You Might Also Like: CyberWire Daily
Digest
The Cyberwire Intel Briefing podcast begins with a sponsor message for Kiteworks, a secure file-sharing solution for defense contractors. The episode then dives into recent cyber security news, including a Russian GRU unit's cyber operations, vulnerabilities in Apache's OFBiz system and SonicWall devices, a novel technique exploiting Linux's PAM modules, and a critical vulnerability in the Linux kernel's net filter component. The podcast also discusses the resurgence of Predator spyware and a major data breach at Confidant Health, exposing sensitive health information. The episode features an interview with Mary Hague, Global CISO of BAE Systems, who shares her insights on building an effective cybersecurity team. Hague emphasizes the importance of diversity, data-driven decision making, and skills-based hiring. She believes that a team with diverse backgrounds and a shared moral code is essential for building a strong foundation and fostering a culture of trust and collaboration. The podcast concludes with a sponsor message for DeleteMe and Vanta, followed by a story about a musician who allegedly used AI-generated songs and bots to generate millions of dollars in fake royalties from streaming platforms. The episode ends with closing remarks and information about upcoming episodes.
Outlines
Cyber Security News and Data Breaches
This segment covers various cyber security news stories, including a Russian GRU unit's cyber operations, vulnerabilities in Apache's OFBiz system and SonicWall devices, a novel technique exploiting Linux's PAM modules, and a critical vulnerability in the Linux kernel's net filter component. It also discusses the resurgence of Predator spyware and a major data breach at Confidant Health, exposing sensitive health information.
Building an Effective Cybersecurity Team
This segment features an interview with Mary Hague, Global CISO of BAE Systems, discussing her approach to building an effective cybersecurity team, emphasizing the importance of diversity, data-driven decision making, and skills-based hiring.
AI Music Streaming Scheme and Closing Remarks
This segment covers a story about a musician who allegedly used AI-generated songs and bots to generate millions of dollars in fake royalties from streaming platforms. The segment concludes with closing remarks and information about upcoming episodes.
Keywords
Cadet Blizzard
A hacker group affiliated with Russia's GRU Unit 29155, known for sabotage and assassination attempts. They have been active since 2022, conducting cyber operations like the Whisper Gate Malware attack on Ukraine.
Pluggable Authentication Modules (PAM)
A framework in Linux that allows for modular authentication and authorization mechanisms. Attackers can exploit PAM modules to create persistent backdoors and exfiltrate sensitive data.
Zero-Trust Framework
A security model that assumes no user or device can be trusted by default. It requires strict verification and authorization for access to resources, enhancing security and compliance.
Data-Driven Decision Making
A process of using data analysis and insights to inform strategic decisions. In cybersecurity, data-driven decision making helps prioritize resources, identify vulnerabilities, and optimize security controls.
Skills-Based Hiring
A hiring approach that focuses on identifying and recruiting individuals with specific skills and expertise, regardless of traditional qualifications or degrees. This approach is becoming increasingly important in cybersecurity, where specialized skills are highly valued.
AI-Generated Music
Music created using artificial intelligence algorithms and software. This technology has raised concerns about copyright infringement and the potential for fraud, as seen in the case of Michael Smith's alleged scheme.
Q&A
What are some of the key challenges facing defense contractors in complying with CMMC 2.0 security standards?
Defense contractors face pressure to comply with CMMC 2.0 standards, requiring secure file-sharing solutions and a robust security posture. Kiteworks, a FedRAP-moderate authorized solution, helps address these challenges by supporting CMMC 2.0 requirements and leveraging a zero-trust framework.
How can organizations defend against the novel technique exploiting Linux's PAM modules?
Organizations should implement proactive measures like privilege management for Unix and Linux systems, file integrity monitoring to detect suspicious changes, and regular security audits to mitigate the risks associated with PAM's flexibility.
What are some of the key factors Mary Hague considers when building an effective cybersecurity team?
Mary Hague emphasizes the importance of diversity, data-driven decision making, and skills-based hiring. She believes that a team with diverse backgrounds and a shared moral code is essential for building a strong foundation and fostering a culture of trust and collaboration.
What are some of the challenges and opportunities in professionalizing the cybersecurity field?
Professionalizing cybersecurity involves standardizing roles, developing career frameworks, and ensuring that qualifications reflect the evolving needs of the industry. It's important to balance professionalization with the value of diverse backgrounds and ensure that career paths remain accessible for individuals from various fields.
What are some of the roadblocks to achieving greater diversity in the cybersecurity field?
While there is a growing consensus on the need for diversity, roadblocks include unconscious bias, lack of mentorship opportunities, and a perception that certain backgrounds are not suitable for cybersecurity roles. Addressing these issues requires proactive efforts like mentorship programs, skills-based hiring, and promoting inclusive environments.
Show Notes
Introducing Blizzard warning: Russia’s GRU unleashes new cyber saboteurs. from CyberWire Daily.
Follow the show: CyberWire Daily
Cadet Blizzard is part of Russia’s elite GRU Unit. Apache releases a security update for its open-source ERP system. SonicWall has issued an urgent advisory for a critical vulnerability. Researchers uncover a novel technique exploiting Linux’s Pluggable Authentication Modules. Google’s kCTF team has discloses a critical security vulnerability affecting the Linux kernel’s netfilter component. Predator spyware has resurfaced. US health care firm Confidant Health exposes 5.3 terabytes of sensitive health information. Dealing with the National Public Data breach. On our Solution Spotlight: Mary Haigh, Global CISO of BAE Systems, speaks with N2K's Simone Petrella about moving beyond the technical to build an effective cybersecurity team. An AI music streaming scheme strikes a sour note.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
CyberWire Guest
On our Solution Spotlight segment, Mary Haigh, Global CISO of BAE Systems, speaks with N2K President Simone Petrella about moving beyond the technical to build a cybersecurity team.
Selected Reading
Russia’s Most Notorious Special Forces Unit Now Has Its Own Cyber Warfare Team (WIRED)
Apache Makes Another Attempt at Patching Exploited RCE in OFBiz (SecurityWeek)
SonicWall Access Control Vulnerability Exploited in the Wild (GB Hackers)
Linux Pluggable Authentication Modules Abused to Create Backdoors (Cyber Security News)
PoC Exploit Released for Linux Kernel Vulnerability that Allows Root Access (Cyber Security News)
Predator spyware resurfaces with signs of activity, Recorded Future says (CyberScoop)
Therapy Sessions Exposed by Mental Health Care Firm’s Unsecured Database (WIRED)
Frustration Trying to Opt-Out After the National Public Data Breach (Security Boulevard)
Musician charged with $10M streaming royalties fraud using AI and bots (Bleeping Computer)
Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices
DISCLAIMER: Please note, this is an independent podcast episode not affiliated with, endorsed by, or produced in conjunction with the host podcast feed or any of its media entities. The views and opinions expressed in this episode are solely those of the creators and guests. For any concerns, please reach out to team@podroll.fm.