Skyhigh Security CloudCast
Skyhigh Security CloudCast

Skyhigh Security CloudCast

Skyhigh Security CloudCast

Overview
Episodes

Details

Join our Data Experts in the following podcast episodes, as we talk about all things Data. As an organization’s biggest asset, the importance of protecting data in a space with no jurisdiction is paramount; particularly at a time when the risks of data breaches globally have never been more serious. Adhering to compliance regulations is also a key challenge facing organizations including FedGov and a critical component of how these organizations protect their data.

Recent Episodes

CloudCast Cybersecurity Headlines for February 12th, 2025
FEB 12, 2025
CloudCast Cybersecurity Headlines for February 12th, 2025
<p class="mt-4">From the CloudCast Studios, I&#8217;m Scott Schlee, and these are your cybersecurity headlines for the week of Wednesday, February 12th, 2025.</p> <h5 class="mb-0 fw-bold">Headlines this week:</h5> <ul class="fw-bold"> <li>Critical Remote Code Execution Vulnerability in Microsoft Outlook</li> <li>Ransomware Payments Decline by 35% in 2024</li> <li>GrubHub Discloses Data Breach Affecting Users and Partners</li> <li>Spyware Firm Cuts Ties with Italy Amid Targeting Allegations</li> <li>Microsoft Warns of Attacks Exploiting ASP.NET Machine Keys</li> <li>Lazarus Group Targets Professionals with Job-Themed Malware</li> <li>SparkCat Malware Campaign Targets Cryptocurrency Wallets</li> <li>Silent Lynx Group Targets Central Asian Organizations</li> <li>Engineer IMI Suffers Cyberattack Following Similar Incident at Smiths Group</li> <li>Taiwan Bans DeepSeek AI Over National Security Concerns</li> </ul> <p>Thank you again for listening to Skyhigh Cloudcast. If you&#8217;ve enjoyed this episode, be sure to subscribe on your favorite platform so you never miss an update. If you like the show, please leave us a review. It helps others find the podcast. For more information about Skyhigh Security or CloudCast, please visit <a href="http://skyhighsecurity.com">skyhighsecurity.com</a>.</p> <p class="small mb-1">Sources:</p> <ul> <li><b>Taiwan Bans DeepSeek AI Over National Security Concerns</b><span style="font-weight: 400;">: </span><a href="https://diesec.com/2025/02/this-weeks-top-5-cybersecurity-news-stories-february-2025-01/"><span style="font-weight: 400;">diesec.com</span></a></li> <li><b>Critical Remote Code Execution Vulnerability in Microsoft Outlook</b><span style="font-weight: 400;">: </span><a href="https://diesec.com/2025/02/this-weeks-top-5-cybersecurity-news-stories-february-2025-01/"><span style="font-weight: 400;">diesec.com</span></a></li> <li><b>Ransomware Payments Decline by 35% in 2024</b><span style="font-weight: 400;">: </span><a href="https://diesec.com/2025/02/this-weeks-top-5-cybersecurity-news-stories-february-2025-01/"><span style="font-weight: 400;">diesec.com</span></a></li> <li><b>GrubHub Discloses Data Breach Affecting Users and Partners</b><span style="font-weight: 400;">: </span><a href="https://diesec.com/2025/02/this-weeks-top-5-cybersecurity-news-stories-february-2025-01/"><span style="font-weight: 400;">diesec.com</span></a></li> <li><b>Spyware Firm Cuts Ties with Italy Amid Targeting Allegations</b><span style="font-weight: 400;">: </span><a href="https://diesec.com/2025/02/this-weeks-top-5-cybersecurity-news-stories-february-2025-01/"><span style="font-weight: 400;">diesec.com</span></a></li> <li><b>Microsoft Warns of Attacks Exploiting ASP.NET Machine Keys</b><span style="font-weight: 400;">: </span><a href="https://thehackernews.com/2025/02/thn-weekly-recap-top-cybersecurity_10.html"><span style="font-weight: 400;">thehackernews.com</span></a></li> <li><b>Lazarus Group Targets Professionals with Job-Themed Malware</b><span style="font-weight: 400;">: </span><a href="https://thehackernews.com/2025/02/thn-weekly-recap-top-cybersecurity_10.html"><span style="font-weight: 400;">thehackernews.com</span></a></li> <li><b>SparkCat Malware Campaign Targets Cryptocurrency Wallets</b><span style="font-weight: 400;">: </span><a href="https://thehackernews.com/2025/02/thn-weekly-recap-top-cybersecurity_10.html"><span style="font-weight: 400;">thehackernews.com</span></a></li> <li><b>Silent Lynx Group Targets Central Asian Organizations</b><span style="font-weight: 400;">: </span><a href="https://thehackernews.com/2025/02/thn-weekly-recap-top-cybersecurity_10.html"><span style="font-weight: 400;">thehackernews.com</span></a></li> <li><b>Engineer IMI Suffers Cyberattack Following Similar Incident at Smiths Group</b><span style="font-weight: 400;">: </span><a href="https://www.cybersecurity-review.com/news-february-2025/"><span style="font-weight: 400;">cybersecurity-review.com</span></a></li> </ul> <p>&#8212;&#8212;&#8212;&#8211;</p> <p>CloudCast is hosted by Skyhigh Security’s very own Digital Experience Manager, Scott Schlee. Scott’s engaging demeanor and wit, backed by over 20 years in digital media production and web development, has led to successful collaborations with top-tier brands. His experience includes hosting and producing a wide range of podcasts and videos. Scott has been recognized for his outstanding work, including an award-winning digital short and a Webby Awards nomination for Viral Marketing (Branded). Beyond his professional achievements, Scott’s personal journey as a decade-long pancreatic cancer survivor has led him to share his story with the U.S. Congress and other organizations as an advocate for increased cancer research funding.</p> <div id="transcript" class="accordion accordion-flush mt-5"> <div class="accordion-item"> <h2 class="accordion-header"><button class="accordion-button collapsed" type="button" data-bs-toggle="collapse" data-bs-target="#flush-collapseOne" aria-expanded="false" aria-controls="flush-collapseOne"><i class="fa-solid fa-align-left me-2"></i> Transcript</button></h2> <div id="flush-collapseOne" class="accordion-collapse collapse" data-bs-parent="#transcript"> <div class="accordion-body"> <p class="mt-4">From the CloudCast Studios, I&#8217;m Scott Schlee, and these are your cybersecurity headlines for the week of Wednesday, February 12th, 2025.</p> <p>A Critical Remote Code Execution Vulnerability Has Been Discovered in Microsoft Outlook: The Cybersecurity and Infrastructure Security Agency issued an urgent alert about an actively exploited vulnerability in Microsoft Outlook. Attackers can execute remote code by bypassing Outlook&#8217;s protections using a simple URL trick, endangering sensitive data. Federal agencies and private organizations are urged to apply patches promptly to mitigate this threat.