Brief

Brief #76: 19M Records Exposed, AI Generates 25% of Code, CrowdStrike Lawsuit

Multiple critical vulnerabilities in NetIQ iManager, cybersecurity workforce growth stalls, and AI reshapes code development at Google.

9 min read
nikoloz kokhreidze mandos brief newsletter for cybersecurity in week 44 of 2024

Happy Sunday!

I hope this Brief finds you well and ready to tackle the week ahead.

In this edition, I am covering:

And much more.


Sponsored

Fabric by BlackStork

Fabric Platform streamlines cybersecurity reporting processes, offering a comprehensive solution for teams seeking efficiency and consistency.

Learn More →

INDUSTRY NEWS

French ISP 'Free' Hit by Data Breach Exposing 19M Customer Records

Multiple Critical Vulnerabilities Found in NetIQ iManager Enable Remote Code Execution

Critical Authentication Flaws in Mitsubishi and Rockwell Factory Systems Enable RCE

LEADERSHIP INSIGHTS

CISO Burnout Crisis: 25% Consider Leaving Roles Due to Stress

NIS2 Directive Consuming 80% of IT Budgets While Effectiveness Questioned

CrowdStrike Outage Response: Key Considerations for Enterprise Security Leaders

CAREER DEVELOPMENT

Cybersecurity Training Gap Leaves Organizations Vulnerable Due to Developer-Centric Focus

Key Strategies for Hiring an Effective CISO in Today's Market

Global Cybersecurity Workforce Growth Stalls Despite 90% Having Unfilled Positions

Your feedback shapes Mandos Brief and I'd love to hear your thoughts about the content I share.

AI & SECURITY

Google Reports 25% of New Code Generated by AI, Driving Strong Financial Growth

AI Tool Detects Zero-Day Exploits Targeting IoT Security Cameras

AI Integration in Energy Infrastructure Requires Early-Stage Cybersecurity Planning

MARKET UPDATES

Delta Airlines Files $500M Lawsuit Against CrowdStrike Over Software Glitch

Armis Secures $200M Funding Round at $4.2B Valuation, Signals IPO Plans

Proofpoint Acquires Normalyze to Enhance Data Security Posture Management

TOOLS

Hacksplaining

Hacksplaining is a comprehensive security training platform for web developers, offering hands-on experience with real, vulnerable applications and concrete advice for securing code.

Covenant

Covenant is a collaborative .NET command and control framework designed for red team operations, providing robust infrastructure for managing offensive security engagements.

Deception-as-Detection

Deception based detection techniques mapped to the MITRE’s Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK): Windows Technique Matrix Linux Technique Matrix Mac Technique Matrix.


Before you go

If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!

For more frequent cybersecurity leadership insights and tips, follow me on LinkedInBlueSky and Mastodon.

Best, 
Nikoloz

Share This Post

Check out these related posts

Brief #82: Apple iCloud Vulnerability, Cloud Security Skills Gap, SolarWinds ARM Flaw

  • Nikoloz Kokhreidze
by Nikoloz Kokhreidze | | 9 min read

Brief #81: OpenAI Container Risks, Cloudflare Tunnel Attacks, AWS IR Service Launch

  • Nikoloz Kokhreidze
by Nikoloz Kokhreidze | | 9 min read

Brief #80: Cloudflare Data Loss, Godot Malware, Claude AI Vulnerability

  • Nikoloz Kokhreidze
by Nikoloz Kokhreidze | | 9 min read