Good morning!
Over the past week, it has been quite a whirlwind to say the least. For one, I was part of a Podcast by Security Studio CvCISO this past Friday (set to release this coming Friday) and that led to an interesting conversation around the use of terminology. Cybersecurity vs Information Security was one of the topics and the differences between those two words. At the end of the day people are using them quite interchangeably and adding to more of the confusion. For one, Cybersecurity falls underneath Information Security, yet the industry continues to call them one in the same. This is not something to get worked up about and honestly, I do not see it changing (as I had this conversation with someone 5 years ago, and yet we are still having it).
Another enjoyable conversation that occurred in the past week was with a friend about the state of cybersecurity (see, I just did it) and what they should be doing to continue to increase their controls and awareness. One of the biggest areas is education of users, whether it's about how to spot malicious intent emails/texts/instant messages, to why it's important to use longer passwords over simple to remember passwords (I am not referring to making them overly complicated - you can use simplicity with length), and lastly making sure users understand the importance of Multifactor Authentication being enabled and why. Yet, if we want to focus on areas we CAN control (well, because people are not a variable that can be controlled) would be implementing tools to help educate them on creating proper passwords effectively.
Are these measures 100% stopping threats? By no means, but they do implement a solid deterrent.
So, with that, let’s dive into this week’s cybersecurity news update...
Advance Auto Parts reveals damage from Snowflake breach
This appears to be yet another company being affected by the Snowflake incident, which has affected 2.3 million people
Link (1): https://www.cybersecuritydive.com/news/advance-auto-parts-snowflake-data-breach/721353/
The personal security implications of the AT&T breach, and the laundering of the ransom paid
AT&T revealed threat actors have gained access to their Snowflake instance to obtain records of customer call and text interactions from May 2022 through Oct 2022
Link (2): https://therecord.media/att-ransom-laundered-mixers-research
Patch or Peril: A Veeam Vulnerability Incident
CVE-2023-27532 was made public in March of 2023, and has already had patches released by Veeam
Link (1): https://www.group-ib.com/blog/estate-ransomware/
Palo Alto patches critical vulnerability within Expedition Migration Tool
The Expedition Migration Tool is used to take configurations from other Firewall config’s and convert them into Palo’s config, to help speed up migration processes
Link (1): https://thehackernews.com/2024/07/palo-alto-networks-patches-critical.html?m=1
Rite Aid announces data breach following June cyberattack and updates
Interesting finding, the “Limited” cyber incident reported by Rite Aid has not exposed more than 2 million records of sensitive information
Link (1): https://therecord.media/rite-aid-data-breach-2-million-people
CDK Global paid ransom
To add more color to the CDK Global incident, it has been reported that they paid $25 million ransom in bitcoin
Link (1): https://www.theregister.com/2024/07/12/cdk_ransom_payout/
Indiana county files declaration of emergency after ransomware attack (Clay County)
During a cyber incident this month, Clay County Indiana, filed a local disaster declaration
Link (1): https://therecord.media/indiana-county-disaster-declaration-ransomware-attack-dallas
Until next week, it’s Brent Forrest signing off. Be cyber safe my friends!
About the Author: Brent Forrest is a Field CISO with Flair Data Systems. In this role, Brents acts as an advisor to customers that span across different verticals providing guidance to include; developing strategies to reduce risk with existing or modern technology while enabling the business. With over 20 years of experience in the IT industry, Brent has been able to be a part of multiple groups within the IT field spanning from Telecom, Network, Wireless, Infrastructure, and eventually finding his passion within Security. Roughly 20 years of that time was spent within the Oil and Gas industry working across multiple teams and leading initiatives. Specifically with EnLink Midstream, he spent most of his time building resilience and developing the cybersecurity program.
Brent has been with Flair Data for 3 years and is CISSP, C|CISO, CvCISO, & Sec+ certified. In his free time, he likes to spend time with family, working out, or staying up with personal development. He lives in Dallas, Texas with his wife and children.
About: Flair Data Systems is a strategically priced IT solutions company, serving clients in the U.S., with offices in Texas and Colorado. Now a technology industry leader, we began in 1916 as the Porter Burgess Company. Flair Data Systems is your Trusted Advisor for: Collaboration, Unified Communications, Networking, Cloud, Infrastructure, Data Analytics, and Cybersecurity, serving the U.S. We provide trusted cybersecurity services in Dallas, TX. and the DFW Metroplex.
Check out our last post: Flair Data Systems Cybersecurity News Update 7-10-2024