 2078 | 5.30.24

Operation Endgame: Hackers' hideouts exposed.

Operation Endgame takes down malware operations around the globe. A major botnet operator is arrested. Ticketmaster’s massive data breach is confirmed, and so is Google’s SEO algorithm leak. Journalists and activists in Europe were targeted with Pegasus spyware. Okta warns users of credential stuffing attacks. NIST hopes to clear out the NVD backlog. On our Threat Vector segment, host David Moulton speaks with Greg Jones, Chief Information Security Officer at Xavier University of Louisiana. Eric Goldstein, Executive Assistant Director for Cybersecurity at CISA, joins us to discuss software security. LightSpy surveillance malware comes to macOS. ChatGPT briefly gets a god mode.

TranscriptTranscript
Ep 2077 | 5.29.24

Alleged leaked files expose a dirty secret.

An alleged leak of Google’s search algorithm contradicts the company’s public statements. German researchers discover a critical vulnerability in a TP-Link router. Breachforums is back…maybe. The Seattle Public Library suffers a ransomware attack. A Georgia man gets ten years for money laundering and romance scams, and the Treasury department sanctions a group of botnet operators. 44,000 individuals are affected by the breach of a major U.S. title insurance company. Microsoft describes North Korea’s Moonstone Sleet. Advocating for a more architectural approach to cybersecurity. Maria Varmazis speaks with WiCyS Executive Director Lynn Dohm and a panel of N2K experts about the 2024 Cyber Talent Study. A cracked password results in a multimillion dollar windfall.

TranscriptTranscript
Ep 2076 | 5.28.24

FBI untangles the web that is Scattered Spider.

The FBI untangles Scattered Spider. The RansomHub group puts a deadline on Christie’s. Prescription services warn customers of data breaches. Personal data from public sector workers in India is leaked online. Check Point says check your VPNs. The Internet Archive suffers DDoS attacks. A Minesweeper clone installs malicious scripts. N2K T-Minus Space Daily podcast host Maria Varmazis speaks with guest Carrie Hernandez Marshall, CEO and Co-Founder from Rebel Space Technologies, about the need to extend cybersecurity into space. If you can’t beat ‘em, troll ‘em.

TranscriptTranscript
Load More

Monday, June 3, 2024

CyberHawaii.org

"Reminder to register:  Friday, June 14, at noon:  FBI Update on Hate Crimes."

Views expressed in this cybersecurity report are those of the reporters and correspondents.  Accessed on 03 June 2024, 2104 UTC.

Content and Source:   https://mail.google.com/mail/u/0/#inbox/FMfcgzQVwnfPQvFmpsjjHTcrdHKZnLbh/CyberHawaii.org.

Please scroll down to read your selections.  Thanks for joining us today.

Russ Roberts (https://www.hawaiicybersecurityjournal.net).


Register today!

Upcoming FBI hybrid session on Hate Crime

Unite Against Hate:

An FBI Update for Hawaii Businesses


High Intensity Drug Trafficking Area (HIDTA)

500 Ala Moana Blvd., Bldg 5 Suite 200

Honolulu, Hawaii 96813


Friday, June 14, 2024

Noon – 1 pm

Choose to attend in person or participate via Teams

(previously scheduled for April 12, 2024)


Parking is $5. If a purchase is made at a store at Restaurant Row, parking can be validated and may be free.

Ideal for human resources professionals and analysts, attorneys and other legal service professionals, security and cybersecurity managers, and business owners.


Today’s America is contentious. Whether it’s arguments over immigration, the LGBTQ rights or what keiki learn in school, the tone and language of arguments often go beyond what most reasonable people would call civil. The foundation of our democracy is the ability to debate ideas in a vigorous, but ultimately collaborative, respectful manner, especially in our islands.

 

Most debates today occur online — in social media, chat groups, media reports or blogs. The anonymity of the internet encourages aggressive, hateful and inappropriate speech, language that might not be used in an in-person debate.

