<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[The InfoSec Board Brief]]></title><description><![CDATA[An insider cybersecurity and compliance intelligence briefing for board members about essential GRC frameworks like ISO 27001, GDPR, HIPAA, PCI, SOC2, CMMC, NIST 800-171, and others. ]]></description><link>https://infosecbb.com</link><image><url>https://substackcdn.com/image/fetch/$s_!RkUa!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a8bd3cd-9c0e-447c-913e-eea723c8cc52_256x256.png</url><title>The InfoSec Board Brief</title><link>https://infosecbb.com</link></image><generator>Substack</generator><lastBuildDate>Sun, 03 May 2026 08:11:00 GMT</lastBuildDate><atom:link href="https://infosecbb.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Irving Place Partners]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[infosecbb@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[infosecbb@substack.com]]></itunes:email><itunes:name><![CDATA[Amir Tarighat]]></itunes:name></itunes:owner><itunes:author><![CDATA[Amir Tarighat]]></itunes:author><googleplay:owner><![CDATA[infosecbb@substack.com]]></googleplay:owner><googleplay:email><![CDATA[infosecbb@substack.com]]></googleplay:email><googleplay:author><![CDATA[Amir Tarighat]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[FedRAMP: A Strategy Overview for Executives & Boards]]></title><description><![CDATA[FedRAMP (Federal Risk and Authorization Management Program) is a U.S.]]></description><link>https://infosecbb.com/p/fedramp-a-strategy-overview-for-executives</link><guid isPermaLink="false">https://infosecbb.com/p/fedramp-a-strategy-overview-for-executives</guid><dc:creator><![CDATA[Amir Tarighat]]></dc:creator><pubDate>Tue, 18 Mar 2025 13:43:38 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a8bd3cd-9c0e-447c-913e-eea723c8cc52_256x256.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>FedRAMP (Federal Risk and Authorization Management Program)</strong> is a U.S. government initiative that standardizes security assessment and authorization for cloud services used by federal agencies. In practice, FedRAMP is often seen as the <em>&#8220;gold standard&#8221;</em> for cloud security compliance in the public sector. Compliance is mandatory for cloud providers serving civilian agencies, and FedRAMP was codified into law in 2022, reinforcing its government-wide scope. For board members and technology executives, FedRAMP is not just an IT checkbox &#8211; it&#8217;s a strategic credential that can unlock the federal market and signal robust security governance.</p><p><strong>FedRAMP-Certified Cloud Providers (Low, Moderate, High Impact Levels)</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://infosecbb.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The InfoSec Board Brief! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>FedRAMP authorizations are categorized by impact level &#8211; Low, Moderate, or High &#8211; corresponding to the sensitivity of data a cloud service handles. The vast majority (~80%) of FedRAMP authorizations are at the <strong>Moderate impact level</strong>, covering systems where a security breach could cause <em>&#8220;serious adverse effects&#8221;</em> (e.g. significant operational damage or financial loss). <strong>High impact</strong> authorizations are reserved for the government&#8217;s most sensitive unclassified data (e.g. law enforcement, emergency services, financial or health records) where a compromise could be <em>&#8220;severe or catastrophic&#8221;</em>. <strong>Low impact</strong> (including the &#8220;LI-SaaS&#8221; tailored baseline for simple SaaS apps) is used for low-risk services (e.g. no sensitive PII beyond login info) and has fewer controls, offering a lightweight path for basic cloud tools.</p><p><strong>Hundreds of cloud services now meet these bars.</strong> As of 2023, over <strong>300 cloud offerings</strong> have achieved FedRAMP authorization . This roster includes all major cloud infrastructure players &#8211; <strong>Amazon Web Services, Microsoft Azure, and Google Cloud</strong> &#8211; which each maintain FedRAMP High authorizations for their U.S. government cloud environments. These platforms enable agencies to run highly sensitive workloads in the cloud with confidence in security and continuous monitoring. In the SaaS arena, dozens of well-known enterprise services have Moderate or High ATOs (Authority to Operate). For example, <strong>Box</strong>, a cloud content management provider, is FedRAMP Moderate authorized and even pursuing a High authorization to serve more sensitive federal needs. Collaboration and productivity tools like <strong>Zoom for Government</strong> have been FedRAMP Moderate authorized since 2019, and business applications from <strong>ServiceNow to Salesforce</strong> offer FedRAMP-authorized government editions. Industry-focused cloud solutions (e.g. for healthcare or finance) are also in the mix, as FedRAMP High covers domains like health IT systems and financial systems under its umbrella. Notably, FedRAMP isn&#8217;t only for tech giants &#8211; <strong>over 30% of FedRAMP-authorized providers are small businesses</strong>, underscoring that even smaller cloud innovators can meet these rigorous standards.</p><p><strong>Business Impact of FedRAMP Certification: Case Studies and ROI</strong></p><p>Achieving FedRAMP compliance is a resource-intensive journey &#8211; but it can yield significant financial and strategic benefits. Many cloud companies view FedRAMP as a <em>&#8220;ticket&#8221;</em> to enter or expand in the government market, and the numbers bear this out. A 2024 survey of 300 companies found that <strong>57% pursued FedRAMP primarily to access federal or state government markets</strong> (only slightly behind the 62% who cited improved security posture as the top driver). By meeting FedRAMP&#8217;s stringent requirements, vendors become eligible for <strong>&#8220;$60+ billion&#8221; in federal cloud spending opportunities</strong> that would otherwise be off-limits. This often translates to new revenue streams and contract wins. In fact, among companies that achieved an ATO, <strong>67% reported meeting or exceeding their revenue targets thanks to FedRAMP</strong> compliance .</p><p>Real-world cases illustrate this growth trajectory. For instance, <strong>Palantir Technologies</strong> saw a tangible market impact after securing FedRAMP High authorization for its platform. The company&#8217;s FedRAMP announcement instilled confidence in federal customers and even investors &#8211; Palantir&#8217;s stock price jumped <strong>65% in the month following the news</strong>, contributing to a 300%+ year-to-date increase . This surge reflected expectations of lucrative new federal deals and validation of Palantir&#8217;s security robustness. Smaller firms have also leveraged FedRAMP to solidify and expand business. <strong>Aidin</strong>, a healthcare SaaS provider, noted that without FedRAMP compliance it <em>&#8220;would have lost an existing [federal] contract&#8221;</em> &#8211; a cornerstone customer &#8211; and <em>&#8220;lost the opportunity to expand within the government agency.&#8221;</em> By investing in FedRAMP (with help from a consultant), Aidin achieved a &#8220;FedRAMP In Process&#8221; status that <strong>saved its anchor client and positioned it to grow its federal business</strong> . In addition to winning deals, companies consistently cite <em>credibility</em> gains: FedRAMP&#8217;s rigorous review boosts customer trust. One FedRAMP-authorized SaaS CEO likened it to an elite security badge that reassures even commercial clients that the company meets top-tier standards for data protection . Internally, the process can also improve discipline &#8211; small cloud providers report that FedRAMP drove stronger security practices across <em>all</em> their products, not just the government offering .</p><p><strong>FedRAMP vs. CMMC 2.0 vs. NIST 800-171: How Do They Compare?</strong></p><p>Executives often ask how FedRAMP stacks up against other federal cybersecurity frameworks like <strong>CMMC 2.0</strong> (Cybersecurity Maturity Model Certification) and <strong>NIST SP 800-171</strong>. All three are grounded in NIST security guidelines, but they differ in scope, rigor, and business context:</p><p>&#8226; <strong>Scope &amp; Audience:</strong> FedRAMP applies to <strong>cloud service providers (CSPs)</strong> offering solutions to <em>any</em> federal agency (civilian or DoD) . It is essentially a <em>vendor risk management program for cloud</em>, ensuring agencies only use pre-vetted secure cloud services. In contrast, <strong>NIST 800-171</strong> and <strong>CMMC 2.0</strong> apply to <strong>federal contractors</strong> (especially Defense Industrial Base companies) that handle sensitive federal data. NIST 800-171 is a set of security requirements to protect <strong>Controlled Unclassified Information (CUI)</strong> on non-federal systems, and CMMC 2.0 is the DoD&#8217;s program to enforce those (and additional) requirements in the <strong>defense supply chain</strong> . In short: <em>FedRAMP = cloud providers for gov; CMMC/NIST 800-171 = defense contractors handling CUI</em>. They are complementary, not interchangeable &#8211; a cloud SaaS selling to DoD might need FedRAMP for the service <em>and</em> CMMC compliance for its organization if it handles CUI internally.</p><p>&#8226; <strong>Framework Rigor:</strong> FedRAMP is built on the comprehensive <strong>NIST SP 800-53 control catalog</strong>, with hundreds of controls at Moderate and High baselines . By comparison, <strong>NIST 800-171 has 110 controls</strong> that are effectively a tailored subset of 800-53 aimed at CUI protection . In fact, 800-171&#8217;s requirements are only <em>&#8220;about 35%&#8221;</em> of the controls in a FedRAMP Moderate baseline . <strong>CMMC 2.0 Level 2</strong> maps directly to those 110 NIST 800-171 controls, while Level 3 will add a further enhanced set (drawn from NIST 800-172 for advanced threats) . FedRAMP High goes beyond, covering more controls across 17 families (comparable to highly sensitive systems). Thus, FedRAMP&#8217;s security bar (especially at Moderate/High) is broader in scope than CMMC Level 2/800-171 &#8211; which means achieving FedRAMP compliance can substantially cover an organization&#8217;s 800-171/CMMC obligations, but not vice versa .</p><p>&#8226; <strong>Certification Process:</strong> FedRAMP has a formalized <strong>authorization process</strong>: a cloud provider must undergo a third-party assessment by an accredited 3PAO auditor and then secure an ATO from either the FedRAMP Joint Authorization Board or a federal agency sponsor . This process emphasizes documentation (e.g. a detailed System Security Plan) and continuous monitoring once authorized. <strong>CMMC 2.0</strong>, on the other hand, will require <strong>certification audits by C3PAOs</strong> for contractors (Level 2 and above) starting as soon as 2025 . Unlike FedRAMP, CMMC has <em>maturity levels</em> (Level 1 basic, Level 2 advanced, Level 3 expert) and is focused on organizational cybersecurity maturity rather than a specific cloud system. <strong>NIST 800-171</strong> historically relied on self-attestation or supplier declarations of compliance, but with CMMC coming, contractors handling CUI will move to third-party certification. In summary, FedRAMP and CMMC both demand independent audits, but FedRAMP is <strong>per cloud service</strong> authorization, while CMMC is <strong>organizational</strong> certification for DoD suppliers.</p><p>&#8226; <strong>Compliance Costs:</strong> All three frameworks carry compliance costs, but scale differs. FedRAMP is known for substantial upfront investment in engineering, documentation, and audit. Estimates for <strong>initial FedRAMP ATO costs range from $250K up to $750K</strong> (not including continuous monitoring overhead) . This figure can climb higher (into the millions) for large, complex systems &#8211; GAO found cost estimates <em>&#8220;ranged from tens of thousands to millions&#8221;</em> among various providers . CMMC 2.0 was explicitly designed to be more accessible for smaller firms, with Level 1 being relatively low effort (only 17 controls) and self-assessable. <strong>CMMC Level 2</strong> (the roughly 110 controls matching 800-171) will involve more effort but still far less than a full FedRAMP Moderate program. Projected <strong>CMMC certification costs</strong> vary widely by company size and gaps &#8211; roughly <strong>$20K&#8211;$100K+ for many small/mid firms</strong> &#8211; but could reach a couple hundred thousand for larger enterprises needing Level 2 certification . (One analysis pegs Level 2 compliance in the $63K&#8211;$200K+ range in total) . In short, FedRAMP&#8217;s cost is often an order of magnitude higher due to its depth and ongoing requirements, whereas CMMC costs scale with the organization but are generally lower per company. NIST 800-171 implementation costs will mirror CMMC prep costs &#8211; often focusing on closing technical gaps and implementing controls &#8211; but without the added expense of formal certification audits (until CMMC kicks in for a given contract).</p><p>&#8226; <strong>Business Implications:</strong> The business value of each framework corresponds to market access. <strong>FedRAMP&#8217;s value proposition</strong> is clear for cloud vendors: no FedRAMP, no sale into most federal agencies. Many RFPs now <strong>require FedRAMP authorization</strong> up-front, effectively filtering out non-compliant providers. Thus, FedRAMP can be a <em>competitive differentiator</em> &#8211; even a smaller SaaS with a FedRAMP Moderate authorization competes on a level playing field with larger firms when federal agencies insist on it . Moreover, FedRAMP&#8217;s rigorous vetting signals strong security to other industries (e.g. state governments via StateRAMP, or even commercial clients), potentially opening doors in regulated sectors like healthcare and finance that prize robust cloud security . <strong>CMMC 2.0&#8217;s business impact</strong> is concentrated in the defense realm: certification will become <em>&#8220;no bid&#8221;</em> gating criteria &#8211; contractors must certify at the required level or be ineligible for DoD contracts . In essence, CMMC compliance will protect existing Defense revenue and enable continued participation in the DoD supply chain. For many suppliers, this is defensive: avoiding loss of contracts due to non-compliance . <strong>NIST 800-171</strong> compliance (outside of CMMC) has been more of a contractual duty to avoid breach of contract and potential penalties . It hasn&#8217;t historically been a public &#8220;certification&#8221; to market, but it underpins trust in handling government data. From a strategic view, achieving FedRAMP can actually streamline meeting CMMC/800-171 requirements too &#8211; nearly half of companies in one survey said FedRAMP helped improve compliance with other frameworks like ISO 27001, SOC 2, and CMMC .</p><p><strong>Strategic Insights: Trends in Government Cloud and Compliance</strong></p><p><strong>Government Cloud Adoption is Accelerating:</strong> Federal agencies are rapidly embracing cloud solutions as part of IT modernization. FedRAMP&#8217;s growth metrics reflect this trend &#8211; between 2019 and 2023, the number of FedRAMP authorizations across major agencies jumped about <strong>60%</strong> . There are simply far more cloud services in use now, supporting everything from basic infrastructure to mission-critical applications . Notably, even Defense and intelligence communities (with DoD&#8217;s IL4/IL5 and IC&#8217;s C2S cloud programs) reciprocally recognize FedRAMP baselines, meaning a FedRAMP Moderate or High service can often be leveraged across civilian and military environments with minimal duplication . For cloud providers, this expanding market means FedRAMP authorization can lead to multiple agency customers reusing that ATO &#8211; a &#8220;sell once, deploy many&#8221; benefit. Agencies, for their part, are under mandates (Cloud Smart policy) to use secure cloud and prefer authorized solutions, which drives demand for FedRAMP-compliant offerings. An emerging insight is that <strong>being in the FedRAMP Marketplace is increasingly critical for visibility</strong> &#8211; agencies consult this official list of approved services when planning procurements.</p><p><strong>Compliance as a Market Enabler (and Barrier):</strong> FedRAMP and related requirements are creating a clearer dividing line in the industry. On one hand, companies that invest in compliance are reaping rewards: 73% of firms that <em>haven&#8217;t</em> pursued FedRAMP report that they are still keeping the option open, likely due to fear of missing out on deals . On the other hand, firms that do achieve authorization report broader benefits than just sales. According to a 2024 Coalfire study, the <strong>top cited benefit of FedRAMP authorization was improving the company&#8217;s overall security program (72% of respondents)</strong> &#8211; even above the revenue gains &#8211; and a majority also said it accelerated compliance with other standards . This suggests FedRAMP can be a driver of internal maturity, which is a strategic upside for executives concerned about resilience and brand trust. Still, challenges persist: <strong>81% of organizations said finding qualified FedRAMP talent is a major challenge</strong> (in fact, skill shortage was cited as a bigger barrier than budget) . This has led to an ecosystem of FedRAMP advisors, accelerators, and automation tools to help companies through the process. Boards should be aware that attracting and retaining cloud security talent (with FedRAMP experience) can be as important as the technology itself in meeting compliance on time.</p><p><strong>&#8220;Do Once, Use Many&#8221; &#8211; Beyond FedRAMP:</strong> A strategic insight for companies is to leverage overlap and reciprocity among frameworks. Because FedRAMP draws from NIST 800-53 and has rigorous continuous monitoring, it often covers substantial ground for other cybersecurity frameworks. Achieving FedRAMP can thus give a head start in meeting <strong>CMMC, SOC 2, ISO 27001, GDPR</strong> and others . The reverse is also true: investments in NIST 800-171 (CMMC) controls can partially satisfy FedRAMP requirements since there is about 35% overlap . Executives should encourage their compliance and engineering teams to map control requirements across these standards to reduce duplicate work. Notably, recent policy updates aim to improve reciprocity. The FedRAMP Authorization Act (2022) encourages mutual recognition of security assessments, and there have been discussions about <strong>CMMC accepting FedRAMP-certified cloud services</strong> as automatically compliant for the cloud portion of a contractor&#8217;s environment . Staying attuned to these developments can save costs and time &#8211; for example, using a FedRAMP-authorized cloud for handling CUI may simplify a contractor&#8217;s CMMC compliance (the cloud provider already covers many controls).</p><p><strong>FedRAMP Enhances Market Positioning:</strong> In an era of heightened cyber threats, many enterprise and government buyers prefer vendors who can demonstrate strong security credentials. FedRAMP has become a respected credential not just in government but in the broader market. A Harvard governance article even advises corporate directors to ask management <em>&#8220;Is the cloud provider we&#8217;re considering FedRAMP-approved?&#8221;</em> as a litmus test of security due diligence . The logic: if a vendor&#8217;s cloud platform is FedRAMP authorized, it means an objective 3rd party vetted its controls to a high standard, reducing risk. Tech executives can thus leverage FedRAMP status in sales discussions outside federal circles as proof of a hardened security environment. Additionally, being early to comply can preempt future regulations &#8211; FedRAMP&#8217;s model is inspiring analogous programs (e.g. <strong>StateRAMP</strong> for states, and discussions of similar frameworks for critical infrastructure clouds). Organizations that treat compliance as a strategic investment &#8211; building it into product development and cloud architecture &#8211; will be better positioned as trusted partners. On the flip side, <strong>non-compliance can be a deal-breaker</strong>: we&#8217;ve seen agencies report using non-FedRAMP cloud services in the past, but OMB is clamping down on that exception . The window for operating in federal spaces without proper certifications is closing fast.</p><p><strong>Key Takeaways and Recommendations</strong></p><p>&#8226; <strong>FedRAMP is a Must-Have for Federal Cloud Business:</strong> For any cloud service targeting government clients, FedRAMP authorization is effectively a prerequisite. Federal procurement officers often <em>require</em> FedRAMP in RFPs, which means providers without it are filtered out. Achieving FedRAMP not only opens doors to ~$60B in federal cloud spend , it also <em>&#8220;levels the playing field&#8221;</em> for smaller companies to compete in government deals . Board members should view FedRAMP as a strategic investment to access and grow in the public sector market.</p><p>&#8226; <strong>FedRAMP Drives Security and Revenue Upside:</strong> The compliance journey can strengthen a company&#8217;s overall security posture and credibility. Over 60% of companies sought FedRAMP to <strong>improve cybersecurity</strong> &#8211; not just to check a box . This rigor pays off: 67% of FedRAMP-compliant firms met or exceeded their revenue targets, and 63% saw improved security across the business as a result . Case studies show FedRAMP can help <strong>retain key customers and win new contracts</strong> (e.g. Aidin preserving a federal client ) and even boost investor confidence in tech companies aiming for government sectors (Palantir&#8217;s market value jump being a vivid example ). Executives should track and communicate these ROI metrics when evaluating the FedRAMP business case.</p><p>&#8226; <strong>Plan for Compliance Challenges &#8211; Talent and Cost:</strong> <strong>Executives must be prepared to dedicate resources</strong> &#8211; both people and budget &#8211; to succeed in FedRAMP or CMMC initiatives. FedRAMP can entail an initial spend in the high six or low seven figures , plus ongoing compliance staffing. Perhaps more critical is the <em>talent gap</em>: 81% of organizations say finding personnel with FedRAMP expertise is a top challenge . Companies should consider engaging experienced 3PAOs or consultants and investing in training to navigate the complexity. For CMMC 2.0, costs will scale with the organization (ranging from around $20K for very small Level 1 efforts up to hundreds of thousands for Level 2 in larger enterprises) . Early gap assessments and incremental upgrades can spread out the cost and avoid last-minute scrambles that disrupt operations .</p><p>&#8226; <strong>Align Frameworks and Leverage Overlap:</strong> Treat FedRAMP, CMMC, and NIST 800-171 not as isolated checklists but as <em>complementary parts of a unified security governance strategy</em>. Map controls across these frameworks to maximize reciprocity. For example, if you&#8217;ve built a robust FedRAMP Moderate environment, highlight that ~65% of its controls exceed NIST 800-171 &#8211; a strong selling point when pursuing defense contracts . Conversely, if you&#8217;re a defense contractor implementing CMMC Level 2, use that foundation to springboard into FedRAMP for any cloud services you may develop. This integrated approach reduces duplication and showcases a company-wide commitment to high standards. Consider also how FedRAMP authorization can satisfy state and local requirements (via StateRAMP reciprocity) or even bolster international compliance (many GDPR and ISO 27001 controls align with NIST 800-53, which FedRAMP covers) .</p><p>&#8226; <strong>Stay Ahead of Policy and Market Trends:</strong> Finally, board members should ensure their organizations remain proactive as the government compliance landscape evolves. OMB is working on FedRAMP process improvements to lower costs and speed authorizations &#8211; engage with these initiatives (through industry groups or public comments) to shape a more efficient future state. Keep an eye on the rollout of CMMC requirements in 2025 and beyond, updating risk registers for any contracts that will require certification. Embrace the <em>&#8220;trust stamp&#8221;</em> effect of FedRAMP in marketing and partnerships &#8211; include it in annual reports and sales pitches to capitalize on the brand value of being a FedRAMP-authorized provider. In an environment where cyber resilience is paramount, leveraging FedRAMP as part of your cloud governance strategy not only ensures compliance but can actively <strong>enhance your company&#8217;s reputation and competitive edge</strong> .</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://infosecbb.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The InfoSec Board Brief! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Cybersecurity Compliance Requirements for Board Members]]></title><description><![CDATA[Strategic Insights for Cyber-Resilient Boards]]></description><link>https://infosecbb.com/p/cybersecurity-compliance-requirements</link><guid isPermaLink="false">https://infosecbb.com/p/cybersecurity-compliance-requirements</guid><dc:creator><![CDATA[Amir Tarighat]]></dc:creator><pubDate>Thu, 27 Feb 2025 21:36:17 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!q49h!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae7a3c2b-b826-4a1c-9070-13e8fdac99c0_1792x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!q49h!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae7a3c2b-b826-4a1c-9070-13e8fdac99c0_1792x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!q49h!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae7a3c2b-b826-4a1c-9070-13e8fdac99c0_1792x1024.png 424w, https://substackcdn.com/image/fetch/$s_!q49h!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae7a3c2b-b826-4a1c-9070-13e8fdac99c0_1792x1024.png 848w, https://substackcdn.com/image/fetch/$s_!q49h!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae7a3c2b-b826-4a1c-9070-13e8fdac99c0_1792x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!q49h!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae7a3c2b-b826-4a1c-9070-13e8fdac99c0_1792x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!q49h!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae7a3c2b-b826-4a1c-9070-13e8fdac99c0_1792x1024.png" width="1456" height="832" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ae7a3c2b-b826-4a1c-9070-13e8fdac99c0_1792x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:832,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:494770,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://infosecbb.com/i/158063433?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae7a3c2b-b826-4a1c-9070-13e8fdac99c0_1792x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!q49h!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae7a3c2b-b826-4a1c-9070-13e8fdac99c0_1792x1024.png 424w, https://substackcdn.com/image/fetch/$s_!q49h!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae7a3c2b-b826-4a1c-9070-13e8fdac99c0_1792x1024.png 848w, https://substackcdn.com/image/fetch/$s_!q49h!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae7a3c2b-b826-4a1c-9070-13e8fdac99c0_1792x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!q49h!