DiscoverCybersecurity Today
Cybersecurity Today
Claim Ownership

Cybersecurity Today

Author: Howard Solomon

Subscribed: 2,155Played: 84,880
Share

Description

Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
933 Episodes
Reverse
Join Jim Love on a special edition of Cybersecurity Today and Hashtag Trending as he delves into the recent CrowdStrike incident that led to a global IT meltdown. With over 8.5 million Windows devices affected by a faulty CrowdStrike Falcon update, this event is being compared to Y2K and WannaCry. Discover the widespread impacts across key industries, the technical details behind the kernel-crashing error, and the fallout for companies and IT professionals. Learn why this disaster has created such frustration and anger in the cybersecurity community and what steps are being taken to recover. Tune in to understand the broader economic and societal implications of what is being called the 'worst cyber event in history.' 00:00 Introduction and Host Introduction 00:19 CrowdStrike Incident Overview 00:46 Community Reactions and Frustrations 02:29 Understanding CrowdStrike's Role 04:49 Technical Breakdown of the Issue 07:59 Impact and Consequences 09:04 Response and Fixes 12:33 Lessons and Future Precautions 13:20 Final Thoughts and Warnings 13:58 Conclusion
Dodging the Biggest Supply Chain Attack Ever: An Insight with JFrog's Security Research Team In this weekend edition of Cyber Security Today, host Jim Love discusses with Brian Moussalli, the Security Research Team Lead at JFrog, how potentially the biggest supply chain attack was averted. They delve into the intricacies of supply chain attacks, the risks associated with leaked tokens, and the importance of checking binary files for vulnerabilities. The conversation also touches on securing open source software and the role of JFrog in making the cyber world safer. Tune in to learn critical lessons on cybersecurity from this insightful interview. 00:00 Introduction and Host Update 00:32 Understanding Supply Chain Attacks 02:47 Interview with Brian Moussalli, the Security Research Team Lead at JFrog 06:15 The Python Token Leak Incident 17:01 Lessons Learned and Future Outlook 23:06 Conclusion and Sign-Off  
With Howard away and today's episode of Hashtag Trending being all about security stories, I took the liberty of doing a cross posting. Hope we'll have Howard back next week. In today's episode of Hashtag Trending, host Jim Love covers significant cybersecurity news. Microsoft faces criticism for mishandling a reported MSHTML browser engine vulnerability, and Disney investigates a hack by 'Null Bulge,' a group accusing the company of unethical AI use. Additionally, Kaspersky Labs announces its exit from the U.S. market due to government sanctions. The episode also discusses the FBI's swift unlocking of a shooter's phone, indicating advanced law enforcement capabilities. Tune in for these updates and more. 00:00 Introduction and Overview 00:43 Microsoft's Vulnerability Disclosure Controversy 02:28 Disney Hacked: Internal Messages Leaked 03:42 Kaspersky Exits the U.S. Market 04:59 FBI Cracks Encrypted Phones 06:54 Conclusion and Upcoming Shows
A new ransomware group that has been discovered is highlighted in this edition
This episode features an interview with a cybersecurity and privacy lawyer about responding to cyber attacks Navigating Ransomware Response: Insights from Cybersecurity Expert Imran Ahmad In this episode features an interview between Howard Solomon and Imran Ahmad, a partner at Norton Rose Fulbright, discussing effective strategies for managing ransomware attacks. Ahmad, with his extensive background in cybersecurity law, shares practical advice on incident response, the importance of having a structured plan, and the dynamic nature of cyber threats. He elucidates the common pitfalls companies face, the role of communication, and the legal nuances of dealing with cyber incidents. Ahmad also touches on the increasing sophistication of attackers, including the use of AI, and the balance organizations must strike between cybersecurity investments and other business priorities. 00:00 Introduction and Host Welcome 00:26 Meet Imran Ahmad: Cybersecurity Expert 01:37 The Reality of Ransomware Attacks 04:05 Elements of a Good Ransomware Response Plan 07:07 Inside the Incident Response Room 11:49 Legal and Communication Challenges 20:11 Government Policies and Ransomware Payments 22:29 Why Organizations Struggle with Cyber Preparedness 24:02 Conclusion and Farewell
A report on business email compromise attacks is highlighted in this edition
This episode reports on some of the new ways threat actors are bypassing phishing defences
This episode reports on new reports on vulnerabilities and software supply chain security
This episode features a discussion on the latest MOVEit vulnerability, a report on recruiting cybersecurity pros and how an API coding error is being blamed for a large cyber breach in Australia
Are attacks cybercrime or hiding espionage? Researchers investigate in this episode
This episode reports on an updated explanation of the hack of Los Angeles County's health department, an API coding error that led to a huge data breach in Australia, and more
This episode reports on a warning to patch Serv-U applications, the workings of the Rafel trojan, and more 
This episode features a discussion on an undiscovered three-year hack, the cause of Snowflake attacks and allegations of how an Australian health insurer was compromised Join Howard Solomon and David Shipley in the weekend review edition of Cybersecurity Today for insights into major cybersecurity incidents.   Topics include a three-year undetected hack by the Velvet Ant gang, major breaches involving personal data theft, the Medibank hack, misuse of Snowflake passwords, and the recent CDK Global cyberattack affecting car dealerships. Learn about the latest developments and cybersecurity lessons from these significant events.   00:00 Introduction and Overview 00:40 Weekly Headlines Recap 04:15 In-Depth Analysis: Three-Year Undetected Hack 14:27 Medibank Data Breach Investigation 25:18 Snowflake Data Breaches Update 30:04 CDK Global Cyber Attack 33:47 Conclusion and Final Thoughts    
This episode reports on how gullible employees are falling for a scam and cutting and pasting malware into their organization's IT systems, and more 
This episode reports on how outdated software played a role in a lengthy hack, the latest VMware security update, and more
This episode reports on complaints about the proposed UN cybercrime treaty, servers used by Islamic State terrorists shut, and more 
This episode includes a discussion on Microsoft and Google's offer to help U.S. rural hospitals tighten their cybersecurity, a report on top network vulnerabilities found by penetration testers and the latest news on hacks of Snowflake customers.
This episode reports on the latest ransomware news, another North Korean threat actor putting  malicious packages on the NPM registry, vulnerabilities in some open source AI apps, and more
This episode reports on the latest patches from Microsoft, Nvidia, JetBrains and ARM, as well as action by the Privacy Commissioner of Canada 
Microsoft has listened to criticism about the supposedly helpful tool, and more
loading
Comments (3)

