DiscoverCybersecurity Today
Cybersecurity Today
Claim Ownership

Cybersecurity Today

Author: Howard Solomon

Subscribed: 2,168Played: 85,046
Share

Description

Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
935 Episodes
Reverse
Cybersecurity Weekly Review: CrowdStrike, Malware, and Major IT Outages Join Jim Love and a panel of experts as they delve into the top cybersecurity stories of the week. This episode covers the major CrowdStrike incident, AT&T's February outage affecting millions of calls, a new strain of malware in Ukraine targeting industrial control systems, and much more. Listen in as experts Terry Cutler, David Shipley, and Mike Walters discuss the implications, lessons learned, and future strategies needed to tackle these cybersecurity challenges. 00:00 Introduction and Overview 00:18 CrowdStrike Dominates the Headlines 00:27 AT&T's Major Outage 01:14 New Malware in Ukraine 01:51 Whiz Startup's Bold Move 02:33 Panel Discussion Begins 02:55 Introduction of Mike Walters 03:31 Whiz's Market Valuation Debate 06:59 Modbus Protocol Vulnerabilities 07:35 Penetration Testing Insights 12:50 CrowdStrike Incident Analysis 22:24 Media Focus on Airport Chaos 22:36 The Real Impact on Patient Care 23:53 Who Pays for the Outage? 25:40 CrowdStrike's Quick Response 26:27 Future Prevention Strategies 28:27 Challenges in Cybersecurity Updates 38:14 Lessons Learned and Moving Forward 42:17 Conclusion and Acknowledgements
North Korean State Actor Infiltrates US Security Firm | Cybersecurity Today In this episode of Cybersecurity Today, host Jim Love covers two major incidents. The first is an American firm, KnowBe4, inadvertently hiring a North Korean state actor posing as a software engineer, leading to an attempted malware installation. He discusses the techniques used by the threat actor and the broader implications for cybersecurity. The second story involves CrowdStrike's post-incident review of a system crash, detailing the causes, the company's response, and criticisms of their crisis communication strategy. Tune in to learn about these pressing cybersecurity challenges and how companies are handling them. 00:00 A Shocking Cybersecurity Incident 00:20 North Korean State Actor Infiltration 01:59 CrowdStrike's Post Incident Review 05:07 CrowdStrike's Crisis Communication Failure 06:31 Conclusion and Upcoming Shows
In this episode of Cybersecurity Today, guest host Jim Love covers major events impacting the cybersecurity world, including CrowdStrike CEO George Kurtz's summons to testify before a U.S. House Committee on Homeland Security following a massive IT outage and a new malware strain, Frosty Goop, attacking critical infrastructure in Ukraine. The episode also discusses cybersecurity firm Wiz's surprising decision to decline a $23 billion acquisition offer from Google's parent company, Alphabet, opting instead to aim for an IPO. Stay informed about the latest in cybersecurity, and what these developments mean for the industry. 00:00 Introduction and Headlines 00:24 CrowdStrike CEO Summoned by U.S. House Committee 00:38 Impact and Response to the IT Outage 01:41 Frosty Goop: New Malware Threat 03:09 Wiz Rejects Alphabet's Acquisition Offer 04:45 Conclusion and Show Notes
Join Jim Love on a special edition of Cybersecurity Today and Hashtag Trending as he delves into the recent CrowdStrike incident that led to a global IT meltdown. With over 8.5 million Windows devices affected by a faulty CrowdStrike Falcon update, this event is being compared to Y2K and WannaCry. Discover the widespread impacts across key industries, the technical details behind the kernel-crashing error, and the fallout for companies and IT professionals. Learn why this disaster has created such frustration and anger in the cybersecurity community and what steps are being taken to recover. Tune in to understand the broader economic and societal implications of what is being called the 'worst cyber event in history.' 00:00 Introduction and Host Introduction 00:19 CrowdStrike Incident Overview 00:46 Community Reactions and Frustrations 02:29 Understanding CrowdStrike's Role 04:49 Technical Breakdown of the Issue 07:59 Impact and Consequences 09:04 Response and Fixes 12:33 Lessons and Future Precautions 13:20 Final Thoughts and Warnings 13:58 Conclusion
Dodging the Biggest Supply Chain Attack Ever: An Insight with JFrog's Security Research Team In this weekend edition of Cyber Security Today, host Jim Love discusses with Brian Moussalli, the Security Research Team Lead at JFrog, how potentially the biggest supply chain attack was averted. They delve into the intricacies of supply chain attacks, the risks associated with leaked tokens, and the importance of checking binary files for vulnerabilities. The conversation also touches on securing open source software and the role of JFrog in making the cyber world safer. Tune in to learn critical lessons on cybersecurity from this insightful interview. 00:00 Introduction and Host Update 00:32 Understanding Supply Chain Attacks 02:47 Interview with Brian Moussalli, the Security Research Team Lead at JFrog 06:15 The Python Token Leak Incident 17:01 Lessons Learned and Future Outlook 23:06 Conclusion and Sign-Off  
With Howard away and today's episode of Hashtag Trending being all about security stories, I took the liberty of doing a cross posting. Hope we'll have Howard back next week. In today's episode of Hashtag Trending, host Jim Love covers significant cybersecurity news. Microsoft faces criticism for mishandling a reported MSHTML browser engine vulnerability, and Disney investigates a hack by 'Null Bulge,' a group accusing the company of unethical AI use. Additionally, Kaspersky Labs announces its exit from the U.S. market due to government sanctions. The episode also discusses the FBI's swift unlocking of a shooter's phone, indicating advanced law enforcement capabilities. Tune in for these updates and more. 00:00 Introduction and Overview 00:43 Microsoft's Vulnerability Disclosure Controversy 02:28 Disney Hacked: Internal Messages Leaked 03:42 Kaspersky Exits the U.S. Market 04:59 FBI Cracks Encrypted Phones 06:54 Conclusion and Upcoming Shows
A new ransomware group that has been discovered is highlighted in this edition
This episode features an interview with a cybersecurity and privacy lawyer about responding to cyber attacks Navigating Ransomware Response: Insights from Cybersecurity Expert Imran Ahmad In this episode features an interview between Howard Solomon and Imran Ahmad, a partner at Norton Rose Fulbright, discussing effective strategies for managing ransomware attacks. Ahmad, with his extensive background in cybersecurity law, shares practical advice on incident response, the importance of having a structured plan, and the dynamic nature of cyber threats. He elucidates the common pitfalls companies face, the role of communication, and the legal nuances of dealing with cyber incidents. Ahmad also touches on the increasing sophistication of attackers, including the use of AI, and the balance organizations must strike between cybersecurity investments and other business priorities. 00:00 Introduction and Host Welcome 00:26 Meet Imran Ahmad: Cybersecurity Expert 01:37 The Reality of Ransomware Attacks 04:05 Elements of a Good Ransomware Response Plan 07:07 Inside the Incident Response Room 11:49 Legal and Communication Challenges 20:11 Government Policies and Ransomware Payments 22:29 Why Organizations Struggle with Cyber Preparedness 24:02 Conclusion and Farewell
A report on business email compromise attacks is highlighted in this edition
This episode reports on some of the new ways threat actors are bypassing phishing defences
This episode reports on new reports on vulnerabilities and software supply chain security
This episode features a discussion on the latest MOVEit vulnerability, a report on recruiting cybersecurity pros and how an API coding error is being blamed for a large cyber breach in Australia
Are attacks cybercrime or hiding espionage? Researchers investigate in this episode
This episode reports on an updated explanation of the hack of Los Angeles County's health department, an API coding error that led to a huge data breach in Australia, and more
This episode reports on a warning to patch Serv-U applications, the workings of the Rafel trojan, and more 
This episode features a discussion on an undiscovered three-year hack, the cause of Snowflake attacks and allegations of how an Australian health insurer was compromised Join Howard Solomon and David Shipley in the weekend review edition of Cybersecurity Today for insights into major cybersecurity incidents.   Topics include a three-year undetected hack by the Velvet Ant gang, major breaches involving personal data theft, the Medibank hack, misuse of Snowflake passwords, and the recent CDK Global cyberattack affecting car dealerships. Learn about the latest developments and cybersecurity lessons from these significant events.   00:00 Introduction and Overview 00:40 Weekly Headlines Recap 04:15 In-Depth Analysis: Three-Year Undetected Hack 14:27 Medibank Data Breach Investigation 25:18 Snowflake Data Breaches Update 30:04 CDK Global Cyber Attack 33:47 Conclusion and Final Thoughts    
This episode reports on how gullible employees are falling for a scam and cutting and pasting malware into their organization's IT systems, and more 
This episode reports on how outdated software played a role in a lengthy hack, the latest VMware security update, and more
This episode reports on complaints about the proposed UN cybercrime treaty, servers used by Islamic State terrorists shut, and more 
This episode includes a discussion on Microsoft and Google's offer to help U.S. rural hospitals tighten their cybersecurity, a report on top network vulnerabilities found by penetration testers and the latest news on hacks of Snowflake customers.
loading
Comments (3)