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae7a3c2b-b826-4a1c-9070-13e8fdac99c0_1792x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Cybersecurity governance is no longer just a technical matter&#8212;it is a critical <strong>strategic, legal, and operational issue</strong> that board members must actively oversee. Organizations of all sizes must ensure compliance with evolving security regulations and risk management standards. To fulfill their governance responsibilities, board members should prioritize structured discussions, documentation, and policy approvals related to cybersecurity.</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://infosecbb.com/p/cybersecurity-compliance-requirements?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading The InfoSec Board Brief! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://infosecbb.com/p/cybersecurity-compliance-requirements?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://infosecbb.com/p/cybersecurity-compliance-requirements?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p><h1><strong>Key Elements of Cybersecurity Governance</strong></h1><h2><strong>1. Cyber Risks Discussed and Documented</strong></h2><p>Regular, structured board discussions on cyber risks should be prioritized. These discussions must go beyond passive reporting to include <strong>thorough analysis, prioritization, and documented action plans</strong>. Meeting minutes should reference specific risks and the steps taken to mitigate them, ensuring accountability and providing a clear audit trail.</p><p>&#128204; <strong>Resource:</strong> <a href="https://www.nacdonline.org/insights/publications.cfm?ItemNumber=66657">National Association of Corporate Directors (NACD) Cyber-Risk Oversight Handbook</a></p><h2><strong>2. Approval of Risk Management and Compliance Policies</strong></h2><p>The board must formally approve <strong>cybersecurity risk management and compliance policies</strong>. These policies define the organization&#8217;s response to cyber threats, covering risk mitigation, incident response, data protection, and regulatory adherence. <strong>Annual reviews</strong>&#8212;or updates in response to significant cybersecurity developments&#8212;ensure alignment with industry standards and legal expectations.</p><p>&#128204; <strong>Resource:</strong> <a href="https://www.nist.gov/cyberframework">NIST Cybersecurity Framework (CSF)</a></p><h2><strong>3. Documenting Cyber Requests and Actions</strong></h2><p>Any cybersecurity-related requests&#8212;whether for <strong>new tools, training programs, or budget increases</strong>&#8212;should be documented in meeting minutes or other official records. This level of transparency allows the board to <strong>track progress and measure the organization&#8217;s commitment</strong> to strengthening its cybersecurity posture.</p><p>&#128204; <strong>Resource:</strong> <a href="https://www.cisa.gov/resources-tools">CISA Cybersecurity Resources for Boards</a></p><h2><strong>4. Incident Response and Disclosure</strong></h2><p>Boards should review and approve <strong>incident response plans</strong>, ensuring they align with <strong>legal and regulatory disclosure requirements</strong>. If a security incident occurs, board minutes should document response steps, lessons learned, and follow-up actions to mitigate future risks.</p><p>&#128204; <strong>Resource:</strong> <a href="https://www.sec.gov/news/press-release/2023-139">SEC Cybersecurity Disclosure Rules</a></p><h2><strong>5. Annual Review of SOC 2 Reports</strong></h2><p>SOC 2 reports provide <strong>critical insights into an organization&#8217;s security, privacy, and compliance posture</strong>. Companies that handle sensitive data&#8212;particularly in SaaS and technology sectors&#8212;should undergo <strong>annual reviews of these reports</strong> as part of the board&#8217;s oversight role.</p><p>&#128204; <strong>Resource:</strong> <a href="https://www.aicpa-cima.com/resources/article/soc-for-service-organizations">AICPA Guide to SOC 2 Compliance</a></p><h2><strong>6. Referencing Policies and Audit Results in Meeting Minutes</strong></h2><p>To maintain a <strong>strong cybersecurity governance framework</strong>, board minutes should regularly reference cybersecurity <strong>policies, audit outcomes, and updates to risk management practices</strong>. This demonstrates a proactive governance approach and helps integrate cybersecurity into the organization&#8217;s broader risk management strategy.</p><p>&#128204; <strong>Resource:</strong> <a href="https://www.iso.org/isoiec-27001-information-security.html">ISO 27001 Compliance Framework</a></p><h2><strong>Conclusion</strong></h2><p>Board members play a <strong>vital role in cybersecurity governance</strong>. By fostering <strong>structured discussions, documentation, and policy approvals</strong>, they ensure <strong>accountability and compliance</strong> while reinforcing a <strong>strong security culture</strong>. A <strong>proactive approach</strong> to cybersecurity oversight will help safeguard the organization against evolving threats and regulatory risks.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://infosecbb.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The InfoSec Board Brief! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Vulnerability Management ]]></title><description><![CDATA[How SaaS companies can meet the reqs for SOC2 and ISO 27001]]></description><link>https://infosecbb.com/p/vulnerability-management</link><guid isPermaLink="false">https://infosecbb.com/p/vulnerability-management</guid><dc:creator><![CDATA[Amir Tarighat]]></dc:creator><pubDate>Fri, 09 Aug 2024 20:48:22 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a8bd3cd-9c0e-447c-913e-eea723c8cc52_256x256.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="native-video-embed" data-component-name="VideoPlaceholder" data-attrs="{&quot;mediaUploadId&quot;:&quot;6fa0d686-5ab7-4f59-a905-5f169ae4c587&quot;,&quot;duration&quot;:null}"></div><p></p><p>For executives, founders, and business leaders,&nbsp;having a vulnerability management program is one of the often misunderstood requirements of audited frameworks like SOC2, ISO 270001, and NIST.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://infosecbb.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The InfoSec Board Brief! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>In this board brief, I&#8217;ll explain in the simplest terms for a non-technical audience what it is, how it&#8217;s measured during an audit, and what you can do right now to comply with this requirement.</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://infosecbb.com/p/vulnerability-management?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Know someone who could benefits from this post?</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://infosecbb.com/p/vulnerability-management?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://infosecbb.com/p/vulnerability-management?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p>There are many things that sound like they could be related to the words&nbsp; &#8220;vulnerability management&#8221;, but the ones the frameworks focus on are very specific.&nbsp;</p><p>Vuln Management is part of the secure software development lifecycle, which includes all the various things software developers have to do on an ongoing basis to ensure the applications they work on are secure from the most common types of threats.&nbsp;</p><p>All software is built using libraries and packages. These are basically other people's code that make your software work, and most are open source. They can be tightly intertwined with your code or in the underlying OS that your application uses.&nbsp;</p><p>As hackers and researchers identify security issues in packages, the maintainers, the people who write the code for them, update their libraries to fix the vulnerabilities that have been identified.</p><p>But not every update to a package fixes a vulnerability, most add features and can change how the package works. Updating to a new package that isn&#8217;t backward compatible could break something in your application. That&#8217;s why this can get very frustrating and time-consuming.&nbsp;</p><p>But this is one of the most important things developers can do to secure their applications. This is literally how attacks on software happen: a well-established vulnerability is exploited to compromise your software.</p><p>Ok so, how do you pass your audit?&nbsp;</p><p>During an audit, this is measured by examining the length of time a package that has been identified as vulnerable and then fixed or updated.&nbsp;</p><p>Vulnerable packages are scored by how sensitive they are and auditors will look to make sure highly sensitive critical packages are updated within 30 days, or sooner for example. Less sensitive packages could be 60 or even 90-day timelines, or until they become severely critical.&nbsp;</p><p>How do you actually get this done?</p><p>Detecting and triaging the vulnerabilities is thankfully very easy.&nbsp;</p><p>Github&#8217;s Dependabot and Snyk&#8217;s free plan both cover everything you need to detect vulnerable packages. Did I mention they&#8217;re both free?&nbsp;</p><p>Tools like those will continuously monitor and generate the list of vuln packages. They will even rank them in terms of importance.&nbsp;</p><p>Now, this is the hard part. Developers will have to test to ensure that upgrading the packages doesn&#8217;t break their application. This is real work; it&#8217;s not just changing the version number of a package in a requirements file. Upgrading certain packages might require upgrading others or changing things in how your application uses that package.&nbsp;</p><p>So how do you do this? You need to make vuln management a part of your normal software development process. Upgrading packages regularly.&nbsp;</p><p>Some of the worst offenders I&#8217;ve seen are companies that leverage outsourced developers or development companies who write code and then forget about it. Upgrading packages from last quarter's version is significantly easier than upgrading a package from 3 years ago.</p><p></p><p>&#128075; What did you think of this post? I&#8217;d love to hear your feedback!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://infosecbb.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The InfoSec Board Brief! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Edition #9 ]]></title><description><![CDATA[Table of Contents]]></description><link>https://infosecbb.com/p/edition-9</link><guid isPermaLink="false">https://infosecbb.com/p/edition-9</guid><dc:creator><![CDATA[Amir Tarighat]]></dc:creator><pubDate>Tue, 25 Jun 2024 20:21:12 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!98qn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55b3403d-5448-41b6-8442-b0b38e562c7e_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!98qn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55b3403d-5448-41b6-8442-b0b38e562c7e_1280x1280.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!98qn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55b3403d-5448-41b6-8442-b0b38e562c7e_1280x1280.png 424w, https://substackcdn.com/image/fetch/$s_!98qn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55b3403d-5448-41b6-8442-b0b38e562c7e_1280x1280.png 848w, https://substackcdn.com/image/fetch/$s_!98qn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55b3403d-5448-41b6-8442-b0b38e562c7e_1280x1280.png 1272w, https://substackcdn.com/image/fetch/$s_!98qn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55b3403d-5448-41b6-8442-b0b38e562c7e_1280x1280.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!98qn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55b3403d-5448-41b6-8442-b0b38e562c7e_1280x1280.png" width="1280" height="1280" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/55b3403d-5448-41b6-8442-b0b38e562c7e_1280x1280.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1280,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!98qn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55b3403d-5448-41b6-8442-b0b38e562c7e_1280x1280.png 424w, https://substackcdn.com/image/fetch/$s_!98qn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55b3403d-5448-41b6-8442-b0b38e562c7e_1280x1280.png 848w, https://substackcdn.com/image/fetch/$s_!98qn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55b3403d-5448-41b6-8442-b0b38e562c7e_1280x1280.png 1272w, https://substackcdn.com/image/fetch/$s_!98qn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55b3403d-5448-41b6-8442-b0b38e562c7e_1280x1280.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>Table of Contents</strong></h3><ol><li><p><em><strong>Snowflake</strong></em><strong> Data Leak Puts at Least 165 Clients at Risk&nbsp;</strong></p></li></ol><ol start="2"><li><p><strong>Whistleblower Speaks About Negligence at </strong><em><strong>Microsoft</strong></em><strong> Prior to </strong><em><strong>SolarWinds</strong></em><strong> Attack</strong></p></li></ol><ol start="3"><li><p><em><strong>Apple Intelligence</strong></em><strong>: What to Expect and Security Implications&nbsp;</strong></p></li></ol><ol start="4"><li><p><em><strong>NSO Group</strong></em><strong> Declares Government Officials and Military Leaders &#8220;Legitimate Targets&#8221;&nbsp;&nbsp;</strong></p></li></ol><ol start="5"><li><p><em><strong>EU</strong></em><strong> Considers Bill That Would Mandate the Mass Scanning of Digital Messages&nbsp;</strong></p></li></ol><ol start="6"><li><p><strong>Ilya Sutskever Founds </strong><em><strong>Safe Superintelligence</strong></em><strong> Following Dramatic Exit From </strong><em><strong>OpenAI</strong></em></p></li></ol><ol start="7"><li><p><strong>Active Directory Defense Startup Achieves Unicorn Status&nbsp;</strong></p></li></ol><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://infosecbb.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The InfoSec Board Brief! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h3><em><strong>Snowflake</strong></em><strong> Data Leak Puts at Least 165 Clients at Risk&nbsp;</strong></h3><p><strong>What happened:&nbsp;</strong></p><ul><li><p>Incident response firm Mandiant reports that hackers may have stolen a &#8220;significant volume of data&#8221; from cloud storage industry giant Snowflake and its customers.</p></li></ul><p><strong>What to know:&nbsp;</strong></p><ul><li><p>At least 165 victims have been identified, including TicketMaster and LendingTree.</p></li><li><p>The threat isn&#8217;t over; TechCrunch confirms that hundreds of Snowflake customer credentials are still circulating online.&nbsp;</p></li><li><p>Snowflake defends its own security in official statement, blaming customers for putting their own credentials at risk by forgoing multifactor authentication.&nbsp;</p></li><li><p>Snowflake reports it is working on a plan to obligate customer use of MFA and other security features; however, they have yet to provide a timeline or specific plan of action.&nbsp;&nbsp;&nbsp;&nbsp;</p></li></ul><p><strong>Business impact:&nbsp;</strong></p><ul><li><p>Companies utilizing Snowflake, partnering with, or relying on any vendors that utilize Snowflake should take immediate action to determine if they&#8217;ve been affected; especially important to confirm that MFA is being broadly enforced.</p></li><li><p>Snowflake&#8217;s denial of wrongdoing and criticism of clients&#8217; security practices sets a new precedent; service providers will not take responsibility for data leaks that leverage customer account access&#8212;companies have to take access to SAAS applications as entirely their own risk.</p></li></ul><p><strong>What to do:&nbsp;</strong></p><ul><li><p>Check with vendors and partners to see if they use or are connected to parties that use Snowflake.&nbsp;</p></li><li><p>Encourage employees to uphold rigorous use of MFA, <em>especially</em> if your company is a Snowflake customer, on <em>everything</em>, not just &#8220;high risk&#8221; applications.</p></li></ul><p>For more information, check out <a href="https://techcrunch.com/2024/06/10/mandiant-hackers-snowflake-stole-significant-volume-data-customers/">this article</a>.</p><p></p><h3><strong>Whistleblower Speaks about Negligence at </strong><em><strong>Microsoft</strong></em><strong> Prior to SolarWinds Attack</strong></h3><p><strong>What happened:&nbsp;</strong></p><ul><li><p>Andrew Harris, former Microsoft employee, provides insight about his experience at the company prior to the devastating SolarWinds cyberattack, revealing that he flagged the potential for &#8220;SAML attacks&#8221; years before they occurred&nbsp;</p></li></ul><p><strong>What to know:&nbsp;</strong></p><ul><li><p>Despite Harris&#8217; warnings about the potential severity of the bug, Microsoft repeatedly brushed off his concerns.&nbsp;</p></li><li><p>Harris states their deprioritization of the security risk was undergirded by a mindset of profit-over-security, as Microsoft viewed getting a piece of an upcoming cloud computing deal with the USFG as a business imperative.&nbsp;</p></li><li><p>In 2019, Harris&#8217; worst fears came true, as Russian hackers took advantage of the SAML weakness to perpetrate the SolarWinds cyberattack, one of the worst in US history, in which over 18,000 accounts were breached, including various divisions of the US government, most alarmingly the National Nuclear Security Administration&nbsp;&nbsp;</p></li></ul><p><strong>Business impact:&nbsp;</strong></p><ul><li><p>Scale of SolarWinds cyberattack was such that even parties that weren&#8217;t directly affiliated with SolarWinds were affected by the hack; consequently, the full impact and extent of the intrusion is still being explored to this day</p></li><li><p>Prioritization of profit over customers points to a troubling trend in Microsoft&#8217;s internal culture, despite its supposed policy of putting security &#8220;above all else&#8221;&nbsp;&nbsp;</p></li></ul><p><strong>What to do:</strong></p><ul><li><p>Companies should consider the impact of Microsoft products in their own cyber ecosystems, examine the extent to which another breach in Microsoft&#8217;s security would affect them, and review ways to mitigate this risk&nbsp;&nbsp;</p></li></ul><p>For more information, check out <a href="https://www.propublica.org/article/microsoft-solarwinds-golden-saml-data-breach-russian-hackers">this article</a>.</p><p></p><h3><em><strong>Apple Intelligence</strong></em><strong>: What to Expect and Security Implications&nbsp;</strong></h3><p><strong>What happened:&nbsp;</strong></p><ul><li><p>Apple has finally released details about their new AI project, &#8220;Apple Intelligence,&#8221; which aims to integrate generative AI into Apple smartphones, creating a &#8220;semi-autonomous,&#8221; personalized AI assistant&nbsp;&nbsp;&nbsp;&nbsp;</p></li></ul><p><strong>What to know:&nbsp;</strong></p><ul><li><p>The AI will be trained using your phone&#8217;s (e.g., <em>your</em>) personal data; however, Apple promises to keep as much of the AI training process and subsequent computations as possible on the device itself to minimize security anxieties&nbsp;</p></li><li><p>What can&#8217;t be done directly with your phone&#8217;s hardware will be sent to and processed by Apple&#8217;s &#8220;Private Cloud Compute System,&#8221; which Apple promises will be as secure as possible&nbsp;</p></li><li><p>For more computationally taxing queries, users will have the option to voluntarily run their inputs through ChatGPT, although Apple makes no promises about OpenAI&#8217;s own data privacy procedures</p></li></ul><p><strong>Business impact:&nbsp;</strong></p><ul><li><p>Apple Intelligence feature poised to boost iPhones sales, foreshadowing possible Apple boom&nbsp;&nbsp;&nbsp;</p></li><li><p>Could benefit certain businesses through faster schedule optimization and workflow acceleration&nbsp;</p></li><li><p>Company data could be processed through this system without company approval due to the fact that individuals get to make the decision about when to use ChatGPT on their phone (which won&#8217;t be handled by Apple&#8217;s Private Cloud)&nbsp;</p></li><li><p>The widespread introduction of this technology could necessitate increased mobile device security for companies to minimize security risks.</p></li></ul><p><strong>What to do:</strong></p><ul><li><p>Individuals privy to and handling sensitive company information should be especially conscientious about what their own Apple Intelligence is trained on and has access to&nbsp;&nbsp;</p></li><li><p>Companies should explore the implementation of Mobile Device Management (MDM) software and related technologies to increase the security of employees&#8217; personal devices.&nbsp;</p></li></ul><p>For more information, check out <a href="https://www.cnet.com/tech/services-and-software/apple-faces-a-tough-task-in-keeping-ai-data-secure-and-private/">these</a> <a href="https://ioc.exchange/@matthew_d_green/112597849837858606">articles</a>.</p><p></p><h3><em><strong>NSO Group</strong></em><strong> Declares Government Officials and Military Leaders &#8220;Legitimate Targets&#8221;&nbsp;</strong></h3><p><strong>What happened:&nbsp;</strong></p><ul><li><p>In a statement from court documents related to NSO Group&#8217;s ongoing legal battle against WhatsApp (which accuses them of unjustly infecting over 1,400 devices with spyware), NSO Group, Pegasus spyware manufacturer, states all government officials and military leaders are legitimate targets for their products by nature of their jobs&nbsp;&nbsp;&nbsp;</p></li></ul><p><strong>What to know:&nbsp;</strong></p><ul><li><p>This statement stands as a significant revelation of the expected use cases of their technologies, which, according to their mission statement, are only to be used &#8220;to prevent acts of terrorism, large-scale drug trafficking, pedophile networks, and other serious criminal acts&#8221;</p></li><li><p>Their most recent comment, though, makes no mention of the company&#8217;s mission statement, and insinuates a broader intended use for the technology</p></li><li><p>NSO Group is no stranger to ethical scrutiny, as their technology was rumored to have been used to track journalist Jamal Khashoggi in the weeks leading up to his assassination, and has even been blacklisted by the Biden administration, which cited concerns that the company has acted &#8220;contrary to the foreign policy and national security interests of the US&#8221;</p></li></ul><p><strong>Business impact:&nbsp;</strong></p><ul><li><p>The result of WhatsApp&#8217;s lawsuit against NSO Group will determine to what extent NSO Group, and other commercial surveillance companies, will be held accountable for malicious uses and impacts of their technologies&nbsp;</p></li><li><p>How the trial ends will also define the efficacy of legal action against malware developers, and inform companies exploited by malware developers on how to proceed legally&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p></li></ul><p>For more information, check out <a href="https://therecord.media/government-military-fair-targets-nso-group">this article</a>.</p><p></p><h3><em><strong>EU</strong></em><strong> Considers Bill that Would Mandate the Mass Scanning of Digital Messages&nbsp;</strong></h3><p><strong>What happened:&nbsp;</strong></p><ul><li><p>On 6/20, the EU was scheduled to assume a position on a bill that would mandate the mass scanning of all digital messages in the EU; however, the vote was canceled on short notice, and a new vote has yet to be announced as of the writing of this article&nbsp;&nbsp;&nbsp;</p></li></ul><p><strong>What to know:&nbsp;</strong></p><ul><li><p>The bill&#8217;s stated goal is to automatically scan digital messages in order to flag content that may contain &#8220;child sexual abuse material&#8221;</p></li><li><p>Critics claim that it is a fundamental violation of the right to individual privacy within personal correspondence&nbsp;</p></li></ul><p><strong>Business impact:&nbsp;</strong></p><ul><li><p>Subjects all EU digital correspondence to surveillance&nbsp;&nbsp;</p></li><li><p>Potentially massive security risks due to the undermining of end-to-end encryption (even encrypted messages will be scanned)&nbsp;&nbsp;</p></li></ul><p><strong>What to do:</strong></p><ul><li><p>Track updates on this legislation if your company is impacted by European business&nbsp;</p></li><li><p>Consider how the passing of such a bill may impact your company and data security&nbsp;</p></li></ul><p>For more information, check out <a href="https://www.theverge.com/2024/6/19/24181214/eu-chat-control-law-propose-scanning-encrypted-messages-csam">this article</a>.&nbsp;</p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://infosecbb.com/?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share The InfoSec Board Brief&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://infosecbb.com/?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share The InfoSec Board Brief</span></a></p><p></p><p></p><h3><strong>Ilya Sutskever Founds </strong><em><strong>Safe Superintelligence</strong></em><strong> Following Dramatic Exit From </strong><em><strong>OpenAI</strong></em></h3><p><strong>What happened:&nbsp;</strong></p><ul><li><p>After drawn out tensions and an eventual falling out with OpenAI leadership in May about how to deal with AI safety, Ilya Sutskever has announced the launch of his own company, Safe Superintelligence, which will, as the name implies, focus exclusively on the development and regulation of safe superintelligent AI&nbsp;&nbsp;</p></li></ul><p><strong>What to know:&nbsp;</strong></p><ul><li><p>Safe Superintelligence is being designed from the bottom up as a for profit entity, and is currently recruiting talent&nbsp;</p></li></ul><p><strong>Business impact:&nbsp;</strong></p><ul><li><p>How OpenAI will fare after losing one of its key scientific minds remains to be seen, but one thing is certain: the trajectory of the company has been altered by Ilya&#8217;s exit, with speculation that OpenAI will take a less cautious approach to development in the future</p></li></ul><p>For more information, check out <a href="https://techcrunch.com/2024/06/19/ilya-sutskever-openais-former-chief-scientist-launches-new-ai-company/">this article</a>.&nbsp;</p><p></p><p></p><h3><strong>Active Directory Defense Startup Achieves Unicorn Status&nbsp;</strong></h3><p><strong>What happened:&nbsp;</strong></p><ul><li><p>Semperis valuation surpasses $1 billion after successfully raising $125 million from JP Morgan and Hercules Capital</p></li></ul><p><strong>What to know:&nbsp;</strong></p><ul><li><p>Semperis&#8217; offers extensive hybrid AD threat detection services, which automatically monitor and repel entry attempts to on premise AD and Entra ID, while providing a cohesive, real-time view of AD and Entra ID security&nbsp;&nbsp;</p></li><li><p>Semperis&#8217; unique specialization in Active Directory makes it stand out within the cybersecurity industry, and despite not even having an IPO yet it has already received significant accolades and praise from big names such as Deloitte&nbsp;&nbsp;&nbsp;</p></li><li><p>Semperis to devote its new funding to R&amp;D and Business Development&nbsp;</p></li><li><p>According to CEO, IPO is on the horizon&nbsp;</p></li></ul><p><strong>Business impact:&nbsp;</strong></p><ul><li><p>Semperis&#8217; runaway success highlights the importance of and a growing need for AD defense going into the future&nbsp;</p></li></ul><p><strong>What to do:</strong></p><ul><li><p>Companies should investigate ways to protect their AD systems if they aren&#8217;t already, and ensure that the measures they&#8217;re taking are as rigorous and up to date as they can be&nbsp;&nbsp;&nbsp;</p></li></ul><p>For more information, check out <a href="https://techcrunch.com/2024/06/20/semperis-a-specialist-in-active-directory-security-now-worth-more-than-1b-raises-125m/">this article</a>.