Secret CISO 3/19: Community Care Alliance, James Pascoe Group, Center for Digestive Health, California Cryobank Data Breaches; Google's $32B Wiz Acquisition; CISA's Security Crew Shake-up; Orion's AI Security Solution; Medusa Ransomware Protection Tips

Secret CISO 3/19: Community Care Alliance, James Pascoe Group, Center for Digestive Health, California Cryobank Data Breaches; Google's $32B Wiz Acquisition; CISA's Security Crew Shake-up; Orion's AI Security Solution; Medusa Ransomware Protection Tips

Good morning, Secret CISO readers! Today's newsletter is packed with the latest updates on data breaches and security measures. We start with the recent data breach at Community Care Alliance, which has prompted an investigation by Levi & Korsinsky, LLP. This breach has raised concerns about the security of sensitive personal information. In other news, Lifehacker provides steps to protect your data from the Medusa Ransomware. This comes at a time when data breaches are becoming increasingly common, with James Pascoe Group and the Center for Digestive Health also reporting breaches.

On a brighter note, we explore how security organizations can optimize cloud storage costs without compromising data security. We also delve into why security teams need to prepare for 'Q-Day' and the implications of Google's $32 billion acquisition of cloud security platform, Wiz. In a surprising turn of events, the Cybersecurity and Infrastructure Security Agency (CISA) has rehired its security crew after firing them.

Meanwhile, MGM is settling data breach claims, and Orion Security is using AI to minimize insider threats. Stay tuned for more updates, including a look at the recent data breach at California Cryobank, and the investigation into a data breach at Grubhub Holdings Inc. by Levi & Korsinsky, LLP. We'll also be discussing the latest research on protecting sensitive data during cloud computation, and the potential security risks associated with AI coding assistants.

Data Breaches

  1. Community Care Alliance Data Breach: Community Care Alliance recently disclosed a data breach that compromised sensitive information. The extent of the breach and the number of affected individuals are yet to be determined. Source: CBS4Indy
  2. Medusa Ransomware Threat: Security experts are urging individuals and organizations to implement best practices to protect their data from the Medusa ransomware. The FBI is actively investigating the threat. Source: Lifehacker
  3. James Pascoe Group Data Breach: New Zealand's James Pascoe Group has reported a data breach to the Privacy Commissioner. The extent of the breach is currently unknown. Source: NZ Herald
  4. Center for Digestive Health Data Breach: The Center for Digestive Health in Orlando, Florida, has disclosed a data breach compromising sensitive personal and health information. The number of affected patients is yet to be disclosed. Source: TEISS
  5. California Cryobank Data Breach: US sperm donor giant California Cryobank has suffered a data breach exposing customers' personal information. The company is currently notifying affected customers. Source: Bleeping Computer

Security Research

  1. Security scheme could protect sensitive data during cloud computation: MIT researchers have developed a new theoretical approach to building homomorphic encryption schemes. This approach is simple and relies on computational efficiency, providing a potential solution for protecting sensitive data during cloud computation. Source: MIT News
  2. How AI coding assistants could be compromised via rules file: Security researchers from Pillar have reported potential security issues with AI coding assistants. These issues arise from the distribution of malicious rule configuration files, which could compromise the AI systems. Source: SC Media
  3. New research reveals security's biggest AI challenges – and two potential solutions: Insights from IDC's Voice of Security 2025 white paper, sponsored by Tines and AWS, reveal the biggest challenges in security related to AI and propose two potential solutions. Source: CSO Online
  4. New Windows zero-day exploited by 11 state hacking groups since 2017: Security researchers Peter Girnus and Aliakbar Zahravi have discovered a new Windows zero-day exploit that has been used by 11 state hacking groups since 2017. The exploit, CVE-2024-43461, was found by Girnus, a Senior Threat Researcher. Source: Bleeping Computer
  5. How a researcher with no malware-coding skills tricked AI into creating Chrome infostealers: A researcher has managed to trick generative AI into creating Chrome infostealers, despite having no malware-coding skills. This highlights potential security vulnerabilities in AI systems. Source: ZDNet

Top CVEs

  1. CVE-2024-23943 - Unauthenticated Remote Access to Cloud API: An unauthenticated remote attacker can gain access to the cloud API due to a lack of authentication for a critical function in the affected devices. This could potentially lead to unauthorized access and manipulation of data. Source: CVE-2024-23943
  2. CVE-2024-56346 - IBM AIX Command Execution: IBM AIX 7.2 and 7.3 nimesis NIM master service could allow a remote attacker to execute arbitrary commands due to improper process. This could potentially lead to unauthorized system access and data manipulation. Source: CVE-2024-56346
  3. CVE-2025-2262 - WordPress Plugin Vulnerability: The Logo Slider – Logo Showcase, Logo Carousel, Logo Gallery and Client Logo Presentation plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 3.7.3. This could potentially allow unauthenticated attackers to execute arbitrary code. Source: CVE-2025-2262
  4. CVE-2025-29907 - jsPDF Denial of Service: jsPDF, a library to generate PDFs in JavaScript, is vulnerable to a denial of service attack. If a user is given the possibility to pass unsanitised image urls to the addImage method, a harmful data-url can result in high CPU utilization and denial of service. Source: CVE-2025-29907
  5. CVE-2025-0755 - MongoDB Buffer Overflow: The various bson_append functions in the MongoDB C driver library may be susceptible to buffer overflow when performing operations that could result in a final BSON document which exceeds the maximum allowable size, resulting in a segmentation fault and possible application crash. Source: CVE-2025-0755

Sponsored by Wallarm API Security Solution

Final Words

And that's a wrap for today's edition of Secret CISO. As we've seen, the world of cybersecurity is ever-evolving, with new threats and challenges emerging every day. From data breaches at Community Care Alliance and James Pascoe Group, to the rise of Medusa Ransomware, it's clear that staying informed and vigilant is more important than ever. Remember, security isn't just about protecting your own data, it's about safeguarding the information of those who trust you with theirs.

So, whether you're a security professional or simply a concerned individual, let's continue to learn, share, and work together to create a safer digital world. If you found today's newsletter helpful, please consider sharing it with your friends and colleagues.

They might find it useful too. Stay safe, stay informed, and see you in the next edition of Secret CISO.

Read more

Secret CISO 3/23: Oracle denies massive data breach, Indiana health systems unite for cybersecurity, Microsoft Trust Signing service abused, Researchers find security gaps in AI cloud services

Secret CISO 3/23: Oracle denies massive data breach, Indiana health systems unite for cybersecurity, Microsoft Trust Signing service abused, Researchers find security gaps in AI cloud services

Welcome to today's issue of Secret CISO, your daily dose of cybersecurity news. Today, we're diving into a series of data breaches and security lapses that have been making headlines. First up, Indiana health systems are banding together to help smaller providers tackle cybersecurity. This comes

By Secret CISO