This Week in Security #2

This Week in Security #2

- 4 mins

Navigating the ever-evolving landscape of cybersecurity can feel like a whirlwind—new threats, innovations, and incidents are constantly reshaping the digital world. This week’s post breaks down some of the developments and that took place this past week.

“Cybersecurity Incidents” Hit Government Networks, B.C.

Clearly attempting to be as vague as possible, on Wednesday B.C.’s premier said their government networks were involved in “sophisticated cybersecurity incidents”. He says that so far there is no evidence that sensitive information was breached and that they’re working with the Canadian Centre for Cyber Security as well as the Office of the Information and Privacy Commissioner. Meanwhile, government employees were told to change their passwords, making them even longer (increased from 10 to 14 characters).

Further Discussion:

New MacOS Information Stealer/Spyware

“Mac’s can’t get viruses”

This commonly held belief likely stems from the fact that relative to malware targeting Windows machines, there haven’t been many for Macs. Combining the 72% marketshare Windows holds with a user demographic consisting of some of the most vulnerable users, it makes sense that cybercriminals would dedicate most of their resources towards Windows computers.
However, Macs aren’t immune to all attention and in late April a spyware dubbed “Cuckoo” was discovered. On downloading an application designed to download music off streaming services like Spotify, Kandji (a security company) found the files included malicious code which would steal information relating to everything from hardware details to passwords.

Further Discussion: Do not get complacent because you have a Mac. Please please please, don’t download software from suspicious sources… please.

Scams:

Phishing, smishing… vishing? Scammers are getting more creative and more able by the day, we’ll be covering a fresh set of modern scams each week to keep you informed and vigilant

Online shopping scams are rampant generally aim to steal payment information, contact information, and of course money. For example, a large scale scam network that seems to originate in China created many fake retail sites offering large discounts on many clothing brands like Versace and Hugo Boss. Most would-be consumers didn’t receive any of the items they ordered, and while some didn’t have any money stolen their data was nonetheless given up.

How do we combat this?

Rapid-fire:

Paris 2024: Any high profile event brings with it plenty of people looking to attack it, few bigger than the summer olympics. The event spans many days and locations, giving prospective attackers many potential entry points. Organizers are working together with national french agencies and other security companies to combat cyberattacks. The 2018 winter olympics was hit by the “Olympic Destroyer” which took down several bits of infrastructure.

Russia Disputes Germany’s Hacker Claims: Germany accused Russia of attacking its defence and aerospace firms, recalling their ambassador as a result. Russia in turn claims that this was merely a ploy to worsen other Russian international relations.
The intersection of PR and Cybersecurity muddies the waters even more, how should we deal with these situations?

Deepfakes Impact India’s 2024 Election: Fake video clips of high ranking politicians and even Bollywood actors, Aamir Khan and Ranveer Singh, in which they comment on the ongoing election have gone viral prompting police investigations into the source of these videos.
Companies like Meta and OpenAI extol the virtues of advancing this technology at breakneck speeds, how can we ensure the responsible development of generative AI? Here are some of OpenAI’s guidelines.

Glossary:

Siddhantha Bose

Siddhantha Bose

Living, learning, and meeting people along the way

comments powered by Disqus