У нас вы можете посмотреть бесплатно Clinton’s weekly cybersecurity roundup issue#28 или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Clinton’s Weekly Cybersecurity Roundup issue#28 —- Cybersecurity Breach, Impact & Countermeasures —- [1] - The BREACH Odido (Dutch telecom) – 6M customer records exposed What happened: Dutch operator Odido (formerly T‑Mobile NL) suffered a major breach; attackers stole data for around 6 million customers, including names, addresses, phone numbers, email addresses, dates of birth, bank account numbers, and ID document details. Impact: High identity‑theft risk, regulatory exposure, and heavy dependency on third‑party infrastructure and support systems highlighted in early reporting The Countermeasures Treat suppliers as high‑risk data custodians (DSP/DPD + provenance) What to do Maintain an up‑to‑date data‑flow map showing which vendors hold which data categories (ID docs, DOB, bank details, health data). Require data‑minimisation, encryption, and breach‑notification SLAs for any vendor touching high‑value personal data. Regularly validate risk profile-GDPR posture, breach history, and regulator interactions for key suppliers. —- [2] - The BREACH Figure Technology Solutions – 967k+ financial customers breached What happened: Fintech lender Figure disclosed a breach affecting roughly 967,000 accounts after ShinyHunters used voice‑phishing (vishing) to trick an employee into handing over SSO credentials and MFA codes. Impact: Names, addresses, phone numbers, emails, and dates of birth (~2.5GB of data) were exfiltrated and posted on a dark‑web forum, driving fraud and targeted phishing risk The Countermeasures Harden identity & human layer (SSO / MFA / anti‑vishing) —- What to do: Enforce phishing‑resistant MFA (FIDO2/passkeys where possible) for admin and high‑risk accounts. Run scenario‑based trainingspecifically on helpdesk spoofing, MFA fatigue, and vishing. Implement conditional access (device posture, location, impossible travel) and strict admin separation ——- Pragmatyq Vendor Management Platform Provides live vendor‑data catalogue insights on risks profile, evidence of compliance and non-compliance. Supplier Tiers and highlight where your highest blast radius sits. Comes with ISO, TSA78, DORA GDPR and sector‑specific questionnaires you can use to baseline suppliers against regulatory, industry expectations and track gaps. Links contracts, data categories, and incidents together, when a vendor like “Telco X” is breached, you instantly know: which customers, products, and geos are touchedand what your notification duty is Captures how each vendor authenticates (SSO/MFA patterns, admin access models), Integration touchpoints, location, remediation, risk register and structured controls across your vendor ecosystem. Flags critical vendors and in-app guides and tips on how to stay secure. Lets you embed security‑awareness and security feeds into the system, monitor vendor SLAs and monitor attestations over time. #weeklyroundup #cybersecurity #breach #pragmatyq #sso #mfa #compliance