In today’s episode, we discuss TeamViewer’s security breach by Midnight Blizzard, who extracted encrypted employee credentials but left customer data untouched (https://www.cybersecuritydive.com/news/teamviewers-breached-employee-credentials/720306/). We also cover Cisco’s response to a zero-day flaw in NX-OS exploited by the Velvet Ant cyberespionage group to install custom malware (https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmd-injection-xD9OhyOP). Additionally, we explore the critical OpenSSH vulnerability, “regreSSHion,” putting 700,000 servers at risk of remote code execution attacks (https://www.cybersecuritydive.com/news/openssh-remote-code-cve/720315/).
Video Episode: https://youtu.be/sX082aW6clg
Sign up for digestible cyber news delivered to your inbox: news.thedailydecrypt.com
Thanks to Jered Jones for providing the music for this episode. https://www.jeredjones.com/
Logo Design by https://www.zackgraber.com/
Tags
TeamViewer, Midnight Blizzard, breach, cyber threats, cybersecurity, employee data, network security, Velvet Ant, Cisco, NX-OS, CVE-2024-20399, vulnerability, OpenSSH servers, remote code execution, Qualys
Search Phrases
- TeamViewer breach by Midnight Blizzard
- Midnight Blizzard cyber attack
- TeamViewer data security incident
- Velvet Ant Cisco NX-OS vulnerability
- Cisco NX-OS zero-day exploit
- CVE-2024-20399 patch details
- Critical OpenSSH server vulnerability
- Qualys remote code execution vulnerability
- Securing OpenSSH servers against regreSSHion
- Modern cybersecurity threats 2024