Daniel Lisa

Acronis Cyber Backup is a comprehensive data backup and recovery solution designed to protect data, systems, and applications. It's used by businesses and individuals to ensure that their critical information is safeguarded against data loss, hardware failures, cyberattacks, and other unexpected events. Acronis Cyber Backup offers features like full disk imaging, incremental backups, cloud storage, and quick recovery to keep operations running smoothly. It provides flexible deployment options, allowing backups to be stored locally or in the cloud, and integrates advanced cybersecurity features to defend against ransomware and other cyber threats. For a thorough cybersecurity assessment and data protection strategy, you might consider consulting with cybersecurity experts like those at https://www.wizlynxgroup.com/hk/en/

May 9th
Reply

Daniel Lisa

Acronis Cyber Backup is a comprehensive data backup and recovery solution designed to protect data, systems, and applications. It's used by businesses and individuals to ensure that their critical information is safeguarded against data loss, hardware failures, cyberattacks, and other unexpected events. Acronis Cyber Backup offers features like full disk imaging, incremental backups, cloud storage, and quick recovery to keep operations running smoothly. It provides flexible deployment options, allowing backups to be stored locally or in the cloud, and integrates advanced cybersecurity features to defend against ransomware and other cyber threats. For a thorough cybersecurity assessment and data protection strategy, you might consider consulting with cybersecurity experts like those at Wizlynx Group. They specialize in security testing and cybersecurity consulting to help businesses identify vulnerabilities and implement effective defense measures. You can learn more about their servic

May 9th
Reply

Denny Luyis

When you use a third party platform that offers an app for your on-premise platform - https://www.protectimus.com/platform/ , you are automatically taking advantage of the multi-factor security that they offer. It is easy to forget when you are using your computer, tablet, or smartphone that all of your data is being tracked in some way. With the use of a Protectimus application, your data is encrypted and protected even more. You are also provided with a second layer of security as a secondary level of protection. This helps to make your business' data secure even more.

Jul 26th
Reply