</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://infosecbb.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The InfoSec Board Brief! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Edition #8]]></title><description><![CDATA[Table of Contents]]></description><link>https://infosecbb.com/p/edition-8</link><guid isPermaLink="false">https://infosecbb.com/p/edition-8</guid><dc:creator><![CDATA[Amir Tarighat]]></dc:creator><pubDate>Mon, 06 May 2024 12:16:50 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a8bd3cd-9c0e-447c-913e-eea723c8cc52_256x256.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<blockquote><h2>Table of Contents</h2><ol><li><p><strong>Deep Secrets Exposed in Massive Psychotherapy Records Hack</strong></p></li><li><p><strong>Deepfake Menace: Global Election Security Under Threat</strong></p></li><li><p><strong>MITRE Hacked via Ivanti Zero-Day Vulnerabilities</strong></p></li><li><p><strong>Microsoft&#8217;s Security Crisis: A Battle Against Cyber Threats</strong></p></li><li><p><strong>Paris Olympics Gears Up for Cyber Attacks</strong></p></li><li><p><strong>Cybercrime's Destructive Alliance: Western Hackers and Russian Partners</strong></p></li><li><p><strong>CISA Investigates Breach at Sisense, Urges Customer Action</strong></p></li><li><p><strong>Nationwide Smart Lock Vulnerability</strong></p></li><li><p><strong>North Koreans Secretly Animated Amazon and HBO Max Shows</strong></p></li><li><p><strong>Musk Sparks Controversy with Sydney Attack Images on X</strong></p></li><li><p><strong>Kaiser Warns Millions of Data Exposure</strong></p></li><li><p><strong>GitHub Comments Used to Spread Malware via Microsoft Repo URLs</strong></p><p></p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://infosecbb.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&quot;,&quot;text&quot;:&quot;Share The InfoSec Board Brief&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://infosecbb.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share"><span>Share The InfoSec Board Brief</span></a></p></li></ol></blockquote><p></p><h2><strong>Deep Secrets Exposed in Massive Psychotherapy Records Hack</strong></h2><p>What happened:</p><ul><li><p>Julius Kivim&#228;ki, renowned in global hacking communities for over a decade, was accused of hacking and attempting to extort ransom from Vastaamo, a Finnish national chain of psychotherapy clinics.</p></li><li><p>Sensitive patient data was leaked online, including intimate details confessed to therapists.</p></li></ul><p>What to know:</p><ul><li><p>It&#8217;s one of the largest data breaches in Finland&#8217;s history: &#8220;everyone knows someone who knows someone&#8221; whose therapy records were leaked.</p></li><li><p>The breach triggered widespread distress among victims and prompted government intervention.</p></li><li><p>Vastaamo's lax security measures like disabling network&#8217;s firewall or using no password on the system admin account facilitated the exposure of sensitive patient information at least twice.</p></li><li><p>Kivim&#228;ki has a history of convictions for prominent data breaches and harassment since his early teens, including stealing passwords, and credit card information.</p></li><li><p>Investigators pieced together evidence from digital traces and financial transactions to track down Kivim&#228;ki.</p></li><li><p>Kivim&#228;ki consistently asserted his innocence, but the trial's outcome remains pending.</p></li></ul><p>Business Impact:</p><ul><li><p>For businesses, especially those handling sensitive data, leaking customer data can severely damage reputation and erode customer trust.</p></li><li><p>Businesses in the therapy industry or adjacent could be negatively affected by the appearance of lack of privacy in digital therapy services.  </p></li></ul><p>What to do:</p><ul><li><p>Therapy and tele-health services should prioritize implementing and regularly updating security protocols to mitigate the risk of data breaches.</p></li></ul><p>For more information, check out <a href="https://www.bloomberg.com/news/features/2024-04-22/a-massive-therapy-hack-shows-just-how-unsafe-patients-files-can-be?cmpid=cyber&amp;utm_medium=email&amp;utm_source=newsletter&amp;utm_term=240424&amp;utm_campaign=cyber">this article</a>.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://infosecbb.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The InfoSec Board Brief! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2><strong>Deepfake Menace: Global Election Security Under Threat</strong></h2><p>What happened:</p><ul><li><p>The rise of deepfake technology has raised concerns about the ability to manipulate elections worldwide.</p></li></ul><p>What to know:</p><ul><li><p>Elections globally face the threat of AI-driven disinformation, including deepfake videos and manipulated content, influencing voter perceptions.</p></li><li><p>Creating deepfakes is now faster, easier, and cheaper, requiring only days and a few thousand dollars to train and edit an effective AI.</p></li><li><p>Once trained, AI models can generate videos using a politician's voice and images in minutes.</p></li><li><p>Lack of clear regulations and guidelines exacerbates the risk of deepfake misuse.</p></li><li><p>Major tech companies are developing tools to detect and label synthetic media, but voluntary commitments may not sufficiently address the issue.</p></li><li><p>While most AI-related activity in elections involves "shallow" manipulations such as creating content or emails, requests for unethical deepfake videos persist.</p></li><li><p>The EU has introduced comprehensive regulations on AI use, but implementation may take years, leaving elections vulnerable in the interim.</p></li></ul><p>Business Impact:</p><ul><li><p>The true threat to democracy lies not solely in short-term deepfakes but also in the lasting erosion of trust in the electoral process.&nbsp;</p></li><li><p>Companies handling AI technologies face increasing scrutiny, with potential legal ramifications for misuse.</p></li></ul><p>What to do:</p><ul><li><p>Regulatory bodies should consider the development and implementation of robust AI regulations to safeguard electoral processes.</p></li><li><p>Voters need to remain vigilant against AI-driven disinformation.</p></li></ul><p>For more information, check out <a href="https://www.bloomberg.com/features/2024-ai-election-security-deepfakes/?cmpid=cyber&amp;utm_campaign=cyber&amp;utm_medium=email&amp;utm_source=newsletter&amp;utm_term=240424">this article</a>.</p><p></p><h2><strong>MITRE Hacked via Ivanti Zero-Day Vulnerabilities</strong></h2><p>What happened:</p><ul><li><p>MITRE Corporation, overseeing federally funded research, breached by nation-state hackers through two zero-day vulnerabilities in the Ivanti Connect Secure (VPN) product.</p></li></ul><p>What to know:</p><ul><li><p>MITRE discovered the breach in its unclassified network, impacting collaborative research and development activities supporting various government agencies.</p></li><li><p>There&#8217;s no indication that MITRE&#8217;s core enterprise network or partners&#8217; systems were affected by this incident.</p></li><li><p>Hackers moved laterally within MITRE's infrastructure using compromised administrator accounts, employing sophisticated backdoors and webshells.</p></li><li><p>Actions advised by the government and Ivanti were insufficient to mitigate the vulnerability.</p></li><li><p>MITRE provided recommendations for organizations based on their experience and will investigate the attack technical details in upcoming updates.</p></li></ul><p>Business Impact:</p><ul><li><p>Organizations using Ivanti VPN and other products face heightened security risks and may have their data compromised.</p></li></ul><p>What to do:</p><ul><li><p>Companies utilizing Ivanti products should promptly upgrade, replace, and harden their systems to mitigate vulnerabilities.</p></li></ul><p>For more information, check out <a href="https://therecord.media/mitre-breached-ivanti-zero-days">this article</a>.</p><p></p><h2><strong>Microsoft&#8217;s Security Crisis: A Battle Against Cyber Threats</strong></h2><p>What happened:</p><ul><li><p>Microsoft faces a series of corporate and government high-profile hacks, including breaches by nation-state actors.</p></li><li><p>Amid mounting criticism, the company pledges its most ambitious security overhaul in two decades.</p></li></ul><p>What to know:</p><ul><li><p>Microsoft vows to address cloud vulnerabilities faster and enhance authentication protocols.</p></li><li><p>The company also plans to rely more on AI and automation and change to more secure programming languages, which can be challenging given Microsoft&#8217;s size and the complexity of its product portfolio.</p></li><li><p>Microsoft is accelerating efforts to eliminate outdated accounts and applications.</p></li><li><p>Critics doubt Microsoft's incentive for lasting changes, citing its dominant market position and lucrative cybersecurity revenue.</p></li><li><p>Legislation has been proposed to mandate cybersecurity standards for collaboration software, targeting Microsoft's alleged anticompetitive practices.</p></li></ul><p>Business Impact:</p><ul><li><p>Microsoft's cybersecurity reputation is at stake, affecting customer trust and regulatory scrutiny.</p></li><li><p>Microsoft faces the pressure to balance security improvements with product development amid heightened competition and market demands.</p></li></ul><p>What to do:</p><ul><li><p>Federal agencies and companies should reassess their security protocols to combat evolving threats, and they might consider switching to an alternative vendor if Microsoft's security measures fail to improve.</p></li></ul><p>For more information, check out <a href="https://www.bloomberg.com/news/articles/2024-04-15/microsoft-beset-by-hacks-grapples-with-problem-years-in-the-making?cmpid=cyber&amp;utm_medium=email&amp;utm_source=newsletter&amp;utm_term=240417&amp;utm_campaign=cyber">this article</a>.</p><p></p><h2><strong>Paris Olympics Gears Up for Cyber Attacks</strong></h2><p>What happened:</p><ul><li><p>The 2024 Paris Olympics anticipates facing billions of cyberattacks against the Games&#8217; computer networks.</p></li><li><p>To prepare, organizers have been conducting &#8220;war games&#8221; and offering bug bounties to ethical hackers.</p></li></ul><p>What to know:</p><ul><li><p>Hacking groups now have sophisticated operations capable of disabling digital ticketing systems, credential scanners, and even event timing systems.</p></li><li><p>The 2018 Pyeongchang Winter Olympics experienced a significant cyberattack, causing disruptions to Wi-Fi networks, ticket app, and broadcasting systems. Fans couldn&#8217;t enter the stadium and news couldn&#8217;t be transmitted.</p></li><li><p>2024 Paris Olympics organizers expect to face 3600-5400 &#8220;security events&#8221;.</p></li><li><p>Russia is a major focus of concern due to past incidents of cyber interference in sports events, including state-sponsored hacking targeting anti-doping organizations.</p></li></ul><p>Business Impact:</p><ul><li><p>Organizers promoting or working with the Olympics should be aware of potential cyberattacks and invest in robust cybersecurity measures.</p></li></ul><p>What to do:</p><ul><li><p>Paris Olympics organizers are actively preparing for cyber threats through staff training, war games and collaboration with technology partners.</p></li></ul><p>For more information, check out <a href="https://www.nytimes.com/2024/04/16/world/europe/paris-olympics-cyberattacks.html">this article</a>.</p><p></p><h2><strong>Cybercrime's Destructive Alliance: Western Hackers and Russian Partners</strong></h2><p>What happened:</p><ul><li><p>Ransomware attacks, where hackers encrypt critical files and demand payment for their release, have plagued hospitals, tech firms, and Las Vegas casinos.</p></li><li><p>A group of young hackers from the U.S., U.K., and Canada, known as Scattered Spider, has joined forces with Russia's most notorious ransomware gang, raising concerns of escalating cyber threats.</p></li></ul><p>What to know:</p><ul><li><p>MGM Resorts suffered a $100 million ransomware attack, disrupting operations across major Las Vegas casinos.</p></li><li><p>Western hackers leverage their English and social engineering skills, like impersonating an employee, to infiltrate Western companies' networks, while the Russian group offers "ransomware as a service" to its affiliates.</p></li><li><p>Despite law enforcement efforts, collaboration between Western hackers and Russian groups persists, posing significant challenges for cybersecurity.</p></li></ul><p>Business Impact:</p><ul><li><p>The alliance between Western hackers and Russian ransomware groups amplifies the corporate threat landscape.</p></li></ul><p>What to do:</p><ul><li><p>Companies must enhance cybersecurity measures to defend against ransomware attacks, including training employees to recognize social engineering tactics and implementing robust network security protocols.</p></li></ul><p>For more information, check out <a href="https://www.cbsnews.com/news/cybersecurity-investigators-worry-ransomware-attacks-may-worsen-as-young-hackers-in-us-work-with-russians-60-minutes-transcript/">this article</a>.</p><p></p><h2><strong>CISA Investigates Breach at Sisense, Urges Customer Action</strong></h2><p>What happened:</p><ul><li><p>CISA is investigating a breach at Sisense, a business intelligence company known for its dashboard and analytics services.</p></li><li><p>Customers were urged to reset all credentials used within Sisense, such as Microsoft Active Directory credentials, GIT credentials, web access tokens, and any single sign-on (SSO) secrets or tokens.</p></li></ul><p>What to know:</p><ul><li><p>The breach involves unauthorized access to Sisense's self-hosted Gitlab code repository, containing credentials to Sisense S3 buckets.</p></li><li><p>Attackers accessed the buckets and exfiltrated terabytes of customer data, including access tokens, email passwords and even SSL certificates.</p></li><li><p>The incident raises concerns about Sisense security protocols, including data encryption at rest.</p></li></ul><p>Business Impact:</p><ul><li><p>Sisense's breach casts doubt on its security practices and damages its reputation.</p></li><li><p>Businesses using Sisense may have had their data compromised.</p></li></ul><p>What to do:</p><ul><li><p>Sisense customers should follow detailed instructions provided by the company to reset passwords and credentials.</p></li></ul><blockquote></blockquote><p>For more information, check out <a href="https://krebsonsecurity.com/2024/04/why-cisa-is-warning-cisos-about-a-breach-at-sisense/">this article</a>.</p><p></p><h2><strong>Nationwide Smart Locks Vulnerability</strong></h2><p>What happened:</p><ul><li><p>The U.S. government warns of hard-coded credentials in Chirp Systems' smart locks, potentially compromising 50,000 dwellings nationwide.</p></li><li><p>Despite being alerted to the vulnerability in March 2021, Chirp Systems remains unresponsive.</p></li></ul><p>What to know:</p><ul><li><p>Chirp Systems offers smart mobile access to properties, allowing users to use its app for building entry.</p></li><li><p>The company stores hardcoded credentials within its source code, posing a security risk if compromised.</p></li><li><p>Attackers within Bluetooth range can use the credentials to manipulate device settings, although it doesn't impact the device's locking/unlocking functionality.</p></li><li><p>Chirp's parent company, RealPage, faces lawsuits for alleged rent inflation collusion, using &#8220;a mysterious algorithm to help landlords push the highest possible rents on tenants.&#8221;</p></li></ul><p>Business Impact:</p><ul><li><p>Businesses utilizing Chirp Systems' smart locks for property management are exposed to security risks, potentially leading to unauthorized access to their premises.</p></li><li><p>RealPage's reputation may suffer further due to ongoing legal issues and its association with Chirp Systems.</p></li></ul><p>What to do:</p><ul><li><p>Chirp Systems customers should be cautious and consider alternative security measures for their properties.</p></li></ul><p>For more information, check out <a href="https://krebsonsecurity.com/2024/04/crickets-from-chirp-systems-in-smart-lock-key-leak/">this article</a>.</p><p></p><h2><strong>North Koreans Secretly Animated Amazon and HBO Max Shows</strong></h2><p>What happened:</p><ul><li><p>A misconfigured North Korean cloud server containing thousands of animation files was discovered, revealing North Korean&#8217;s involvement in international projects like season 3 of the Amazon show "Invincible", HBO Max shows and Japanese anime series.</p></li></ul><p>What to know:</p><ul><li><p>Existing sanctions forbid US companies from working with North Korean entities, but the findings suggest North Korea utilizes skilled IT workers to fund its regime.</p></li><li><p>North Korea's limited internet access (1,024 IP addresses and 30 websites) is tightly controlled, but skilled IT workers are still active.</p></li><li><p>The server, accessed without a login, contained animation files, editing comments, and instructions in Chinese translated to Korean.</p></li><li><p>The involvement of North Korean animators in these projects raises concerns about potential sanctions violations and the use of front companies in China to conceal their activity.</p></li></ul><p>Business Impact:</p><ul><li><p>Skybound Entertainment, YouNeek Studios, and other involved companies face scrutiny and reputational challenges, although they may not have knowingly violated sanctions.</p></li></ul><p>What to do:</p><ul><li><p>Companies involved in animation projects should conduct thorough due diligence to ensure compliance with sanctions regulations.</p></li><li><p>Increased scrutiny and verification measures may be necessary for remote IT workers to prevent potential security breaches and sanctions violations.</p></li></ul><p>For more information, check out <a href="https://www.wired.com/story/north-korea-amazon-max-animation-exposed-server/">this article</a>.</p><p></p><h2><strong>Musk Sparks Controversy with Sydney Attack Images on X</strong></h2><p>What happened:</p><ul><li><p>Australian government criticizes Elon Musk and X for allegedly failing to promptly remove graphic content and misinformation during recent violent attacks in Sydney.</p></li><li><p>Five government ministers signal potential tougher laws, including a mandatory code of conduct for social media companies operating in Australia.</p></li></ul><p>What to know:</p><ul><li><p>Calls for stricter regulations surged after two knife attacks in Sydney, leading to the posting of graphic content and rapid misinformation spread.</p></li><li><p>X contests the authority of Australia's eSafety commissioner to dictate global content visibility for its users, intending to challenge the orders in court.</p></li><li><p>Musk's previous clashes with national authorities include defying orders from Brazil&#8217;s Supreme Court.</p></li><li><p>Meta Platforms Inc. takes a contrasting stance, recognizing social responsibility and compliance with laws.</p></li></ul><p>Business Impact:</p><ul><li><p>Musk's resistance and X's stance may lead to potential legal actions against the social media platform in Australia.</p></li></ul><p>What to do:</p><ul><li><p>Social media companies should prioritize timely removal of inappropriate content and misinformation to address public concerns.</p></li><li><p>Governments may introduce tougher legislation to regulate social media platforms and combat misinformation effectively.</p></li></ul><p>For more information, check out <a href="https://www.bloomberg.com/news/articles/2024-04-22/australia-flags-fight-with-elon-musk-over-social-media-takedowns?cmpid=cyber&amp;utm_medium=email&amp;utm_source=newsletter&amp;utm_term=240424&amp;utm_campaign=cyber">this article</a>.</p><p></p><h2><strong>Kaiser Warns Millions of Data Exposure</strong></h2><p>What happened:</p><ul><li><p>Kaiser Permanente, the Oakland-based health care conglomerate, revealed that its customers&#8217; personal information may have been transmitted to Google, Microsoft Bing, and Twitter.</p></li></ul><p>What to know:</p><ul><li><p>Any of the 13.4 million individuals, including current and former members and patients, may have been affected.</p></li><li><p>While passwords, Social Security numbers, and credit card details were not exposed, other data such as names, IP addresses, and medical concerns might have been disclosed.</p></li><li><p>The incident marks the largest health-related breach of the year.</p></li><li><p>Kaiser has removed the technology responsible for the breach from its platforms, which is believed to be tracking software.</p></li></ul><p>Business Impact:</p><ul><li><p>Kaiser faces reputational damage and potential regulatory scrutiny following the breach.</p></li><li><p>Tracking software on organizations' websites may lead to potential violations of privacy laws.</p></li></ul><p>What to do:</p><ul><li><p>Kaiser users should remain vigilant for any signs of misuse of their personal information.</p></li><li><p>Companies should prioritize data protection measures and review their websites for tracking software.</p></li></ul><p>For more information, check out <a href="https://www.sfgate.com/tech/article/kaiser-data-breach-millions-companies-19423543.php">this article</a>.</p><p></p><h2><strong>GitHub Comments Used to Spread Malware via Microsoft Repo URLs</strong></h2><p>What happened:</p><ul><li><p>Malicious files were disguised as legitimate Microsoft files in GitHub comments, enticing users to download them.</p></li></ul><p>What to know:</p><ul><li><p>Malicious URLs appearing to belong to Microsoft repos were crafted using GitHub's file upload feature in comments, creating convincing lures.</p></li><li><p>GitHub automatically generates download links after files are added to unsaved comments, enabling threat actors to attach malware discreetly to any repository.</p></li><li><p>Even after comments are deleted, the files remain accessible through generated URLs on GitHub's CDN.</p></li><li><p>Disabling comments temporarily is the only way to safeguard a GitHub account from such abuse, which can disrupt bug reporting.</p></li><li><p>GitHub has removed the malware linked to Microsoft's repositories.</p></li></ul><p>Business Impact:</p><ul><li><p>Individuals and organizations may fall victim to malware distributed through seemingly trustworthy URLs.</p></li><li><p>Companies hosting repositories on GitHub risk damage if users unknowingly download malicious files from URLs that resemble their repositories.</p></li></ul><p>What to do:</p><ul><li><p>GitHub users and organizations should remain vigilant and report any suspicious activity or files.</p></li><li><p>Implement additional security measures to mitigate the risk of malware distribution through comments and attachments.</p></li><li><p>GitHub should address this vulnerability promptly to prevent further exploitation.</p></li></ul><p>For more information, check out <a href="https://www.bleepingcomputer.com/news/security/github-comments-abused-to-push-malware-via-microsoft-repo-urls/#google_vignette">this article</a>.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://infosecbb.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The InfoSec Board Brief! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Edition #7]]></title><description><![CDATA[Table of Contents]]></description><link>https://infosecbb.com/p/edition-7</link><guid isPermaLink="false">https://infosecbb.com/p/edition-7</guid><dc:creator><![CDATA[Amir Tarighat]]></dc:creator><pubDate>Mon, 08 Apr 2024 13:15:44 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a8bd3cd-9c0e-447c-913e-eea723c8cc52_256x256.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Table of Contents</h2><ol><li><p><strong>Doxing Turns Violent: Executives at Risk</strong></p></li><li><p><strong>Safe AI for US Government: Mitre Unveils Testing Lab</strong></p></li><li><p><strong>US Plans Defense Against Satellite Cyberattacks</strong></p></li><li><p><strong>Millions of AT&amp;T Customers' Data Exposed on Dark Web</strong></p></li><li><p><strong>Red Hat Warns of Backdoor Threat in XZ Tools for Linux Distributions</strong></p></li><li><p><strong>Apple Users Targeted in 'MFA Bombing' Phishing Attacks</strong></p></li><li><p><strong>CISA Purposes Mandated Reporting of Cyber Incidents and Ransom Payments</strong></p><p></p></li></ol><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://infosecbb.com/?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share The InfoSec Board Brief&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://infosecbb.com/?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share The InfoSec Board Brief</span></a></p><p></p><h2>Doxing Turns Violent: Executives at Risk</h2><p>What happened:</p><ul><li><p>Domestic violent extremists (DVEs) in the US are increasingly doxing senior leaders from public and private sectors, exposing their personal information without consent.</p></li></ul><p>What to know:</p><ul><li><p>Those being doxed face a higher risk of physical threats like harassment, stalking, protests, physical attacks and cyber threats.</p></li><li><p>There was a notable surge in doxing in 2023, particularly against corporate leaders.</p></li><li><p>Factors driving DVE doxing include geopolitical events, US presidential elections, and private sector engagement in social justice issues.</p></li></ul><p>Business Impact:</p><ul><li><p>Doxing exposes both corporate executives and their companies to significant financial, reputational, and physical harm.</p></li></ul><p>What to do:</p><ul><li><p>Executives should boost their cyber hygiene, use threat monitoring services, and minimize digital footprints.</p></li><li><p>Regular audits of online presence, removal of personal information from public platforms, and preparation for potential doxing incidents recommended.</p></li><li><p>In case of doxing, document the incidents, assess risks, mitigate leaks, and engage with law enforcement if necessary.</p></li></ul><p>For more information, check out <a href="https://www.recordedfuture.com/violent-extremists-dox-executives-enabling-physical-threats">this article</a>.</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://infosecbb.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The InfoSec Board Brief! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Safe AI for US Gov: Mitre Unveils Testing Lab</h2><p>What happened:</p><ul><li><p>Mitre, a government-backed nonprofit, opened a lab to assess AI systems used by federal agencies for security flaws and risks, focusing on data leaks and explainability of AI decisions.</p></li></ul><p>What to know:</p><ul><li><p>The facility is called the AI Assurance and Discovery Lab, located in McLean, Virginia, and can host up to 50 people onsite and 4,000 remotely.