Transcript
Steve Prentiss (0:00)
From the CISO series, it's Cybersecurity Headlines these are the cybersecurity headlines for Monday, January 20, 2025. I'm Steve Prentiss. TikTok is back, but with strings attached after shutting down in the US late Saturday night, TikTok appears to be back up and running after President Elect Trump announced on Sunday that he would offer a 90 day deadline for the company find a US purchaser. This would come in an executive order today. The app now works again for its existing users, although it is still unavailable on the Google and Apple app stores. In a post sent to Truth Social on Sunday morning, Trump suggested that the US take 50% ownership of the company. Meanwhile, over the weekend, millions of TikTok users headed over to RedNote declaring themselves as TikTok refugees. Some sent messages saying they were doing so to spite the US government for blocking TikTok in the first place. According to Dark Reading, RedNote is based in Shanghai and is one of the few social media platforms allowed to operate on both sides of the Great Firewall, making spying on Americans seemingly much easier. RedNote's servers are primarily located in China, meaning that user data is subject to Chinese cybersecurity laws that require companies to grant government access upon request. Prior to TikTok's 90 day lifeline, numerous experts had been stating that this resulting exodus to RedNote had made US national security over TikTok even more problematic. Noem Promises to curtail CISA as quoted in cyberscoop, Department of Homeland Security Secretary nominee Christy Noem stated in testimony before the Homeland Security and Governmental Affairs Committee on Friday that if confirmed, she would keep the department out of efforts to combat disinformation and misinformation and pledged to make CISA smaller and more nimble, end quote. She added that CISA has gone far off mission, which is to hunt and to help harden our nation's critical infrastructure, end quote Label company Avery Announces Data Breach the company, well known for its line of adhesive labels, printing services and other office products, stated that the attack was discovered on December 9th of last year, but the attack itself was the installation of a card skimmer on avery.com, the company's online shop domain. This installation occurred on July 18, 2024, and as a result, sensitive payment information that customers inputted on Avery's website between July 18 and December 9, 2024, was exfiltrated to the threat actors. This includes PII, of course, but also payment card numbers with CVV codes and expiration dates. The company estimates that more than 61,000 customers may have been affected, thanks to today's episode's sponsor, Vanta. Do you know the status of your compliance controls right now? Like right now, CISOs know that real time visibility is critical for security, but when it comes to GRC programs, they rely on point in time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. Vanta brings automation to evidence collection across over 35 frameworks like SoC2 and ISO 27001. They also centralize key workflows like policies, access reviews and reporting, and helps you get security questionnaires done five times faster with AI. Now that's a new way to GRC. Get started at vanta.com headlines that is V A N T A dot com headlines surveillance pricing costs Consumers according to FTC Report the preliminary report, which was released on Friday, alleges that businesses charge customers more for products based on insights gleaned from their consumer data and behaviors, including geolocation, demographics, shopping habits and even how an individual moves their mouse on a webpage. End quote. This data was pulled from companies including MasterCard, Accenture and McKinsey, who allegedly sell the tools that other businesses use to tweak pricing. This report uses only hypothetical examples to avoid revealing company trade secrets. An example of this would be a consumer profiled as a new parent being shown higher prices for baby products. The companies involved have denied that they sell or develop surveillance pricing software. The report itself is at the staff perspective stage, meaning that it is not yet final. Incoming FTC Chair Andrew Ferguson and fellow Republican Melissa Holyoak objected to its publication, saying that it should not have been released before the agency's investigation had concluded. End quote Costa Rica Refinery Cyber attack was first deployment for new US Response program Following up on a story we covered on December 3, a ransomware attack on Costa Rica's largest oil refinery was the first real world test of the U.S. state Department's new rapid response tool for cybersecurity incidents. This is according to Nate Fick, the US Ambassador at large for Cyberspace and Digital Policy. The response program is a product of the State Department's Cyber Bureau and is called the Foreign Assistance Leveraged for Cybersecurity Operational Needs or OR falcon, a bit of a stretch in the acronym department there. It is described as one of several US Initiatives developed to bolster allies and infuse global digital norms with American values, End quote. Fick emphasized that the program is meant to use best in breed private sector incident response capabilities across a number of vendors, ideally within 48 hours of the initial request. In this inaugural case, it was around 36 hours OpenText added to Moscow's list of undesirable organizations. The company, headquartered near Toronto in Canada, specializes in enterprise information management software. It is now only the second company to have been named undesirable after a recorded future. Russia's official line says the OpenText Corporation collaborates closely with US law enforcement and contributes to the West's anti Russia propaganda efforts. But it is also worth noting that in 2023, OpenText acquired UK based Micro Focus, which Russia says provided Ukrainian law enforcement agencies with cybersecurity software and services needed for data collection to strike Russian troops and infrastructure. End Quote 86% of default router passwords have never been changed, says Survey this survey was conducted by the British company Broadband Genie, an independent UK comparison service for home broadband T landline and mobile home broadband service. This was the third on this topic conducted by the company, the first two done in 2018 and 2022. Of the more than 3,000 residential customers who responded, 52% say they have never adjusted any of their router factory settings, 86% said they have never changed the router administrator password, and 72% said they have never changed their WI fi password. These and similar numbers have shown very little change up or down over six years. A link to the report is available in the show. Notes to this Episode Just one quick announcement. The CISO series is hiring. We are looking for a production assistant to help out our team. If that sounds like something for you or for someone you know, please head ON over to cisoseries.com for more details. I'm Steve Prentiss reporting for the CISO Series. Cybersecurity headlines are available every weekday. Head to cisoseries.com for the full stories behind the headlines.
