Off the Mic: Cloud Security Can’t Be an Afterthought
On Threat Vector This Week: Rethinking Cloud Security Strategies
In my latest conversation on Threat Vector, I sat down with Amol Mathur, SVP and GM for Prisma Cloud, to talk about a shift security leaders need to make: moving from a fragmented, reactive approach to an integrated, platform-driven cloud security strategy. Amol made a critical point—cloud security isn’t just about adding tools; it’s about ensuring they work together. The reality? Security teams aren’t getting bigger, but attack surfaces are. If your cloud defenses are siloed, attackers will find gaps faster than you can patch them. A prevention-first, platform approach isn’t just a nice-to-have—it’s the only way to scale security without burning out your team.
This conversation ties directly into a CISA alert about actively exploited vulnerabilities in Apple iOS/iPadOS and Mitel SIP phones. Cloud environments are dynamic, but if your security strategy isn’t built for speed—meaning fast detection, automated prevention, and rapid response—these threats will catch you off guard.
Listen to the podcast: Threat Vector – Rethinking Cloud Security Strategies
Read more: CISA Adds Apple and Mitel Vulnerabilities to Exploited List
Chinese Hackers Exploit Cisco Routers to Breach U.S. Telecoms
More U.S. telecom providers are getting hit by Chinese hackers, and the weak link? Unpatched Cisco routers. Attackers linked to China’s Volt Typhoon are exploiting old vulnerabilities to maintain deep, stealthy access to critical infrastructure.
Why It Matters: Perimeter devices are attack gateways. If they’re not patched, they’re already breached. Read more
Romance Scams Evolve: The “Tunnel of Love” Trap
Cybercriminals are using deepfake video calls, AI-generated messages, and investment fraud to trick victims into financial scams. The emotional manipulation is advanced, and it’s not just personal—employees are falling for them, too.
Why It Matters: Social engineering is getting smarter. Awareness training needs to go beyond just phishing emails. Read more
Trump’s Pick for National Cyber Director: Sean Cairncross
Trump has nominated Sean Cairncross, a lawyer and former executive, to lead U.S. cybersecurity strategy. With no direct cyber background, his impact will hinge on the team he builds.
Why It Matters: Cyber threats are at an all-time high. Leadership here isn’t just about policy—it’s about execution. Read more
Dutch Police Take Down Bulletproof Hosting Service
Authorities seized 127 servers from ZServers, a hosting provider favored by ransomware gangs. It’s a win for law enforcement, but history tells us cybercriminals will just move elsewhere.
Why It Matters: Infrastructure takedowns slow cybercrime but don’t stop it. Expect attackers to pivot quickly. Read more
CISA Flags New Apple and Mitel Vulnerabilities—Patch Now
CISA has added two actively exploited vulnerabilities to its watchlist:
Apple iOS/iPadOS (CVE-2024-38094)
Mitel SIP phones
Why It Matters: These are already being used in attacks. If your organization relies on either, patch immediately. Read more
Russian Hackers Use Device Code Phishing to Bypass MFA
Russia’s APT29 (Cozy Bear) is bypassing multi-factor authentication (MFA) using a technique called device code phishing. Attackers hijack authentication sessions without needing passwords or push notifications.
Why It Matters: MFA alone isn’t enough. Organizations need phishing-resistant authentication like FIDO2 keys to stay ahead. Read more