</p> <p>GrubHub Has Disclosed A Data Breach Affecting Users and Partners: Food delivery service GrubHub reported a data breach resulting from a compromised third-party service provider account. Exposed information includes names, emails, phone numbers, and partial payment details of some campus diners. GrubHub has terminated the unauthorized access, enhanced security measures, and advises users to maintain strong, unique passwords.</p> <p>Paragon Solutions Cuts Ties with Italy Amid Targeting Allegations: Israeli spyware company Paragon Solutions has severed relationships with its Italian clients following allegations that its software was used to target government critics. A recent spyware campaign affected 90 users across 24 countries, including journalists and activists, prompting an investigation by Italian authorities into the misuse of surveillance tools.</p> <p>Microsoft Warns of Attacks Exploiting ASP.NET Machine Keys: Microsoft identified over 3,000 publicly disclosed ASP.NET machine keys that attackers are exploiting to inject and execute malicious code using the Godzilla post-exploitation framework. This technique, known as ViewState code injection, poses significant risks to web applications. Organizations are advised to review and secure their ASP.NET configurations to prevent such attacks.</p> <p>Lazarus Group Is Targeting Professionals with Job-Themed Malware: The North Korean-linked Lazarus Group has launched a campaign using fake LinkedIn job offers in the cryptocurrency and travel sectors to distribute malware. The malicious code is capable of infecting Windows, macOS, and Linux systems, highlighting the group&#8217;s evolving tactics and the need for vigilance among professionals receiving unsolicited job communications.</p> <p>SparkCat Malware Campaign Is Targeting Cryptocurrency Wallets: A new malware campaign dubbed SparkCat has been identified, leveraging fake apps on both Apple&#8217;s App Store and Google&#8217;s Play Store to steal mnemonic phrases associated with cryptocurrency wallets. Notably, this marks one of the first instances of a stealer with optical character recognition capabilities being discovered in the Apple App Store. The malicious apps have since been removed, but users are advised to remain cautious when downloading wallet-related applications.</p> <p>Silent Lynx Group Is Targeting Central Asian Organizations: A previously unidentified hacking group, dubbed Silent Lynx, has been targeting entities in Kyrgyzstan and Turkmenistan, including embassies, legal firms, government-backed banks, and think tanks. The attackers deploy a PowerShell script that utilizes Telegram for command-and-control operations. Attribution points to a Kazakhstan-origin threat actor, with tactical overlaps observed with the YoroTrooper group.</p> <p>IMI Suffers A Cyberattack Following A Similar Incident at Smiths Group: Engineering firm IMI confirmed a cyberattack affecting its global systems, occurring shortly after a similar breach at rival company Smiths Group. While specific data accessed remains undisclosed, the incident underscores the increasing targeting of engineering and manufacturing sectors by cybercriminals. Organizations in these industries are urged to bolster their cybersecurity defenses.</p> <p>Taiwan Bans DeepSeek AI Over National Security Concerns: Taiwan has prohibited the use of DeepSeek, a Chinese-developed AI chatbot, citing risks of data leakage and potential censorship issues. This move aligns with actions taken by other countries concerned about the security implications of foreign AI technologies. The ban underscores the growing global apprehension regarding AI governance and data privacy.</p> <p>And let&#8217;s end the week off with some positive news. Ransomware Payments Declined by 35% in 2024: Despite a record number of ransomware attacks in 2024, totaling 5,263 incidents, ransom payments decreased to $813.55 million—a 35% drop from the previous year. This decline is attributed to improved cybersecurity measures, robust backups, and intensified law enforcement actions against ransomware groups. The trend indicates a shift in how organizations are managing and responding to ransomware threats.</p> <p>And those are your headlines for the week. Thank you again for listening to Skyhigh Cloudcast. If you&#8217;ve enjoyed this episode, be sure to subscribe on your favorite platform so you never miss an update. If you like the show, please leave us a review. It helps others find the podcast. For more information about Skyhigh Security or Cloudcast, please visit <a href="http://skyhighsecurity.com" target="_blank">skyhighsecurity.com</a>.</p> <hr class="my-4" /> <p class="mt-4 font-italic small">Please Note: All transcripts are generated using speech recognition software and human transcription, and may contain errors. Please check the corresponding audio before quoting in print.</p> </div> </div> </div> </div> <style> .accordion-flush .accordion-item .accordion-button, .accordion-flush .accordion-item .accordion-button.collapsed { border-radius: 0; border-top: solid 1px #ededed; border-bottom: solid 1px #ededed; background-color: #f8f9fa; } .accordion-button:focus { box-shadow:none; } .accordion-body { border-bottom: solid 1px #ededed; border-left: solid 1px #ededed; border-right: solid 1px #ededed; } .font-italic { font-style: italic; } </style>
play-circle icon
5 MIN
CloudCast Cybersecurity Headlines for February 5th, 2025
FEB 5, 2025
CloudCast Cybersecurity Headlines for February 5th, 2025
<p class="mt-4">From the Skyhigh Studios, I&#8217;m Scott Schlee, and these are your cybersecurity headlines for the week of Wednesday, February 5th, 2025.</p> <h5 class="mb-0 fw-bold">Headlines this week:</h5> <ul class="fw-bold"> <li>Android Users Urged to Update Devices Due to Critical Vulnerabilities</li> <li>Smiths Group Suffers Global Cyberattack</li> <li>TalkTalk Investigates Potential Data Breach</li> <li>Apple Releases Critical Security Updates</li> <li>Law Enforcement Shuts Down Illicit Cybercrime Services</li> <li>Google Blocks Over 2 Million Risky Android Apps in 2024</li> <li>UnitedHealth Discloses Massive Data Breach</li> <li>DeepSeek AI Chatbot&#8217;s Data Exposure &#038; Proposed US Government Ban</li> </ul> <p>Thank you again for listening to Skyhigh Cloudcast. If you&#8217;ve enjoyed this episode, be sure to subscribe on your favorite platform so you never miss an update. If you like the show, please leave us a review. It helps others find the podcast. For more information about Skyhigh Security or CloudCast, please visit <a href="http://skyhighsecurity.com">skyhighsecurity.com</a>.