VMware

Risky Business Weekly Cybersecurity News Podcast, Episode 757



In this podcast Patrick Gray and Adam Boileau from Risky Business Media talk through the week’s cybersecurity news. Links to everything discussed are below:

Business interruption claims will drive insurance losses linked to CrowdStrike IT disruption | Cybersecurity Dive

Delta hires David Boies to seek damages from CrowdStrike, Microsoft

CrowdStrike disruption direct losses to reach $5.4B for Fortune 500, study finds | Cybersecurity Dive

Why CrowdStrike’s Baffling BSOD Disaster Was Avoidable – YouTube

CrowdStrike offers a $10 apology gift card to say sorry for outage | TechCrunch

Crooks Bypassed Google’s Email Verification to Create Workspace Accounts, Access 3rd-Party Services – Krebs on Security

Hackers exploit VMware vulnerability that gives them hypervisor admin | Ars Technica

Microsoft calls out apparent ESXi vulnerability that some researchers say is a ‘nothing burger’ | CyberScoop

AMI Platform Key leak undermines Secure Boot on 800+ PC models

Chrome will now prompt some users to send passwords for suspicious files | Ars Technica

Google Online Security Blog: Improving the security of Chrome cookies on Windows

Cyber firm KnowBe4 hired a fake IT worker from North Korea | CyberScoop

North Korean hacker used hospital ransomware attacks to fund espionage | CyberScoop

North Korea Cyber Group Conducts Global Espionage Campaign to Advance Regime’s Military and Nuclear Programs

North Korean hacking group makes waves to gain Mandiant, FBI spotlight | CyberScoop

Chaining Three Bugs to Access All Your ServiceNow Data

ServiceNow spots sales opportunities post-CrowdStrike outage | Cybersecurity Dive

Cyber Supply Chain Risk Management Conference (CySCRM) 2024 | Conference | PNNL

[ad_2]

source

Related Articles

9 Comments

  1. Great show. Re VMware, the vendor advisory is wrong – the group is ESX Admins, not ESXi Admins. Also, it doesn’t necessarily need domain admins to create – most orgs don’t have domain admins creating groups, they delegate it to service desk staff or MSPs. There’s likely more to come about why it’s a vuln – eg VMware have issued a patch which changes three different things for this one CVE.

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button