{"id":46125,"date":"2024-08-09T17:20:13","date_gmt":"2024-08-09T21:20:13","guid":{"rendered":"https:\/\/www.technewsday.com\/?p=46125"},"modified":"2024-08-09T20:04:21","modified_gmt":"2024-08-10T00:04:21","slug":"cyber-security-today-week-in-review-for-august-10-2024","status":"publish","type":"post","link":"https:\/\/technewsday.com\/staging\/cyber-security-today-week-in-review-for-august-10-2024\/","title":{"rendered":"Cyber Security Today: Week in Review for August 10, 2024"},"content":{"rendered":"<p>Cybersecurity Insights: Malvertising, Phishing Trends, and North Korean Hackers<\/p>\n<p>In this weekend edition of &#8216;Cybersecurity Today,&#8217; host Jim Love brings together experts Terry Cutler from Cyology Labs, David Shipley from Beauceron Security, and Greg Monson from Trustwave.<\/p>\n<p><iframe style=\"border: none;\" title=\"Embed Player\" src=\"https:\/\/play.libsyn.com\/embed\/episode\/id\/32519592\/height\/192\/theme\/modern\/size\/large\/thumbnail\/yes\/custom-color\/2f3336\/time-start\/00:00:00\/playlist-height\/200\/direction\/backward\/font-color\/FFFFFF\" width=\"100%\" height=\"192\" scrolling=\"no\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>The panel explores the latest trends in cybersecurity, including a deep dive into a report on &#8216;Malvertising,&#8217; the use of social media advertising to distribute malware.<\/p>\n<p>They also discuss a significant rise in phishing attempts and the challenges of detecting them, revealing a worrying leakage rate of up to 50%.<\/p>\n<p>The panel delves into a fascinating and concerning trend: North Korean hackers being hired as remote workers to infiltrate companies.<\/p>\n<p>Finally, they analyze the recent Delta lawsuit against CrowdStrike and Microsoft&#8217;s involvement in the case.<\/p>\n<p>Tune in for expert insights, practical advice, and the latest updates in the ever-evolving field of cybersecurity.<\/p>\n<p>This <a href=\"https:\/\/usw2.nyl.as\/t1\/73\/9bth276vx1mrgv984uvtmbs1x\/2\/82bd1caaafabe4ce0afccca16526a1a8b9ca63ab989a46437098b157966affb3\" target=\"_blank\" rel=\"noopener\">is a link to the Trustwave report<\/a>, referred to by the panel<\/p>\n<p>00:00 Introduction and Panelist Introductions<br \/>\n01:27 Malvertising: A New Cyber Threat<br \/>\n04:13 The Rise of Alternative Communication Channels<br \/>\n07:39 Corporate Dangers of Facebook Account Takeovers<br \/>\n12:04 North Korean Hackers in Remote Work<br \/>\n20:11 Navigating Reference Checks and Hiring Challenges<br \/>\n20:27 The Intricacies of the Prisoner Swap<br \/>\n21:49 CrowdStrike&#8217;s Legal Battle with Delta<br \/>\n24:24 The IT Professional&#8217;s Dilemma<br \/>\n30:25 Phishing Email Statistics and Security Measures<br \/>\n35:59 Concluding Thoughts and Future Topics<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Insights: Malvertising, Phishing Trends, and North Korean Hackers In this weekend edition of &#8216;Cybersecurity Today,&#8217; host Jim Love brings together experts Terry Cutler from Cyology Labs, David Shipley from Beauceron Security, and Greg Monson from Trustwave. The panel explores the latest trends in cybersecurity, including a deep dive into a report on &#8216;Malvertising,&#8217; the [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":46129,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"video","meta":{"_acf_changed":false,"footnotes":""},"categories":[360],"tags":[389,198],"class_list":["post-46125","post","type-post","status-publish","format-video","has-post-thumbnail","hentry","category-podcasts","tag-cyber-security-today","tag-podcast","post_format-post-format-video"],"acf":[],"_links":{"self":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/46125","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/comments?post=46125"}],"version-history":[{"count":3,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/46125\/revisions"}],"predecessor-version":[{"id":46128,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/46125\/revisions\/46128"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media\/46129"}],"wp:attachment":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media?parent=46125"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/categories?post=46125"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/tags?post=46125"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}