</p></li><li><p>Concerns exist over the adoption of AI systems without fully understanding potential vulnerabilities.</p></li><li><p>The lab will conduct hacking tests and assess AI for biases to understand the risks better.</p></li></ul><p>Business Impact:</p><ul><li><p>Mitre enhances its role in overseeing national security and cybersecurity research.</p></li><li><p>For companies involved in AI development: Highlight the importance of rigorous testing and risk mitigation in AI systems.</p></li></ul><p>What to do:</p><ul><li><p>Mitre will continue its assessments of AI systems and collaborate with federal agencies to address any identified vulnerabilities.</p></li><li><p>Companies engaged in AI development should prioritize thorough testing and addressing potential biases to ensure system reliability and security.</p></li></ul><p>For more information, check out <a href="https://www.bloomberg.com/news/articles/2024-03-25/mitre-opens-lab-to-test-us-government-s-artificial-intelligence">this article</a>.</p><p></p><p></p><h2><strong>US Plans Defense Against Satellite Cyberattacks</strong></h2><p>What happened:</p><ul><li><p>The Biden administration and Congress are intensifying measures to counter cyberattacks targeting satellites and space infrastructure.</p></li></ul><p>What to know:</p><ul><li><p>Cyberattacks on satellites can lead to control loss, device shutdowns, communication disruptions, or even force the satellites to overheat and explode.</p></li><li><p>A widespread attack can disrupt multiple services such as stock trading, GPS navigation, text messaging, weather forecasting, and so on.</p></li><li><p>Cyberattacks in space are a low-cost, low-effort way to disrupt critical systems globally, with unpredictable consequences due to a lack of regulations.</p></li><li><p>Satellites' reliance on vulnerable networks makes them susceptible to attacks across various systems.</p></li><li><p>Past incidents involving Russian hackers targeting satellite provider Viasat, causing major disruptions to Ukrainian military communications.</p></li><li><p>US bolsters space security with Space Force's cyber focus, CISA collaboration, and proposed legislations.</p></li></ul><p>Business Impact:</p><ul><li><p>Increased government focus on space security may lead to regulatory changes impacting companies involved in space-related industries.</p></li></ul><p>What to do:</p><ul><li><p>Government agencies are planning to fortify cybersecurity resources and support for critical infrastructures reliant on space-based capabilities.</p></li><li><p>Companies in the satellite sector should prioritize cybersecurity measures and stay informed.</p></li></ul><p>For more information, check out <a href="https://www.politico.com/news/2024/03/25/satellite-cyber-threat-00148672">this article</a>.</p><p></p><p></p><h2><strong>Millions of AT&amp;T Customers' Data Exposed on Dark Web</strong></h2><p>What happened:</p><ul><li><p>A data breach at AT&amp;T has exposed information from over 7.6 million current customers and 65 million former customers.</p></li><li><p>Leaked data includes sensitive details like full name, date of birth, passcodes, social security numbers, and more.</p></li></ul><p>What to know:</p><ul><li><p>AT&amp;T has reset security passcodes for affected active customers and is notifying them via email or letter.</p></li><li><p>TechCrunch notified AT&amp;T in 2021 about vulnerabilities in its encrypted passcodes, which are typically 4-digit numerical PINs and simple to decrypt.</p></li><li><p>Customers are advised to set up fraud alerts from credit bureaus.</p></li><li><p>The leaked data does not appear to contain financial information or call history.</p></li><li><p>AT&amp;T claimed that there hasn&#8217;t been evidence of unauthorized access to its systems.</p></li><li><p>AT&amp;T previously announced two data leaks in 2021 and 2023.</p></li></ul><p>Business Impact:</p><ul><li><p>AT&amp;T's reputation may be affected, leading to customer trust issues and loss of business.</p></li><li><p>Businesses partnering with AT&amp;T or using their services may have their data compromised and should take actions to secure it.</p></li></ul><p>What to do:</p><ul><li><p>AT&amp;T is collaborating with cybersecurity experts to analyze the breach.</p></li><li><p>Affected customers should set up fraud alerts and monitor their accounts for any suspicious activity.</p></li><li><p>Companies should review and enhance their data security measures, especially if they handle sensitive customer information.</p></li></ul><p>For more information, check out <a href="https://www.theverge.com/2024/3/30/24116515/att-data-leak-passcode-reset-cybersecurity-privacy">this article</a>.</p><p></p><p></p><h2><strong>Red Hat Warns of Backdoor Threat in XZ Tools for Linux Distributions</strong></h2><p>What happened:</p><ul><li><p>Red Hat issued a warning advising users to cease using Fedora 41 and Fedora Rawhide versions due to a backdoor discovered in the latest XZ Utils compression tools, which allows potential unauthorized access to systems running affected Linux distributions.</p></li></ul><p>What to know:</p><ul><li><p>The compromised XZ versions 5.6.0 and 5.6.1 contain malicious code injected by contributor Jia Tan, potentially enabling remote code execution or unauthorized access.</p></li><li><p>The malicious code is obfuscated and can only be found in complete download packages, not in Git distributions, complicating detection.</p></li><li><p>Debian, Kali Linux, openSUSE, and Arch Linux have issued security advisories and rolled back affected versions in their distributions.</p></li><li><p>Linux administrators are urged to downgrade to an uncompromised XZ version (i.e., 5.4.6 Stable).</p></li></ul><p>Business Impact:</p><ul><li><p>Companies relying on systems running Fedora development and experimental versions should be mindful of potential breaches and must take immediate action to safeguard their systems.</p></li></ul><p>What to do:</p><ul><li><p>Users should downgrade to uncompromised XZ versions and monitor their systems for any signs of malicious activity.</p></li></ul><p>For more information, check out <a href="https://www.bleepingcomputer.com/news/security/red-hat-warns-of-backdoor-in-xz-tools-used-by-most-linux-distros/#google_vignette">this article</a>.</p><p></p><p></p><h2><strong>Apple Users Targeted in 'MFA Bombing' Phishing Attacks</strong></h2><p>What happened:</p><ul><li><p>Apple users have reported sophisticated phishing attacks involving overwhelming system prompts for password reset approvals.</p></li></ul><p>What to know:</p><ul><li><p>Victims experience a barrage of system notifications demanding password reset approvals, hindering device functionality until users choose &#8220;Allow&#8221; or &#8220;Don&#8217;t Allow&#8221;.</p></li><li><p>Clicking "Allow" displays a six-digit PIN necessary for changing the account password. Phishers will impersonate Apple support callers, attempting to extract these verification codes, change password and seize control of the Apple ID.</p></li><li><p>Clicking "Don't Allow" triggers even more notifications that persist for days.</p></li></ul><p>Business Impact:</p><ul><li><p>Apple's security reputation may suffer, leading to a loss of customer trust.</p></li></ul><p>What to do:</p><ul><li><p>Apple users should remain vigilant and avoid clicking "Allow" on unsolicited password reset prompts, as this could enable attackers to compromise their accounts.</p></li><li><p>Users should also consider changing account phone numbers and utilizing email aliases to reduce exposure to potential attacks.</p></li></ul><p>For more information, check out <a href="https://krebsonsecurity.com/2024/03/recent-mfa-bombing-attacks-targeting-apple-users/">this article</a>.</p><p></p><p></p><h2><strong>CISA Purposes Mandated Reporting of Cyber Incidents and Ransom Payments</strong></h2><p>What happened:</p><ul><li><p>The Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) proposed a comprehensive cyber incident reporting structure across 16 critical sectors.</p></li><li><p>Covered organizations are required to report cyber incidents under the Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA), within 18 months of the final rule.</p></li></ul><p>What to know:</p><ul><li><p>The proposed rule includes sector-based criteria, such as the Healthcare and Public Health sector, encompassing entities like manufacturers of Class II or III medical devices.</p></li><li><p>If a facility or function within an organization is considered a covered entity, then the entire organization will be a covered entity.</p></li><li><p>A cyber incident at any part (sector-defined or not) within a covered entity triggers reporting for the entire entity.</p></li><li><p>CISA considered various alternatives to the proposed rule, weighing costs and benefits, and explained the reasons why each alternative was rejected in the rule document.</p></li></ul><p>Business Impact:</p><ul><li><p>If implemented, the rule could enhance cybersecurity resilience across critical sectors but may increase compliance costs for affected organizations.</p></li></ul><p>What to do:</p><ul><li><p>Organizations falling under the proposed rule should closely monitor developments and prepare to comply with reporting requirements.</p></li></ul><p>For more information, check out <a href="https://www.healthcareitnews.com/news/proposed-cisa-rule-would-require-reporting-cyber-incidents-and-ransom-payments">this article</a>.</p><p></p><p></p><p></p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://infosecbb.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The InfoSec Board Brief! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Edition #6]]></title><description><![CDATA[Table of Contents]]></description><link>https://infosecbb.com/p/edition-6</link><guid isPermaLink="false">https://infosecbb.com/p/edition-6</guid><dc:creator><![CDATA[Amir Tarighat]]></dc:creator><pubDate>Mon, 25 Mar 2024 17:01:04 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a8bd3cd-9c0e-447c-913e-eea723c8cc52_256x256.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Table of Contents</h2><ol><li><p><strong>Automobile Makers Are Selling Consumer Driving Behavior To Insurers</strong></p></li><li><p><strong>The TikTok Threat</strong></p></li><li><p><strong>Nevada AG Seeks Ban On Meta's End-To-End Encryption For Minors</strong></p></li><li><p><strong>Telco Manager Pleads Guilty in SIM Swap Conspiracy</strong></p></li><li><p><strong>State AGs Demand Action from Meta Over Account Hacking </strong></p></li><li><p><strong>Healthcare Hack Will Burden US With Hundreds of Millions in Costs</strong></p></li><li><p><strong>Lawmakers Propose a New Federal Office to Regulate Workplace Surveillance Technology</strong></p></li><li><p><strong>McKinsey to Boards of Directors: You&#8217;re the Final Line of Cybersecurity Defense</strong></p></li></ol><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://infosecbb.com/?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share The InfoSec Board Brief&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://infosecbb.com/?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share The InfoSec Board Brief</span></a></p><p></p><h2><strong>Automobile Makers Are Selling Consumer Driving Behavior To Insurers</strong></h2><p>What happened:</p><ul><li><p>Automakers like General Motors (GM) are gathering extensive data on driving habits such as speed, braking, and acceleration patterns through connected car technologies.</p></li><li><p>This data is being sold to insurance providers without drivers' knowledge.</p></li></ul><p>What to know:</p><ul><li><p>Lexis Nexis, a data broker, received detailed driving data from GM vehicles, including trip details and driving behaviors.</p></li><li><p>Many drivers have experienced spiking insurance premiums based on data collected without their explicit consent.&nbsp;</p></li><li><p>They were enrolled in driver feedback programs, which tracked driving habits without their full awareness, leading to privacy concerns.</p></li><li><p>The practice of sharing driving data extends beyond GM, involving other automakers like Kia, Subaru, and Mitsubishi.</p></li></ul><p>Business Impact:</p><ul><li><p>Brands involved in intrusive data collection practices can face growing consumer outrage and potential backlash. </p></li><li><p>There are also potential legal implications regarding data privacy and the need for transparent consent mechanisms for data collection.</p></li></ul><p>What to do:</p><ul><li><p>Companies should reassess their data collection practices, ensuring transparent disclosure and explicit consent from consumers. Review your consumer facing marketing materials for deceptive language about how data is used.  </p></li><li><p>Insurance providers should consider the ethical implications of using data obtained without full consumer awareness and consent.</p></li></ul><p>For more information, check out <a href="https://theautowire.com/2024/03/15/your-car-is-spying-on-you-for-your-insurance-provider/">this article</a>.</p><p></p><h2><br>The <strong>TikTok Threat </strong></h2><p>What happened:</p><ul><li><p>Despite widespread concerns and legislative actions targeting TikTok, U.S. intelligence has no evidence of TikTok coordinating with Beijing, labeling the national security threat as only hypothetical for now. </p></li></ul><p>What to know:</p><ul><li><p>The bill to force ByteDance to sell TikTok passed a full vote in the House on March 13.</p></li><li><p>Allegations against TikTok suggest it could be used by the Chinese government for manipulation, data collection, and espionage. </p></li></ul><p>Business Impact:</p><ul><li><p>Continued uncertainty about TikTok's security and privacy could prompt regulatory or legislative actions, potentially resulting in bans or forced sales.</p></li><li><p>Businesses utilizing TikTok for marketing or engagement strategies may face challenges due to ongoing scrutiny and regulatory concerns.</p></li></ul><p>What to do:</p><ul><li><p>Companies relying on TikTok for marketing or engagement should monitor developments closely and be prepared to adapt to potential regulatory changes.</p></li></ul><blockquote></blockquote><p>For more information, check out <a href="https://theintercept.com/2024/03/16/tiktok-china-security-threat/">this article</a>.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://infosecbb.com/?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share The InfoSec Board Brief&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://infosecbb.com/?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share The InfoSec Board Brief</span></a></p><p></p><h2> <br><strong>Nevada Attorney General Seeks Ban On Meta's End-To-End Encryption For Minors</strong></h2><p>What happened:</p><ul><li><p>Nevada's Attorney General (AG) has filed a motion to block Meta from providing end-to-end encryption to users under eighteen in the state.</p></li><li><p>The AG cites concerns about child predators targeting minors online and argues that encrypted communication would hinder law enforcement investigations.</p></li></ul><p>What to know:</p><ul><li><p>End-to-end encryption ensures that communication is encrypted on the sender's device and decrypted only on the recipient's device, preventing intermediaries from accessing its contents.</p></li><li><p>Meta has offered optional end-to-end encryption since 2016 and recently made it default on Messenger.</p></li><li><p>Despite Meta's claims that law enforcement can access messages from criminals and minors&#8217; devices, the AG aggressively pushes for encryption restrictions.</p></li><li><p>Identifying minors based on IP addresses and self-disclosure is challenging and risks compromising adults' privacy if wrongly identified.</p></li><li><p>Meta opposes the injunction, arguing encryption is essential for user privacy and protection against online threats.</p></li></ul><p>Business Impact:</p><ul><li><p>Granting the AG's request could set a precedent affecting privacy and security standards for minors on various messaging platforms, including Apple iMessages and WhatsApp, across multiple states.</p></li></ul><p>What to do:</p><ul><li><p>Businesses involved in providing communication platforms should review their encryption policies and compliance with state regulations to mitigate legal risks.</p></li></ul><p>For more information, check out <a href="https://www.zetter-zeroday.com/nevada-ag-asks-court-to-ban-meta-from-providing-end-to-end-encryption-to-minors/">this article</a>.</p><p></p><h2><br><strong>Telco Manager Pleads Guilty in SIM Swap Conspiracy</strong></h2><p>What happened:</p><ul><li><p>Jonathan Katz, a former manager at a telecommunications company in New Jersey, admitted to performing unauthorized SIM swaps for payment, enabling an accomplice to hack customer accounts.</p></li><li><p>The swaps occurred between May 10 and 20, 2021.</p></li></ul><p>What to know:</p><ul><li><p>SIM swapping involves transferring a target's phone number to a physical SIM card or eSIM controlled by attackers to bypass two-factor authentication.</p></li><li><p>Katz received $1,000 in Bitcoin per swap, totaling $5,000, and a share of profits from illicit access to victims' accounts.</p></li><li><p>Court documents revealed victims across multiple states, whose accounts were compromised, including email, social media, and cryptocurrency wallets.</p></li><li><p>Katz faces up to five years in prison and a significant fine.</p></li><li><p>Telecom service providers have now enacted measures to prevent unauthorized number porting events without the owner's involvement or authorization.</p></li></ul><p>Business Impact:</p><ul><li><p>Customers may lose trust in telecom providers if such similar insider threats occur, potentially leading to reputational damage and loss of business.</p></li></ul><p>What to do:</p><ul><li><p>Telecom companies should review and enhance security measures to prevent similar insider abuses, safeguarding customer trust and data integrity.</p></li><li><p>Users should remain vigilant by monitoring their accounts for suspicious activity and promptly reporting any unauthorized access.</p></li></ul><p>For more information, check out <a href="https://www.bleepingcomputer.com/news/security/former-telecom-manager-admits-to-doing-sim-swaps-for-1-000/">this article</a>.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://infosecbb.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://infosecbb.com/subscribe?"><span>Subscribe now</span></a></p><p></p><h2><br><strong>State AGs Demand Action from Meta Over Account Hacking </strong></h2><p>What happened:</p><ul><li><p>A coalition of 41 state attorney generals penned a letter to Meta's top attorney, expressing concerns over the surge in complaints about Facebook and Instagram accounts being stolen.</p></li></ul><p>What to know:</p><ul><li><p>Reports indicate instances of fraudulent charges to stored credit cards, unauthorized use of personal information and advertisements, disruptions in communication, and more.</p></li><li><p>The spike in complaints poses a significant drain on governmental resources, as many stolen accounts are linked to financial crimes.</p></li><li><p>Meta faces criticism for allegedly failing to assist hacked users promptly, leaving them unable to salvage their accounts or their businesses.</p></li><li><p>Complaints have surged over recent years, with a tenfold increase in New York alone.</p></li><li><p>The surge in complaints coincided with Meta's layoffs of approximately 11,000 employees in November 2022.</p></li></ul><p>Business Impact:</p><ul><li><p>Businesses using Meta face the risk of losing their account along with all the resources invested.</p></li></ul><p>What to do:</p><ul><li><p>Meta is urged to take immediate action to address the surge in hacking complaints and provide timely assistance to affected users.</p></li><li><p>Users experiencing hacking incidents should follow reporting procedures provided by Meta and seek legal recourse if necessary to protect their accounts and businesses.</p></li><li><p>Secure your personal and business accounts with strong passwords and two-factor authentication. </p></li></ul><p>For more information, check out <a href="https://www.wired.com/story/meta-hacked-users-draining-resources/">this article</a>.</p><p></p><p></p><h2><br><strong>Healthcare Hack Will Burden US With Hundreds of Millions in Costs</strong></h2><p>What happened:</p><ul><li><p>The Feb 21st cyberattack on Change Healthcare, an UnitedHealth subsidiary, has disrupted medical payments, causing financial strain on providers.</p></li><li><p>Insurance executives and US health officials believe the situation is improving, with approximately 95% of claims being processed compared to pre-hack levels.</p></li></ul><p>What to know:</p><ul><li><p>The cyberattack halted billions of dollars in medical payments and left many providers struggling financially.</p></li><li><p>Insurance companies, doctors, hospitals, and pharmacies have been working to resolve the fallout, but there's no clear timeline for when backlogs will be cleared.</p></li><li><p>UnitedHealth has advanced over $2 billion to medical providers affected by the hack, but the total amount of disrupted claims remains uncertain.</p></li><li><p>Smaller medical providers relying on Change may face credit profile impacts, while larger companies have more financial flexibility.</p></li><li><p>UnitedHealth has restored its payments platform as of March 15.</p></li></ul><p>Business Impact:</p><ul><li><p>Companies in the healthcare industry should be mindful of and have backup plans for potential financial strains and disruptions caused by cyberattacks on payment systems.</p></li></ul><p>What to do:</p><ul><li><p>Healthcare companies should continue efforts to restore disrupted services and processes.</p></li><li><p>Implement robust cybersecurity measures to mitigate the risk of future cyberattacks and protect critical systems and data.</p></li></ul><p>For more information, check out <a href="https://www.bloomberg.com/news/articles/2024-03-18/unitedhealth-unh-says-services-coming-back-after-change-healthcare-attack?cmpid=cyber&amp;utm_medium=email&amp;utm_source=newsletter&amp;utm_term=240320&amp;utm_campaign=cyber">this article</a>.</p><p></p><h2><br><strong>Lawmakers propose a new federal office to regulate workplace surveillance technology</strong></h2><p>What happened:</p><ul><li><p>Two House Democrats, Chris Deluzio and Suzanne Bonamici, introduced the Stop Spying Bosses Act to increase transparency and protect workers' rights regarding workplace surveillance technologies.</p></li><li><p>The bill aims to regulate the surveillance, monitoring, and collection of certain worker data by employers, requiring disclosure and prohibiting specific surveillance activities.</p></li></ul><p>What to know:</p><ul><li><p>The Department of Labor would establish a "privacy and technology division" to oversee workplace surveillance technologies under the proposed legislation.</p></li><li><p>Similar legislation was previously introduced in the Senate in February 2023 by Senators Bob Casey, Cory Booker, and Brian Schatz.</p></li><li><p>The proposed rules would mandate timely and conspicuous disclosure of data collection activities to workers, prohibit certain surveillance practices, and empower workers in AI-based decision-making processes.</p></li></ul><p>Business Impact:</p><ul><li><p>Companies should prepare for increased transparency requirements and restrictions on surveillance activities in the workplace.</p></li><li><p>This will also effect BYOD (bring your own device) policies.</p></li></ul><p>What to do:</p><ul><li><p>Employers should stay informed about developments in workplace surveillance regulation to adapt policies and procedures accordingly.</p></li></ul><p>For more information, check out <a href="https://www.nextgov.com/policy/2024/03/lawmakers-propose-new-federal-office-regulate-workplace-surveillance-tech/395076/">this article</a>.</p><p></p><h2><br>McKinsey to <strong>Boards of Directors: You&#8217;re the Final Line of Cybersecurity Defense</strong></h2><p>What happened:</p><ul><li><p>In a new McKinsey article, they urged boards of directors are positioned to provide oversight, guidance, and risk prioritization in addressing cybersecurity challenges of the organizations in the industrial sector.</p></li></ul><p>What to know:</p><ul><li><p>Cybercrimes are escalating and is projected to have an annual impact of $10.5 trillion by 2025.</p></li><li><p>The cyber attack surface is expanding with the integration of digital operational technology (OT), cloud and edge computing, Internet of Things (IoT) &amp; Industrial IoT, and AI.</p></li><li><p>Attackers are evolving, pooling skills, and leveraging AI for novel attack techniques.</p></li><li><p>Hacker-for-hire markets are thriving, with freelancers offering tailored attacks for personal profit.</p></li><li><p>Time to exploit vulnerabilities has decreased from several months to only days.</p></li><li><p>Despite the growing volume of cyberattacks, security professionals are improving defense capabilities.</p></li></ul><p>Business Impact:</p><ul><li><p>Boards of directors play a crucial role in ensuring cybersecurity initiatives are planned, funded, and embedded in organizational strategies and digital transformations.</p></li><li><p>Boards have the role of providing strategic cyber planning versus the day to day tasks of putting out fires.</p></li><li><p>Boards should play a role in risk prioritization and managing the trade-offs, as this also relates to budget and resources.</p></li><li><p>Organizations across all sectors face heightened cybersecurity risks and must prioritize building resilience against evolving threats.</p></li></ul><p>What to do:</p><ul><li><p>Organizations should strengthen their cyber defense capabilities through human capital investment, integration of cyber governance, secure third-party and supply chain management, proactive response and recovery planning, embedded security architecture &amp; engineering and AI.</p></li><li><p>A board member doesn&#8217;t have to be a cyber expert to help add value or to ensure accountability.</p></li><li><p>Boards of directors should provide oversight, guidance, and risk prioritization, and hold executives and cyber teams accountable for achieving security goals.</p></li></ul><p>For more information, check out <a href="https://www.mckinsey.com/capabilities/risk-and-resilience/our-insights/boards-of-directors-the-final-cybersecurity-defense-for-industrials">this article</a>.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://infosecbb.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The InfoSec Board Brief! Subscribe for free to receive new posts.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Edition #5]]></title><description><![CDATA[Table of Contents:]]></description><link>https://infosecbb.com/p/edition-5</link><guid isPermaLink="false">https://infosecbb.com/p/edition-5</guid><dc:creator><![CDATA[Amir Tarighat]]></dc:creator><pubDate>Mon, 04 Mar 2024 12:25:21 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a8bd3cd-9c0e-447c-913e-eea723c8cc52_256x256.