</p> <p class="small mb-1">Sources:</p> <ul> <li>Android Users Urged to Update Devices Due to Critical Vulnerabilities: <a href="https://www.thesun.ie/tech/14651573/android-phone-security-update-bug-hackers-hijack/" target="_blank">thesun.ie</a></li> <li>Smiths Group Suffers Global Cyberattack: <a href="https://www.thetimes.co.uk/article/smiths-group-news-share-price-9q6r8rx7f" target="_blank">thetimes.co.uk</a></li> <li>TalkTalk Investigates Potential Data Breach: <a href="https://www.thesun.ie/tech/14606321/talktalk-data-breach-hacker-customer-details-for-sale/" target="_blank">thesun.ie</a></li> <li>Apple Releases Critical Security Updates: <a href="https://diesec.com/2025/01/this-weeks-top-5-cybersecurity-news-stories-january-2025-05/" target="_blank">diesec.com</a></li> <li>Law Enforcement Shuts Down Illicit Cybercrime Services: <a href="https://thehackernews.com/2025/02/thn-weekly-recap-top-cybersecurity.html" target="_blank">thehackernews.com</a></li> <li>Google Blocks Over 2 Million Risky Android Apps in 2024: <a href="https://diesec.com/2025/01/this-weeks-top-5-cybersecurity-news-stories-january-2025-05/" target="_blank">diesec.com</a></li> <li>United Health Discloses Massive Data Breach: <a href="https://diesec.com/2025/01/this-weeks-top-5-cybersecurity-news-stories-january-2025-05/" target="_blank">diesec.com</a></li> <li>DeepSeek AI Chatbot&#8217;s Data Exposure: <a href="https://diesec.com/2025/01/this-weeks-top-5-cybersecurity-news-stories-january-2025-05/" target="_blank">diesec.com</a></li> <li>Lawmakers Advocate for DeepSeek Ban on Government Devices: <a href="https://www.wsj.com/tech/ai/lawmakers-push-to-ban-deepseek-app-from-u-s-government-devices-6a76151a" target="_blank">wsj.com</a></li> </ul> <p>&#8212;&#8212;&#8212;&#8211;</p> <p>CloudCast is hosted by Skyhigh Security’s very own Digital Experience Manager, Scott Schlee. Scott’s engaging demeanor and wit, backed by over 20 years in digital media production and web development, has led to successful collaborations with top-tier brands. His experience includes hosting and producing a wide range of podcasts and videos. Scott has been recognized for his outstanding work, including an award-winning digital short and a Webby Awards nomination for Viral Marketing (Branded). Beyond his professional achievements, Scott’s personal journey as a decade-long pancreatic cancer survivor has led him to share his story with the U.S. Congress and other organizations as an advocate for increased cancer research funding.</p> <div id="transcript" class="accordion accordion-flush mt-5"> <div class="accordion-item"> <h2 class="accordion-header"><button class="accordion-button collapsed" type="button" data-bs-toggle="collapse" data-bs-target="#flush-collapseOne" aria-expanded="false" aria-controls="flush-collapseOne"><i class="fa-solid fa-align-left me-2"></i> Transcript</button></h2> <div id="flush-collapseOne" class="accordion-collapse collapse" data-bs-parent="#transcript"> <div class="accordion-body"> <p>Google released a security update addressing nearly 50 flaws in the Android operating system, including a high-severity vulnerability that could allow attackers to install malware or steal files without user authentication. Users are strongly advised to update their devices promptly to mitigate these risks.</p> <p>Smiths Group, a multinational engineering firm, experienced a cyberattack leading to unauthorized access to its systems. The company isolated the affected systems and is collaborating with cybersecurity experts to assess and recover from the incident. The breach resulted in a 1.7% drop in the company&#8217;s share price.</p> <p>Telecom company TalkTalk is investigating claims of a data breach after a hacker alleged they were selling data from nearly 19 million of the company&#8217;s current and former customers. The breach reportedly involves customer names, emails, IP addresses, and phone numbers, though no financial information is believed to be at risk.</p> <p>Apple issued updates to address a zero-day vulnerability (CVE-2025-24085) in its Core Media component, which could allow malicious applications to escalate privileges on affected devices. Users are advised to update their iPhones, Macs, and other Apple devices to the latest software versions to protect against potential exploits.</p> <p>A series of law enforcement operations led to the takedown of online marketplaces such as Cracked, Nulled, Sellix, StarkRDP, and HeartSender, which were involved in selling hacking tools, illegal goods, and crimeware solutions. These actions impacted millions of users and disrupted significant illegal activities.</p> <p>Google reported that it blocked a record 2.3 million harmful Android apps from the Play Store in 2024, utilizing AI-powered reviews to detect threats more efficiently. Additionally, 158,000 developer accounts were banned for attempting to distribute malware, highlighting ongoing efforts to secure the app ecosystem.</p> <p>UnitedHealth revealed that a data breach in 2024 affected approximately 190 million Americans, making it the largest healthcare data breach in U.S. history. The compromised information includes personal and healthcare data, underscoring the critical need for robust data protection measures in the healthcare sector.</p> <p>Our final stories this week focus on DeepSeek, the Chinese-developed AI chatbot, facing major security concerns. Released on January 10, 2025, for iOS and Android, it quickly became the most-downloaded free app on the U.S. iOS App Store by January 27, surpassing even ChatGPT. Researchers have recently discovered that the platform exposed over a million lines of sensitive data online, including software keys and user chat logs, raising serious privacy risks. U.S. lawmakers are now pushing to ban DeepSeek from government devices, citing fears that foreign governments could potentially access and misuse the data. This follows a growing trend of regulatory crackdowns on AI applications with potential national security implications. The situation highlights the ongoing debate around AI governance, data privacy, and the risks associated with rapidly developing AI models.</p> <p>And those are your headlines for the week. Thank you again for listening to Skyhigh Cloudcast. If you&#8217;ve enjoyed this episode, be sure to subscribe on your favorite platform so you never miss an update. If you like the show, please leave us a review. It helps others find the podcast. For more information about Skyhigh Security or Cloudcast, please visit <a href="http://skyhighsecurity.com" target="_blank">skyhighsecurity.com</a>.</p> <hr class="my-4" /> <p class="mt-4 font-italic small">Please Note: All transcripts are generated using speech recognition software and human transcription, and may contain errors. Please check the corresponding audio before quoting in print.</p> </div> </div> </div> </div> <style> .accordion-flush .accordion-item .accordion-button, .accordion-flush .accordion-item .accordion-button.collapsed { border-radius: 0; border-top: solid 1px #ededed; border-bottom: solid 1px #ededed; background-color: #f8f9fa; } .accordion-button:focus { box-shadow:none; } .accordion-body { border-bottom: solid 1px #ededed; border-left: solid 1px #ededed; border-right: solid 1px #ededed; } .font-italic { font-style: italic; } </style>
