Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Random but Memorable - Episode 11.5: Ethical Pizza Delivery Hobbies with Jamie Woodruff

Strap yourselves in, because today we're joined by one of the world's most notorious and ethical hackers: Jamie Woodruff. From impersonating a Domino’s pizza delivery driver to malware infected e-cigarettes, Jamie takes us on a wild ride of social engineering attacks and the great lengths hackers will go to exploit targets. 💻🍕 We also celebrate Cybersecurity Awareness Month with a giveaway and announce the game-changing passkey support new to 1Password. 🎉

The 443 Podcast - Episode 262 - Bing Chat Malvertising

This week on the podcast, we discuss an alert from CISA on nation state threat actors embedding malware into legacy Cisco router firmware. After that, we cover a research post on malicious advertisements served up via Bing's ChatGTP integration. We then end with an analysis of North Korea's Lazarus group's latest social engineering techniques. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

How To Send Your Social Security Number Safely

The safest way to send your Social Security number (SSN) is by using a password manager. A password manager is a tool used to keep passwords and other sensitive data secure at all times. A little-known benefit to password managers is that in addition to generating and storing strong passwords, they also aid users in securely sending sensitive information such as Social Security numbers, MFA codes, home deeds, identification cards and more.

How does Vanta work? Top product questions about the Vanta Platform

Getting compliant can be a time-consuming and tedious process when done manually. That’s why thousands of businesses use Vanta to automate up to 90% of the work needed to comply with security and privacy frameworks. ‍ Why do companies choose Vanta? They’re looking to unlock business growth and expand into new markets or larger accounts, streamline their compliance processes, and strengthen their security posture to earn trust with stakeholders.

$3,000 of Gas Stolen from Hacked Pumps in Detroit

Detroit is Michigan’s largest city, hosting a population of more than 630,000 people. The area is called “Motor City” for its contributions to the automobile industry in the 1950s. More than 2.8 million cars belong to Detroit residents—and gas prices have reached a $3.72 gallon average. More cars are on the roads than ever before, but the cost of running them is taking its toll.

CVE-2023-42115: Critical RCE Vulnerability in Exim

On October 2, 2023, Exim released security fixes for an out-of-bounds write remote code execution (RCE) vulnerability (CVE-2023-42115, CVSS: 9.8). This vulnerability affects the Simple Mail Transfer Protocol (SMTP) service and is caused by improper validation of user input. A threat actor can remotely exploit CVE-2023-42115 by writing data beyond the boundaries of a buffer, which leads to the execution of arbitrary code.

What CIS Controls are Effective for Successful Cyber Defense?

Critical Security Controls are a set of cybersecurity principles and actions that list defense tactics and best practices to mitigate against popular cyber-attack methods. But what makes them so valuable is that the framework prioritizes a small number of actions that all work to significantly reduce cybersecurity risk across your network. Keep reading to learn more about CIS controls, as well as which controls are essential for successful cyber defense.