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Table of Contents:</h2><ol><li><p><strong>New York Sues Citibank Over Poor Data Security</strong></p></li><li><p><strong>Surveillance Apps PhoneSpector and Highster Shut Down After Legal Settlement</strong></p></li><li><p><strong>AnyDesk suffers cyberattack, source code and signing keys stolen</strong></p></li><li><p><strong>Clorox&#8217;s Cyberattack Costs Exceed $49 Million</strong></p></li><li><p><strong>CISA Issues Urgent Removal Order for Insecure Ivanti Products</strong></p></li><li><p><strong>Company Tracked Visits to 600 Planned Parenthood Locations for Anti-Abortion Ads</strong></p></li><li><p><strong>FCC Implements Stricter Rules for Telcos Regarding Data Breach Reporting</strong></p></li><li><p><strong>Staying Ahead of Threat Actors in the Age of AI</strong></p></li><li><p><strong>US military notifies 20,000 of data breach after cloud email leak</strong></p></li><li><p><strong>Atlassian vulnerability exploited in Government Accountability Office breach affecting 6,600 individuals.</strong></p></li><li><p><strong>Cyberattack Hits German Battery Maker Varta, Halts Production</strong></p></li><li><p><strong>Hackers Gained Access to Prudential&#8217;s Computer Systems</strong></p></li><li><p><strong>Nation-State Hackers Use AI to Boost Cyber Operations</strong></p></li><li><p><strong>Pig Butchering Scam Exposed: How Scammers Are Duping Victims for Millions</strong></p></li><li><p><strong>Microsoft Rolls Out Expanded Logging Six Months After Chinese Breach</strong></p></li><li><p><strong>Avast Ordered to Stop Selling Browsing Data from its Privacy Apps</strong></p></li></ol><p></p><h3><strong>New York Sues Citibank Over Poor Data Security</strong></h3><p>What happened:&nbsp;</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://infosecbb.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The InfoSec Board Brief! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><ul><li><p>New York Attorney General Letitia James has filed a lawsuit against Citibank for alleged failures in protecting customers from hackers and fraudsters who have stolen millions, as well as their refusal to reimburse victims.</p></li></ul><p>What to know:</p><ul><li><p>The lawsuit cites specific examples of individuals losing significant sums after falling victim to cybercriminals.</p></li><li><p>Threat actors primarily used social engineering tactics to trick victims into granting access to their accounts and executing unauthorized transfers without exploiting software vulnerabilities or system access.</p></li><li><p>The attorney general believes Citibank should have more efficient fraud detection systems, such as identifying unrecognized device locations, suspicious password or username changes, and suspicious transfers.</p></li><li><p>Citibank was accused of being slow in responding to fraud reports from customers.</p></li><li><p>Citibank allegedly exploits a legal loophole to deny reimbursement claims under the Electronic Fund Transfer Act (EFTA), arguing that they are not obligated to reimburse customers who follow fraudsters' instructions without any indication of deception.</p></li></ul><p>Business Impact:&nbsp;</p><ul><li><p>Companies should consider the risks associated with benefiting from fraudulent activity against their customers or through their platforms. </p></li></ul><p>What to do:</p><ul><li><p>Provide training to employees on recognizing and defending against social engineering techniques against your clients.</p></li></ul><p>For more information, check out <a href="https://www.securityweek.com/new-york-sues-citibank-over-poor-data-security-anti-breach-practices/">this article</a>.</p><p></p><h2><strong>Surveillance Apps PhoneSpector and Highster Shut Down After Legal Settlement</strong></h2><p>What happened:</p><ul><li><p>PhoneSpector and Highster, two secret phone surveillance services, have shut down after their owner settled New York state accusations of promoting illegal spyware.</p></li><li><p>The settlement in February 2023 required the companies to pay $410,000 in penalties and modify the apps to alert device owners that their phones were being monitored.</p></li></ul><p>What to know:</p><ul><li><p>These apps, often referred to as stalkerware or spouseware, allowed covert surveillance of smartphones by individuals with knowledge of the device passcode, usually spouse or domestic partner. They continuously collected and uploaded messages, photos, and real-time location data to a dashboard accessible by the abuser.</p></li><li><p>PhoneSpector's website stopped functioning after the settlement and was redirected to an Indonesian lottery website. Highster's website also stopped loading months later.</p></li><li><p>The domains, servers, and infrastructure used by PhoneSpector and Highster are no longer online. Their customer service lines have also been disconnected.</p></li><li><p>It remains uncertain whether the companies have paid the $410,000 penalty as agreed in the settlement.&nbsp;</p></li><li><p>Several other stalkerware apps, including Retina-X and SpyFone, have ceased operations in recent years following regulatory actions.</p></li></ul><p>Business Impact:&nbsp;</p><ul><li><p>Businesses developing stalkerware and individuals using them should reconsider the ethical implications of such practices.</p></li></ul><p>What to do:</p><ul><li><p>Users of PhoneSpector and Highster may need to consider the legality and ethics of using such apps for monitoring purposes.</p></li><li><p>Regularly check your devices for potential spyware.</p></li></ul><p>For more information, check out <a href="https://techcrunch.com/2024/02/02/phonespector-highster-stalkerware-shut-down/?guccounter=1&amp;guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&amp;guce_referrer_sig=AQAAADLeuv2iMmWOa3f8fRjClgtvsu4wbIr528-w64LhmA-9Mw5WO-r2In-IasDknZ-MxaKTTEtpCzSWxQ5Kfe9PEYkqSetbx_KapNmvUjXUjKu5VI2Xnp-fgxQ5X7Ta-0bSKJbItkuk9DR4sGQonz4KolK_izdBnzNcuM5uz2pnKjaw">this article</a>.</p><h2></h2><h2><strong>AnyDesk Suffers Cyberattack- Source Code and Signing Keys Stolen</strong></h2><p>What happened:</p><ul><li><p>AnyDesk, a remote access solution, experienced a recent cyberattack where hackers gained access to the company's production systems and stole source code and private code signing certificates.</p></li></ul><p>What to know:</p><ul><li><p>AnyDesk allows users to access computers remotely over the internet.</p></li><li><p>AnyDesk serves 170,000 customers, including notable organizations like 7-Eleven, Comcast, Samsung, MIT, NVIDIA, SIEMENS, and the United Nations.</p></li><li><p>The attack was detected after indications of an incident on their servers, leading to a security audit that confirmed the compromise.</p></li><li><p>The cybersecurity firm CrowdStrike assisted in responding to the incident, and AnyDesk revoked security-related certificates and replaced systems as necessary.</p></li><li><p>While they assured customers that AnyDesk was safe to use, they recommended using the latest version with the new code signing certificate.</p></li><li><p>AnyDesk stated that no authentication tokens were stolen as they exist only on the end user's device, not the AnyDesk system. Still, they decided to revoke all passwords to their web portal as a precaution.</p></li></ul><p>Business Impact:&nbsp;</p><ul><li><p>If your company uses AnyDesk, they assert that your authentication tokens and password remain unaffected. However, it's essential to remain vigilant and monitor for any signs of potential incidents.</p></li></ul><p>What to do:</p><ul><li><p>If you use AnyDesk, switch to the new version, as the old code signing certificate will be revoked.</p></li><li><p>Update your AnyDesk passwords and any other accounts if you're using the same passwords.</p></li></ul><p>For more information, check out <a href="https://www.bleepingcomputer.com/news/security/anydesk-says-hackers-breached-its-production-servers-reset-passwords/">this article</a>.</p><p></p><h3><strong>Clorox&#8217;s Cyberattack Costs Exceed $49 Million</strong></h3><p>What happened:</p><ul><li><p>Clorox suffered a cyberattack in August 2023, resulting in system shutdowns, order processing delays, and product shortages. The attack incurred $49 million in costs by the end of 2023.</p></li></ul><p>What to know:</p><ul><li><p>Costs included losses from disruptions and expenses related to third-party experts engaged for investigation and remediation.</p></li><li><p>Clorox anticipates additional costs of approximately $50-$60 million ($38-$46 million after tax) in FY24.</p></li><li><p>The company has not recognized insurance proceeds, and timing may differ from expense recognition.</p></li><li><p>Specific details of the attack, including data theft, remain undisclosed.</p></li><li><p>Security researcher Dominic Alvieri stated that the cyberattack was attributed to the BlackCat (a.k.a Alphv) ransomware group, but this has yet to be confirmed.&nbsp;</p></li></ul><p>Business Impact:</p><ul><li><p>Clorox's customers may experience potential data breaches, and Clorox&#8217;s share price is down 2.4% over the past 12 months.</p></li></ul><p>What to do:</p><ul><li><p>Invest in robust security protocols and incident response plans to minimize impacts.</p></li></ul><p>For more information, check out <a href="https://www.securityweek.com/clorox-says-cyberattack-costs-exceed-49-million/">this article</a>.</p><h2></h2><h3><strong>CISA Issues Urgent Removal Order for Insecure Ivanti Products</strong></h3><p>What happened:</p><ul><li><p>The US government&#8217;s Cybersecurity and Infrastructure Security Agency (CISA) has issued an unprecedented directive on Jan 31, 2024 requiring federal agencies to disconnect all instances of Ivanti Connect Secure and Ivanti Policy Secure products with only 48 hours notice.</p></li></ul><p>What to Know:</p><ul><li><p>This move is in response to at least three actively exploited Ivanti security vulnerabilities.</p></li><li><p>Ivanti is an IT software company that develops software solutions for IT Security, IT Service Management, IT Asset Management, Unified Endpoint Management, Identity Management, and supply chain management.</p></li><li><p>Federal Civilian Executive Branch (FCEB) agencies were urged to conduct threat hunting on affected systems and monitor authentication or identity management services.</p></li><li><p>Within the 48-hour timeframe, network administrators must isolate the systems from enterprise resources and continue auditing privilege-level access accounts.</p></li><li><p>CISA outlines steps to bring Ivanti products back into service, including exporting device configuration settings, performing a factory reset following Ivanti's instructions, and upgrading to a fully patched software version.</p></li><li><p>Volexity identified exploitations of these Ivanti&#8217;s vulnerabilities, warning of Chinese nation-state hackers leveraging them to breach US organizations.</p></li><li><p>Cybercriminal groups have also taken advantage of these vulnerabilities to deploy malicious software.</p></li></ul><p>Business Impact:</p><ul><li><p>Organizations relying on Ivanti&#8217;s products face potential security risks and should take immediate action to comply with CISA's directive.</p></li></ul><p>What to Do:</p><ul><li><p>Federal agencies must follow CISA&#8217;s directive to bring the product back into service.</p></li><li><p>Organizations should also be vigilant for any signs of compromise.</p></li></ul><p>For more information, check out <a href="https://www.securityweek.com/cisa-sets-48-hour-deadline-for-removal-of-insecure-ivanti-products/">this article</a>.</p><h2></h2><h3><strong>Company Tracked Visits to 600 Planned Parenthood Locations for Anti-Abortion Ads</strong></h3><p>What happened:</p><ul><li><p>Near Intelligence allegedly tracked visits to 600 Planned Parenthood locations across 48 states, fueling a significant anti-abortion ad campaign.</p></li></ul><p>What to Know:</p><ul><li><p>Near Intelligence, a location data provider, allegedly gathered and sold information on visitors to Planned Parenthood locations without their consent.</p></li><li><p>This data was utilized for a national anti-abortion ad campaign between 2019 and 2022, targeting individuals who had visited these locations.</p></li><li><p>The company claims to have information on 1.6 billion people across 44 countries</p></li><li><p>Near Intelligence filed for bankruptcy in December, raising concerns about the fate of the collected data, which could be sold off as part of its assets.</p></li><li><p>Senator Ron Wyden has called on the Federal Trade Commission (FTC) to block Near Intelligence&#8217;s data sales and the Securities and Exchange Commission (SEC) to investigate the company&#8217;s misleading filings.</p></li></ul><p>Business Impact:</p><ul><li><p>Businesses investing in, partnering with, or using Near Intelligence's services should be mindful of the legal and ethical implications associated with the data collected and sold by the company.</p></li></ul><p>What to Do:</p><ul><li><p>This case highlights the need for stronger privacy regulations and compliance measures</p></li><li><p>Companies should review data collection practices to ensure compliance.</p></li><li><p>Businesses should ensure accurate representation of data practices in filings.</p></li><li><p>Individuals should be mindful of sharing location data and consider privacy tools.</p></li></ul><p>For more information, check out <a href="https://www.politico.com/news/2024/02/13/planned-parenthood-location-track-abortion-ads-00141172">this article</a>.</p><h2></h2><h3><strong>FCC Implements Stricter Rules for Telcos Regarding Data Breach Reporting</strong></h3><p>What happened:&nbsp;</p><ul><li><p>The FCC has enforced new rules mandating telecom companies in the US to report any security breaches to the agency, FBI, and Secret Service within seven days. The mandatory waiting period before informing consumers has also been eliminated.</p></li></ul><p>What to know:</p><ul><li><p>Telecom companies must now inform customers of data breaches without undue delay, with a maximum of 30 days following confirmation of a breach.</p></li><li><p>The scope of data exposure types requiring customer notification has been expanded to include personally identifiable information (PII) such as names, government ID numbers, authentication data, email addresses/passwords, and biometric data.</p></li><li><p>An exception to customer notifications exists if the carrier determines that no harm is reasonably likely to occur.</p></li><li><p>The FCC's definition of a breach now includes "inadvertent access, use, or disclosure of customer information," broadening the scope of incidents requiring reporting.</p></li></ul><p>Business impact:</p><ul><li><p>Telcos now have more compliance requirements related to breach disclosure.</p></li><li><p>Businesses that are telcos&#8217; customers will now be promptly informed of any breaches, allowing them to take immediate steps to remediate potential harms.</p></li></ul><p>What to do:</p><ul><li><p>Telecom companies should review and update breach notification protocols to align with the FCC's new requirements.</p></li><li><p>Ensure that all relevant personnel are aware of the updated regulations and receive appropriate training.</p></li><li><p>Monitor developments from regulatory agencies like CISA to stay informed about potential changes in breach reporting standards.</p></li></ul><p>For more information, check out <a href="https://www.theregister.com/2024/02/12/fcc_gets_tough_on_telcos/">this article</a>.</p><h2></h2><h3><strong>Staying Ahead of Threat Actors in the Age of AI</strong></h3><p>What happened:</p><ul><li><p>Microsoft and OpenAI collaborated to publish research on how cybercriminals are using advanced technology like AI for attacks, such as attempted misuse of large language models (LLMs) and fraud.</p></li></ul><p>What to know:</p><ul><li><p>The use of LLM technology by threat actors has shown them utilizing AI for reconnaissance, coding assistance for improving malware, and social engineering.</p></li><li><p>While there haven't been big AI-powered attacks yet, Microsoft and OpenAI are watching closely.</p></li></ul><ul><li><p>Microsoft outlined principles to mitigate risks associated with the use of AI tools by threat actors, including identification and action against malicious use, collaboration with stakeholders, and transparency in reporting actions taken.</p></li></ul><p>Business Impact:</p><ul><li><p>Businesses should recognize the evolving landscape of cyber threats enhanced by AI and prioritize implementing robust cybersecurity measures.</p></li><li><p>Understanding potential misuse of AI by threat actors is crucial for devising effective defense strategies and safeguarding against emerging threats.</p></li></ul><p>What to do:</p><ul><li><p>Utilize resources provided by Microsoft and OpenAI to stay informed about emerging threats and best practices for mitigating risks associated with AI-enabled attacks.</p></li><li><p>Implement comprehensive AI safety and security standards aligned with industry best practices and regulatory requirements.</p></li><li><p>Foster collaboration with other stakeholders to exchange information and enhance collective responses to ecosystem-wide risks posed by AI-enabled threats.</p></li></ul><p>For more information, check out <a href="https://www.microsoft.com/en-us/security/blog/2024/02/14/staying-ahead-of-threat-actors-in-the-age-of-ai/">this article</a>.</p><h2></h2><h3><strong>US Military Notifies 20,000 of Data Breach After Cloud Email Leak</strong></h3><p>What happened:</p><ul><li><p>The U.S. Department of Defense (DOD) is informing thousands of individuals about their personal information being exposed in an email data leak from last year.</p></li><li><p>The breach occurred between February 3 and February 20, 2023, due to an unsecured U.S. government cloud email server hosted on Microsoft's cloud platform.</p></li></ul><p>What to know:</p><ul><li><p>Around 20,600 individuals are receiving breach notification letters.</p></li><li><p>The exposed emails included sensitive military information, such as personnel data and security clearance questionnaires.</p></li><li><p>The server was accessible without a password, allowing anyone with the public IP address to view the emails.</p></li><li><p>The breach was initially discovered by security researcher Anurag Sen, who alerted TechCrunch to report it to the U.S. government.</p></li><li><p>The affected server was identified and removed from public access on February 20, 2023, and the vendor addressed the issues that resulted in the exposure.&nbsp;</p></li></ul><p>Business Impact:</p><ul><li><p>Businesses engaged with the department should verify whether their sensitive data was compromised in the breach and take necessary measures to mitigate potential risks.</p></li></ul><p>What to do:</p><ul><li><p>Organizations should regularly audit their cloud configurations and security protocols to ensure data protection.</p></li><li><p>Promptly report any security vulnerabilities or breaches to the relevant authorities and take immediate action to address them.</p></li></ul><p>For more information, check out <a href="https://techcrunch.com/2024/02/14/department-defense-data-breach-microsoft-cloud-email/">this article</a>.</p><p></p><h3><strong>Atlassian Vulnerability Exploited in Government Accountability Office Breach Affecting 6,600 Individuals.</strong></h3><p>What happened:</p><ul><li><p>A breach of the Government Accountability Office (GAO) occurred through a contractor, CGI Federal, resulting in the compromise of data of approximately 6,600 current and former GAO employees from 2007 to 2017, along with some companies engaged with GAO.</p></li><li><p>The breach was attributed to a vulnerability in the Atlassian Confluence workforce collaboration tool, which malicious hackers actively exploited.</p></li></ul><p>What to know:</p><ul><li><p>The GAO conducts investigations into taxpayer spending for Congress and federal agencies.</p></li><li><p>The Cybersecurity and Infrastructure Security Agency (CISA) issued an advisory in October 2023 about the vulnerability affecting certain versions of Atlassian Confluence Data Center and Server, warning of active exploitation.</p></li><li><p>CGI Federal took immediate remediation actions following the CISA advisory and is cooperating with authorities and clients to address the impact of the breach.</p></li><li><p>Atlassian alerted its customers of the vulnerability on October 4 and emphasized the importance of taking immediate action to safeguard data.</p></li></ul><p>Business Impact:</p><ul><li><p>Companies involved with the GAO and/or using Atlassian should assess if their data was compromised and take appropriate measures to enhance their cybersecurity posture.</p></li></ul><p>For more information, check out <a href="https://cyberscoop.com/atlassian-vulnerability-at-fault-in-gao-breach/">this article</a>.</p><h2></h2><h3><strong>Cyberattack Hits German Battery Maker Varta, Halts Production</strong></h3><p>What happened:</p><ul><li><p>Varta AG experienced a cyberattack on February 12, leading to the suspension of production in five of its facilities.</p></li><li><p>The company's information technology systems were temporarily shut down and disconnected from the internet.</p></li></ul><p>What to know:</p><ul><li><p>VARTA AG is a German-based company specializing in battery manufacturing for automotive, industrial, and consumer markets, with subsidiaries in over 75 countries worldwide.</p></li><li><p>The extent of the damage caused by the cyberattack is still under evaluation.</p></li><li><p>Varta has activated its emergency plan to manage the situation and has formed a task force to expedite the restoration of operations.</p></li><li><p>Varta shares went down 3.6% at the close of European trading the following day.</p></li></ul><p>Business Impact:</p><ul><li><p>Companies doing business with Varta should be aware of the potential risks associated with cyberattacks.</p></li><li><p>Interruptions in production due to cyber incidents can lead to financial losses and damage to reputation.</p></li></ul><p>What to do:</p><ul><li><p>Companies with ties to Varta should assess their own cybersecurity measures and consider implementing additional safeguards to mitigate the risk of similar incidents.</p></li></ul><h2></h2><h3><strong>Hackers Gained Access to Prudential&#8217;s Computer Systems</strong></h3><p>What happened:</p><ul><li><p>Hackers accessed Prudential Financial Inc.'s information technology systems.</p></li><li><p>A small percentage of user accounts linked to employees and contractors were compromised.</p></li></ul><p>What to know:</p><ul><li><p>No evidence of customer or client data theft has been found so far.</p></li><li><p>The unauthorized access occurred starting from February 4, with Prudential detecting the breach the following day.</p></li><li><p>The company is cooperating with law enforcement and regulatory authorities to address the breach.</p></li><li><p>Prudential is investigating the incident's extent and potential impact on additional information or systems.</p></li></ul><p>Business Impact:</p><ul><li><p>Companies that are Prudential&#8217;s customers or partners may have had their data leaked.</p></li></ul><p>What to do:</p><ul><li><p>Companies associated with Prudential should check if their data has been compromised and monitor the situation closely for any updates.</p></li><li><p>Companies should enhance their cybersecurity protocols and remain vigilant against potential cyber threats.</p></li></ul><h2></h2><h3><strong>Nation-State Hackers Use AI to Boost Cyber Operations</strong></h3><p>What happened:</p><ul><li><p>Russian, North Korean, Iranian, and Chinese-backed adversaries are incorporating large-language models (LLMs) into their cyberattacks.</p></li><li><p>These hackers are leveraging AI, such as OpenAI's ChatGPT, to enhance their operations, including phishing emails and vulnerability research.</p></li></ul><p>What to know:</p><ul><li><p>The use of LLMs by state-sponsored cyber-espionage groups signals a significant evolution in their tactics.</p></li><li><p>OpenAI has terminated accounts associated with state-sponsored hackers to mitigate the threat.</p></li></ul><ul><li><p>Although no major breaches utilizing LLM technology have occurred yet, security experts warn of its potential for more sophisticated cyberattacks.</p></li></ul><p>Business Impact:</p><ul><li><p>The increasing sophistication of cyber threats, particularly from nation-state actors poses significant risks to companies and governments.</p></li></ul><p>What to do:</p><ul><li><p>Monitor developments in AI technology and its potential applications in cyber operations.</p></li><li><p>Strengthen cybersecurity defenses to mitigate the risk of AI-enhanced attacks.</p></li></ul><h2></h2><h3><strong>Pig Butchering Scam Exposed: How Scammers Are Duping Victims for Millions</strong></h3><p>What happened:</p><ul><li><p>Scammers are employing a sophisticated scheme known as "Pig Butchering," targeting victims worldwide through social media and dating apps, stealing hundreds of millions of dollars.</p></li><li><p>They establish trust with victims through prolonged conversations, feigning interest, and offering investment opportunities in cryptocurrencies and other financial instruments.</p></li></ul><p>What to know:</p><ul><li><p>"Pig butchering" refers to scammers luring victims with romantic or investment promises to swindle them of large sums of money, either in fiat currency or cryptocurrency.</p></li></ul><ul><li><p>The scam has resulted in losses exceeding $429 million, per the FBI's 2021 Internet Crime Report.</p></li><li><p>Victims are lured into the scam through various platforms such as WhatsApp, Telegram, TikTok, X (formerly Twitter), Instagram, Tinder, Bumble, and Hinge.</p></li><li><p>Scammers use fake profiles, stolen images, and AI-generated photos to create convincing personas to gain victims' trust.</p></li><li><p>The scheme involves "herders" who initiate contact and "pig butchers" who conduct prolonged conversations to persuade victims to invest.</p></li></ul><p>Business Impact:</p><ul><li><p>Companies should be aware of the potential for employees to become victims of financial scams through social media and dating apps.</p></li></ul><p>What to do:</p><ul><li><p>Victims of the scam should report suspicious activity to the appropriate authorities and cease communication with potential scammers.</p></li><li><p>Platforms hosting these scams should implement stricter moderation and reporting mechanisms to prevent scammers from targeting unsuspecting users.</p></li></ul><p>For more information, check out <a href="https://www.tenable.com/blog/pig-butchering-scam-tinder-tiktok-whatsapp-telegram-scammers-steal-millions">this article</a>.</p><p></p><h3><strong>Microsoft Rolls Out Expanded Logging Six Months After Chinese Breach</strong></h3><p>What happened:</p><ul><li><p>After Chinese state hackers used a stolen Microsoft signing key to breach US government officials' email accounts in June 2023, Microsoft faced criticism for not offering robust logging features by default.</p></li></ul><p>What to know:</p><ul><li><p>Microsoft's decision to charge a premium for security features, including logging, drew scrutiny following the Chinese hacking operation. The company removed this fee after that.</p></li><li><p>Federal officials announced progress in making expanded logs available to federal agencies, with plans to extend access to all agencies this month.</p></li><li><p>Microsoft is increasing the default log retention period from 90 to 180 days and making more detailed logs available.</p></li></ul><p>Business Impact:</p><ul><li><p>The delayed rollout of expanded logging features may have hindered federal agencies' ability to detect and respond to security threats effectively.