Happy to be with you again in this The Secret CISO newsletter! As we prepare to dive into another week, we're bringing you a special issue that covers the highlights from the weekend as well as the key insights and developments for Monday. In this edition, we'll explore the significant data breaches that have shaken the financial sector, highlighting the critical importance of cybersecurity vigilance. We'll also delve into the latest research findings that are shaping the landscape of cybersecurity, offering valuable insights into innovative defense strategies. Additionally, we'll spotlight some of the top job opportunities for cybersecurity professionals, showcasing the demand for expertise in this ever-evolving field. Join us as we navigate the digital frontiers, uncovering the challenges and opportunities that lie ahead in the world of cybersecurity.
1. Data Breaches
33M French Citizens Impacted in Country's Largest-Ever Breach
The CNIL is investigating a massive breach at two payment processors affecting 33 million French citizens, marking the country's largest data breach. The breach has raised significant concerns about the security of financial data in France and the effectiveness of current cybersecurity measures.
US Government Accounting Office Notified by IT Contractor CGI Federal of Data Breach
The GAO announced a breach affecting approximately 6,000 records due to an incident with IT contractor CGI Federal. This breach highlights the vulnerabilities even within government institutions and raises questions about the safeguarding of sensitive information.
Bank of America Notifies Consumers of Data Breach Stemming from Cyberattack at Infosys
A cyberattack on Infosys led to a data breach affecting Bank of America customers. Filed on February 6, 2024, this incident underscores the interconnected risks in the financial sector and the cascading effects of cybersecurity failures in vendor networks.
State Street Files Notice of Data Breach Affecting Consumers' SSNs and Financial Info
State Street disclosed a data breach on February 5, 2024, that compromised Social Security numbers and financial information of consumers. This breach exemplifies the critical nature of securing financial institutions and the direct impact on consumer privacy and financial security.
Integris Health Class Action Claims Data Breach Affects 2M Patients
A class action has been filed over a data breach at Integris Health, affecting nearly 2 million patients' personal information. This incident highlights the ongoing challenges in protecting health information and the significant consequences of breaches in the healthcare sector.
2. Top CVE
CVE-2022-34309 & CVE-2022-34310
IBM CICS TX Standard and Advanced Weak Cryptographic Algorithms These vulnerabilities in IBM CICS TX Standard and Advanced 11.1 reveal the use of weaker than expected cryptographic algorithms, potentially allowing attackers to decrypt highly sensitive information. Highlighting the importance of strong cryptographic standards, these issues underscore the risks associated with inadequate encryption practices in critical enterprise software.
Fortinet FortiOS & FortiProxy Out-of-Bounds Write Vulnerability. A critical out-of-bounds write vulnerability has been identified across multiple versions of Fortinet FortiOS and FortiProxy. This flaw could allow attackers to execute arbitrary code or cause a denial of service, pointing to the necessity for rigorous security in network infrastructure components and the prompt application of patches to mitigate potential exploitation.
IBM Robotic Process Automation Tenant User ID Exposure. A security flaw in IBM Robotic Process Automation 21.0.2 could lead to the exposure of user IDs across tenants. This vulnerability highlights concerns regarding data isolation and privacy in multi-tenant environments, emphasizing the need for stringent access controls and data protection measures in cloud-based and automated IT solutions.
Deserialization of Untrusted Data in Kalli Dan's KD Coming Soon Plugin. This deserialization vulnerability affects the KD Coming Soon plugin, illustrating the risks associated with deserializing untrusted data. It emphasizes the importance of secure coding practices and the potential for such vulnerabilities to compromise web applications, leading to unauthorized access or other security breaches.
X.Org Server Out-of-Bounds Memory Access Flaw. An out-of-bounds memory access flaw in the X.Org server could lead to application crashes, local privilege escalation, or denial of service. This vulnerability highlights the challenges in securing foundational components of the Linux ecosystem and the potential repercussions of flaws in such critical infrastructure componen.
3. Security Research
Can a $10 Raspberry Pi Break Your PC's Disk Encryption?
This research by StackSmashing explores the potential of a low-cost Raspberry Pi to compromise Microsoft's BitLocker drive encryption. Highlighting the importance of physical security and the vulnerabilities in widely-used encryption technologies, this study underscores the evolving landscape of cybersecurity threats and the need for continuous vigilance in protecting sensitive data.
Ivanti Connect Secure Threat Activity Continues
Researchers have identified additional flaws in Ivanti Connect Secure, signaling ongoing susceptibility to suspected nation-state cyberattacks. This development emphasizes the critical nature of software security in the face of sophisticated threat actors and the importance of rapid response and remediation efforts to protect organizational assets and information.
How Secure is Your Security Camera?
New research from Northeastern University reveals significant security gaps in security cameras, potentially allowing hackers to spy through them. This study raises critical questions about the security infrastructure of common surveillance technologies and highlights the need for robust security measures to protect privacy and prevent unauthorized access.
CISA Releases 2024 Priorities for the Joint Cyber Defense Collaborative
This report outlines the strategic direction for enhancing national cybersecurity resilience, reflecting on the current state of security researcher engagement. It underscores the importance of collaboration across sectors to strengthen defenses against cyber threats and enhance the overall security posture of critical infrastructure and organizations.
Ovrdrive USB: The Self-Destructing Pendrive
Created by security researcher Ryan Walker, Ovrdrive USB introduces a novel security feature by self-destructing under certain conditions, emulating a James Bond gadget. This research highlights innovative approaches to data protection and the potential for new security technologies to safeguard sensitive information in a highly interconnected and digital world.
4. CISO Jobs
CISO Risk Officer C13
This position offers a competitive salary range of $125.8K to $188.6K per year for a VP-level role, highlighting the critical importance of risk management and cybersecurity leadership within the organization. The hybrid work model provides flexibility, catering to modern work preferences while ensuring effective risk oversight and strategic cybersecurity leadership.
Director Information Security at Locke and McCloud
Offering a salary range of $170K to $210K, this remote role emphasizes the growing demand for high-level cybersecurity expertise across geographical boundaries. The role underscores the importance of strategic information security management in protecting organizational assets in a predominantly digital landscape.
CISO at Serotonin
This remote Chief Information Security Officer position reflects the high stakes of cybersecurity leadership in today's digital age, requiring a strategic approach to managing cyber risks and ensuring the security of information assets in a dynamic and evolving threat environment.
Executive Director, Information Security- Governance, Risk and Compliance at BioSpace
This role focuses on the critical areas of governance, risk, and compliance within information security, indicating the importance of a holistic approach to cybersecurity that encompasses policy, procedures, and compliance with regulatory requirements to protect sensitive data and systems.
Director, Cybersecurity and Emerging Tech Policy at Microsoft
With a wide salary range of $124.8K to $264K, this position highlights the significance of policy development in cybersecurity and emerging technologies. It underscores the need for strategic leadership in shaping policies that address the challenges and opportunities presented by new technologies, ensuring that cybersecurity measures evolve in tandem with technological advancements.
Thank you for reading Secret CISO #15!
We hope you found the insights valuable and the highlighted positions reflective of the critical and dynamic nature of the cybersecurity field. As we continue to navigate these challenging digital landscapes together, your support and engagement are greatly appreciated. Please consider sharing this newsletter with friends and colleagues who share our passion for cybersecurity. As a token of our gratitude, we're sharing a digital gift with you - a cyber lizard, symbolizing adaptability and resilience in the ever-evolving digital ecosystem. Stay safe, stay informed, and let's continue to strengthen our cyber defenses together.
Thank you again for your time and interest in our newsletter!
Always with you in all the cyber challenges, Secret CISO Team.