play-circle icon
4 MIN
CloudCast Cybersecurity Headlines for January 15, 2025
JAN 15, 2025
CloudCast Cybersecurity Headlines for January 15, 2025
<p class="mt-4">From the Skyhigh Studios at Skyhigh Security, I’m Scott Schlee, it’s Wednesday, January 15, 2025, and these are your cybersecurity headlines.</p> <h5 class="mb-0 fw-bold">Headlines this week:</h5> <ul class="fw-bold"> <li>US Treasury Department Reports A Significant Data Breach</li> <li>China Protests US Sanctions Over Cyber Activities</li> <li>Bayview Asset Management Agrees to a $20 Million Settlement</li> <li>Apple Proposes a $95 Million Siri Privacy Settlement</li> <li>Sophisticated AI-Driven Phishing Scams Are Targeting Email Users</li> <li>Myanmar Enacts a Cybersecurity Law Enforcing Internet Censorship</li> <li>US Cybersecurity Experts Predict Increased Post-Election Cyber Attacks</li> <li>Former US Federal Officials Recommend Cybersecurity Policies for the Upcoming Trump Administration</li> <li>Project 2025&#8217;s Proposed Changes and Their Potential Impact on US Election Security</li> <li>And Concerns Over Quantum Computing&#8217;s Impact on Cybersecurity</li> </ul> <p>Before diving into this week’s headlines, we want to take a moment to acknowledge the devastating wildfires currently impacting California. Our thoughts are with everyone affected, including those who have lost homes, loved ones, or are facing displacement. As always, we encourage listeners to support relief efforts if they’re able. Please visit <a href="https://www.charitynavigator.org/losangelesfires" target="_blank">Charity Navigator</a> for a list of trusted organizations offering support.</p> <p>Thank you again for listening to Skyhigh Cloudcast. If you&#8217;ve enjoyed this episode, be sure to subscribe on your favorite platform so you never miss an update. If you like the show, please leave us a review. It helps others find the podcast. For more information about Skyhigh Security or CloudCast, please visit <a href="http://skyhighsecurity.com">skyhighsecurity.com</a>.</p> <p class="small mb-1">Sources:</p> <ul> <li>US Treasury Department Breach: <a href="https://www.usnews.com/news/top-news/articles/2025-01-06/us-cyber-watchdog-says-no-indication-breach-at-treasury-hit-other-federal-agencies" target="_blank">US News</a></li> <li>China Protests US Sanctions Over Cyber Activities: <a href="https://www.usnews.com/news/business/articles/2025-01-06/beijing-based-cyber-group-protests-us-sanctions-for-its-alleged-role-in-hacking-incidents" target="_blank">US News</a></li> <li>Bayview Asset Management&#8217;s $20 Million Settlement: <a href="https://www.wsj.com/articles/bayview-asset-management-enters-into-20-million-settlement-over-cybersecurity-weaknesses-a5335697" target="_blank">WSJ</a></li> <li>Apple&#8217;s $95 Million Siri Privacy Settlement: <a href="https://www.vox.com/culture/393839/apple-siri-lawsuit-settlement-is-my-phone-spying-on-me" target="_blank">Vox</a></li> <li>AI-Driven Phishing Scams Targeting Email Users: <a href="https://nypost.com/2025/01/04/tech/gmail-outlook-and-apple-users-urged-to-watch-out-for-this-new-email-scam-cybersecurity-experts-sound-alarm/" target="_blank">New York Post</a></li> <li>Myanmar&#8217;s Cybersecurity Law Enforces Internet Censorship: <a href="https://apnews.com/article/8128ba7a2c02555217c6a64ab641eaf6" target="_blank">AP News</a></li> <li>US Cybersecurity Experts Predict Increased Cyber Attacks Post-Election: <a href="https://www.theaustralian.com.au/business/technology/google-says-cyber-attacks-set-to-escalate-following-trump-victory/news-story/0b7ebbd93d4abb123761045a1751d92b" target="_blank">The Australian</a></li> <li>Quantum Computing&#8217;s Impact on Cybersecurity: <a href="https://www.thetimes.com/business-money/entrepreneurs/article/battle-begins-to-stop-quantum-computers-smashing-cyber-defences-rzmlwqw7f" target="_blank">The Times</a></li> <li>Former Officials Recommend Cybersecurity Policies for Next Administration: <a href="https://www.politico.com/news/2024/10/22/former-officials-next-administration-cyber-policies-00184854" target="_blank">POLITICO</a></li> <li>Project 2025&#8217;s Potential Impact on US Election Security: <a href="https://www.wired.com/story/project-2025-cisa-election-critical-infrastructure-security" target="_blank">WIRED</a></li> </ul> <p>&#8212;&#8212;&#8212;&#8211;</p> <p>CloudCast is hosted by Skyhigh Security’s very own Digital Experience Manager, Scott Schlee. Scott’s engaging demeanor and wit, backed by over 20 years in digital media production and web development, has led to successful collaborations with top-tier brands. His experience includes hosting and producing a wide range of podcasts and videos. Scott has been recognized for his outstanding work, including an award-winning digital short and a Webby Awards nomination for Viral Marketing (Branded). Beyond his professional achievements, Scott’s personal journey as a decade-long pancreatic cancer survivor has led him to share his story with the U.S. Congress and other organizations as an advocate for increased cancer research funding.</p> <div id="transcript" class="accordion accordion-flush mt-5"> <div class="accordion-item"> <h2 class="accordion-header"><button class="accordion-button collapsed" type="button" data-bs-toggle="collapse" data-bs-target="#flush-collapseOne" aria-expanded="false" aria-controls="flush-collapseOne"><i class="fa-solid fa-align-left me-2"></i> Transcript</button></h2> <div id="flush-collapseOne" class="accordion-collapse collapse" data-bs-parent="#transcript"> <div class="accordion-body"> <p>From the Skyhigh Studios at Skyhigh Security, I&#8217;m Scott Schlee, and these are your cybersecurity headlines for the week of January 6th, 2025.</p> <p>The U.S. Treasury Department reported a significant cyber incident attributed to Chinese state-backed hackers. Attackers remotely accessed employee workstations and unclassified documents, raising concerns about the security of federal systems. The Cybersecurity and Infrastructure Security Agency (CISA) stated there is no indication that other federal agencies were affected.</p> <p>The U.S. Treasury Department imposed sanctions on Beijing-based Integrity Technology Group for its alleged involvement in hacking incidents targeting U.S. critical infrastructure. China condemned the sanctions, denying the allegations and accusing the U.S. of defamation. This development underscores escalating cyber tensions between the two nations.