</p></li></ul><p>What to do:</p><ul><li><p>Federal agencies should leverage the expanded logging capabilities to enhance their cybersecurity posture and better detect and respond to potential threats.</p></li><li><p>Technology vendors, including Microsoft, should prioritize security features by default and address concerns about cybersecurity readiness to mitigate risks to the government and other users.</p></li></ul><h2></h2><h3><strong>Avast Ordered to Stop Selling Browsing Data from its Privacy Apps</strong></h3><p>What happened:</p><ul><li><p>Avast collected users' browser information from 2014 to 2020 and sold it to over 100 companies through Jumpshot.</p></li><li><p>The Federal Trade Commission (FTC) ordered Avast to pay $16.5 million and cease selling browsing data.</p></li></ul><p>What to know:</p><ul><li><p>Avast acquired then-antivirus competitor Jumpshot in early 2014, rebranding it as an analytics seller, offering insights into the online habits of over 100 million consumers.</p></li><li><p>Avast's apps claimed to increase privacy but collected identifiable data, including job searches and map directions.</p></li><li><p>FTC found the data wasn't sufficiently anonymous, including unique device identifiers and specific browsing activities.</p></li><li><p>The connection between Avast and Jumpshot was revealed in January 2020, showing data purchases by major companies like Home Depot, Google, Microsoft, Pepsi, and McKinsey.</p></li><li><p>Avast is required to implement a comprehensive privacy program and obtain express consent for future data gathering.</p></li></ul><p>Business Impact:</p><ul><li><p>Businesses using Avast&#8217;s applications or have employees using Avast may have their data tracked.</p></li></ul><p>What to do:</p><ul><li><p>Companies may consider switching to alternative security providers with more stringent privacy policies.</p></li><li><p>Companies should review their data collection and sharing practices to ensure compliance with privacy regulations.</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://infosecbb.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The InfoSec Board Brief! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[January 2024 Edition]]></title><description><![CDATA[Hi!]]></description><link>https://infosecbb.com/p/january-2024-edition</link><guid isPermaLink="false">https://infosecbb.com/p/january-2024-edition</guid><dc:creator><![CDATA[Amir Tarighat]]></dc:creator><pubDate>Mon, 29 Jan 2024 13:02:38 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a8bd3cd-9c0e-447c-913e-eea723c8cc52_256x256.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><p>Hi! We&#8217;re back after a short break with the essential cybersecurity and privacy news for executives. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://infosecbb.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The InfoSec Board Brief! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>Table of Contents</h1><ol><li><p><strong>Microsoft network breached by Russia-state hackers</strong></p></li><li><p><strong>Cyber scams and their surprising connection to human trafficking and Myanmar's civil war</strong></p></li><li><p><strong>Nearly 25 million new unique login credentials stolen from various websites</strong></p></li><li><p><strong>Kaspersky Research Created a Lightweight Method to Detect Potential iOS Malware</strong></p></li><li><p><strong>SentinelOne Uncovers the Evolution of Undetected macOS InfoStealers | KeySteal, Atomic, and CherryPie</strong></p></li><li><p><strong>Facebook Users are Monitored by Thousands of Companies</strong></p></li><li><p><strong>Inside the $1 billion Walmart Gift Card Laundering Scheme</strong></p></li><li><p><strong>Critical GitLab vulnerability exposes 2FA-less users to account takeovers</strong></p></li><li><p><strong>GenAI could make KYC effectively useless</strong></p></li><li><p><strong>FTC Order Prohibits Data Broker X-Mode Social and Outlogic from Selling Sensitive Location Data</strong></p></li></ol><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://infosecbb.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&quot;,&quot;text&quot;:&quot;Share The InfoSec Board Brief&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://infosecbb.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share"><span>Share The InfoSec Board Brief</span></a></p><p></p><h2>1. <strong>Microsoft network breached by Russia-state hackers </strong></h2><p></p><p>What happened:&nbsp;</p><ul><li><p>In late November 2023, Russian state-backed hackers called Midnight Blizzard attacked Microsoft's network.</p></li><li><p>Microsoft only discovered the breach on January 12, 2024.</p></li></ul><p>What to know:</p><ul><li><p>The hackers breached a device within Microsoft&#8217;s network with a weak password and no two-factor authentication.</p></li><li><p>They tried various previously compromised or commonly used passwords until they succeeded.</p></li><li><p>After gaining access through this account, they assessed a small number of Microsoft corporate email accounts, including those of senior executives and employees in cybersecurity, legal, and other functions.</p></li><li><p>Microsoft hasn't shared details about the number of compromised email accounts or the accessed data, but it didn&#8217;t seem to affect customer environments, production systems, source codes, or AI systems.</p></li></ul><p>Business Impact:&nbsp;</p><ul><li><p>Microsoft business customers should be aware of the potential information leak through these compromised emails.</p></li></ul><p>What to do:</p><ul><li><p>Microsoft enhances security and applies current standards to legacy systems and internal processes. Organizations should consider reviewing and strengthening their own cybersecurity practices to mitigate similar threats.</p></li></ul><p>For more information, check out <a href="https://msrc.microsoft.com/blog/2024/01/microsoft-actions-following-attack-by-nation-state-actor-midnight-blizzard/">this article</a>.</p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://infosecbb.com/p/january-2024-edition?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://infosecbb.com/p/january-2024-edition?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><h2>2. Cyber scams and their surprising connection to human trafficking and Myanmar's civil war.</h2><p>What happened:</p><ul><li><p>Rebel groups called the Three Brotherhood Alliance launched "Operation 1027" in Myanmar's northern Shan state, capturing military outposts and towns.</p></li><li><p>These rebels aimed to overthrow the military government and eliminate telecom fraud and scam centers along the China-Myanmar border.</p></li></ul><p>What to know:</p><ul><li><p>Southeast Asia has seen a rise in abducting people for internet scams, known as "pig butchering" scams.</p></li><li><p>Criminal groups lure tech-savvy workers with fake tech jobs, forcing them into scam operations.</p></li><li><p>China's political ties and economic interests in Myanmar have led it to crack down on these scam centers.</p></li><li><p>China's involvement in Myanmar's civil war has created a complex situation where it may be playing both sides to ensure stability.</p></li><li><p>The cyberscam industry is growing, possibly using AI, and targeting a wider range of victims.</p></li></ul><p>Business Impact:</p><ul><li><p>Companies operating in Myanmar or with employees and customers there can face disruptions and risks due to the growth of conflict and cybercrime.</p></li></ul><p>What to do:</p><ul><li><p>A comprehensive approach is needed to combat transnational crimes like fraud, cybercrime, human trafficking, money laundering, and corruption.</p></li><li><p>As crime moves online, its ties to real-world conflicts persist.</p></li></ul><p>For more information, check out <a href="https://www.vox.com/world-politics/2024/1/18/24041696/cyberscams-myanmar-china-pig-butchering">this article</a>.</p><p></p><p></p><h2>3. <strong>Nearly 25 million new unique login credentials stolen from various websites</strong></h2><p>What happened:</p><ul><li><p>Troy Hunt, creator of "Have I Been Pwned," reported a huge password dump on the dark web containing nearly 71 million unique login credentials, with 25 million of which had never been leaked before.</p></li></ul><p>What to know:</p><ul><li><p>The stolen data is collected in text files and images; each line consists of a login URL, its login name, and an associated stolen password.</p></li><li><p>Many passwords in the dataset are weak and duplicated, making them more vulnerable to simple password dictionary attacks.</p></li><li><p>The authenticity of the dataset was confirmed by contacting affected individuals.</p></li></ul><p>What to do:</p><ul><li><p>Change passwords for affected accounts. Encourage employees to do the same.</p></li><li><p>Use strong, unique passwords, activate two-factor authentication, and use passkeys for extra security. Encourage employees to do the same with personal accounts.</p></li><li><p>Regularly check for breached credentials and take necessary steps to secure accounts and data. Consider using software to do that for your organization.</p></li><li><p>If cryptocurrency is owned, consider transferring it to a different wallet not associated with that email address. </p></li></ul><p>For more information, check out <a href="https://arstechnica.com/security/2024/01/71-million-passwords-for-facebook-coinbase-and-others-found-for-sale/">this article</a>.</p><p></p><h2>5. <strong>Kaspersky Research Created a Lightweight Method to Detect Potential iOS Malware</strong></h2><p>What happened:</p><ul><li><p>A lightweight method for detecting potential iOS malware like Pegasus is to analyze the "Shutdown.log" file stored in sysdiag archives on iOS devices.&nbsp;</p></li></ul><p>What to know:</p><ul><li><p>Pegasus is a spyware for eavesdropping on mobile phones and harvesting their data.</p></li><li><p>Traditional methods for detecting iPhone infections are time-consuming or require expertise.</p></li><li><p>Shutdown.log is a text-based log file created on mobile iOS devices that records reboot events and multiple environment characteristics.&nbsp;</p></li><li><p>Anomalies detected include excessive reboot delays (more than 4) and the presence of Pegasus malware indicators.</p></li><li><p>Retrieving the Shutdown.log file is relatively straightforward from sysdiag archives, which are collections of system logs for debugging and troubleshooting.</p></li></ul><p>Impact:</p><ul><li><p>This discovery can help businesses identify iPhone malware more efficiently, improving their device and data security.</p></li><li><p>This method relies on the user rebooting the phone as often as possible.</p></li></ul><p>For more information, check out <a href="https://securelist.com/shutdown-log-lightweight-ios-malware-detection-method/111734/">this article</a>.</p><p></p><h2>5. SentinelOne Uncovers the Evolution of Undetected macOS InfoStealers | KeySteal, Atomic, and CherryPie</h2><p>What Happened:</p><ul><li><p>Despite Apple's updates to macOS's XProtect signature database, infostealer families like KeySteal, Atomic InfoStealer, and CherryPie are still active and continue to evolve.</p></li></ul><p>What to Know:</p><ul><li><p>Information stealer (or Infostealer) is a type of malware that gathers information like usernames and passwords from a system.</p></li><li><p>Infostealers targeting macOS have been on the rise, with variants like Atomic Stealer, macOS MetaStealer, and RealStealer.</p></li><li><p>Three active infostealers that are currently avoiding static signature detection.</p><ul><li><p>KeySteal, initially noted in 2021, has undergone significant technical changes and steals Keychain information.</p></li><li><p>Atomic InfoStealer has multiple variants, avoids detection, and includes anti-analysis logic.</p></li><li><p>CherryPie, also known as Gary Stealer, is detected by Apple but not on VirusTotal in some cases and has cross-platform Windows/macOS capabilities.</p></li></ul></li></ul><p>Business Impact:&nbsp;</p><ul><li><p>MacOS is vulnerable to attacks by various undetected infostealers, leading to data theft, privacy breaches, and potential damage to an organization's reputation.</p></li><li><p>Relying solely on signature-based detection is not enough.&nbsp;</p></li><li><p>Companies using macOS need to take security more seriously and allocate a security budget to implement more comprehensive security measures on MACs, such as installing tools like Endpoint Detection &amp; Response (EDR).</p></li></ul><p>What to Do:</p><ul><li><p>Be vigilant about the persistent risk of undetected macOS InfoStealer and strengthen macOS security.</p></li><li><p>Prioritize proactive threat detection, improve detection rules, and stay informed about evolving tactics.</p></li></ul><p>For more information, check out <a href="https://www.sentinelone.com/blog/the-many-faces-of-undetected-macos-infostealers-keysteal-atomic-cherrypie-continue-to-adapt/">this article</a>.</p><p></p><h2>6. <strong>Facebook Users are Monitored by Thousands of Companies</strong></h2><p>What happened:&nbsp;</p><ul><li><p>Consumer Reports, a non-profit consumer watchdog, conducted a study with 709 volunteers, revealing that 186,892 companies shared data about them with Facebook.</p></li></ul><p>What to know:&nbsp;</p><ul><li><p>The study exposed massive surveillance and server-to-server tracking, including the Meta tracking pixels on websites.&nbsp;</p></li><li><p>On average, each participant in the study had their data sent to Facebook by 2,230 companies. Some panelists' had over 7,000 companies providing their data to Facebook.</p></li><li><p>Data collection includes "events" and "custom audiences," tracking user interactions on websites and apps.</p></li><li><p>Users can access the list of companies that sent their data to Facebook and choose to disconnect future sharing via<a href="https://accountscenter.facebook.com/info_and_permissions"> this link.</a></p></li></ul><p>Business Impact:&nbsp;</p><ul><li><p>The scale of data collection and sharing raises concerns about user privacy and transparency in data practices. </p></li><li><p>Users may stop using businesses that collect and sell their data.</p></li><li><p>Increased demand for privacy could impact marketing data brokers.</p></li><li><p>Facebook might also crack down on businesses, which could jeopardize your pixel tracking.</p></li></ul><p>What to do:&nbsp;</p><ul><li><p>Businesses using Meta pixel or data brokers should review data-sharing practices.</p></li><li><p>Ensure user data privacy and compliance with regulations.</p></li></ul><p>For more information, check out <a href="https://themarkup.org/privacy/2024/01/17/each-facebook-user-is-monitored-by-thousands-of-companies-study-indicates">this article</a>.</p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://infosecbb.com/p/january-2024-edition?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://infosecbb.com/p/january-2024-edition?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><h2>7. <strong>Inside the $1 billion Walmart Gift Card Laundering Scheme</strong></h2><p>What happened:</p><ul><li><p>Scammers have duped consumers out of more than $1 billion by exploiting Walmart&#8217;s lax security. The company has resisted taking responsibility while breaking promises to regulators and skimping on training.</p></li></ul><p>What to Know:</p><ul><li><p>Scammers used tactics like posing as IRS agents or creating fake online romances to trick victims into buying gift cards, then quickly transferring balances to other cards.</p></li><li><p>Walmart had a financial incentive to avoid banning card-for-card purchases, as it earns millions in profit from gift card usage, commissions on other brands of cards purchased, and money transfer fees.</p></li><li><p>Walmart continued to expand in financial services, acquiring One in 2022.</p></li><li><p>Despite claims of anti-fraud efforts, Walmart's training and security measures fell short, leading to legal action.</p></li><li><p>Technology like analytics and AI only capture a small fraction of fraud, and gift card theft remains an ongoing issue.</p></li></ul><p>What to Do:</p><ul><li><p>Exercise caution</p></li><li><p>Be aware of common scam tactics and report suspicious activities.</p></li></ul><p>For more information, check out <a href="https://www.propublica.org/article/walmart-financial-services-became-fraud-magnet-gift-cards-money-laundering">this article</a>.</p><p></p><p></p><h2>8. <strong>Critical GitLab vulnerability exposes 2FA-less users to account takeovers</strong></h2><p>What Happened:</p><ul><li><p>GitLab disclosed a critical vulnerability with a severity score of 10 in May 2023, which allowed users to issue password resets through a secondary email address.</p></li><li><p>Multiple GitLab versions are affected and require patching.</p></li><li><p>A second critical vulnerability allowed attackers to execute slash commands in Slack or Mattermost.</p></li></ul><p>What to Know:</p><ul><li><p>Attackers can send password reset emails to unverified addresses.</p></li><li><p>Users without two-factor authentication (2FA) are at risk of account takeover.</p></li><li><p>All authentication methods are impacted, including some single sign-on (SSO) configurations.</p></li><li><p>Administrators can disable password authentication for self-managed customers.</p></li></ul><p>Business Impact:</p><ul><li><p>There is a significant risk of account takeover for GitLab users if your company is using GitLab or relies on vendors who use GitLab with sensitive data.</p></li><li><p>Organizations using GitLab for DevOps may have valuable intellectual property and source code at stake.</p></li><li><p>Depending on their function, organizations with custom apps and integrations that use slash commands could also leak sensitive data.</p></li></ul><p>What to Do:</p><ul><li><p>Apply the latest security patches promptly.</p></li><li><p>Enable two-factor authentication (2FA) for all accounts and ensure vendors using Gitlab are checked.</p></li><li><p>Regularly monitor logs for signs of exploitation.</p></li><li><p>GitLab has added new tests to validate the password reset logic to prevent similar vulnerabilities.&nbsp;</p></li></ul><p>For more information, check out <a href="https://www.theregister.com/2024/01/15/critical_gitlab_vulnerability/">this article</a>.</p><p></p><h2>9. <strong>GenAI could make KYC effectively useless</strong></h2><p>What happened:</p><ul><li><p>Recent viral posts on social media platforms showed how to use generative AI to manipulate ID images and pass KYC (Know Your Customer) tests.</p></li></ul><p>What to know:</p><ul><li><p>KYC (Know Your Customer) is a process used by financial institutions and banks to verify the identity of their customers. It often involves ID images and cross-checked selfies to confirm a person's identity.</p><ul><li><p>Generative AI (GenAI) tools like Stable Diffusion can be used to create synthetic renderings of a person against various backdrops, including ones that appear to hold an ID document.</p></li><li><p>Android apps running on desktop emulators and web apps can be tricked into accepting deepfaked images instead of live camera feeds.</p></li><li><p>Some platforms implement "liveness" checks but can still be bypassed.</p></li><li><p>Deepfaked images and videos may soon reach the point where they can fool human reviewers.</p></li></ul></li></ul><p>Business Impact:&nbsp;</p><ul><li><p>KYC could become useless as a security measure. Attackers can create convincing deepfake ID images, potentially undermining the security of platforms that rely on KYC.</p></li></ul><p>What to do:&nbsp;</p><ul><li><p>Businesses must enhance security beyond KYC in response to the deepfake threat.</p></li></ul><p>For more information, check out <a href="https://techcrunch.com/2024/01/08/gen-ai-could-make-kyc-effectively-useless/">this article</a>.</p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://infosecbb.com/p/january-2024-edition?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://infosecbb.com/p/january-2024-edition?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><h2>10. FTC Order Prohibits Data Broker X-Mode Social and Outlogic from Selling Sensitive Location Data</h2><p>What happened:</p><ul><li><p>X-Mode Social and its successor Outlogic are prohibited from selling sensitive location data due to the Federal Trade Commission (FTC) settlement.</p></li><li><p>Allegations included selling location data linked to sensitive places without proper safeguards.</p></li></ul><p>What to know:</p><ul><li><p>X-Mode &amp; Outlogic collected location data associated with mobile advertising IDs and sold it to various clients in different industries.</p></li><li><p>The company did not have policies to remove sensitive locations from the raw data it sold until May 2023, potentially exposing consumers to privacy violations and risks.</p></li><li><p>Users were not fully informed about how their location data would be used.</p></li><li><p>The company didn&#8217;t employ necessary technical safeguards and oversight to honor users&#8217; opt-out requests.</p></li><li><p>X-Mode provided information for marketing purposes about consumers who had visited certain medical facilities and pharmacies, violating the FTC Act's prohibition against unfair and deceptive practices.</p></li></ul><p>Business Impact:&nbsp;</p><ul><li><p>Businesses using location data should be aware of the FTC settlement, which restricts X-Mode &amp; Outlogic from sharing certain sensitive location data and requires them to take various measures to protect consumer data.&nbsp;</p></li></ul><p>What to do:&nbsp;</p><ul><li><p>If your company collects location data, you must create a program for sensitive location data, data deletion, supplier assessment, and privacy measures.</p></li><li><p>Simplify consent withdrawal and data deletion for consumers.</p></li><li><p>If there&#8217;s sensitive location data, ensure compliance with privacy regulations and standards to avoid potential legal issues.</p></li></ul><p>For more information, check out <a href="https://www.ftc.gov/news-events/news/press-releases/2024/01/ftc-order-prohibits-data-broker-x-mode-social-outlogic-selling-sensitive-location-data">this article</a>.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://infosecbb.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The InfoSec Board Brief! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[August 2023 Edition]]></title><description><![CDATA[Table of Contents]]></description><link>https://infosecbb.com/p/august-2023-edition</link><guid isPermaLink="false">https://infosecbb.com/p/august-2023-edition</guid><dc:creator><![CDATA[Amir Tarighat]]></dc:creator><pubDate>Mon, 21 Aug 2023 17:15:11 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a8bd3cd-9c0e-447c-913e-eea723c8cc52_256x256.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Table of Contents</h2><p><strong>1. WormGPT and FraudGPT Claim to Create Content Cybercriminals Can Use For Phishing Campaigns</strong></p><p><strong>2. Cybersecurity Executive Slams Microsoft&#8217;s Negligent Approach to Security</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://infosecbb.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The InfoSec Board Brief! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p><strong>3. Teenage Hackers Make Millions Through SIM Swapping</strong></p><p><strong>4. AI Incident Database Collects and Analyzes AI Incidents</strong></p><p><strong>5. Canon Printers Pose Network Threat</strong></p><p><strong>6. Pentagon Investigates Second Breach in 3 Months</strong></p><p><strong>7. Chinese Advanced Persistent Threats Continue to Infiltrate US Infrastructure</strong></p><p><strong>8. Obscure Cloud Service Company Tied to Malicious Users</strong></p><p><strong>9. Hackers Access 16 Years Worth of Colorado Public School Data</strong></p><p><strong>10. Cyberattacks on Ukraine Play Huge Role in War</strong></p><p><strong>11. Vulnerabilities Abound in Chinese Input Keyboard</strong></p><p><strong>12. Secure Channel OSDP is Rendered Useless</strong></p><div><hr></div><h3><strong>1. WormGPT and FraudGPT Claim to Create Content Cybercriminals Can Use For Phishing Campaigns</strong></h3><p>What Happened: </p><p>Cybercriminals have created unique versions of language models like ChatGPT that help them create copy for their phishing and malware scams. </p><p>What to Know:</p><ul><li><p>Criminals on dark-web forums are posting about two large language models (LLMs) they&#8217;ve created, called WormGPT and FraudGPT, and are marketing them for illegal activities.</p></li><li><p>It is unknown how legitimate these claims are with some experts thinking these claims themselves are an attempt at a scam.</p></li><li><p>LLMs like OpenAI and ChatGPT have safety measures that stop misuse - these shady LLMs strip away these guardrails.</p></li><li><p>The FBI and Europol have issued warnings that cybercriminals are using generative AI in their work that could help with fraud, impersonation, and other social engineering. For example, operators of pig butchering and romance scams often use generated text in their messages.</p></li></ul><p>What to Do: </p><ul><li><p>Businesses should be hyper-vigilant and should consider conducting in-depth training with employees about the possibility of these advanced-level phishing campaigns.</p></li><li><p>Implement AI detection tools that can detect and mitigate AI-generated content. With these tools, you&#8217;ll be able to identify and block suspicious activities</p></li></ul><p>For more information, check out <a href="https://www.wired.com/story/chatgpt-scams-fraudgpt-wormgpt-crime/">this article. </a></p><div><hr></div><h3><strong>2. Cybersecurity Executive Slams Microsoft&#8217;s Negligent Approach to Security</strong></h3><p>What Happened: </p><p>Amit Yoran, CEO of cybersecurity firm Tenable, criticized Microsoft as &#8220;grossly irresponsible, if not blatantly negligent&#8221; for consistently failing to proactively and professionally address vulnerabilities in their products.</p><p>What to Know:</p><ul><li><p>Yoran&#8217;s company recently identified a critical vulnerability in a Microsoft Azure product that allowed them to, among other things, access a bank&#8217;s authentication secrets. It has been four months since the disclosure to Microsoft, and the vulnerability has still not been patched.</p></li><li><p>Microsoft announced that no one else accessed the secrets besides the researchers at Tenable.</p></li><li><p>Microsoft is under increased scrutiny after hackers based in China abused one of Microsoft&#8217;s products to steal the email messages of senior U.S. officials. The Cyber Security Review Board is currently investigating Microsoft&#8217;s role in the breach.</p></li><li><p>Microsoft is also under fire for the so-called SolarWinds attack in which Russian state-sponsored hackers compromised computer networks in the federal government and private sector.</p></li></ul><p><br>What to Do:</p><ul><li><p>Keep up to date with possible updates to Microsoft&#8217;s software. Since the company is so ingrained in online business infrastructure, you&#8217;ll likely be impacted by any updates or changes the company makes in response to this backlash.</p></li></ul><p>Business Impact: </p><ul><li><p>Shares of Microsoft were down 1% on Friday morning in New York</p></li></ul><p>For more information, check out <a href="https://cyberscoop.com/tenable-microsoft-negligence-security-flaw/">this article</a> and <a href="https://www.bloomberg.com/news/articles/2023-08-11/microsoft-s-role-in-email-breach-to-be-part-of-us-cyber-inquiry">this one, too.