Powered by RND
PodcastsNieuwsDaily Security Review

Daily Security Review

Daily Security Review
Daily Security Review
Nieuwste aflevering

Beschikbare afleveringen

5 van 205
  • TikTok, China, and the EU: The Battle Over Data Sovereignty
    In this episode, we explore the mounting scrutiny TikTok faces over its handling of European user data, with the EU’s Data Protection Commission (DPC) launching a fresh investigation into alleged transfers of data to China. TikTok, owned by Beijing-based ByteDance, is once again in the crosshairs for possible violations of the General Data Protection Regulation (GDPR) — this time following revelations that contradicted previous assurances given during a years-long inquiry.At the heart of the episode lies the broader question: Who controls data in a globalized, politically fractured internet?We delve into the intricate politics of data localization, examining how governments are increasingly treating data flows as matters of sovereignty and national security. With the EU enforcing a rights-based data protection regime and China emphasizing state-centric control through its Personal Information Protection Law (PIPL), companies like TikTok are navigating a legal minefield where compliance in one jurisdiction could mean noncompliance in another.Topics discussed include:TikTok’s €530 million GDPR fine and the new inquiry sparked by undisclosed data transfers to Chinese servers.The role of Project Clover, TikTok’s €12 billion initiative to localize EU user data and build trust through European-based infrastructure and security auditing.How GDPR’s Article 46 requires equivalency in legal safeguards for any cross-border data transfers, and why Chinese laws such as the National Intelligence Law fail that test.The strategic enforcement power of the Irish DPC and how remote access, not just physical storage, is now classified as a “data transfer” under GDPR.The stark contrast between GDPR and China’s PIPL: one centers on individual rights and transparency, while the other prioritizes state surveillance and geopolitical control.The collateral damage to global cloud computing, API efficiency, and data redundancy when localization laws fragment digital ecosystems.Europe’s evolving stance toward Chinese tech firms—once seen through a commercial lens, now increasingly treated as security and sovereignty issues.Through the lens of the TikTok case, this episode unpacks the new realities of digital governance, where data is power, and control over that data is rapidly becoming a tool of foreign policy. For enterprises and policymakers alike, the challenge is not just about compliance, but navigating a digital world divided by legal borders and political agendas.
    --------  
    58:06
  • Booz Allen Invests in Corsha: Defending Machine-to-Machine Communication at Scale
    As the cybersecurity landscape shifts toward hyperautomation and AI-driven autonomy, a new frontier has emerged: the identity and access security of machines. In this episode, we explore Booz Allen Ventures’ strategic investment in Corsha, a company at the forefront of Machine Identity Provider (mIDP) technology. Their collaboration marks a pivotal moment in redefining how we secure machine-to-machine (M2M) communication, especially in operational environments and critical infrastructure.Corsha’s platform addresses a seismic transformation: machines now outnumber humans in digital ecosystems by a ratio of 50:1—or even 80:1 in some accounts. With the rise of Agentic AI, autonomous software agents are making decisions, executing tasks, and accessing networks without human oversight. This paradigm shift makes human-centric identity models obsolete and demands dynamic, cryptographic, and automated lifecycle management for non-human identities (NHIs).This episode covers:Why identity is the new perimeter—and why it starts with machines.The vulnerabilities in today's identity and access management (IAM) frameworks, particularly in API-heavy, cloud-native environments where machines drive over 90% of all traffic.How Corsha’s mIDP delivers MFA for machines, manages millions of machine credentials, and secures connections across legacy industrial systems and modern cloud deployments.The significance of Corsha’s integration with traditional IdPs like EntraID and AWS IAM, bringing adaptive identity management to autonomous, interconnected ecosystems.The growing strategic alignment between national security imperatives and machine identity solutions. With Zero Trust becoming a mandate across U.S. federal agencies, Corsha’s capabilities directly support mission-critical autonomy, AI governance, and cyber-physical resilience.The role of Booz Allen Ventures in not just funding Corsha but helping scale its solutions for government and industrial sectors. The firm sees Corsha as “foundational infrastructure for next-generation mission systems.”How this investment follows Corsha’s Series A and A-1 rounds, and enables the expansion of Corsha Labs, advancing agentless behavioral identity and AI-enhanced IAM for autonomous systems.We conclude with a forward-looking view: as critical infrastructure, defense systems, and industrial operations become more automated, machine identity will become as central as human authentication is today. With Agentic AI accelerating the pace of change, Corsha—and investments like Booz Allen’s—are laying the groundwork for a secure, autonomous future.
