Microsoft Lost Its Keys, Voice Cloning Scams, The Biden-Harris Cybersecurity Labeling Program

In this episode, we discuss the recent Microsoft security breach where China-backed hackers gained access to numerous email inboxes, including those of several federal government agencies, using a stolen Microsoft signing key to forge authentication tokens.

A TikTok influencer used a voice cloning app to expose a cheating boyfriend. But wait, there’s more to this story than meets the eye! We discuss the serious implications of voice cloning and how its being used for new types of phone scams.

Lastly, we discuss the recent announcement by the Biden-Harris administration about their new cybersecurity labeling program for smart devices. Will this program help or hinder the security of smart devices?

** Links mentioned on the show *

Microsoft lost its keys, and the government got hacked
https://techcrunch.com/2023/07/17/microsoft-lost-keys-government-hacked/
https://www.bleepingcomputer.com/news/microsoft/microsoft-still-unsure-how-hackers-stole-azure-ad-signing-key/

Woman Reveals How a Voice-Cloning App Can Expose a Cheating Boyfriend
https://www.msn.com/en-us/news/technology/woman-reveals-how-a-voice-cloning-app-can-expose-a-cheating-boyfriend/ar-AA1dVMBh

Biden-⁠Harris Administration Announces Cybersecurity Labeling Program for Smart Devices to Protect American Consumers
https://www.whitehouse.gov/briefing-room/statements-releases/2023/07/18/biden-harris-administration-announces-cybersecurity-labeling-program-for-smart-devices-to-protect-american-consumers/

** Watch this episode on YouTube **

** Become a Shared Security Supporter **

For only $5 per month get exclusive access to ad-free episodes, listen to new episodes before they are released, get access to our private Discord server, receive a monthly shout-out on the show, and get a discount code for 15% off merch at the Shared Security store. Become a supporter today! https://patreon.com/SharedSecurity

** Thank you to our sponsors! **

SLNT

Visit slnt.com to check out SLNT’s amazing line of Faraday bags and other products built to protect your privacy. As a listener of this podcast you receive 10% off your order at checkout using discount code “sharedsecurity”.

Click Armor

To find out how “gamification” of security awareness training can reduce cyber risks related to phishing and social engineering, and to get a free trial of Click Armor’s gamified awareness training platform, visit: https://clickarmor.ca/sharedsecurity

** Subscribe and follow the podcast **

Join the Shared Security Community on Reddit: https://www.reddit.com/r/SharedSecurityShow/

Subscribe on YouTube: https://www.youtube.com/c/SharedSecurityPodcast

Watch and Subscribe on Odysee (YouTube alternative)
https://odysee.com/@SharedSecurity:c

Follow us on Mastodon: https://infosec.exchange/@sharedsecurity

Follow us on Twitter: https://twitter.com/sharedsec

Visit our website: https://sharedsecurity.net

Subscribe on your favorite podcast app: https://sharedsecurity.net/subscribe

Sign-up for our email newsletter to receive updates about the podcast, contest announcements, and special offers from our sponsors: http://eepurl.com/dwcc8D

Leave us a rating and review: https://ratethispodcast.com/sharedsecurity

Contact us: https://sharedsecurity.net/contact

The post Microsoft Lost Its Keys, Voice Cloning Scams, The Biden-Harris Cybersecurity Labeling Program appeared first on Shared Security Podcast.

*** This is a Security Bloggers Network syndicated blog from Shared Security Podcast authored by Tom Eston. Read the original post at: https://sharedsecurity.net/2023/07/24/microsoft-lost-its-keys-voice-cloning-scams-the-biden-harris-cybersecurity-labeling-program/

Recent Posts

Account takeover fraud: 5 steps for protecting your customers

According to research by the Aite Group, financial institutions are facing a 64% uptick in account takeover attacks than before…

4 hours ago

Seven Common Lateral Movement Techniques

Inside the Attacker’s Playbook: Unmasking the most common lateral movement techniques   Lateral movement techniques refer to the methods employed by…

5 hours ago

Antisocial Media and Critical National Infrastructure

[For some reason I posted this several months ago on my Dataholics blog, when this one might have been at…

5 hours ago

API Discovery: Definition, Importance, and Step-by-Step Guide on AppTrana WAAP

The growing use of APIs in various business areas exposes organizations to new security risks. An analysis of data breaches…

6 hours ago

Infoline launches LogRhythm-Powered SOC to Deliver Crucial Cybersecurity Services in Malaysia

SINGAPORE, July 25, 2023— LogRhythm, the company helping security teams stop breaches by turning disconnected data and signals into trustworthy…

11 hours ago

What Comes After Your SIEM Purchase?

Let’s say you recently acquired a security information and event Management (SIEM) solution and have a new layer of defense…

15 hours ago