</p> <p>Bayview Asset Management agreed to a $20 million settlement following a 2021 data breach that exposed personal information of 5.8 million customers. The firm faced criticism for inadequate cybersecurity measures and lack of cooperation with regulatory investigations. As part of the settlement, Bayview will enhance its cybersecurity protocols and undergo independent assessments.</p> <p>Apple proposed a $95 million settlement in a class-action lawsuit alleging unlawful surveillance through Siri. The lawsuit followed revelations that Siri had inadvertently recorded private conversations. Affected users between 2014 and 2024 may be eligible for compensation, highlighting ongoing concerns about digital privacy and device eavesdropping.</p> <p>Cybersecurity experts warned Gmail, Outlook, and Apple Mail users about sophisticated phishing scams utilizing artificial intelligence. These AI-generated emails are highly personalized, making them difficult to distinguish from legitimate correspondence. Users are advised to verify email senders, avoid clicking on suspicious links, and implement two-factor authentication to enhance security.</p> <p>Myanmar&#8217;s military government enacted a new cybersecurity law extending its control over internet usage and information flow. The law targets communication methods like virtual private networks (VPNs) and imposes sanctions on digital platforms that fail to prevent the spread of &#8220;disinformation.&#8221; Non-compliance can result in fines, suspensions, and imprisonment, raising concerns about freedom of expression and digital rights.</p> <p>Following Donald Trump&#8217;s presidential victory, cybersecurity experts anticipate a surge in cyber attacks from nations like China, Russia, North Korea, and Iran. The use of AI in cyber crimes is expected to escalate, making phishing emails and deepfake campaigns more convincing. Organizations are urged to adopt comprehensive cybersecurity measures to defend against these evolving threats.</p> <p>A bipartisan group of former federal officials proposed around 40 recommendations for cybersecurity policies for the upcoming administration. The plan emphasizes integrating cyber regulations, addressing workforce gaps, enhancing public-private collaboration, and developing a continuity of the economy plan to prepare for major cyberattacks. The report also highlights the need to standardize cybersecurity for critical infrastructure and address outdated regulations.</p> <p>Project 2025, developed by the Heritage Foundation, proposes significant reductions and changes to the Cybersecurity and Infrastructure Security Agency (CISA), a move that could jeopardize U.S. election security. The project criticizes CISA, particularly its efforts to combat misinformation, and suggests transferring some of its responsibilities to the military and intelligence community. Experts warn that the proposals could weaken CISA, undermine its critical functions, and create gaps in cybersecurity, leaving the nation vulnerable to misinformation and cyber threats.</p> <p>The U.S. has initiated efforts for businesses to enhance their cybersecurity systems against potential quantum computer threats. The National Institute of Standards and Technology has approved three algorithms for post-quantum cryptography after eight years of research. Major tech firms like Google and Apple have already started incorporating the new algorithms into their products. While current quantum computers cannot break existing encryption, they might in the future, making immediate action critical.</p> <hr class="my-4" /> <p class="mt-4 font-italic small">Please Note: All transcripts are generated using speech recognition software and human transcription, and may contain errors. Please check the corresponding audio before quoting in print.</p> </div> </div> </div> </div> <style> .accordion-flush .accordion-item .accordion-button, .accordion-flush .accordion-item .accordion-button.collapsed { border-radius: 0; border-top: solid 1px #ededed; border-bottom: solid 1px #ededed; background-color: #f8f9fa; }< .accordion-button:focus { box-shadow:none; } .accordion-body { border-bottom: solid 1px #ededed; border-left: solid 1px #ededed; border-right: solid 1px #ededed; } .font-italic { font-style: italic; } </style>
play-circle icon
6 MIN
CloudCast Cybersecurity Headlines for December 18, 2024
DEC 18, 2024
CloudCast Cybersecurity Headlines for December 18, 2024
<p class="mt-4">From the Skyhigh Studios at Skyhigh Security, I’m Scott Schlee, it’s Wednesday, December 18th, 2024, and these are your cybersecurity headlines.</p> <h5 class="mb-0 fw-bold">Headlines this week:</h5> <ul class="fw-bold"> <li>Microsoft’s AI Tool Privacy Concerns</li> <li>North Korean IT Worker Indictments</li> <li>Mysterious Drone Sightings</li> <li>Sanctions on Chinese Hackers</li> <li>Apple Users Urged to Update Devices</li> <li>SEC Cybersecurity Enforcement</li> <li>UK&#8217;s Cybersecurity Concerns</li> <li>Game Freak Data Breach</li> <li>Geico and Travelers Fined for Data Breaches</li> <li>Krispy Kreme Cyberattack</li> </ul> <p>Thank you again for listening to Skyhigh Cloudcast. This is our last episode of CloudCast for 2024. We sincerely hope you have a wonderful holiday break. We&#8217;ll be back in January and hope you will be too. If you&#8217;ve enjoyed this episode, be sure to subscribe on your favorite platform so you never miss an update. If you like the show, please leave us a review. It helps others find the podcast. For more information about Skyhigh Security or CloudCast, please visit <a href="http://skyhighsecurity.com">skyhighsecurity.com</a>.</p> <p class="small mb-1">Sources:</p> <ul> <li><strong>Wired</strong> &#8211; <a href="https://www.wired.com/story/microsoft-recall-credit-card-social-security-numbers" rel="noopener" target="_blank">Microsoft’s AI Tool Privacy Concerns</a> and <a href="https://www.wired.com/story/microsoft-recall-credit-card-social-security-numbers" rel="noopener" target="_blank">Mysterious Drone Sightings</a></li> <li><strong>The Times (UK)</strong> &#8211; <a href="https://www.thetimes.co.uk/article/north-korean-spy-knowbe4-tech-wzbfrlzk6" target="_new" rel="noopener">North Korean IT Worker Indictments</a> and <a href="https://www.thetimes.co.uk/article/britain-now-worse-at-dealing-with-cyberattackers-gchq-says-h7v57rh0d" target="_new" rel="noopener">UK&#8217;s Cybersecurity Concerns</a></li> <li><strong>Reuters</strong> &#8211; <a href="https://www.reuters.com/technology/cybersecurity/us-sanctions-chinese-firm-over-potentially-deadly-ransomware-attack-2024-12-10/" target="_new" rel="noopener">Sanctions on Chinese Hackers</a> and <a href="https://www.reuters.com/legal/legalindustry/wave-cyber-related-sec-enforcement-activity-may-signal-increased-scrutiny-2024-12-09/" target="_new" rel="noopener">SEC