    --------  
    33:00
  • WSUS Meltdown: Global Sync Failures and the Shift Toward Cloud Patch Management
    Windows Server Update Services (WSUS) has long been a cornerstone of enterprise patch management—but recent global synchronization failures have raised serious questions about its future viability. In this episode, we dissect the widespread outage that left organizations unable to sync critical Windows updates, unpacking both the technical cause and the broader implications for IT teams worldwide.In July 2025, system administrators across the US, UK, India, and Europe found their WSUS servers stuck in failed sync loops, thanks to a problematic update revision from Microsoft. With WSUS servers globally attempting full synchronizations simultaneously, Microsoft's update infrastructure was overwhelmed. The result? Timeout errors, stalled deployments, and massive headaches for IT teams already stretched thin.We walk through the exact symptoms of the incident—including IIS errors, .NET timeouts, and SoftwareDistribution.log anomalies—and the server-side fix that ultimately resolved it. But as we explore the root causes, it's clear this wasn’t just a one-off issue. Firewall misconfigurations, bloated WSUS databases, mismanaged application pools, and MIME-type conflicts all contribute to WSUS’s growing fragility.To keep WSUS functioning, organizations must implement rigorous maintenance routines:Regular SUSDB health checks for superseded, obsolete, and declined updatesIIS application pool tuning to prevent 503 errorsSQL and PowerShell-based cleanup scripts for reindexing, shrinking, and update pruningFirewall and service configuration audits to ensure all dependencies are running and reachableEven with these best practices, many experts believe WSUS is reaching end-of-life in spirit, if not in official terms. Microsoft's increasing emphasis on cloud-native solutions, like Windows Update for Business (WUfB) and Microsoft Endpoint Configuration Manager (MECM), signals a strategic departure from the manual, high-maintenance nature of WSUS.We explore modern alternatives that offer automation, scalability, and security:WUfB + Intune: Cloud-native patching with faster deployment and tighter endpoint integrationMECM (formerly SCCM): Hybrid control with support for complex environments and third-party appsThird-party platforms: Like Vicarius vRx, providing cross-platform patching, scripting, and virtual remediationAs security threats accelerate and zero-day exploits demand rapid mitigation, patch management can no longer rely on legacy systems prone to breaking under pressure. This episode makes it clear: now is the time to re-evaluate your patching strategy, invest in automation, and position your organization for secure, sustainable operations in a post-WSUS world.
    --------  
    27:45
  • Cracking eSIM: Exposing the Hidden Threats in Next-Gen Mobile Security
    eSIM technology has transformed the way we connect—but has it also introduced new vulnerabilities into the heart of modern telecommunications?In this deep-dive episode, we dissect the security architecture, remote provisioning systems, and critical attack surfaces of embedded SIM (eSIM) technology, now deployed in billions of mobile, consumer, and IoT devices worldwide. While eSIMs offer convenience, flexibility, and integration benefits, a growing body of research reveals severe flaws in their design and implementation—flaws that allow profile hijacking, cloning, and even eavesdropping on private communications.We begin by tracing the evolution of Subscriber Identity Module (SIM) technology into today’s eUICC-based eSIM architecture, reviewing the GSMA’s role in standardizing eSIMs for machine-to-machine (M2M), consumer, and IoT deployments. We unpack the core remote provisioning components, such as SM-SR, SM-DP+, LPA, and IPA, and explain how they interact to enable over-the-air SIM profile installation and switching—technically elegant, but increasingly a security liability.The heart of the episode delves into high-impact vulnerabilities that continue to shake the telecom industry:Memory exhaustion attacks that brick eSIMs by orphaning profile containersMalicious profile locking that disables switching to other networksCloning and profile hijacking, demonstrated in 2025 by researchers who extracted private cryptographic keys from real-world GSMA-certified eUICCsUndetected Java app injection, allowing rogue code to be embedded in live profilesCritical failures in Java Card VM implementations, enabling type confusion and remote profile manipulationWe also discuss the wider systemic implications, including:How