Friday Five 8/26 | Digital Guardian

The Industry’s Only SaaS-Delivered Enterprise DLP

Our unique approach to DLP allows for quick deployment and on-demand scalability, while providing full data visibility and no-compromise protection.

No-Compromise Data Protection is:

  • Cloud-Delivered
  • Cross Platform
  • Flexible Controls

Digital Guardian's Blog

Friday Five 8/26

by Robbie Araiza on Friday August 26, 2022

Contact Us
Free Demo

Read about why Twitter is coming under fire, how a cybersecurity organization may have gone on the offensive, possible big changes coming for software vendors, and much more in this week’s Friday Five!

1. Twitter security under scrutiny after former executive turns whistleblower by Pieter Arntz

Peiter “Mudge” Zatko, former security lead for Twitter who was fired this past January for “poor performance,” has recently come out with several accusations against the social media giant, claiming that the company has spread misinformation about their security practices, that Twitter’s infrastructure is vulnerable to attacks, that the platform is vulnerable to foreign influence, and more. Per Zatko, "it was impossible to protect the production environment. All engineers had access. There was no logging of who went into the environment or what they did... Nobody knew where data lived or whether it was critical, and all engineers had some form of critical access to the production environment." Read the full story from Malwarebytes Labs to get the full breakdown of Zatko’s accusations, and read the full whistleblower disclosure for full details.

Read more

2. LockBit ransomware group downed by DDoS after claiming Entrust breach by Carly Page

In what may be a first, after the LockBit ransomware group claimed responsibility for an attack against Entrust this past July, the group also claims that their victim mounted a DDoS counterattack. A LockBit member going by the pseudonym ‘LockBitSupp’ reported to a security researcher that LockBit’s dark web leak site was receiving “400 requests a second from over 1,000 servers.” Read the full story from TechCrunch to find out why LockBit suspects Entrust is behind the DDoS attack, and why Entrust’s counterattack could spell trouble for the company if proven guilty.

Read more

3. The Pentagon may require vendors certify their software is free of known flaws. Experts are split by Suzanne Smalley

The U.S. House of Representatives recently passed the defense spending bill for the 2023 fiscal year, H.R.7900 - National Defense Authorization Act for Fiscal Year 2023, which will reportedly not allow software companies to sell software with any known common vulnerabilities and exposures (CVEs) to the Department of Defense. While at first glance this mandate may appear reasonable, this component of the bill has quickly sparked debate. Dan Lorenc, CEO of Chainguard and former Google software engineer, says, "to anyone who has spent time looking at CVE scan results, this idea is just misguided at best and an impending s***show at worst.” For a more detailed look into both sides of the argument, read Suzanne Smalley’s full report at CyberScoop.

Read more

4. Misconfigured Meta Pixel exposed healthcare data of 1.3M patients by Bill Toulas

After U.S. healthcare provider Novant Health ran promotional campaigns for COVID-19 vaccines in 2020 using Meta Pixel (formerly Facebook Pixel), the organization recently found that over 1.3 million patients had their sensitive health information mistakenly collected by the ad tracking script. The breach was reportedly caused by a misconfiguration of Meta Pixel on Novant Health’s website, and the exposed information could have included any of the following:

  • Email address
  • Phone number
  • IP address
  • Emergency contact information
  • Appointment type and date
  • Selected physician
  • Portal menu selections
  • Any content typed into the "free text" boxes

Read the full story at BleepingComupter to find out whether or not your information could have been included in the breach and to read more about the impending class action lawsuit against Meta and others involved.

Read more

5. Microsoft: Iranian attackers are using Log4Shell to target organizations in Israel by Liam Tung

The Microsoft Threat Intelligence Center (MSTIC) has assessed with “high confidence” that a threat actor known as Mercury, which has been exploiting Log4Shell vulnerabilities in Israeli organizations, is affiliated with Iran's Ministry of Intelligence and Security (MOIS). In a recent blog from Microsoft, they warned that Mercury is "leveraging exploitation of Log4j 2 vulnerabilities in SysAid applications against organizations all located in Israel," after which they establish "persistence, dumps credentials, and moves laterally within the targeted organization using both custom and well-known hacking tools, as well as built-in operating system tools for its hands-on-keyboard attack."

Read more

Tags: Vulnerabilities, DDoS, Data Breach

Recommended Resources

  • The seven trends that have made DLP hot again
  • How to determine the right approach for your organization
  • Making the business case to executives
  • Why Data Classification is Foundational
  • How to Classify Your Data
  • Selling Data Classification to the Business

Robbie Araiza

Robbie is a Content Creator for the Data Protection team at HelpSystems. Prior to joining the organization, he studied psychology and social work at Texas State University in San Marcos, TX.