</a></p><div><hr></div><h3><strong>3. Teenage Hackers Make Millions Through SIM Swapping</strong></h3><p>What Happened:</p><p>Michael Terpin, a prominent crypto investor and marketer, fell victim to a SIM swap by teenage hackers looking for access to his cryptocurrency. </p><p>What to Know:</p><ul><li><p>&#8220;SIM Swapping&#8221; is when a criminal hijacks a user&#8217;s mobile number by getting their phone service providers to transfer the numbers to phones the attackers control. This can give a hacker a way into someone&#8217;s email, social media, and online storage accounts. </p></li><li><p>The first attempt of a SIM Swap on Terpin was successful only in that hackers were able to get about $30,000 from friends of Terpin after impersonating him via messages. Following this, T-Mobile and AT&amp;T informed Terpin that he would get a heightened level of security on their accounts and that no SIM swap could be made without a PIN. A second attempt was much more successful, and Terpin responded by suing AT&amp;T for $224 million. The fall-out from this ended up being the most significant take on record for a SIM swap and was conducted entirely by teenagers.</p></li><li><p>Last year the FBI received over 2000 SIM swapping complaints with losses totaling $71.6 million.</p></li><li><p>Community, a group of teenage SIM swappers in the US, the UK, and Ireland, ultimately ended up being responsible for the theft form Terpin.</p></li></ul><p>What to Do: </p><ul><li><p>Security experts recommend that users use a form of two-factor authentication that requires a code sent to an app rather than one text to a phone number to prevent SIM swapping. This way, even if a hacker has access to your phone messages, they won&#8217;t be able to complete two-factor authorization for entities like emails and banking.</p></li><li><p>Consider asking your phone provider to increase the level of security on your accounts.</p></li><li><p>Reduce the amount of sensitive information you&#8217;re putting through messaging apps like Telegram and email apps like Gmail. </p></li></ul><p>For more information, check out <a href="https://www.bloomberg.com/news/features/2023-08-04/teen-gamers-targeted-michael-terpin-in-major-sim-swapping-theft?utm_medium=email&amp;utm_source=newsletter&amp;utm_term=230809&amp;utm_campaign=cyber#xj4y7vzkg">this article.</a></p><div><hr></div><h3><strong>4. AI Incident Database Collects and Analyzes AI Incidents</strong></h3><p>What Happened:</p><p>The AI Incident Database is an open-source, constantly evolving database for AI incidents.</p><p>What to Know:</p><ul><li><p>This repository of problems will be used by future researchers and developers to mitigate or avoid repeated bad outcomes.</p></li><li><p>It is designed to provide information, structure, and perspectives on AI incidents.</p></li></ul><p>Business Impact: </p><ul><li><p>This tool will be incredibly helpful for anyone in the AI industry and will work to promote a more ethical, responsible AI industry.</p></li></ul><p>What to Do:</p><ul><li><p>If you experience an AI incident, you can submit it directly to the AI Incident Database.</p></li><li><p>Read through submitted incidents to learn more about faulty AI and AI mishaps.</p></li></ul><p>Check out the AI Incident Database <a href="https://incidentdatabase.ai/">here.</a></p><div><hr></div><h3><strong>5. Canon Printers Pose Network Threat</strong></h3><p>What Happened:</p><p>Canon is warning that sensitive Wi-Fi settings don&#8217;t get wiped during resets so customers need to manually delete them before selling, discarding, or getting them repaired.</p><p>What to Know:</p><ul><li><p>Manual wiping of settings needs to occur whenever your printer will be in the hand of a third party.</p></li><li><p>Malicious actors could use settings saved on this hardware to gain unauthorized access to a network that hosts or hosted a Canon printer.</p></li></ul><p>What to Do: </p><ul><li><p>Make sure you manually wipe your settings before sending your Canon printer off to any third party. If you don&#8217;t use a Canon printer, check to see if these same precautions are necessary for your brand.</p></li><li><p>If your business utilizes a printer connected to the network over Wi-Fi, a malicious actor could theoretically gain access to your network through the printer. Make sure to take necessary precautions before getting printers repaired or replaced.</p></li></ul><p>For more information, check out <a href="https://arstechnica.com/security/2023/08/canon-warns-printer-users-to-manually-wipe-wi-fi-settings-before-discarding/">this article.</a></p><div><hr></div><h3><strong>6. Pentagon Investigates Second Breach in 3 Months</strong></h3><p>What Happened: </p><p>The compromise was made across several Air Force Facilities by a US Air Force engineer.</p><p>What to Know:</p><ul><li><p>The government was told that an Arnold Air Force Base (in Tennessee) employee had taken government radio technologies home. The equipment was worth around $90,000.</p></li><li><p>It was found the employee had unauthorized administrator access to radio communications technology used by the Air Education and Training Command. The compromise affected 17 Department of Defense installations.</p></li><li><p>There is evidence the suspect had possible access to communications of the FBI and various Tennessee state agencies.</p></li><li><p>This comes just three months after another major breach of Pentagon security where Massachusetts Air National Guard member Jack Teixeira leaked classified documents related to the war in Ukraine on Discord.</p></li></ul><p>For more information, check out <a href="https://www.csoonline.com/article/648207/pentagon-investigating-compromise-in-air-force-communications-report.html">this article.</a></p><div><hr></div><h3><strong>7. Chinese Advanced Persistent Threats Continue to Infiltrate US Infrastructure</strong></h3><p>What Happened: </p><p>Chinese APTs (Advanced Persistent Threats), believed to be associated with the Chinese government, are actively infiltrating sensitive infrastructure in the US with the intention of establishing permanent presences.</p><p>What to Know:</p><ul><li><p>Three distinct reports highlight this threat:</p><ul><li><p>Security firm Kaspersky reported on an advanced spying toolkit used by a group (Zirconium) to create a continuous data exfiltration channel within industrial infrastructure.</p></li><li><p>The New York Times reported on another Chinese Group (Volt Typhoon) that aimed to insert disruptive malware deep within critical infrastructure, possibly for use during potential conflicts.</p></li><li><p>Microsoft disclosed a breach involving its Azure and Exchange cloud services by a Chinese APT where hackers accessed inactive signing keys and forged tokens for authentication</p></li></ul></li><li><p>These Chinese efforts are all difficult to detect due to their sophistication and the dormant nature of their malware, which can remain hidden for long periods.</p></li><li><p>Chinese reports label this propaganda.</p></li></ul><p>What to Do:</p><ul><li><p>Keep up to date as more information comes to light. The US government is investigating the extent of the code&#8217;s presence in networks, as its scope is still not fully understood.</p></li></ul><p>For more information, check out <a href="https://arstechnica.com/security/2023/08/multiple-chinese-apts-establish-major-beachheads-inside-us-infrastructure/">this article.</a></p><div><hr></div><h3><strong>8. Obscure Cloud Service Companies Tied to Malicious Users</strong></h3><p>What Happened:</p><p>Cloudzy, an obscure cloud service company, has been providing state-sponsored hackers with internet services to spy on and extort their victims</p><p>What to Know:</p><ul><li><p>Researchers from cybersecurity firm Halcyon said Cloudzy had been leasing server space and reselling it to at least 17 different state-sponsored hacking groups from China, Russia, Iran, North Korea, India, Pakistan, and Vietnam.</p></li><li><p>Cloudzy CEO says only 2% of his firm&#8217;s clients are malicious. Halcyon estimates that half of Cloudsy&#8217;s business was malicious.</p></li><li><p>The bigger picture is that this is an example of how hackers and ransomware gangs use small firms operating at the fringes of cyberspace to enable big hacks.</p></li></ul><p>For more information, check out <a href="https://www.reuters.com/technology/cloud-company-assisted-17-different-government-hacking-groups-us-researchers-2023-08-01/">this article.</a></p><div><hr></div><h3><strong>9. Hackers Access 16 Years Worth of Colorado Public School Data</strong></h3><p>What Happened:</p><p>16 years of student information was accessed by a ransomware gang over the course of eight days this past June. Additional victims were certain cohorts of higher education students, recipients of General Education Development certificates, and teacher&#8217;s licenses. </p><p>What to Know:</p><ul><li><p>No ransomware gang has taken public credit and it is unknown whether a ransom was paid.</p></li><li><p>Impacted records include names, SSNs, student ID numbers, and other records ranging from bank statements and bills to copies of government IDs parents use as proof of address.</p></li></ul><p>What to Do: </p><ul><li><p><a href="https://therecord.media/hackers-accessed-colorado-school-data">If you&#8217;ve gone to school in Colorado, check out the original article</a> to see if you may have been included on the list of people who&#8217;s data was breached.</p></li></ul><p>For more information and to see the list of affected people, check out <a href="https://therecord.media/hackers-accessed-colorado-school-data">this article.</a></p><div><hr></div><h3><strong>10. Cyberattacks on Ukraine Play Huge Role in War</strong></h3><p>What Happened: </p><p>Victor Zhora, deputy chairman of the State Service of Special Communications and Information Protection of Ukraine, is working to catalog cyberwar crime evidence against Russian hackers targeting Ukraine.</p><p>What to Know:</p><ul><li><p>Cyberattacks have played a huge role in the war in Ukraine. Russian hackers have targeted satellite systems and used digital assaults to execute disinformation and psychological warfare campaigns; have carried out widespread hacking campaigns to conduct cyber-espionage, surveil Ukrainians, and spread propaganda; and have conducted other digital assaults.</p></li><li><p>Each day, Ukraine faces up to 10 cyberattacks. Since the beginning of the invasion, they&#8217;ve registered around 3000 major cyber incidents.</p></li><li><p>Ukraine considers the first strike in cyberwar to have been made on January 14 when around 70 governmental websites were attacked by Russia-affiliated actors.</p></li><li><p>Global IT providers have offered software, hardware, cloud infrastructures, consultancy, and threat intelligence to Ukraine.</p></li></ul><p>For more information, check out <a href="https://cyberscoop.com/victor-zhora-cyberwar-crime-ukraine-russia/">this article.</a></p><div><hr></div><h3><strong>11. Vulnerabilities Abound in Chinese Input Keyboard</strong></h3><p>What Happened: </p><p>There has been a lot of effort analyzing, documenting, and responsibly disclosing vulnerabilities concerning the insecure transmission of sensitive data in Chinese-developed apps. A specific study showed how Tencent&#8217;s Sogou Input Method, the most popular Chinese input method in China, has vulnerabilities decipherable by a network eavesdropper, revealing what users are typing as they type.</p><p>What to Know: </p><ul><li><p>This ecosystem remains problematic as these apps fail to adopt practices to secure the sensitive data which they transmits.</p></li><li><p>Sogou Input Method, an app with around 450 million users, failed to properly secure the transmission of sensitive data.</p></li></ul><p>What to Do: </p><ul><li><p>Reconsider using this type of input keyboard.</p></li><li><p>Don&#8217;t ever use messaging or input apps that don&#8217;t implement any type of well-known encryption.</p></li></ul><p>To see the complete study, <a href="https://citizenlab.ca/2023/08/vulnerabilities-in-sogou-keyboard-encryption/">click here.</a></p><div><hr></div><h3><strong>11. Secure Channel OSDP is Rendered Useless</strong></h3><p>What Happened: </p><p>Secure Channel is a next-gen protocol that was designed to prevent the hacking of access control systems used at secure facilities on US military bases and buildings belonging to federal, state, and local governments and private organizations. Recently, researchers discovered a suit of vulnerabilities.</p><p>What to Know:</p><ul><li><p>Open Supervised Device Protocol (OSDP) was developed as a security standard after an attack demonstrated at the Black Hat security conference in 2008 on a device called Gecko. Gecko exploited weaknesses that allowed attackers to create spoof cards for unauthorized entry. To address these vulnerabilities, the industry introduced OSDP with a Secure Channel that encrypted communication.</p></li><li><p>Recent research shows that OSDP is still very vulnerable. Vulnerabilities include the inability to enforce encryption, weak key management, and a flawed key exchange process.</p></li><li><p>Despite efforts to improve security, OSDP remains compromised with vulnerabilities that can lead to unauthorized access of buildings and data breaches.</p></li></ul><p>For more information, check out <a href="https://arstechnica.com/security/2023/08/next-gen-osdp-was-supposed-to-make-it-harder-to-break-in-to-secure-facilities-it-failed/">this article.</a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://infosecbb.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The InfoSec Board Brief! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[July 2023 Edition]]></title><description><![CDATA[Table of Contents]]></description><link>https://infosecbb.com/p/july-2023-edition</link><guid isPermaLink="false">https://infosecbb.com/p/july-2023-edition</guid><dc:creator><![CDATA[Amir Tarighat]]></dc:creator><pubDate>Sun, 13 Aug 2023 23:51:48 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a8bd3cd-9c0e-447c-913e-eea723c8cc52_256x256.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Table of Contents</h2><ol><li><p><strong>700,000 TikTok Accounts in Turkey Compromised</strong></p></li><li><p><strong>Ongoing Repercussions from MOVEit Hack Bring Up Software Supply Chain Concerns</strong></p></li><li><p><strong>&#8220;Fourth Amendment is Not For Sale Act&#8221; Works to Protect Data From Law Enforcement</strong></p></li><li><p><strong>Stalkerware App Made Millions by Forging Identities</strong></p></li><li><p><strong>VirusTotal Apologizes for Human Error-Driven Data Exposure</strong></p></li><li><p><strong>Typo Leads to Continuing Military Data Leak</strong></p></li><li><p><strong>Dutch Patient Data at Risk for Data Leakage</strong></p></li><li><p><strong>Amazon Van Surveillance Camera Footage Ending Up On Reddit</strong></p></li><li><p><strong>IT Firm JumpCloud Experiences Security Breach by Unnamed Nation-State</strong></p></li><li><p><strong>Biden-Harris Administration Proposes &#8220;U.S. Cyber Trust Mark'&#8220;</strong> </p><p></p></li></ol><div><hr></div><h3>1.  700,000 TikTok Accounts in Turkey Compromised</h3><p>What Happened: </p><p>Weeks before the presidential election in Turkey, around 700,000 TikTok accounts in Turkey had their private information and control compromised</p><p>What To Know: </p><ul><li><p>The vulnerability came from TikTok&#8217;s &#8220;grey routing&#8221; of SMS messages through insecure channels during an account verification step</p></li><li><p>Grey routing of a message is when a message bypasses international messaging laws and fees and travels through illegal channels before reaching its destination. Companies do this to keep down costs and avoid guardrails. </p></li><li><p>Prior to the breach, TikTok was warned by the U.K.&#8217;s National Cyber Security Centre that this practice posed cybersecurity threats</p></li><li><p>This is the largest company-confirmed compromise of TikTok </p></li><li><p>This comes at a time when TikTok and parent company ByteDance have been facing increased scrutiny for shaky security practices</p></li></ul><p>Business Impact: </p><p>Companies utilizing grey routing should be wary of the cybersecurity threats inherent to this practice and consider alternate modes of account verification</p><p>What to Do: </p><ul><li><p>In response, TikTok introduced passkeys so users could log into their accounts without using an SMS code. Users of TikTok should consider opting out of SMS verifications for their accounts</p></li></ul><p>For more information, check out <a href="https://apple.news/AiC0jf79MRCeaEvHiDIeoPA">this article.</a></p><div><hr></div><h2>2. Ongoing Repercussions from MOVEit Hack Bring Up Software Supply Chain Concerns</h2><p>What Happened: </p><p>The CIOp extortion group responsible for the MOVEit hack continues to post the names of hundreds of companies, state and local governments, universities, and other organizations on its dark web leak site with an extortion threat to leak data of named victims if payment demands are not made.</p><p>What to Know: </p><ul><li><p>The breach initially occurred in May and there are no signs of a slow down in reported incidents. </p></li><li><p>With about 369 organizations confirmed to be affected by the breach, this is the most widespread file transfer hack ever recorded. Most of the victims are direct Progress Software customers or entities that purchased or used its file transfer service. </p></li><li><p>There are at least 73,000 entities that tech-solution company Exiger is &#8220;moderately confident&#8221; could inadvertently have exposed their data to theft in the hack due to relationships with third-party providers</p></li></ul><p>What to Do:</p><ul><li><p>Reconsider the avenue through which you transfer files for your business and double check for safety and security of data transfer</p></li><li><p>Users of Progress Software are especially vulnerable and should consult a cybersecurity expert to see if they are victims of a data leak</p></li><li><p>Consider software supply chain vulnerabilities that your business may face</p></li><li><p>Many of the victims don&#8217;t use MOVEit Transfer, but they send their data to third-party providers who do. Consider who your third-, fourth-, or fifth-party providers may be and understand how they handle the data you may be sending them.</p><p></p><p>For more information, check out <a href="https://www.scmagazine.com/analysis/the-tail-of-the-moveit-hack-may-be-longer-than-we-realize">this article</a>.</p><p></p></li></ul><div><hr></div><h2>3. &#8220;Fourth Amendment is Not For Sale Act&#8221; Works to Protect Data From Law Enforcement</h2><p>What Happened: </p><p>The House Judiciary Committee advanced the &#8220;Fourth Amendment is Not for Sale Act,&#8221; legislation that will prevent data brokers from selling consumer data to government agencies. </p><p>What to Know: </p><ul><li><p>Proponents of the legislation argue that purchases of data by government agencies breach the Fourth Amendment. Such purchases allow law enforcement to bypass the judicial system&#8217;s requirement for a warrant</p></li><li><p>Without this ruling, information like location and internet records can be purchased directly from data brokers. This allows law enforcement to evade the warrant process required to get the same information from phone companies directly</p></li><li><p>With bipartisan support, this ruling suggests both sides agree that law enforcement&#8217;s access to digital data needs to be regulated</p></li></ul><p>What to Do: </p><ul><li><p>Keep an eye out as this continues to move forward. Eventually, the bill might be included in a bigger surveillance reform package</p></li></ul><p>For more information, check out <a href="https://cyberscoop.com/legislation-data-brokers-congress-privacy-surveillance/">this article</a>.</p><div><hr></div><h2>4. Stalkerware App Made Millions by Forging Identities</h2><p>What Happened: </p><p>TheTruthSpy, a collection of Android &#8220;stalkerware&#8221; surveillance apps, has compromised hundreds of thousands of phones.</p><p>What to Know: </p><ul><li><p>Vietnam-based startup 1Byte is behind the development of TheTruthSpy. To go under the radar, 1Byte devised a network of fake identities with forged American passports to cash out customer payments into bank accounts that at the surface level looked like accounts owned by Americans but that 1Byte actually owned. That way, the fake sellers would take the fall if the operation was discovered by authorities. Through an intricate system of fake identities, 1Byte made millions.</p></li><li><p>TheTruthSpy&#8217;s database contains a record of close to 400,000 victims </p></li><li><p>1Byte faced constant difficulty in finding a way to process payments and eventually built its own checkout website called Affiligate which quickly began handling the majority of customer payments for TheTruthSpy and other cloned apps. It was designed to look and feel like a legitimate software reseller marketplace to outsiders while acting as a payment processor for 1Byte&#8217;s stalkerware products. However, Affiligate still needed to rely on an outside company for credit card payments and eventually use Stripe to process them at scale.</p></li><li><p>1Byte&#8217;s forgeries were impressive: passports, driver licenses, and proof of U.S. residency were forged;  email addresses were used to establish merchant accounts; burner phone numbers were acquired. A deeper dive shows that some of the home addresses 1Byte listed for its employees don&#8217;t exist; some SSNs belong to deceased persons; and forged government documents contain typos</p></li><li><p>1Byte hosted the phone data in Texas web hosting data centers</p></li><li><p>Stalkerware developers and companies are notoriously susceptible to hacks</p></li></ul><p>What to Do: </p><ul><li><p>TechCrunch created a free tool that allows anyone to check if their phone has been compromised: <a href="https://techcrunch.com/pages/thetruthspy-investigation/">https://techcrunch.com/pages/thetruthspy-investigation/</a>. Consider checking your devices</p><p></p><p>For more information, check out <a href="https://techcrunch.com/2023/07/20/thetruthspy-stalkerware-forged-passports-millions/">this article</a>.</p></li></ul><div><hr></div><h2>5. VirusTotal Apologizes for Human Error-Driven Data Exposure</h2><p>What Happened: </p><p>VirusTotal issued an apology for the recent customer data exposure incident. The incident was due to human error and not related to a cyberattack.</p><p>What to Know: </p><ul><li><p>An employee accidentally uploaded a file containing information about customers (including names of companies, associated VirusTotal group names, and email addresses of group admin) to the VirusTotal platform. It was removed within one hour of its posting.</p></li><li><p>The file was only accessible to partners and cybersecurity analysts who hold premium accounts. No anonymous user or malicious entity would have had access to the premium platform and thus would have been able to leak the data.</p></li></ul><p>Business Impact: </p><ul><li><p>Businesses should take this as a reminder to regularly schedule training sessions with employees in order to mitigate opportunities for human error driven data spills</p></li></ul><p>What to Do: </p><ul><li><p>Consider implementing internal processes and technical controls to improve security of customer data</p></li><li><p>Restrict employee access to customer data to those employee for whom it is essential to their role</p></li></ul><p>To view the apology, click <a href="https://blog.virustotal.com/2023/07/apology-and-update-on-recent-accidental.html">here</a>.</p><div><hr></div><h2>6. Typo Leads to Continuing Military Data Leak</h2><p>What Happened: </p><p>Millions of US military emails have been misdirected to Mali through a &#8220;typo leak.&#8221;</p><p>What to Know: </p><ul><li><p>The suffix to all US military email addresses is .MIL; however, it is commonly misspelled as the country identifier for Mali, .ML, and as a result emails are sent to that domain instead of the military domain. The problem was first identified about a decade ago.</p></li><li><p>Highly sensitive information like diplomatic documents, tax returns, passwords, and travel details of top officers have been breached. Additional email contents include things like medical data, crew lists for ships, photos of bases, naval inspection reports, bullying investigations, and financial records. None of the information was marked classified.</p></li><li><p>Mali&#8217;s government is closely allied with Russia</p><p></p><p>For more information, check out <a href="https://www.ft.com/content/ab62af67-ed2a-42d0-87eb-c762ac163cf0?accessToken=zwAGAYOMwqUwkdOrYq9n7SpC0NOH68dirBY88A.MEUCIQDWgckVxKJDZ020_DscOE91BQ-67M3ruhPQJPP4sXVTOAIgHKMDsb4SQGQyFGirgImgxTZOjEG65HoLzBqFyxr78g0&amp;sharetype=gift&amp;token=41d620fb-0403-4fdb-969f-f82472fb787a">this article</a>.</p><div><hr></div></li></ul><h2>7. Dutch Patient Data at Risk for Data Leakage</h2><p>What Happened: </p><p>Dutch family doctor medical records are stored on servers owned by a commercial software company without some patients&#8217; knowledge.</p><p>What to Know: </p><ul><li><p>Canadian-owned software company Calculus allows doctors to share encrypted patient information with other doctors in the region which can help facilitate treatment for certain patients. The problem is that some doctors are claiming that all patient files are being copied, not just those necessary</p></li><li><p>There is a risk of a massive data leak because Calculus is storing too much data in one place</p></li></ul><div><hr></div><h2>8. Amazon Van Surveillance Camera Footage Ending Up On Reddit</h2><p>What Happened: </p><p>Anonymous reddit users have been posting video footage from in-van cameras that Amazon uses to monitor drivers to the subreddit r/AmazonDSPDrivers.</p><p>What to Know: </p><ul><li><p>Amazon delivery service partners (DSP) are small-business contractors responsible for Amazon&#8217;s door-to-door deliveries. They select routes, dispatch drivers, and monitor their actions on the road with cameras</p></li><li><p>Amazon drivers have to sign a &#8220;biometric consent&#8221; form that allows them to be monitored while on the job</p></li><li><p>It isn&#8217;t clear who exactly is posting these videos or how they have access, but they seem to be DSP employees who have access to the camera stream</p></li><li><p>The cameras Amazon use are AI-enabled to monitor drivers&#8217; speed, location, and actions on the road</p></li></ul><p>Business Impact: </p><p>Employees are becoming ever-more concerned with data breaches at the hands of their parent companies and may become less willing to work for companies that violate their privacy. </p><p>What to Do: </p><ul><li><p>If you&#8217;re a business owner, make sure your employees are aware of their privacy rights and of company data protection policies. </p></li><li><p>To prevent similar leakages to DSP, consider scheduling regular training sessions with employees about the importance of protected company data</p></li></ul><p>For more information, check out <a href="https://www.vice.com/en/article/v7b3gj/amazon-told-drivers-not-to-worry-about-in-van-surveillance-cameras-now-footage-is-leaking-online">this article</a>.