 

As a business, you must be prepared to deal with this type of speech to avoid being liable for condoning or fostering a hostile work environment. As an employer, you must draw the line between what is protected under the First Amendment and what is criminal. Your policies and processes must be developed from the perspectives of professionals in human resources, legal services and security to protect your employees and take action against employees who may be instigators of this type of speech.


Representatives from the FBI Honolulu field office will cover:

 

1.    What is the Federal Civil Rights Program?

2.    What Constitutes a Hate Crime Wherein the FBI Gets Involved?

3.    Free Speech vs. True Threats

4.    Public Reporting

Register for In Person or Virtual Participation

CyberHawaii | www.cyberhawaii.org

Facebook  Twitter  Instagram

The Hacker News Daily Updates

"Top Cyber News:  Cox modem flaws, Fake browser updates and Dora RAT."

Views expressed in this cybersecurity, cyber crime update are those of the reporters and correspondents. Accessed on 03 June 2024, 1541 UTC.

Content and Source:  https://mail.google.com/mail/u/0/#inbox/FMfcgzQVwnfNxHpczDPJWCdPnCcCBhhQ/The Hacker News DailyUpdates.

Please scroll down to read your selections.  Thanks for joining us today.

Russ Roberts (https://www.hawaiicybersecurityjournal.net).

THN Daily Updates
Newsletter
cover

The Cybersecurity Manager's Guide ($39.99 Value) FREE for a Limited Time

If you're a cybersecurity professional, then you know how it often seems that no one cares about (or understands) information security.

Download NowSponsored
LATEST NEWSJun 3, 2024

SASE Threat Report: 8 Key Findings for Enterprise Security

Threat actors are evolving, yet Cyber Threat Intelligence (CTI) remains confined to each isolated point solution. Organizations require a holistic ana... ...

Read More
TwitterFacebookLinkedIn

Researcher Uncovers Flaws in Cox Modems, Potentially Impacting Millions

Now-patched authorization bypass issues impacting Cox modems could have been abused as a starting point to gain unauthorized access to the devices and... ...

Read More
TwitterFacebookLinkedIn

Be Incident Ready: Get a Customizable Incident Response Plan Template [PDF]

A cyberattack is a WHEN, not an IF. Ensure compliance and minimize crisis response time with our pre-built Incident Response Plan template. Easily customize it to fit your organization's ...

Read More
TwitterFacebookLinkedIn

Andariel Hackers Target South Korean Institutes with New Dora RAT Malware

The North Korea-linked threat actor known as Andariel has been observed using a new Golang-based backdoor called Dora RAT in its attacks targeting edu... ...

Read More
TwitterFacebookLinkedIn

Beware: Fake Browser Updates Deliver BitRAT and Lumma Stealer Malware

Fake web browser updates are being used to deliver remote access trojans (RATs) and information stealer malware such as BitRAT and Lumma Stealer (aka ... ...

Read More
TwitterFacebookLinkedIn

AI Company Hugging Face Detects Unauthorized Access to Its Spaces Platform

Artificial Intelligence (AI) company Hugging Face on Friday disclosed that it detected unauthorized access to its Spaces platform earlier this week. "... ...

Read More
TwitterFacebookLinkedIn

Mysterious Cyber Attack Took Down 600,000+ Routers in the U.S.

More than 600,000 small office/home office (SOHO) routers are estimated to have been bricked and taken offline following a destructive cyber attack st... ...

Read More
TwitterFacebookLinkedIn

Microsoft Warns of Surge in Cyber Attacks Targeting Internet-Exposed OT Devices

Microsoft has emphasized the need for securing internet-exposed operational technology (OT) devices following a spate of cyber attacks targeting such ... ...

Read More
TwitterFacebookLinkedIn
cover

The Cybersecurity Manager's Guide ($39.99 Value) FREE for a Limited Time

If you're a cybersecurity professional, then you know how it often seems that no one cares about (or understands) information security.

Download NowSponsored

Cyber War News Today.

"From trade wars to cyber wars in modern era." Views expressed in this cybersecurity, cyber espionage, and cyber crime update are ...