- Simply Cyber Newsletter
- Posts
- Simply Cyber Newsletter #92
Simply Cyber Newsletter #92
Crush Your Week Like a Cyber Pro!
Start your work week off at full speed with expert analysis and actionable intel from top cybersecurity news stories. Share with your end users, peers, and executives. Support weekly security awareness with Simply Cyber Newsletter!
FOR END USERS
Mobile banking users targeted in new credential theft scheme. Hackers in Czechia, Hungary, and Georgia used malicious banking apps nearly identical to legitimate ones to steal user data in a sophisticated phishing campaign. The apps, distributed via social media ads and voice calls, bypassed traditional security measures and captured banking credentials.
What you need to know: Alert your end users to a new threat targeting mobile banking apps using Progressive Web Applications (PWA). Attackers are tricking users into installing fake banking apps that mimic real ones by bypassing traditional security warnings. These apps, often spread through social media ads, voice calls, and SMS messages can steal banking credentials once installed. To stay safe, users should:
• Only download apps from official app stores.
• Be cautious of unexpected installation prompts.
• Avoid clicking on links from unsolicited messages.
• Verify app updates directly through their bank's official website or app.
Staying vigilant is key to avoiding new and emerging threats like this.
FOR PEERS
CISA flags Jenkins vulnerability. CISA added a critical Jenkins vulnerability (CVE-2024-23897) to its catalog, warning it is actively being exploited for remote code execution. Unpatched Jenkins servers, particularly in the U.S. and China, are vulnerable, prompting urgent security updates to prevent ransomware attacks.
What you need to know: In response to the critical Jenkins vulnerability (CVE-2024-23897), it's important to share this with your peers. This flaw allows unauthenticated attackers to gain remote code execution, posing a significant risk to any organization using Jenkins. Ensure your environment is thoroughly assessed, apply the latest security patches, and monitor for any signs of exploitation. Even if Jenkins isn't in use within your organization, reviewing other publicly exposed systems is vital to proactively identify and mitigate similar risks before they escalate into critical threats.
FOR EXECUTIVES
Microchip Technology hit by cyberattack. Microchip Technology's operations were disrupted by a cyberattack, affecting servers and business activities. The company is investigating, with manufacturing impacted. The full scope and financial impact are unknown. Semiconductor firms remain key targets for cyberattacks.
What you need to know: When speaking to your senior business leaders, emphasize the importance of proactive cybersecurity measures to prevent incidents like the one at Microchip Technology. Advocate for increased investment in cybersecurity resources, including advanced threat detection, incident response capabilities, and employee training. Highlight the need for regular risk assessments and stress that cybersecurity is a critical business imperative that impacts operational resilience, supply chain security, and long-term success. Additionally, urge them to consider the security of the business' supply chain and the importance of having backup systems to ensure business continuity, in the event of an attack. Stress that these steps are essential not only for protecting internal operations but also for maintaining the trust and reliability that partners and customers expect.
SIMPLY CYBER FIRESIDES
Web Application Security with Tim Tomes on August 22nd
Join us for an exciting episode of Simply Cyber Firesides with your host, Gerald Auger, Ph.D.. Catch this stream LIVE as we interview Founder and Application Security Engineer, Tim Tomes @lanmaster53!
Tim has extensive experience in IT and InfoSec. His expertise spans from software development to full-scope penetration testing, serving in the U.S. Military and private industry.
Tim is a trainer and practitioner, specializing in application security with a focus on web application penetration testing and secure software development.
This episode promises to be packed with knowledge in #appsec, offering insights from two seasoned cybersecurity experts. Whether you’re a pro or just curious about #cybersecurity, this is an opportunity you won’t want to miss!
Ask your questions in live chat and engage with Gerald, Tim, and the Simply Cyber community. #TeamSC
Learn more about Tim at lanmaster53.com.
See you there! 🚀 #livestream | Join us at 4:30 PM EDT this Thursday!
Stay current on trending topics, tips, and resources in cybersecurity, connect with me on socials for new content, every day.
As always, please send me feedback. Which tip above is your favorite? What do you want more or less of? Other suggestions? Please let me know. Just send a DM on X with #actionableintel in the subject so I can find it.
Thank you so much and see you next Monday!
Have a great week everybody!
Gerry
MORE FROM SIMPLY CYBER
Catch the most popular weekday cyber threat news analysis live stream around and meet the most supportive community ever. #TeamSC
Join us on the Daily Cyber Threat Brief, available on YouTube, LinkedIn, and your favorite podcast platform:
SIMPLY CYBER ACADEMY
Empower your career by learning real in-demand skills from cyber experts and the theory behind those skills with Simply Cyber Academy.
Visit academy.simplycyber.io to learn more. The popular GRC Analyst Master Class and Cyber 101 courses are below. We even have new courses coming to the academy. Check it out!