Cybersecurity Enforcement</a></li> <li><strong>New York Post</strong> &#8211; <a href="https://nypost.com/2024/12/10/tech/ai-fears-are-leaving-apple-users-exposed-to-data-stealing-bug/" target="_new" rel="noopener">Apple Users Urged to Update Devices</a></li> <li><strong>The Scottish Sun</strong> &#8211; <a href="https://www.thescottishsun.co.uk/tech/13693266/pokemon-developer-game-freak-hack-leak-nintendo-switch-2/" target="_new" rel="noopener">Game Freak Data Breach</a></li> <li><strong>Wall Street Journal (WSJ)</strong> &#8211; <a href="https://www.wsj.com/articles/new-york-state-fines-geico-and-travelers-11-3-million-for-data-breaches-fb7218a3" target="_new" rel="noopener">Geico and Travelers Fined for Data Breaches</a></li> <li><strong>MarketWatch</strong> &#8211; <a href="https://www.marketwatch.com/story/krispy-kreme-is-latest-to-report-a-cyberattack-thats-hampering-its-business-5d58a290" target="_new" rel="noopener">Krispy Kreme Cyberattack</a></li> </ul> <p>&#8212;&#8212;&#8212;&#8211;</p> <p>CloudCast is hosted by Skyhigh Security’s very own Digital Experience Manager, Scott Schlee. Scott’s engaging demeanor and wit, backed by over 20 years in digital media production and web development, has led to successful collaborations with top-tier brands. His experience includes hosting and producing a wide range of podcasts and videos. Scott has been recognized for his outstanding work, including an award-winning digital short and a Webby Awards nomination for Viral Marketing (Branded). Beyond his professional achievements, Scott’s personal journey as a decade-long pancreatic cancer survivor has led him to share his story with the U.S. Congress and other organizations as an advocate for increased cancer research funding.</p> <div id="transcript" class="accordion accordion-flush mt-5"> <div class="accordion-item"> <h2 class="accordion-header"><button class="accordion-button collapsed" type="button" data-bs-toggle="collapse" data-bs-target="#flush-collapseOne" aria-expanded="false" aria-controls="flush-collapseOne"><i class="fa-solid fa-align-left me-2"></i> Transcript</button></h2> <div id="flush-collapseOne" class="accordion-collapse collapse" data-bs-parent="#transcript"> <div class="accordion-body"> <p>From the Skyhigh Studios at Skyhigh Security, I’m Scott Schlee, it’s Wednesday, December 4th, 2024, and these are your cybersecurity headlines. </p> <p>Microsoft’s AI Tool Privacy Concerns: Microsoft&#8217;s AI tool, Recall, has been found capturing sensitive data, including credit card and Social Security numbers, every five seconds. Despite safeguards, this raises significant privacy and security concerns. </p> <p>North Korean IT Worker Indictments: Fourteen North Koreans have been indicted for posing as IT workers to fund nuclear programs. They infiltrated American and Western IT companies, using sophisticated fake identities and VPNs to mimic legitimate employees. This highlights the geopolitical cyber risks posed by state-sponsored actors. </p> <p>Mysterious Drone Sightings: Unexplained drone activity in New Jersey and neighboring states has triggered federal investigations into potential security threats. The drones have caused concern among authorities, leading to increased scrutiny and efforts to identify their origin and purpose. </p> <p>Sanctions on Chinese Hackers: The U.S. has sanctioned Chinese cybersecurity company Sichuan Silence Information Technology for deploying ransomware that posed significant risks to human life. In April 2020, the company used malicious software on over 80,000 firewalls globally, including critical infrastructure, leading to data theft and network disruptions. </p> <p>Apple Users Urged to Update Devices: Cybersecurity experts are urging Apple users to update their iPhones to iOS 18 to avoid a data-stealing bug capable of bypassing safeguards. Concerns over Apple&#8217;s AI program have led to hesitancy in updating, leaving devices vulnerable to attackers who can access sensitive data without user notification. </p> <p>SEC Cybersecurity Enforcement: The Securities and Exchange Commission (SEC) announced four settled enforcement orders against issuers for materially misleading disclosures following the 2020 SolarWinds cybersecurity incident. These settlements underscore the SEC&#8217;s focus on accurate and timely disclosure of cyber incidents. </p> <p>UK&#8217;s Cybersecurity Concerns: Britain is increasingly vulnerable to cyberattacks and complacent about the threats posed by hackers, warns Richard Horne, CEO of the UK’s National Cyber Security Centre (NCSC). Recent cyberattacks have disrupted services at Liverpool hospitals and impacted the grocery and prison transport sectors. The NCSC emphasizes the urgency of closing the gap between threats and cyber-resilience across critical infrastructure and the economy. </p> <p>Game Freak Data Breach: Game Freak, the developer behind Pokémon, confirmed a security breach that resulted in the leak of employee details and codenames for upcoming 10th generation Pokémon games. The breach also exposed information about the anticipated Nintendo Switch 2 console. This incident is considered one of the largest in gaming history. </p> <p>Geico and Travelers Fined for Data Breaches: New York State fined auto insurers Geico and Travelers Indemnity a total of $11.3 million due to cybersecurity lapses that led to data breaches affecting 120,000 individuals during the Covid-19 pandemic. The breaches contributed to a larger hacking campaign that exploited personal information for various frauds, including fraudulent unemployment claims. </p> <p>Krispy Kreme Cyberattack: Krispy Kreme reported an IT systems breach, causing significant impacts on its business operations and a 2% drop in its stock. The cyberattack disrupted online ordering in parts of the U.S., though physical stores remain open. The company is working with cybersecurity experts to investigate and contain the breach. </p> <hr class="my-4" /> <p class="mt-4 font-italic small">Please Note: All transcripts are generated using speech recognition software and human transcription, and may contain errors. Please check the corresponding audio before quoting in print.</p> </div> </div> </div> </div> <style> .accordion-flush .accordion-item .accordion-button, .accordion-flush .accordion-item .accordion-button.collapsed { border-radius: 0; border-top: solid 1px #ededed; border-bottom: solid 1px #ededed; background-color: #f8f9fa; }< .accordion-button:focus { box-shadow:none; } .accordion-body { border-bottom: solid 1px #ededed; border-left: solid 1px #ededed; border-right: solid 1px #ededed; } .font-italic { font-style: italic; } </style>
play-circle icon
4 MIN
