Secret CISO 12/2: NHS Hospital Ransomware Attack, AWS Cloud Security Response, Microsoft's Windows Resiliency Initiative, Google's Gmail Security Surprise
Welcome to today's issue of Secret CISO, your daily dose of cybersecurity insights.
Today, we're diving into the world of vendor data breach risks for small businesses, exploring the National Law Review's advice on procurement practices and contract reviews. We'll also look at AWS's new automated security response platform, designed to help organizations handle account takeovers and ransomware attacks. In market news, the cybersecurity market is projected to reach a staggering USD 542.3 billion by 2032, driven by high-profile data breaches and growing data privacy concerns.
Meanwhile, the NHS children's hospital falls victim to a large-scale data breach, highlighting the ever-present threat of ransomware attacks. On the tech front, Radiant Logic expands its central intelligence hub solution, RadiantOne, to improve identity security posture management. Microsoft is also upping its game with the Windows Resiliency Initiative, promising more robust security controls in its 2025 release. Google keeps things simple with a new Gmail security feature, proving that the best security measures can often be the simplest.
In legal news, Yahoo! and Rogers customers have until December 27 to claim their share of the $20 million set aside for data breach settlements. And in Texas, the Attorney General's Office unveils its latest data breach report, potentially affecting many residents. Stay tuned for more updates and remember, knowledge is the first line of defense in cybersecurity. Stay safe!
Data Breaches
- Yet another ransomware attack - an NHS children's hospital is the latest victim: A large-scale data breach has occurred at an NHS children's hospital, with data leaked online including donation records. The hospital is currently working to secure its systems. Source: TechRadar
- November's Data Breaches in Texas: Find Out if Your Information Was Compromised: The Texas Attorney General's Office has released its latest data breach report, highlighting incidents that could have exposed personal information. Source: 101.9 The Bull
- 'Data breach' after cyber attack on Alder Hey Children's Hospital: Alder Hey Children's Hospital has reported a data breach following a cyber attack. The hospital is currently working to secure its systems. Source: Wirral Globe
- MoD hit by major cyberattack: The Ministry of Defence (MoD) has suffered a security breach, with passwords belonging to nearly 600 employees stolen and leaked onto the dark web. Source: Computing UK
- Washington College data breach victims inch closer to settlement over ransomware attack: Victims of a data breach at Washington College are nearing a settlement over a ransomware attack. A final approval hearing for the settlement is scheduled for May. Source: Baltimore Sun
Security Research
- Advent of Cyber 2024 {DAY 1} Tryhackme Write-up - Jawstar - Medium: Jawstar, a top 1% penetration tester and cybersecurity researcher, provides a detailed write-up of the first day of the Advent of Cyber 2024 event on Tryhackme. Source: Medium
- Top 10 Cyber-Attacks of 2024 - Infosecurity Magazine: Security researcher David Leroy Ross provides insights into the top 10 cyber-attacks of 2024, debunking some assertions about the personal information of residents being compromised. Source: Infosecurity Magazine
- Researchers of AI Aren't Exempt from Digital Millennium Copyright Act Restrictions: A recent decision highlights that AI researchers are not exempt from the restrictions of the Digital Millennium Copyright Act, particularly when examining if AI generates prohibited content. Source: Lexology
- 8 Million Android Users Hit by SpyLoan Malware in Loan Apps on Google Play: Security researcher Fernando Ruiz reveals that 8 million Android users have been affected by SpyLoan malware found in loan apps on Google Play. Source: The Hacker News
- UK Launches AI Security Research Lab to Defend Against Cyber Threats - Regulation Asia: The UK has launched an AI Security Research Lab to defend against cyber threats, including potential malicious uses of AI, with plans to collaborate with the Five Eyes members. Source: Regulation Asia
Top CVEs
- CVE-2024-53752: Berg Informatik Stripe Donation is vulnerable to Stored XSS due to improper neutralization of input during web page generation. The issue affects Stripe Donation versions from n/a through... Source: CVE-2024-53752
- CVE-2024-53750: Maeve Lander PayPal Responder has a Cross-Site Request Forgery (CSRF) vulnerability that allows Stored XSS. The issue affects PayPal Responder versions from n/a through... Source: CVE-2024-53750
- CVE-2024-53742: Prism I.T. Systems Multilevel Referral Affiliate Plugin for WooCommerce is vulnerable to Reflected XSS due to improper neutralization of input during web page generation. The issue affects Multilevel Referral Affiliate Plugin for WooCommerce versions from n/a through... Source: CVE-2024-53742
- CVE-2024-53748: Terry Lin WP Mermaid is vulnerable to Stored XSS due to improper neutralization of input during web page generation. The issue affects WP Mermaid versions from n/a through... Source: CVE-2024-53748
- CVE-2024-45520: WithSecure Atlant (formerly F-Secure Atlant) 1.0.35-1 is vulnerable to a remote Denial of Service because of memory corruption during scanning of a PE32. Source: CVE-2024-45520
API Security
- Memory corruption while processing API calls to NPU with invalid: This is a newly discovered vulnerability (CVE-2024-43052) that can cause memory corruption when invalid inputs are processed through API calls to NPU. This could potentially allow an attacker to manipulate the system and gain unauthorized access. It's crucial for organizations to update their systems to patch this vulnerability. Source: CVE-2024-43052
- Memory corruption when invalid input is passed to invoke GPU Headroom API: Another significant vulnerability (CVE-2024-43048) has been identified that can cause memory corruption when invalid input is passed to invoke the GPU Headroom API. This vulnerability can be exploited by attackers to gain unauthorized access and control over the system. Organizations are advised to update their systems to mitigate this risk. Source: CVE-2024-43048
Sponsored by Wallarm API Security Solution
Final Words
That's it for today's edition of Secret CISO. We've covered a lot of ground, from mitigating vendor data breach risks for small businesses, to the latest ransomware attacks, and even the advent of real-time data lake visibility. Remember, in the world of cybersecurity, knowledge is power.
As we continue to navigate the ever-evolving landscape of data breaches and security threats, it's crucial to stay informed and proactive. Whether you're a small business owner, a security professional, or just a concerned internet user, we hope our newsletter helps you stay one step ahead of the cyber threats.
If you found this information useful, please consider sharing it with your colleagues and friends.
Let's work together to create a safer digital world. Stay safe and see you in the next edition of Secret CISO!