Cyber Bites by Edwin Kwan
Cyber Bites
Cyber Bites News - 2nd August 2024
1×
0:00
Current time: 0:00 / Total time: -9:09
-9:09

Cyber Bites News - 2nd August 2024

  • New Podcast Aims to Unlock Secrets of Application Security

  • SBOMs: A Crucial Tool Hampered by Standardization Issues

  • Mysterious Rings and QR Codes: The Emergence of Brushing Scams

  • France Battles Cyberespionage Ahead of Olympics

  • GitHub's Dark Secret: Deleted Data Never Really Dies

New Podcast Aims to Unlock Secrets of Application Security

A new podcast, AppSec Unlocked, has launched to help demystify the complex world of application security. Targeting both seasoned professionals and those new to the field, the podcast promises to deliver actionable insights, expert interviews, and the latest industry trends.

In an era where applications are the backbone of modern business, ensuring their security is paramount. AppSec Unlocked aims to equip listeners with the knowledge and tools to protect against cyber threats.

The podcast will cover a wide range of topics, including emerging threats, best practices, and the latest technologies. By breaking down complex concepts into easily digestible information, the podcast seeks to empower listeners to enhance their AppSec strategies.

With the increasing reliance on digital systems, understanding application security has never been more critical. AppSec Unlocked aims to be a valuable resource for anyone looking to strengthen their organization's defenses.

SBOMs: A Crucial Tool Hampered by Standardization Issues

https://www.darkreading.com/vulnerabilities-threats/wanted-sbom-standard-to-rule-them-all

Software Bills of Materials (SBOMs) have become essential for securing software supply chains in the wake of high-profile cyberattacks. Mandated by government agencies and increasingly adopted by enterprises, SBOMs promise transparency into software components and their vulnerabilities.

However, the potential of SBOMs is being undermined by a lack of standardization. Competing formats and varying implementation methods have created confusion and inefficiency for organizations. This has turned what should be a straightforward tool for identifying and addressing vulnerabilities into a complex and costly process.

Experts are calling for a unified SBOM standard to streamline the process and maximize the benefits of this critical technology. Achieving this will require collaboration between industry leaders, standards bodies, and government agencies.

By creating a single, standardized SBOM format, the tech industry can significantly improve software supply chain security and protect against future cyberattacks.

Mysterious Rings and QR Codes: The Emergence of Brushing Scams

https://www.sbs.com.au/news/article/a-ring-a-mysterious-box-and-a-qr-code-the-scam-laura-never-saw-coming/pn83e0uux

A complex new cyber scam has surfaced, involving the delivery of unsolicited diamond rings and suspicious QR codes to unsuspecting victims. The scam, believed to be a form of "brushing," has ensnared at least one Australian woman.

In a typical brushing scam, scammers send unsolicited items to victims to boost fake online reviews for their products. However, this latest iteration includes an added layer of mystery and potential danger. Victims are receiving diamond rings (fake ones of course!) accompanied by QR codes, which experts warn could be used for phishing attempts.

Cybersecurity experts are urging caution as the scam demonstrates the increasing sophistication of online criminals. By creating convincing fake websites and exploiting social media platforms, scammers are able to target a wide range of victims.

To protect yourself from falling victim to this or similar scams, it's essential to be vigilant when making online purchases. Be wary of deals that seem too good to be true, avoid clicking on suspicious links or pop-up messages, and carefully research any unfamiliar websites.

If you receive an unsolicited package, do not scan any QR codes or open any links included within it. Instead, report the incident to local authorities and your bank.

Australians lost a staggering $74 million to online scams last year, highlighting the growing threat posed by cybercriminals.

France Battles Cyberespionage Ahead of Olympics

https://www.linkedin.com/posts/parquet-de-paris_communiqu%C3%A9-de-presse-plugx-activity-7222119504518987778-LRCi/

French authorities have launched a massive operation to combat a cyberespionage campaign targeting thousands of computers within the country. The initiative comes just as the Paris Olympics are set to begin, highlighting the heightened security concerns surrounding the global event.

The malware used in the attack, PlugX, is a well-known tool employed by Chinese state-sponsored hacking groups. The operation aims to remove the malicious software from infected devices and disrupt the broader botnet.

While there's no direct confirmation that the cyberattack is Olympics-related, the timing underscores the increased vulnerability of large-scale events to cyber threats. French officials have acknowledged the inevitability of cyberattacks during the Games but vowed to minimize their impact.

The country is also bracing for other security challenges, including potential terrorist attacks and sabotage, as evidenced by recent disruptions to the national railway system.

The operation to clean up infected systems is a significant step in France's efforts to protect its digital infrastructure and safeguard sensitive information.

GitHub's Dark Secret: Deleted Data Never Really Dies

https://trufflesecurity.com/blog/anyone-can-access-deleted-and-private-repo-data-github

A new security vulnerability has been uncovered on GitHub that allows access to data from deleted repositories and forks. This means that sensitive information, such as API keys, can persist even after being supposedly erased.

Security researchers at Truffle Security have dubbed this issue a "Cross Fork Object Reference" (CFOR). They demonstrated how deleted code, including private data, can still be accessed through forks of the original repository. This raises serious concerns about data privacy and security.

While GitHub maintains that this is expected behaviour, critics argue that it undermines user trust and expectations about data deletion. The platform's response has been to classify this as a "feature" rather than a vulnerability.

This discovery highlights the potential risks associated with relying solely on code-hosting platforms for data security. Organizations need to be aware of these limitations and implement additional safeguards to protect sensitive information.

As the digital landscape evolves, it's increasingly clear that data deletion is a complex issue with far-reaching implications for individuals and businesses alike.

Discussion about this podcast

Cyber Bites by Edwin Kwan
Cyber Bites
Your weekly dose of cyber security news by Edwin Kwan
Stay sharp in the digital world! "Cyber Bites" delivers cybersecurity insights, industry trends, and personal experiences to keep you informed and protected.
Listen on
Substack App
Apple Podcasts
Spotify
YouTube
Pocket Casts
RSS Feed
Appears in episode
Edwin Kwan