attackers cloned an Orange eSIM and hijacked a subscriber’s identity undetectedWhy “tamper-proof” certification claims are now under scrutinyThe limitations of current GSMA security fixes and certification frameworksWhy hardware security modules (HSMs) and cryptographic audits are essential for true resilienceThe tension between convenience and control in mobile ecosystems—and what’s at stake if security doesn’t catch up with innovationAs vendors scramble to issue patches and strengthen defenses, the telecom industry faces an urgent reckoning: Can eSIM technology remain viable without complete trust in its secure elements? And are operators, vendors, and standard bodies doing enough to prevent the next wave of remote SIM exploitation?Whether you're a telecom engineer, a cybersecurity professional, or an executive responsible for device security, this episode reveals the high-stakes battle for the security of our mobile identities—and what it will take to protect billions of connected users from invisible compromise.
    --------  
    16:43
  • Qantas Breach and Beyond: Cybersecurity Risks in Australia’s Digital Supply Chains
    As Australia contends with a growing wave of cybersecurity incidents, this episode explores the intersection of national privacy laws, global supply chain vulnerabilities, and public trust in digital security. The recent Qantas data breach—affecting over 5 million customers—was the latest high-profile case to expose how fragile third-party service relationships can compromise even the most reputable organizations. But Qantas is not alone. The aviation sector, and critical infrastructure more broadly, is now a primary target for sophisticated cyberattacks fueled by digitization and undersecured supply chains.We begin with an overview of Australia’s privacy and data protection framework, governed by the Privacy Act, Cyber Security Act, Spam Act, and other related legislation. The Office of the Australian Information Commissioner (OAIC) plays a central role in enforcement, requiring timely breach notifications, secure data handling practices, and clear definitions around personal and sensitive information. Recent legislative amendments are pushing toward more stringent accountability, but enforcement still faces gaps, particularly in the context of global data transfers and outsourced operations.We then widen the lens through insights from ENISA’s latest supply chain cybersecurity report, which examines how organizations across the EU are struggling to implement consistent practices around vendor risk, vulnerability management, and patching. Despite having policies on paper, many essential entities lack dedicated resources, cybersecurity roles, or real-time visibility into their third-party environments. In an interconnected world, supply chain security is only as strong as its weakest link—a lesson repeatedly demonstrated in sectors like aviation, healthcare, and critical infrastructure.The Qantas breach, caused by an attack on a third-party call center platform, underscores the increasing relevance of this risk. Similar incidents at Cathay Pacific, SITA, and U.S. airports point to airlines becoming soft targets due to legacy systems, widespread outsourcing, and the complexity of digital ecosystems. Attackers, including state-aligned threat groups, are leveraging phishing, credential theft, and software vulnerabilities to breach these layered environments.We also discuss:The FAA’s proposed cybersecurity rules for aviation systems and how global regulators are responding to emerging threatsWhy call centers have become high-value entry points for attackers targeting sensitive personal informationBest practices for breach response, including credit monitoring, fraud alerts, and legal safeguards for affected individualsPublic sentiment in Australia, where consumers are expressing growing frustration with repeated breaches and lack of corporate accountabilityActionable recommendations for companies: strong access controls, continuous monitoring, role-based restrictions, and transparent supplier auditsThe challenge of aligning technical, operational, and legal safeguards across jurisdictions in a rapidly evolving threat landscapeUltimately, this episode emphasizes that strong cybersecurity is not just a technical challenge—it’s a governance and trust imperative. As breaches continue to mount and regulations tighten, both organizations and individuals must adapt to protect their digital assets, reputations, and rights.
    --------  
    1:03:23

Meer Nieuws podcasts

Over Daily Security Review

Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
Podcast website

Luister naar Daily Security Review, Groeten uit Grolloo en vele andere podcasts van over de hele wereld met de radio.net-app

Ontvang de gratis radio.net app

  • Zenders en podcasts om te bookmarken
  • Streamen via Wi-Fi of Bluetooth
  • Ondersteunt Carplay & Android Auto
  • Veel andere app-functies
Social
v7.20.2 | © 2007-2025 radio.de GmbH
Generated: 7/12/2025 - 1:47:37 AM