DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Talk To An Expert
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Talk To An Expert
CyberMaterial
Home News

US Cyber Safety Board Reviews Cloud Security

August 14, 2023
Reading Time: 2 mins read
in News

The Department of Homeland Security’s Cyber Safety Review Board (CSRB) is set to embark on an extensive examination of cloud security practices in response to recent cyberattacks on US government Microsoft Exchange accounts, carried out by a Chinese hacking group known as ‘Storm-0558’.

Furthermore, the CSRB, a collaborative effort between public and private sectors, specializes in comprehensive investigations to gain deeper insights into critical events, ascertain root causes, and provide well-informed cybersecurity recommendations. The focal point of this review will be the reinforcement of identity management and authentication within cloud environments, aimed at devising actionable cybersecurity guidance for all stakeholders including the government, industry, and cloud service providers (CSPs). These recommendations will subsequently be submitted to CISA and the current US administration to determine the necessary protective actions for government systems and accounts.

Additionally, the CSRB’s initiative highlights the escalating reliance on cloud computing by various organizations to deliver services to the American populace, underscoring the necessity of understanding the vulnerabilities inherent in cloud technology. The US Secretary of Homeland Security, Alejandro Mayorkas, emphasized the significance of cloud security, particularly its pivotal role in vital systems such as e-commerce platforms, communication tools, and critical infrastructure. The cyberthreat incident in question, involving the breach of email accounts for numerous organizations by the ‘Storm-0558’ group, exploited a zero-day vulnerability and forged authentication tokens derived from a stolen Microsoft consumer signing key. The compromised key allowed impersonation of Azure accounts, granting unauthorized access to sensitive email accounts and necessitating a comprehensive response from authorities.

As part of the aftermath of these cyberattacks, Microsoft faced criticism for not providing adequate free logging services to detect such malicious activities. Following collaboration with CISA, Microsoft eventually offered this logging data for free to all its customers. While Microsoft revoked the stolen signing key and addressed the API flaw, the exact origin of the hackers’ access to the key remains undisclosed.

A subsequent investigation by Wiz researchers revealed that the breach’s scope was more extensive than initially reported, raising concerns that the compromised key could potentially grant access to various Microsoft applications and customer authentication systems. Consequently, due to the severity of the breach and inconclusive findings, the US government entrusted the CSRB with a comprehensive review of the incident, aiming to provide insights to enhance user, defender, and service provider capabilities against future cyber threats.

Source:
  • Department of Homeland Security’s Cyber Safety Review Board to Conduct Review on Cloud Security 
Tags: August 2023CISACloud SecurityCyberattackCybersecurityMicrosoftNewsNews 2023USAVulnerabilities
22
VIEWS
ADVERTISEMENT

Related Posts

Millions of Sensitive Files Exposed

Millions of Sensitive Files Exposed

September 29, 2023
Cloud Security Challenges Persist

Cloud Security Challenges Persist

September 29, 2023
Security Researcher Faces Legal Challenge

Security Researcher Faces Legal Challenge

September 29, 2023
FDA’s Medical Device Cybersecurity Guide

FDA’s Medical Device Cybersecurity Guide

September 29, 2023

More Articles

Incidents

IT Services Provider Hit by Donut Gang

September 22, 2023
Alerts

Chinese-Language Phishing Campaigns

September 20, 2023
Alerts

Lazarus Group Threat to Healthcare

September 22, 2023
Cyber Briefing

September 22, 2023 – Cyber Briefing

September 22, 2023

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Alerts
  • Incidents
  • News
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
    • Tutorials
  • Report Cyber Incident
  • GET HELP
  • Contact Us

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.