Transcript
Claire Aird (0:04)
Russian companies must migrate to domestic ERP systems Ohio's public sector will have to approve ransom payments in public Chanel and Cisco disclose data breaches and a Thai hospital gets fined over the dumbest data breach ever. This is the risky bulletin prepared by Catalyn Kim Panu and read by me, Claire Aird today. Today is the 6th of August and this podcast episode is brought to you by no code automation platform Tynes Russian companies will soon be required to migrate to domestic resource planning software. The government passed a law in April that requires critical infrastructure operators to use Russian made software. Enterprise resource planning is the first category to be designated as critical under that law. The law enters into effect in September, but no migration deadline has been set. About one third of Russian companies still use foreign ERP software such as SAP and Oracle. In other news, local government bodies in Ohio will have to approve ransomware payments in full view of the public. Approval for payments will need to be decided through regular open governance processes such as voting or committee. The new requirement was included in the 2026 state budget bill. The same bill will also require local governments to establish cybersecurity programs to Prevent future attacks. U.S. state and local governments cannot use this year's DHS Cyber grants for services provided by the Multi State Information Sharing and Analysis Centre. Ms. ISAC has previously provided critical cybersecurity intelligence for states and helped secure US elections until earlier this year. The DHS provided regular funding to the group. Its current funding runs out at the end of September. A panel has been tasked with creating a plan for establishing a US cyber force. The 17 person panel is comprised of former military and civilian leaders. The panel is led by the former head of US Army Cyber Command, Ed Cardin and Josh Stiefel, previously of the House Armed Services Committee. According to the record, the panel will prepare a roadmap for Congress to establish the cyber branch for next year's defence budget. A private hospital in Thailand has been fined $37,000 after its patient records were used as wait for it snack packaging. The paper records were used as wrappers for the local delicacy. Kannom, Tokyo this is a crispy crepe typically filled with custard, which sounds delicious. The hospital claimed it paid a contractor to dispose of the sensitive records but failed to follow up. French fashion brand Chanel has notified customers of a data breach. The incident impacted the company's U.S. operations. Chanel said hackers stole data from one of its database providers. It didn't say how many customers were affected. Networking equipment vendor Cisco has suffered a security breach. The incident occurred in late July and exposed some customer information. Cisco says a threat actor voice phished a third party that manages its CRM platform. Both the Cisco and Chanel breaches are likely part of the ongoing campaign targeting Salesforce users. Neither company has confirmed this. Data from a US Sheriff's office has been leaked after a ransomware attack last year. The data from Louisiana's East Baton Rouge Sheriff's office exposed informant details, polygraph results, internal affairs investigations and IMSI catcher warrants. The leak also included training manuals for creating online sock puppet accounts accounts and using the cellebrite and Grey Key phone unlocking tools. The office refused to pay when it was hit by ransomware in April last year. Israeli spyware vendor Candiru is still active. Security firm Recorded Future has discovered new servers that manage and deliver the company's Devil's Tongue spyware. Eight clusters of servers were found, five of which are still active. The servers have been linked to deployments in Hungary, Saudi Arabia, Azerbaijan, Uzbekistan, Spain and Indonesia. An Iranian apt group has changed the name of its front company following U.S. sanctions. The Cotton Sandstorm Group was sanctioned for interfering in the 2020 U.S. presidential election. The group was operated by a contractor named Yemeney Pasagad. The State Department says the company has changed its name to Shahid Shustari but still operates from the same address. This is the third time the company has changed its name. It also operated as Aria Sepa Ayanda Sozan last year. Sonicwall is urging administrators of its virewalls to disable the device's SSL VPN feature. The company received reports of attacks against the devices from multiple security firms this week. Security firms Arctic Woof, Google, Mandiant and Huntress said attackers have been hacking SonicWall systems and deploying RansomW. SonicWall says it's investigating whether the attacks used older bugs or a new zero day exploit. Remote attackers can hijack Nvidia servers running AI models. The attacks are enabled by a chain of three vulnerabilities in the Nvidia Triton Inference server platform. The bugs were discovered in the Triton platform's Backend by Wiz, which is now part of Google Cloud. Nvidia patched the issues this week. A set of vulnerabilities could allow threat actors to backdoor Dell laptops. The bugs impact the Control Vault 3 firmware, which supports advanced authentication options such as fingerprint and smart card readers. The five bugs, codenamed Revault, impact more than 100 models of Dell laptops. The bugs can be exploited via a Windows API and don't require elevated privileges. Dell has released firmware updates. A vulnerability in the Streamlit app deployment framework can allow attackers to hijack the underlying cloud servers. The framework only validates file updates, uploads client side, leading to straightforward path traversal and arbitrary file upload. Streamlit released a security patch in March. Adobe has released an out of band security Update to patch 2 vulnerabilities in its Experience Manager CMS. The patches were released after security researchers published proof of concept code. The researchers published the code after Adobe failed to patch the issue within 90 days of being notified. Adobe said the bugs were not being exploited in the wild at the time of the patch. Cloudflare has accused AI company Perplexity of ignoring no crawl policies. Cloudflare says Perplexity modifies its user agent and changes source IP when a website blocks it. It says the company hides its identity in about one fifth of its scanning activity. And finally, Meta will warn users when they're added to new WhatsApp groups by someone outside of their contacts. Group notifications will be disabled until the user agrees to to join. Meta launched the feature to help users avoid scams, and that is all for this podcast edition. Today's show was brought to you by our sponsor Tines. Find them at tynes.com thanks for your company.