Top 10 Cybersecurity Headlines of 2024
DEC 12, 2024
Top 10 Cybersecurity Headlines of 2024
<p class="mt-4">From the CloudCast Studios at Skyhigh Security, I’m your host Scott Schlee, and today we’re counting down the top 10 cybersecurity headlines of 2024. </p> <h5 class="mb-0 fw-bold">The Top Headlines for 2024: </h5> <ul class="fw-bold"> <li>RockYou2024: 10 billion passwords leaked in the largest compilation of all time</li> <li>Microsoft Falls Victim to Russia-Backed &#8216;Midnight Blizzard&#8217; Cyberattack</li> <li>UnitedHealth says Change Healthcare hack affects over 100 million, the largest-ever US healthcare data breach</li> <li>National Public Data breach publishes private data of 2.9B people</li> <li>Hackers steal “significant volume” of data from hundreds of Snowflake customers</li> <li>Notorious hacking group responsible for Ticketmaster data breach</li> <li>Crooks Steal Phone, SMS Records for Nearly All AT&#038;T Customers</li> <li>Ascension hacked after employee downloaded malicious file</li> <li>CDK Global outage caused by BlackSuit ransomware attack</li> <li>Widespread IT Outage Due to CrowdStrike Update</li> </ul> <p>Thank you for listening to Skyhigh CloudCast. If you’ve enjoyed this episode, be sure to subscribe on your favorite podcast platform so you never miss an update. If you like the show, please leave us a review. It helps others find the podcast. For more information about Skyhigh Security or CloudCast, please visit <a href="http://skyhighsecurity.com">skyhighsecurity.com</a>.</p> <p class="small">Sources: <a href="https://en.wikipedia.org/wiki/2024_CrowdStrike-related_IT_outages" rel="noopener" target="_blank">Wikipedia</a> · <a href="https://krebsonsecurity.com/2024/07/hackers-steal-phone-sms-records-for-nearly-all-att-customers/" rel="noopener" target="_blank">Krebs On Security</a> · <a href="https://cybernews.com/security/rockyou2024-largest-password-compilation-leak/" rel="noopener" target="_blank">CyberNews</a> · <a href="https://www.darkreading.com/threat-intelligence/microsoft-falls-victim-russian-midnight-blizzard-cyberattack%0A" rel="noopener" target="_blank">Dark Reading</a> · <a href="https://techcrunch.com/2024/10/24/unitedhealth-change-healthcare-hacked-millions-health-records-ransomware/" rel="noopener" target="_blank">TechCrunch</a> · <a href="https://support.microsoft.com/en-us/topic/national-public-data-breach-what-you-need-to-know-843686f7-06e2-4e91-8a3f-ae30b7213535" rel="noopener" target="_blank">Microsoft</a> · <a href="https://arstechnica.com/information-technology/2024/06/hackers-steal-significant-volume-of-data-from-hundreds-of-snowflake-customers/" rel="noopener" target="_blank">ARS Technica</a> · <a href="https://help.ticketmaster.com/hc/en-us/articles/26110487861137-Ticketmaster-Data-Security-Incident" rel="noopener" target="_blank">Ticketmaster</a> · <a href="https://www.hipaajournal.com/ascension-cyberattack-2024/" rel="noopener" target="_blank">HIPPA Journal</a> · <a href="https://www.bleepingcomputer.com/news/security/cdk-global-outage-caused-by-blacksuit-ransomware-attack/" rel="noopener" target="_blank">Bleeping Computer</a></p> <p>&#8212;&#8212;&#8212;&#8211;</p> <p>CloudCast is hosted by Skyhigh Security’s very own Digital Experience Manager, Scott Schlee. Scott’s engaging demeanor and wit, backed by over 20 years in digital media production and web development, has led to successful collaborations with top-tier brands. His experience includes hosting and producing a wide range of podcasts and videos. Scott has been recognized for his outstanding work, including an award-winning digital short and a Webby Awards nomination for Viral Marketing (Branded). Beyond his professional achievements, Scott’s personal journey as a decade-long pancreatic cancer survivor has led him to share his story with the U.S. Congress and other organizations as an advocate for increased cancer research funding.</p> <div class="accordion accordion-flush mt-5" id="transcript"> <div class="accordion-item"> <h2 class="accordion-header"> <button class="accordion-button collapsed" type="button" data-bs-toggle="collapse" data-bs-target="#flush-collapseOne" aria-expanded="false" aria-controls="flush-collapseOne"><i class="fa-solid fa-align-left me-2"></i> Transcript</button></h2> <div id="flush-collapseOne" class="accordion-collapse collapse" data-bs-parent="#transcript"> <div class="accordion-body"> <p>From the Skyhigh Studios at Skyhigh Security, I’m Scott Schlee, it’s Thursday, December 12th, 2024, and today, we’re counting down the top 10 cybersecurity headlines of 2024. This year brought no shortage of challenges—from healthcare breaches exposing millions of records, to CrowdStrike’s worldwide outage that disrupted businesses across the globe, and even one breach that cascaded from one company to another. These stories reflect the ever-evolving threats we face and some of the critical lessons learned along the way. And now, in no particular order, let’s dive into the year that was, in cybersecurity.” </p> <p>In July 2024, a massive compilation of nearly 10 billion unique plaintext passwords, dubbed &#8220;RockYou2024,&#8221; was leaked on a popular hacking forum. This dataset amalgamated passwords from thousands of previous breaches, both old and recent, creating an unprecedented repository of compromised credentials. The leak significantly heightened the risk of credential stuffing attacks, where cybercriminals exploit reused passwords to gain unauthorized access to various accounts. Security experts urged individuals to immediately reset compromised passwords, adopt strong and unique passwords for each account, utilize password managers, and enable multi-factor authentication to mitigate potential threats. </p> <p>In January 2024, Microsoft revealed that the Russian state-sponsored group Midnight Blizzard (also known as APT29 or Nobelium) had infiltrated its corporate email systems. The attackers employed a password spray attack to compromise a legacy non-production test account lacking multi-factor authentication. This initial breach allowed them to escalate privileges and access a small percentage of corporate email accounts, including those of senior leadership and cybersecurity personnel. The group exfiltrated emails and attachments, aiming to gather intelligence on Microsoft&#8217;s knowledge of their operations. Microsoft has since implemented enhanced security measures across its environments to prevent similar future incidents. </p> <p>In February 2024, Change Healthcare, a subsidiary of UnitedHealth Group, suffered a ransomware attack by the ALPHV/BlackCat group, compromising the personal and health information of over 100 million individuals—the largest healthcare data breach in U.S. history. The stolen data included names, contact