Copy
View this email in your browser

The Weekly Ledger

Week of March 15, 2021

Share Share
Tweet Tweet
Share Share
Forward Forward

Your Cybersecurity News Roundup

Here are some of the must-read cyber security stories published in the past week.  Experts uncovered critical flaws in the Netop Vision Pro distance learning software used by many schools to control remote learning sessions. Smaller wired and wireless telecommunications firms may still be vulnerable. A "significant" number of cyberattacks targeting vulnerable Microsoft Exchange servers are attempted every single day. Purple Fox, has now added a worm module that allows it to scan for and infect Windows systems reachable over the Internet in ongoing attacks. A novel, if not particularly well made, ransomware is spreading to Exchange servers that haven’t been patched against the ProxyLogon exploit. Researchers discovered that AWS IAM rules do not work the same way as security engineers may be used to with Active Directory or other authorization mechanisms. Anyone with a smartphone that uses facial recognition will know it does not really work with a mask on... FatFace sent customers an email informing them that their personal data could have possibly been compromised in the hack. Facebook says hackers used the site to lure activists, journalists, dissidents to others containing links to malware. The OAuth2 authorization protocol has been under fire for the past ten years, this post presents three new vulnerabilities. Digital threats like ransomware or a CFO’s hijacked e-mail account are upending decades of norms and assumptions when it comes to transferring risk. The SolarWinds supply chain compromise and the exploitation of vulnerabilities in Microsoft Exchange have lent even more urgency to the DHS. Researchers have observed upwards of thousands of daily attacks against the zero-day flaws in Exchange servers. It attracted the highest ransomware demand in history, and the threat actor behind the attack shared some of the pilfered files as proof of responsibility.

Episode 208: Getting Serious About Hardware Supply Chains with Goldman Sachs’ Michael Mattioli

[Download the MP3]

When we think about cyber threats to the hardware supply chain, we often think about defense contractors making missiles and fighter jets. But these days, hardware supply chain security affects a wide range of companies – not just technology giants like Intel or cloud computing providers like Amazon and Google, but banks and financial services companies, healthcare companies, consumer electronics firms and more. 

Despite media attention to the problem, the awareness of hardware supply chain risks is still low within companies. Tools and talent to address it are hard to find and expensive. What’s a company to do?

Hardware Supply Chain Is Everyone’s Problem

In this episode of the Podcast we welcome Michael Mattioli into the Security Ledger studio. Michael leads the Hardware Engineering team within Goldman Sachs. There, he is responsible for the design and engineering of the firm’s digital experiences and technologies. He is also responsible for the overall strategy and execution of hardware innovation both within the firm and within the broader technology industry.

Michael is a Vice President and leads the hardware engineering team at Goldman Sachs

Michael is the author of a paper Consumer Exposure to Counterfeit Hardware. In it, he notes that many of the methods used to ensure hardware supply chain integrity are fallible. Visual inspection of installed parts or open source research on sellers don’t scale and are unreliable. He’s trying to sound the alarm about the threat that hardware supply chain insecurity poses to our entire economy.

TCG Tackles Hardware Supply Chain

Michael’s part of a new working group at Trusted Computing Group and the GSA that is working to develop standards based technology and tools to enforce hardware integrity at scale. In this interview, Michael and I talk about the growing risk of hardware supply chain risk and the need for coordination throughout the industry to address hardware security threats.Goldman Sachs joined the TCG in February as it looks for partners in securing FinTech, where activities like mobile transactions are growing by leaps and bounds.   


(*) Disclosure: This podcast and blog post were sponsored by Trusted Computing Group. For more information on how Security Ledger works with its sponsors and sponsored content on Security Ledger, check out our About Security Ledger page on sponsorships and sponsor relations.

As always,  you can check our full conversation in our latest Security Ledger podcast at Blubrry. You can also listen to it on iTunes and check us out on SoundCloudStitcherRadio Public and more. Also: if you enjoy this podcast, consider signing up to receive it in your email. Just point your web browser to securityledger.com/subscribe to get notified whenever a new podcast is posted. 

Listen Now!
Share Share
Tweet Tweet
Forward Forward
Copyright © 2021 Box Jump LLC/The Security ledger, All rights reserved.


Want to change how you receive these emails?
You can update your preferences or unsubscribe from this list.