|
THURSDAY, JAN. 9, 2025
|
Malicious hackers also have shadow IT problems. What's the State of the CISO in 2025? And one critical infrastructure sector saw a decline in ransomware. This is CyberScoop for Thursday, January 9.
|
|
|
In a post published Wednesday, watchTowr Labs CEO Benjamin Harris and researcher Aliz Hammond said they have successfully identified entry points into thousands of live backdoors being used by hackers through the interconnected infrastructure they leave behind. (Image Source: Getty Images)
|
|
|
Hackers have Shadow IT, too
CISOs commonly face the challenge of shadow IT, where forgotten systems become vulnerabilities in a network, but new research from watchTowr Labs shows that the same issue plagues malicious hackers. Researchers successfully leveraged abandoned infrastructure and expired domains to infiltrate thousands of backdoors left by hackers, even purchasing domains for as little as $20 to monitor these entry points without crossing legal boundaries. This research highlights that attackers often make similar oversights as defenders, offering a more level playing field than previously thought. Derek B. Johnson has more.
|
|
|
|
The State of the CISO
In the first episode of 2025, Greg Otto dives into a conversation with Phil Venables, the Chief Information Security Officer of Google Cloud, who shares insights from his expansive career in cybersecurity. From his beginnings as Goldman Sachs’ first CISO to his current role leading risk and security at Google, Phil discusses the evolving challenges CISOs face, including the impact of AI-powered cyber threats and strategies to prevent burnout. Discover Phil’s perspectives on fostering a supportive organizational culture and the importance of proactive planning in strengthening cybersecurity resilience. Listen here.
|
|
|
|
Schools saw less ransomware
Ransomware attacks on the U.S. education sector decreased in 2024, with 116 confirmed cases affecting 1.8 million records and demanding an average ransom of $847,000. The most active ransomware groups were RansomHub, LockBit, Medusa, and Play, responsible for numerous attacks across various sectors. To combat these threats, the U.S. Department of Education and the Cybersecurity and Infrastructure Security Agency (CISA) are enhancing cybersecurity measures in schools and advising organizations to strengthen recovery plans and authentication methods. Derek B. Johnson has more.
|
|
|
AITalks | Apr 24, 2025
Gain invaluable insights and connect with industry peers at AITalks. Explore the latest AI trends, best practices, and real-world use cases. Learn how to overcome challenges and maximize the benefits of AI for your organization. Register today!
|
|
|