Daniel Lisa

Acronis Cyber Backup is a comprehensive data backup and recovery solution designed to protect data, systems, and applications. It's used by businesses and individuals to ensure that their critical information is safeguarded against data loss, hardware failures, cyberattacks, and other unexpected events. Acronis Cyber Backup offers features like full disk imaging, incremental backups, cloud storage, and quick recovery to keep operations running smoothly. It provides flexible deployment options, allowing backups to be stored locally or in the cloud, and integrates advanced cybersecurity features to defend against ransomware and other cyber threats. For a thorough cybersecurity assessment and data protection strategy, you might consider consulting with cybersecurity experts like those at https://www.wizlynxgroup.com/hk/en/

May 9th
Reply

Daniel Lisa

Acronis Cyber Backup is a comprehensive data backup and recovery solution designed to protect data, systems, and applications. It's used by businesses and individuals to ensure that their critical information is safeguarded against data loss, hardware failures, cyberattacks, and other unexpected events. Acronis Cyber Backup offers features like full disk imaging, incremental backups, cloud storage, and quick recovery to keep operations running smoothly. It provides flexible deployment options, allowing backups to be stored locally or in the cloud, and integrates advanced cybersecurity features to defend against ransomware and other cyber threats. For a thorough cybersecurity assessment and data protection strategy, you might consider consulting with cybersecurity experts like those at Wizlynx Group. They specialize in security testing and cybersecurity consulting to help businesses identify vulnerabilities and implement effective defense measures. You can learn more about their servic

May 9th
Reply

Denny Luyis

When you use a third party platform that offers an app for your on-premise platform - https://www.protectimus.com/platform/ , you are automatically taking advantage of the multi-factor security that they offer. It is easy to forget when you are using your computer, tablet, or smartphone that all of your data is being tracked in some way. With the use of a Protectimus application, your data is encrypted and protected even more. You are also provided with a second layer of security as a secondary level of protection. This helps to make your business' data secure even more.

Jul 26th
Reply