details, Social Security numbers, medical records, and financial information. The breach disrupted healthcare services nationwide, affecting claims processing and patient care. UnitedHealth paid a $22 million ransom to the attackers and has been notifying affected individuals, offering two years of free credit monitoring and identity protection services. </p> <p>In April 2024, National Public Data, a background check company, suffered a massive data breach that exposed approximately 2.9 billion records, affecting up to 170 million individuals across the U.S., U.K., and Canada. The compromised data included full names, Social Security numbers, mailing addresses, email addresses, and phone numbers. The breach was attributed to a third-party hacker who gained access to the company&#8217;s systems in December 2023, with data leaks occurring from April through the summer of 2024. This incident led to multiple class-action lawsuits and significant reputational damage, ultimately resulting in National Public Data filing for Chapter 11 bankruptcy in October 2024. </p> <p>In mid-2024, a cybercriminal group identified as UNC5537 executed a series of attacks targeting customers of Snowflake, a prominent cloud data platform. By exploiting credentials harvested through infostealer malware, the attackers accessed approximately 165 customer accounts lacking multi-factor authentication (MFA), leading to the exfiltration of substantial volumes of sensitive data. Notable victims included Ticketmaster, Santander Bank, and AT&#038;T, with the latter&#8217;s breach exposing call records of over 100 million customers. The attackers attempted to extort affected organizations, demanding ransoms to prevent the public release of stolen data. In response, Snowflake collaborated with cybersecurity firm Mandiant to investigate the breaches and has since initiated plans to mandate MFA for all user accounts to enhance security. </p> <p>In May 2024, Ticketmaster experienced a significant data breach that exposed personal information of approximately 560 million customers worldwide. The hacking group ShinyHunters claimed responsibility, offering 1.3 terabytes of stolen data—including names, addresses, phone numbers, and partial credit card details—for $500,000 on the dark web. Ticketmaster detected unauthorized activity on May 20 and has since collaborated with law enforcement and cybersecurity experts to investigate the breach. The company assured customers that their accounts remain secure and offered affected individuals 12 months of free identity monitoring services. Customers are advised to monitor their financial accounts for suspicious activity and be vigilant against potential phishing attempts. </p> <p>In July 2024, AT&#038;T disclosed a significant data breach that compromised the call and text records of nearly all its wireless customers. The breach affected approximately 110 million individuals, exposing metadata such as phone numbers, call durations, and associated cell tower locations. While the content of communications and sensitive personal information like Social Security numbers were not included, the exposed data could still be exploited for targeted phishing attacks and other malicious activities. AT&#038;T has since secured the breach, notified affected customers, and is collaborating with law enforcement, resulting in at least one arrest related to the incident. </p> <p>In May 2024, Ascension, a major U.S. healthcare system, suffered a ransomware attack initiated by an employee inadvertently downloading a malicious file. The Russian-linked Black Basta group was identified as the perpetrator. The breach disrupted operations across Ascension&#8217;s 140 hospitals, leading to ambulance diversions, postponed medical procedures, and a six-week outage of electronic health records (EHR). Financially, the attack contributed to a $1.1 billion net loss for the fiscal year ending June 30, 2024, due to delays in revenue cycle processes and increased remediation costs. Ascension has since restored EHR access and is collaborating with cybersecurity experts to strengthen its defenses and prevent future incidents. </p> <p>In June 2024, CDK Global, a leading software provider for automotive dealerships, fell victim to a ransomware attack by the BlackSuit group, causing widespread operational disruptions across approximately 15,000 dealerships in North America. The breach forced many dealerships to revert to manual processes, significantly slowing down sales and service operations. To expedite system restoration, CDK Global reportedly paid a $25 million ransom to the attackers. The incident not only highlighted vulnerabilities within the automotive sector&#8217;s digital infrastructure but also underscored the substantial financial and operational risks associated with cyberattacks. </p> <p>In July 2024, a defective software update from cybersecurity firm CrowdStrike caused a global IT outage, disrupting numerous industries. The faulty update led to widespread system crashes, notably displaying the &#8220;blue screen of death&#8221; on Windows devices. This incident affected over 8.5 million devices worldwide, grounding thousands of flights, halting financial transactions, and impairing healthcare services. The recovery process was complex, requiring manual interventions and system reboots, which prolonged downtime for many organizations. The outage highlighted the critical need for robust software testing and the vulnerabilities inherent in centralized cybersecurity solutions. </p> <p>And those are your top headlines for the year of 2024. Thank you again for listening to Skyhigh CloudCast. If you’ve enjoyed this episode, be sure to subscribe on your favorite podcast platform so you never miss an update. If you liked the show, please leave us a review. It helps others find the podcast. For more information about Skyhigh Security or CloudCast, please visit <a href="http://SkyhighSecurity.com" rel="noopener" target="_blank">SkyhighSecurity.com</a>.</p> <hr class="my-4"> <p class="mt-4 font-italic small">Please Note: All transcripts are generated using speech recognition software and human transcription, and may contain errors. Please check the corresponding audio before quoting in print.</p> </p></div> </p></div> </p></div> </div> <style> .accordion-flush .accordion-item .accordion-button, .accordion-flush .accordion-item .accordion-button.collapsed { border-radius: 0; border-top: solid 1px #ededed; border-bottom: solid 1px #ededed; background-color: #f8f9fa; } .accordion-button:focus { box-shadow:none; } .accordion-body { border-bottom: solid 1px #ededed; border-left: solid 1px #ededed; border-right: solid 1px #ededed; } .font-italic { font-style: italic; } </style>
play-circle icon
9 MIN