Weekly News Roundup September 18-23, 2022

Posted on by Kacy Zurkus

I, for one, am loving the theme of this year’s Cybersecurity Awareness Month, which is See Yourself in Cyber. Because I am in the unique position of being able to invite cybersecurity professionals to join me as guests and speakers in the RSAC 365 Cybersecurity Learning Program, I’m conscious of trying to see everyone in this industry. As such, I spend a lot of time reading and listening to podcasts, which is how I discovered the Cyber.RAR podcast hosted by students of the Harvard Kennedy School.

This week’s podcast, “Are Turtles War Machines? AI-Enabled Cybersecurity Has an Answer,” asked whether AI technologies can actually improve the response and resilience of a system. It was a great debate about pattern recognition and the ability to trust the machine learning process. Given the growth of AI tech implementation in cybersecurity, it’s important to have these kinds of conversations about where the technology currently is, its ideal use state, and how to get there.

To learn more about AI Legal and Policy Considerations and Landmines to Avoid, check out this Top-Rated Session with Behnam Dayanim from RSA Conference 2022, or explore other content available in our Library.

Now let’s take a look at what else made cybersecurity headlines this week.

Sep. 23: Anonymous posted a message on one of its Twitter accounts, claiming the hacking group had leaked the personal data of more than 300,000 people believed to be Russian reservists.

Sep. 22: “CISA and the National Security Agency (NSA) have published a joint cybersecurity advisory about control system defense for operational technology (OT) and industrial control systems (ICSs).”

Sep. 21: Schools in the South Redford District of Detroit, Michigan, were closed, and district employees were warned not to use any devices issued by the district after a cyberattack on its systems.

Sep. 21: Courthouse News reported, “On the stand Wednesday in the criminal trial of his former boss, former Uber security chief Mat Henley described how his team found the two hackers who stole private user data in 2016.”

Sep. 21: A Florida teen involved with a nefarious SIM-swapping group is cooperating with the FBI after being kidnapped, beaten, and held for a $200,000 ransom.

Sep. 21: New research published by ESG suggests that security operations have become more difficult over the past two years.

Sep. 20: “A ‘limited number’ of American Airlines’ employees’ email accounts were compromised by an ‘unauthorized actor,’ who had potential access to a range of those employees’ personal data, the company said in a disclosure Sept. 16,” CyberScoop reported.

Sep. 20: Medtronic and the FDA issued a warning that some of the company’s insulin pump systems were vulnerable to cyberattacks.

Sep. 20: CNN reported, “Morgan Stanley was slapped with a $35 million fine from the Securities and Exchange Commission for extensive failures to safeguard personal identifying information on its clients.”

Sep. 19: SpaceNews reported, “The U.S. Space Operations Command is assigning cybersecurity and intelligence specialists to work side-by-side with satellite operators so they’re better prepared to protect U.S. systems from electronic and physical threats.”

Sep. 18: Rockstar Games suffered a breach that resulted in hackers gaining access to gameplay videos and source code in Grand Theft Auto 6.

Kacy Zurkus

Senior Content Manager, RSA Conference

RSAC Insights

artificial intelligence & machine learning cyberattacks cyber warfare & cyber weapons critical infrastructure patch vulnerability & configuration management security operations

Blogs posted to the RSAConference.com website are intended for educational purposes only and do not replace independent professional judgment. Statements of fact and opinions expressed are those of the blog author individually and, unless expressly stated to the contrary, are not the opinion or position of RSA Conference™, or any other co-sponsors. RSA Conference does not endorse or approve, and assumes no responsibility for, the content, accuracy or completeness of the information presented in this blog.

Share With Your Community

Related Blogs