Newsletter #20 - July 30, 2024

July 2024

As we move through July 2024, the cybersecurity landscape continues to evolve with new challenges and opportunities.

This month has been particularly noteworthy for several emerging trends and critical issues that have captured the industry's attention.

From the rise in sophisticated ransomware attacks to vulnerabilities in supply chains and the persistent threat of unmanaged devices, the cybersecurity field is buzzing with activity. 🐝 

Here’s a look at some of the most significant topics making waves in the cybersecurity community this month.

🧑‍🏭 Jobs & Internships

  1. CyberMSI offers a paid internship program focused on developing Microsoft cloud cybersecurity skills, providing hands-on experience, mentorship, and potential full-time employment upon successful completion.

  2. GoDaddy is hiring a remote Senior Security Engineer to tackle security challenges, perform security assessments, and integrate SAST tools with CI/CD pipelines, with a focus on diversity and inclusion.

  3. Tesla is offering in-person internships for security-minded students to perform penetration tests, risk assessments, and audits with competitive pay and comprehensive benefits.

  4. Sony Pictures Entertainment offers paid Fall Internships from September to December for students interested in information security, focusing on incident response, threat intelligence, and risk management.

  5. S&P Global's Application Security team seeks an intern to help secure applications by identifying vulnerabilities and integrating security practices into development. US candidates must have indefinite work rights.

🔏 Last Week in Cyber Security

Join our Discord to get more news in the Security Domain. 🛡️

CrowdStrike Bug Causes Widespread System Crashes
A bug in CrowdStrike's Falcon update allowed faulty data to bypass checks, crashing over 8.5 million Windows systems. The company admits inadequate testing, promising new measures like staggered deployments and local testing to prevent future issues. The incident highlights vulnerabilities in CrowdStrike’s update process.

Covert Data Exfiltration via JSON in APIs
The article explores how attackers can exploit JSON data formats in APIs to covertly exfiltrate sensitive information. It details various techniques for this type of data breach and offers strategies to prevent such vulnerabilities.

US DOJ Indicts North Korean Hacker for Cyber Attacks
The US Department of Justice has indicted a North Korean hacker for a series of cyberattacks, including ransomware and cryptocurrency theft. The indictment reveals extensive details about the hacker’s activities and the impact on victims.

July 2024 Cybersecurity Update: Emerging Threats and Trends

  • Ransomware and Data Theft: Ransomware attacks continue to be a major concern, with many organizations facing extortion instead of traditional data encryption. Over 84% global growth in ransomware attacks has been reported, and over 54% of data breaches are linked to ransomware, particularly targeting sectors like manufacturing, healthcare, and finance​ (eSecurity Planet)​​.

  • Zero-Day Vulnerabilities: The number of zero-day attacks has increased significantly, with over 97 reported this year. Attackers are leveraging these vulnerabilities to bypass defenses, indicating a rise in the sophistication of cyber threats​ (Pluralsight)​.

  • Multi-Factor Authentication (MFA) Bypass: Cybercriminals are finding ways to bypass MFA, taking advantage of "push notification fatigue" where users approve logins without scrutiny. This is compounded by social engineering tactics that exploit help desks​ (Pluralsight)​​ (eSecurity Planet)​.

  • Supply Chain Vulnerabilities: Supply chain attacks are prevalent, with reports highlighting critical risks in software applications. Common vulnerabilities include command injection, data leaks in log files, and cross-site scripting. Organizations are dealing with an average of nine high-risk issues in their supply chains​ (LinkedIn)​.

  • Unmanaged Devices: A significant portion of cyber attacks originate from unmanaged and unprotected devices, such as personal gadgets and outdated systems. These devices often lack proper security measures, making them easy targets for attackers​ (eSecurity Planet)​​.

  • Recent High-Profile Breaches:

    • Advance Auto Parts experienced a data breach affecting over 2.3 million people, exposing sensitive personal information​ (CyberSecurity Dive)​.

    • CrowdStrike's Falcon Sensor malfunctioned, disrupting critical services, though it was later confirmed not to be a cyberattack​ (The Guardian)​.

    • Healthcare Sector Attacks: The healthcare industry remains a primary target, with cybercriminals exploiting vulnerabilities in medical systems and infrastructure​ (TechRadar)​​.

In conclusion, the current cybersecurity landscape presents both challenges and opportunities for organizations striving to protect their digital assets. With the increasing sophistication of ransomware attacks, the exploitation of zero-day vulnerabilities, and the ever-present threat of unmanaged devices, it's clear that robust cybersecurity measures are more critical than ever.

Organizations must continue to enhance their defenses by adopting advanced threat detection technologies and fostering a culture of cybersecurity awareness among employees.

💡 Did you know? 💡 

Cybersecurity tools and practices that were state-of-the-art just a few years ago can quickly become obsolete. For example, many companies still rely on traditional antivirus software, but modern threats often bypass these defenses. Staying updated with the latest threat intelligence and security practices is crucial for maintaining robust protection against evolving cyber threats.

Stay ahead of the curve—subscribe to our newsletter for the latest in cybersecurity trends and best practices!

As always, Staying informed and proactive is key to navigating these threats. By keeping up with the latest trends and adapting to new challenges, we can build a more secure digital environment for everyone. ⚔️🌐 

Thank you for joining us in this month's exploration of cybersecurity issues. We look forward to bringing you more insights and updates in next week's issue. Until then, stay vigilant and safe! 👋 

Reply

or to participate.