</p><div><hr></div><h2>9. IT Firm JumpCloud Experiences Security Breach by Unnamed Nation-State</h2><p>What Happened: </p><p>Cloud-based IT management service JumpCloud experienced a security breach beginning on June 22nd and discovered on June 27th.</p><p>What to Know: </p><ul><li><p>The breach was done by hackers working for a nation-state and started as a spear-phishing campaign</p></li><li><p>A spear-phishing campaign aims malicious emails at specific individuals or organizations in order to steal sensitive information or infect a device with malware</p></li><li><p>JumpCloud implemented its incidence response plan, rotated account credentials, and rebuilt systems</p></li><li><p>The attack was targeted and limited to specific customers</p></li></ul><p>What to Do: </p><ul><li><p>Have an incident response plan in place in the event of a breach and consider working with an incident response partner to analyze systems and logs for suspicious activity</p></li><li><p>Post-investigation, JumpCloud created a list of malicious IP addresses and hashes to block and avoid at all costs in order to add protection to your Endpoint Detection and Response and perimeter security solutions. If you utilize these workflows, access the list and further secure your business environment <a href="https://jumpcloud.com/support/july-2023-iocs">here</a>.</p></li><li><p>Consider increased training sessions for employees centered on phishing attacks</p></li></ul><p>To learn more, check out <a href="https://arstechnica.com/security/2023/07/jumpcloud-says-nation-state-hacker-breach-targeted-some-of-its-customers/">this article</a>. </p><div><hr></div><h2>10. Biden-Harris Administration Proposes &#8220;U.S. Cyber Trust Mark&#8220; </h2><p>What Happened:</p><p>The U.S. Cyber Trust Mark program will  raise the bar for cybersecurity across common devices and help Americans more easily choose smart devices that are safer and less vulnerable to cyberattacks.</p><p>What to Know: </p><ul><li><p>Under the new program consumers would see a new &#8220;U.S. Cyber Trust Mark&#8221; applied to products that meet established cybersecurity criteria. Criteria include things like requirements for unique and strong default passwords, data protection, software updates, and incident detection capabilities</p></li><li><p>The program is voluntary and has received support from companies like Amazon, Best Buy, Google, LG Electronics U.S.A., Logitech, and Samsung</p></li></ul><p>Business Impact: </p><ul><li><p>If passed, this will likely increase the standard to which smart technology is held and will make it easier for consumers to compare and rank product-security across brands before purchase. In response, it&#8217;s likely that businesses supplying these products will need to increase security process transparency and maintain high levels of security in order to meet what may become an industry norm of receiving this U.S. Cyber Trust Mark on their products</p></li><li><p>This would make it much easier for consumers to seek and feel confident about products that meet at least a baseline level of security </p></li><li><p>This would be beneficial for businesses selling smart devices as it helps customers to differentiate between trustworthy products on the market</p></li></ul><p>What to Do: </p><ul><li><p> As a next step the FCC is expected to seek public comment, Keep up to date on the program as opinions are shared and as development continues</p></li></ul><p>For more information, check out this <a href="https://www.whitehouse.gov/briefing-room/statements-releases/2023/07/18/biden-harris-administration-announces-cybersecurity-labeling-program-for-smart-devices-to-protect-american-consumers/">White House briefing</a>.</p>]]></content:encoded></item><item><title><![CDATA[May 2023 Edition]]></title><description><![CDATA[Welcome to the May 2023 Edition of the InfoSec Board Brief]]></description><link>https://infosecbb.com/p/may-2023-edition</link><guid isPermaLink="false">https://infosecbb.com/p/may-2023-edition</guid><dc:creator><![CDATA[Amir Tarighat]]></dc:creator><pubDate>Mon, 22 May 2023 12:30:56 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a8bd3cd-9c0e-447c-913e-eea723c8cc52_256x256.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Table of Contents</h3><ol><li><p><strong>Microsoft Forces Changes to Web Links in Outlook and Teams</strong></p></li><li><p><strong>Federal Trade Commission Accuses Meta of Data Privacy Settlement Breach</strong></p></li><li><p><strong>Numerous Public Salesforce Sites Exposing Private Information</strong></p></li><li><p><strong>DHS Pursues Legislation to Codify the Cyber Safety Review Board</strong></p></li><li><p><strong>Home-Care Provider That Violated Breach Notification Rules Owes Millions in Settlement</strong></p></li><li><p><strong>Videos, Photos, and Employee Interviews Reveal Security Vulnerabilities at TikTok Data Centers in Virginia&nbsp;</strong></p></li><li><p><strong>Lead Singer of Smashing Pumpkins Paid Ransom to Hacker to Prevent Leak of New Album</strong></p></li><li><p><strong>Hacked Facebook Pages are Impersonating Major Tech Companies, Purchasing Ads and Distributing Suspicious Download Links</strong></p></li><li><p><strong>FCC Proposes to Integrate Satellite and Cellular Communications</strong></p></li><li><p><strong>U.S. Emerging Technology Standards</strong></p></li><li><p><strong>Merck&#8217;s Victory Serves As A Major Win For Cyber Security Insurance Policy Holders</strong></p><p></p></li></ol><div><hr></div><h4>1. Microsoft Forces Changes to Web Links Work in Outlook and Teams</h4><p>What Happened:</p><p>Microsoft has announced that a new change will coerce Outlook and Teams users to use its Edge browser for all web links. When a link is clicked, default browser choices will be ignored, and the user will be forced into Edge.</p><p>What To Know:</p><ul><li><p>The change will take effect on June 15th, and will affect both Windows and Mac users.</p></li><li><p>Microsoft is hoping that this will make Edge the go-to browser.</p></li><li><p>This will likely cause issues for IT teams and employees who may be confused about why Edge is opening links.</p></li><li><p>Some websites may not be optimized for Edge and, therefore, not load properly.</p></li></ul><p>What to Do:</p><p>Make sure your IT &amp; Security teams are aware of this change and plan for any user support issues that might come up.</p><p>Business Impact:</p><p>This new change is part of Microsoft&#8217;s larger plan to increase the use of Edge across its services. It is being marketed as a larger effort to increase the security of its users. They&#8217;re trying to position the Edge browser as being designed to be more secure than other browsers.</p><p>For more information, check out <a href="https://www.theverge.com/2023/5/3/23709297/microsoft-edge-force-outlook-teams-web-links-open?fbclid=IwAR0Pac5BItHhLBklRzsO_OHMFU_YumlI2_nm-wKyWuH9bQDtd5RWRKVEuus">this article.&nbsp;</a></p><div><hr></div><h4>2. Federal Trade Commission Accuses Meta of Data Privacy Settlement Breach</h4><p>What&#8217;s Happening:&nbsp;</p><ul><li><p>The Federal Trade Commission is accusing Meta of failing to comply with its $5 billion data privacy settlement from 2020. The main concern is that Facebook is giving app developers access to private user information, especially that of users under 18.</p></li></ul><p>What to Know:</p><ul><li><p>Meta is being accused of:</p></li></ul><ol><li><p>Misleading parents about their ability to control who their children communicate with on the Facebook Messenger app</p></li><li><p>Misrepresenting the access it provided to app developers in violation of two previous FTC orders</p></li></ol><ul><li><p>The FTC is looking to stop the launch of any new Meta projects without confirmation that the privacy program is in compliance&nbsp;</p></li><li><p>The FTC is proposing a ban on Meta profiting from the data it collects from users under 18 and wants to add additional protective measures to facial recognition technology.</p></li></ul><p>What Happens Next:&nbsp;</p><ul><li><p>Meta has 30 days to respond to allegations&nbsp;</p></li><li><p>If Meta acts in favor of the FTC, Meta would only be able to collect data for security purposes and would be prohibited from profiting off of the information even after users turn 18.</p></li></ul><p>Business Impact:&nbsp;</p><ul><li><p>Since the FTC is looking to halt the launch of any new products or services by Meta, this could disrupt Meta&#8217;s business operations and could thus have implications for businesses associated with Meta and its platforms.&nbsp;</p></li><li><p>Serves as a reminder for businesses to prioritize user privacy and implement robust privacy programs with the knowledge that failure to do so can result in significant penalties. Businesses operating in the digital space should monitor developments and ensure compliance with evolving privacy regulations.</p></li></ul><p>For more information, check out<a href="https://www.scmagazine.com/news/privacy/ftc-facebook-broke-terms-5b-data-privacy-settlement"> this</a> article.</p><p></p><div><hr></div><h4>3. <strong>Numerous Public Salesforce Sites Exposing Private Information</strong></h4><p>What&#8217;s Happening:&nbsp;</p><p>A huge number of organizations have unknowingly been leaking private and sensitive information from their Salesforce Community websites due to a misconfiguration within the Salesforce Community that allows an unauthenticated user to access records that should only be available after logging in.</p><p>What to Know:&nbsp;</p><ul><li><p>The mistake occurs when Salesforce administrators grant guest user access to internal resources.</p></li><li><p>Sites granted guest access to sensitive data like names, Social Security numbers, addresses, phone numbers, and bank account numbers.</p></li><li><p>The misconfigurations were often the result of rapid site deployment during the pandemic, which bypassed normal security review processes.</p></li></ul><p>What To Do:</p><ul><li><p>If your business utilizes a Salesforce Community website, make it a priority to identify if any of the pages are misconfigured to make sure you&#8217;re not leaking private information.</p></li><li><p>If your business utilizes a website created rapidly in response to the pandemic, take the time now to double-check safety protocols and conduct a formal security review process.</p></li></ul><p>For more information, check out <a href="https://krebsonsecurity.com/2023/04/many-public-salesforce-sites-are-leaking-private-data/">this article.</a>&nbsp;</p><div><hr></div><h4><strong>4. DHS Pursues Legislation to Codify the Cyber Safety Review Board</strong></h4><p>What&#8217;s Happening:&nbsp;</p><ul><li><p>The Department of Homeland Security is collaborating with Congress and the White House to develop legislation that would establish the Cyber Safety Review Board as a formal entity with authorized funding and subpoena power.&nbsp;</p></li><li><p>The CSRB would be responsible for investigating significant cybersecurity incidents and making recommendations.</p></li></ul><p>What to Know:&nbsp;</p><ul><li><p>If the legislative proposal is approved, it would give the foundation for more resources and subpoena power.</p></li></ul><ul><li><p>If passed, the CSRB would become a formal entity for examining significant cybersecurity incidents and grant the board subpoena power. Legal framework and additional resources would be added to the CSRB, enhancing its ability to continue working towards cybersecurity at a large scale.&nbsp;</p></li></ul><p>Impact on Businesses If Legislation is Passed:</p><ul><li><p>Business owners may face increased accountability for their cybersecurity practices and incident responses as the CSRB evaluates major cybersecurity incidents and makes recommendations to remediate them.</p></li><li><p>It may introduce new compliance requirements for businesses.</p></li><li><p>Since the CSRB&#8217;s work involves gathering information about cybersecurity incidents there may be increased information sharing between businesses and the board. Sensitive information related to cybersecurity incidents may be requested to facilitate investigations.&nbsp;</p></li></ul><p>What to do:&nbsp;</p><ul><li><p>Executives should stay current on the changing status of the CSRB. If legislation is passed, companies may need to stay updated with the board&#8217;s findings and recommendations to align their security measures with evolving standards</p></li></ul><p>For more information, check out<a href="https://therecord.media/csrb-legislation-congress-white-house-rob-silvers-rsac"> this article.&nbsp;</a></p><div><hr></div><h4><strong>5. Home-Care Provider That Violated Breach Notification Rules Owes Millions in Settlement</strong></h4><p>What&#8217;s Happening:&nbsp;</p><ul><li><p>Home-care service provider SuperCare reached a multi-million dollar settlement with over 318,000 patients impacted by a 2021 systems hack.</p></li></ul><p>What to Know:</p><ul><li><p>Hackers accessed personal data for a large group of patients and even accessed social security and driver&#8217;s license numbers for others.</p></li><li><p>The breach notice wasn&#8217;t issued until eight months following the incident.</p></li><li><p>SuperCare was claimed to have an inadequate security program that was responsible for the attack and that violated the Federal Trade Commission and The Health Insurance Portability and Accountability Act regulations in the process.</p></li></ul><p>How to Prevent an Attack Like This:&nbsp;</p><ul><li><p>To prevent a similar attack, businesses can conduct penetration testing and risk assessments to adjust and strengthen their existing cyber security protocols.</p></li><li><p>Update soft authentication for a multi-factor authentication tool&nbsp;</p></li><li><p>Implement a cloud-based identity and access management system</p></li><li><p>Update end-user cybersecurity awareness training</p></li></ul><p>Business Impact:&nbsp;</p><ul><li><p>Executives responsible for confidential client information should make enhancements to cybersecurity so they don&#8217;t find themselves with an inadequate security program like SuperCare.</p></li></ul><p>For more information, check out <a href="https://www.scmagazine.com/news/breach/2-25m-settlement-reached-supercare-breach-exposed-318k-patients">this</a> article.</p><div><hr></div><h4><strong>6. Videos, Photos, and Employee Interviews Reveal Security Vulnerabilities at TikTok Data Centers in Virginia&nbsp;</strong></h4><p>What&#8217;s Happening:</p><ul><li><p>As a result of TikTok trying to quickly grow data storage capacity, corners have been cut along the way.</p></li><li><p>Evidence suggests that TikTok data operations are still intertwined with ByteDance&#8217;s business in China.</p></li></ul><p>What to Know:&nbsp;</p><ul><li><p>Security vulnerabilities include unmarked flash drives plugged into servers and unescorted visitors to boxes of hard drives left unattended in hallways</p></li><li><p>TikTok has proposed a project in which it would remove private U.S. data from the Virginia servers and isolate them in Texas-based data centers. Additionally, TikTok plans to delete private posts, DMs, and other U.S. user data from the servers before the end of 2023.</p></li></ul><p>What to do:&nbsp;</p><ul><li><p>Don&#8217;t allow security to take a backseat within your organization.</p></li><li><p>If your business utilizes a data center, conduct research about the efficacy of the center and ask direct questions to determine the security vulnerabilities that may be present.</p></li></ul><p>Business Takeaway:&nbsp;</p><ul><li><p>Executives should ensure that security protocols are up-to-date and that employees are undergoing the training necessary to prevent data breaches and vulnerabilities being seen at TikTok.</p></li></ul><p>For more information, check ou<a href="https://www.forbes.com/sites/emilybaker-white/2023/04/21/security-failures-tiktok-virginia-data-centers-unescorted-visitors-flash-drives/?sh=48c888e0eb6e">t this article.</a></p><div><hr></div><h4><strong>7. Lead Singer of Smashing Pumpkins Paid Ransom to Hacker to Prevent Leak of New Album</strong></h4><p>What&#8217;s Happening:</p><ul><li><p>Billy Corgan, the lead singer of the band Smashing Pumpkins, paid ransom to a hacker to prevent nine new songs from being leaked.</p></li></ul><p>What to Know:&nbsp;</p><ul><li><p>The FBI got involved in helping trace the hacker.</p></li><li><p>The money came from Corgan&#8217;s personal finances.</p></li><li><p>Corgan claims that the hacker has other leaks in their possession from other notable musicians.</p></li></ul><p>What to Do:</p><ul><li><p>Re-evaluate safety protocols for online databases and implement heightened security to protect data and online files.</p></li><li><p>Do not transfer files through mediums that can be easily breached: choose platforms or tools that offer end-to-end encryption, access controls, and user authentications to ensure file transmission.</p></li><li><p>Use encryption methods to protect files during transmission to ensure data will be unreadable to unauthorized individuals.</p></li><li><p>Utilize a secure file transfer protocol to employ encryption and provide stronger authentication mechanisms.</p></li><li><p>Enforce strong password policies for file transfers.</p></li><li><p>Implement data loss prevention solutions to detect and prevent unauthorized transfer of sensitive data.</p></li></ul><p>Business Impact:</p><ul><li><p>Businesses for whom transferring data and files with third parties is inherent to operation should re-evaluate modes of transmission and storage and stay up to date on the newest cybersecurity measures.</p></li></ul><p>For more information, check out <a href="https://consequence.net/2023/05/billy-corgan-hacker-ransom/">this article.&nbsp;</a></p><div><hr></div><h4><strong>8. Hacked Facebook Pages are Impersonating Major Tech Companies, Purchasing Ads and Distributing Suspicious Download Links</strong></h4><p>What&#8217;s Happening:&nbsp;</p><ul><li><p>Hacked and verified Facebook pages are posing as Meta, among other major tech companies, and using the Meta platform to purchase ads and spread harmful download links.</p></li><li><p>These hacked pages exploit the trust associated with verified accounts to deceive advertisers.</p></li></ul><p>What to Know:&nbsp;</p><ul><li><p>Threats are mostly malware-related</p></li></ul><p>What to do:&nbsp;</p><ul><li><p>Executives should remind employees not to use personal social media accounts on company hardware in an effort to reduce opportunities for this type of attack.</p></li><li><p>For businesses utilizing Facebook ads, be wary of verified accounts impersonating Meta that ask you to download new tools relating to their ad services.</p></li><li><p>Check the history of name changes for verified accounts before clicking links from what appears to be a verified account.</p></li></ul><p>Business Impact:&nbsp;</p><ul><li><p>Businesses that use Facebook and Meta as an advertising platform should realize people are becoming increasingly wary of the authenticity and legitimacy of verified accounts and ads on the platform.&nbsp;</p></li><li><p>Businesses that fall victim to these fraudulent ads may incur financial losses that waste advertising budgets.</p></li><li><p>Fraudulent ads may not reach the intended target audience and will undermine the effectiveness of advertising campaigns.</p></li><li><p>Businesses may need to reevaluate security measures regarding advertising and explore other avenues for future advertisements other than social media.</p></li></ul><p>For more information, check out<a href="https://techcrunch.com/2023/05/05/hacked-verified-facebook-pages-impersonating-meta-are-buying-ads-from-meta/"> this article.</a></p><div><hr></div><h4><strong>9. FCC Proposes to Integrate Satellite and Cellular Communications</strong></h4><p>What&#8217;s Happening:</p><ul><li><p>The FCC has proposed to integrate satellite and cellular communications in such a way that would allow smartphones to communicate through either a cell tower or a satellite</p></li><li><p>Recent technological innovations have finally made it cost-effective to merge these technologies</p></li><li><p>About a dozen companies have announced interest in getting involved</p></li></ul><p>What to Know:</p><ul><li><p>Up to this point, cell towers and satellites have been in separate regulatory environments</p></li><li><p>People would be able to pay extra to access &#8220;satcom&#8221; to use when no cell service is available</p></li><li><p>This merging could lead to eventual global access to seamless communication</p></li><li><p>Sat-coms have a history of being internationally coordinated, and new regulations and international discussions would be needed to determine regulations for this new technology</p></li></ul><p>What to do:&nbsp;</p><ul><li><p>Businesses should stay updated on developments and monitor industry news</p></li><li><p>Evaluate specific business needs and determine how satellite and cellular integration can address challenges or open up new opportunities</p></li><li><p>Consider initiating pilot projects or proof-of-concept trials to test this integration in a controlled environment</p></li></ul><p>Business Impact:&nbsp;</p><ul><li><p>This has the potential to change how people engage in every single online activity&nbsp;</p></li><li><p>Partnerships between satellite operators, smartphone manufacturers, cellcom carriers, and new entrepreneurs emerging in this space will become much more common, so businesses in this environment should begin to consider how the introduction of this new technology could impact operations&nbsp;</p></li><li><p>With the potential to provide businesses with enhanced connectivity options, businesses could greatly benefit from improved connectivity in remote or underserved areas. Further, businesses could extend their reach on a global scale&nbsp;</p></li><li><p>Businesses can leverage merged networks to enhance connectivity, improve data collection and enable real-time monitoring and control</p></li><li><p>In the event of natural disasters or network outages, satellite connectivity can serve as an alternative option ensuring uninterrupted business communications</p></li></ul><p>For more information, check out <a href="https://thehill.com/opinion/technology/3992774-a-satellite-cellular-merger-could-be-the-next-revolutionary-tech-innovation/">this article.&nbsp;</a></p><div><hr></div><h4><strong>10. U.S. Emerging Technology Standards</strong></h4><p>What&#8217;s Happening:&nbsp;</p><ul><li><p>The U.S. government released a standards strategy for critical and emerging technology (CET) spaces that will strengthen national economic and national security</p></li></ul><p>What to Know:</p><ul><li><p>The U.S. wants to ensure that CET are developed and deployed in ways that benefit the U.S. while influencing international standards</p></li><li><p>Competitors are seeking to influence international standards development to advance military-industrial policies and autocratic objectives by tilting what should be a neutral playing field to their own advantage</p></li></ul><p>What to Do:</p><ul><li><p>Stay up to date with standards relating to quantum information technologies in order to protect your business from potential cybersecurity threats relating to quantum technologies</p></li><li><p>Stay up to date with national cybersecurity and privacy standards as well&nbsp;</p></li></ul><p>Business Impact:&nbsp;</p><ul><li><p>Part of the strategy is to educate and empower the domestic workforce: taking part in engagement opportunities can help you stay up to date on CET standards that can help you keep data protected</p></li><li><p>Businesses that operate globally could potentially encounter challenges due to different standards across countries</p></li></ul><p>To access the full strategy, <a href="https://www.whitehouse.gov/wp-content/uploads/2023/05/US-Gov-National-Standards-Strategy-2023.pdf">see here.&nbsp;</a></p><div><hr></div><h4><strong>11. Merck&#8217;s Victory Serves As A Major Win For Cyber Security Insurance Policy Holders</strong></h4><p>What&#8217;s Happening:</p><p>A New Jersey appellate court has upheld a ruling in favor of Merck, a pharmaceutical company, in a legal battle with its insurance carrier, Ace American Insurance. The court found that Ace American Insurance must help cover the losses suffered by Merck during the 2017 global Notpetya cyberattack. The court determined that the cyberattack was not &#8220;hostile or warlike&#8221; as required by the exclusion clauses of Merck&#8217;s insurance policy, and therefore, coverage could not be excluded.</p><p>What to know:&nbsp;</p><ul><li><p>Merck suffered significant losses during the NotPetya cyberattack, including production disruptions, manufacturing outages, third-party cyber firm fees, and the cost of replacing impacted systems. More than 40,000 machines in the network were infected, and losses to production disruptions totaled an estimated $1.4 billion.&nbsp;</p></li><li><p>The insurance policy held by Merck had an exclusion clause for &#8220;Acts of War,&#8221; but the company argued that the exclusion did not apply as a nation-state attack did not cause the cyberattack.</p></li></ul><p>What to do:&nbsp;</p><ul><li><p>Policyholders can take note of this case as a win for seeking insurance coverage for cyberattack-related losses.&nbsp;</p></li><li><p>Business owners should review existing insurance policies and fully understand the scope and interpretation of exclusion clauses.&nbsp;</p></li></ul><p>Business Impact:</p><ul><li><p>The court&#8217;s decision sets a precedent and provides clarity for policyholders seeking coverage for losses resulting from cyberattacks.&nbsp;</p></li><li><p>Reinforces the need for insurance companies to interpret exclusion clauses and resolve ambiguities</p></li><li><p>Serves as a reminder for businesses to review insurance policies and discuss cyber coverage&nbsp;</p></li></ul><p>For more information, check out <a href="https://www.scmagazine.com/news/business-continuity/merck-insurer-ordered-to-pay-1-5b-in-notpetya-attack-court-rules">this article.&nbsp;</a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://infosecbb.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The InfoSec Board Brief! Subscribe for free to receive new posts.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[The InfoSec Board Brief Is Coming Soon...]]></title><description><![CDATA[Sign Up Now To Lock In A Free Subscription.]]></description><link>https://infosecbb.com/p/coming-soon</link><guid isPermaLink="false">https://infosecbb.com/p/coming-soon</guid><dc:creator><![CDATA[Amir Tarighat]]></dc:creator><pubDate>Thu, 27 Apr 2023 00:01:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a8bd3cd-9c0e-447c-913e-eea723c8cc52_256x256.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I created the InfoSecBB to provide executives and tech leaders with a concise, straightforward summary of vital current cybersecurity news, policies, and analysis.</p><p>The cybersecurity media often goes too broad or dives too deep into a topic to be useful for business leaders. My goal is for this monthly briefing to become a reliable companion as you navigate corporate information security.  </p><p>Subscribe now to lock in a free subscription. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://infosecbb.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://infosecbb.com/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item></channel></rss>