Week of June 14th, 2024
Welcome to Your Cybersecurity Recap: a bite-sized weekly newsletter by cybersecurity enthusiasts, for cybersecurity enthusiasts.
Here are this week’s top takeaways:
Recently-Issued Security Alert: Critical Microsoft Outlook Zero-Click RCE Flaw Executes as Email is Opened
A critical zero-click remote code execution (RCE) vulnerability has been discovered in popular personal information management system Microsoft Outlook.
This vulnerability, designated as CVE-2024-30103 , enables attackers to run arbitrary code by sending a specially designed email. When the recipient opens the email, the exploit is triggered.
The vulnerability, CVE-2024-30103, is particularly alarming due to its zero-click nature. Unlike traditional phishing attacks that require user interaction, this flaw can be exploited without any action from the user.
Opening the malicious email alone is enough to compromise the system, making it a powerful weapon for cybercriminals and greatly reducing the barriers to successful exploitation.
A recent report from IBM states that in 2024, the most common cyberattack methods are compromised credentials (19%) and phishing attempts (16%) . This highlights the need for individuals to remain vigilant with their online security.
On average, phishing inflicted the most significant damage at US$ 4.91 million, followed by business email compromise at US$ 4.89 million. All these facts indicate that enterprises must alert employees about phishing attacks and invest in periodic, in-depth Employee Awareness Training to keep abreast of both current and emerging security threats such as CVE-2024-30103.
The Importance of Education Sector Cybersecurity–Toronto District School Board Hit By Cyberattack?
This past week, threat actors attempted to attack a technology testing environment used by the Toronto District School Board (TDSB) with ransomware, officials said Wednesday.
In a statement to parents on Wednesday, the school board stated that it recently became aware of unauthorized activity within a system the technology department uses to test programs before they run live on official systems. The statement also confirmed that the test environment is separate from the board’s official networks.
领英推荐
Colleen Russell-Rawlins, the director of education, and Associate Director Stacey Zucker explained that the board’s cybersecurity team took “immediate steps to secure and preserve data while safeguarding critical systems.”?
“TDSB systems are operational and have not been impacted. We have notified the Toronto Police Service and are working with third-party experts to assess the incident,” they said in the joint statement. “We are conducting a thorough investigation to understand the nature of the incident, any impact on our network, and if any personal information may have been affected by the incident. Out of an abundance of caution, we have notified the Information and Privacy Commissioner of Ontario.”
With the TDSB being the largest school board in Canada and managing 582 schools with about 235,000 total students, this incident is an example of why proactive penetration testing isn’t an option in 2024–it is a critical, non-negotiable component of any cybersecurity roadmap.
Out of 17 reported-on industries, the education sector ranked as the least secure (with financial and healthcare ranking closely behind.) This was determined by the education sector having, on average:
What is the reason for this? While much of it is attributed to human error, device standardization (which is common across all industries, but significantly more difficult to achieve in an educational setting due to their wide number of part-time, remote, and interned workers) is rarely enforced, meaning that educational device management policies and authentication protocols for connected devices are a weak link.
Another primary reasoning for why education sector cybersecurity faces security concerns is that employee awareness training is seldom executed on: with human risk accounting for 82% of security breaches in 2024, organizations open themselves to threat actors by not having robust, periodic awareness training in place.
By understanding the trends and emerging threats that education sector cybersecurity statistics point to, staff and IT decision makers can better advocate for proactive cybersecurity measures.
In 2024 and beyond, proactive cybersecurity measures for the education sector include, but are not limited to, the following:
What are your initial thoughts on this attempted breach?