Transcript
Caitlin Sorey (0:04)
Google buys Wiz for $32 billion China attributes the Poison Ivy APT group to the Taiwanese military APT groups abuse a Windows 0 day and a judge tells CISA to reinstate fired workers. This is the risky bulletin prepared by Catalyn Campanu and read by me, Caitlin sorey. Today is March 19th and this podcast episode is brought to you by no Code automation Platform Tines Google will purchase cloud security company Wiz for $32 billion. The company will join Google's cloud division, but will retain its brand and continue to support all the major cloud platforms. In 2024, Wiz turned down a $23 billion offer from Google. This is the largest cybersecurity related acquisition to date. The Chinese government has attributed the APT group's poison Ivy and Green Spot to the Taiwanese military. Chinese officials say the APT is run by a cyber warf inside Taiwan's Information Communications and Electronic Force Command, also known as ISEFCOM. Officials have published the names of four individuals they believe run the group in 2024. China also claimed ISFCOM was behind a hacktivist group, Anonymous 64. Taiwanese officials have denied both accusations, saying that ISAFCOM only undertakes defensive operations. Multiple cyber espionage groups have been abusing the same Windows Zero day vulnerability for eight years. The zero day is a bug allowing attack to hide command line arguments in LNK shortcut files. Trend Micro says seen the technique being used by 11 APT groups from North Korea, Iran, Russia and China and has found 1,000 samples. Trend Micro reported the flaw in September 2024, but Microsoft assessed it as low severity and has no plan to issue a patch. A group of more than 100 European tech companies have urged EU lawmakers to invest in European digital infrastructure rather than relying on foreign TEC. The open letter has more than 80 signatories including Airbus, OVH, Cloud, Nexcloud and Proton. The call comes amongst growing European scepticism about the reliability of the US as a partner. A US court has ordered CISA to reinstate fired probationary staff. CISA has urged affected employees to get in touch so they can be reinstated, then placed on administrative leave. The layoffs this year include staff from CISA's election security, anti disinformation and penetration testing teams. After being reinstated, some of the employees may be fired a second time as they work in areas the DHS has deprioritized. Sure sounds like government efficiency to us. A remotely exploitable vulnerability has been discovered in AMI Mega Rack baseboard management controllers. The vulnerability bypasses the authentication used for remote management eclipsium says attackers could have used this flaw to tamper with firmware, disable security protections and render devices inoperable. The vulnerability has received a CVSS score of 10. Over 1000 mega rats management interfaces are currently exposed to the Internet. Affected vendors include ASUS, ASRockrack and HPE. An unknown attacker has compromised more than 100 car dealership websites to target users with malware. Visitors to affected sites were met with pop ups instructing users to copy, paste and run malicious commands on their computers, according to security researcher Randy McEwen. The code was delivered via a shared video player platform. Indian IT services provider Infosys has settled multiple class action lawsuits related to a 2023 security breach. The company has agreed to pay $17.5 million to affected plaintiffs. The Infosys hack exposed the personal data of more than 6.5 million people. Hackers stole $6.2 million in crypto assets from the Wemix blockchain gaming platform in February. Wemix CEO Kim Seok Hwan announced an investigation four days later and eventually confirmed the attack in a press conference this week. Kim said the delay in confirming the attack was an attempt to avoid a market panic rather than him trying to conceal the breach. Cryptocurrency exchange OKX has suspended its decentralized exchange aggregator after it was abused by North Korea to launder proceeds from its Bybit hack. Okx was encouraged to take the step by European financial regulators. The company has also launched a system to track and block the Bybit hackers latest addresses in real time. Bitdefender has uncovered a cluster of more than 330 malicious apps in the Google Play Store. The apps hid their icons using a novel technique, started without interaction and showed ads. Some apps would display a pop up to attempt to collect user credentials and banking details. More than 60 million users have downloaded the app since April 2020. 2022 Two vulnerabilities have been discovered in the XML Crypto JavaScript library that can be used to bypass authentication in systems where the library is used to verify signed XML documents. Security researcher Alexander Tan reported The bugs the library's maintainer work OS has confirmed the flaws can be used to bypass SAML authentication. Other SAML implementations that use the library may also be impacted. That's all for this podcast edition. Today's show was brought to you by our sponsor Tines. Find them at tines. Com.
