• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
  • X
  • Facebook
  • YouTube
  • LinkedIn
Support
Screen Connect
Pay Online
SWK logo.

SWK Technologies

Software Solutions & Services

  • Accounting & ERP Software
      • Acumatica Cloud ERP
        • Overview
        • Construction
        • Distribution
        • Field Service
        • Financial Management
        • Manufacturing
        • Professional Services
        • Project Accounting
        • Retail-Commerce
      • Sage Intacct
        • Overview
        • Construction and Real Estate (CRE)
        • Distribution Operations for Sage Intacct
        • Financial Services
        • Healthcare
        • Manufacturing Operations for Sage Intacct
        • Nonprofits
        • Professional Services
        • Sage Intacct Payroll powered by ADP
      • Sage 100
        • Overview
        • Business Intelligence
        • Core Accounting & Financials
        • Distribution
        • Manufacturing
        • Payroll
        • Sage 100 Contractor
      • More Accounting Products
        • QuickBooks
        • Sage 50
        • Sage 300
        • Sage 500
        • Sage BusinessWorks
      • ERP Add-ons
        • ADP Workforce Now
        • Altec
        • Avalara
        • AvidXchange
        • BigCommerce
        • CIMCloud
        • Cloud Hosting
        • DataSelf
        • Fortis
        • FreightPOP
        • Microsoft 365
        • Netstock
        • Ottimate
        • Sage Fixed Assets
        • Sage HRMS
        • Sage Intacct Payroll powered by ADP
        • Savant WMS
        • Scanco
        • ScanForce
        • Solver
        • SPS Commerce
        • Velixo
        • Workforce Go!
      • More ERP Add-ons
        • Bizinsight
        • Concur
        • Crystal Reports
        • Fraxion
        • Fusion RMS
        • FYISoft
        • JobOps
        • KnowledgeSync
        • Lockstep Collect
        • Nectari
        • Pacejet
        • Planning Maestro
        • Sage CRM
        • Sage Intelligence
        • Scissortail HCM
        • Service Pro
        • ShipStation
        • Shopify
        • Starship
        • Sugar CRM
        • Time & Billing Pro
        • Timekeeper
        • True Sky
      • Industries
        • Construction
        • Distribution
        • Financial Services
        • Healthcare
        • Manufacturing
        • Nonprofit
        • Professional Services
        • Retail
  • Managed Cloud Services
      • Managed Services
        • IT Support
        • Cloud Hosting
        • Infrastructure-as-a-Service
        • Managed Cloud Services
        • vCIO
        • Acumatica Infrastructure
      • IT Solutions
        • Backup & Continuity
        • Cybersecurity
        • Email Hosting
        • Microsoft 365 Services
        • Virtualization
  • Consulting & Implementation
    • Business Technology Consulting
    • eCommerce
    • Financing
    • Human Capital Management
    • Managed Cloud & IT Services
    • Partner Program
    • Software Development
    • Software Implementation
  • Resources
    • Help Desk
    • Blog Posts
    • Payments Portal
    • Webinars
    • YouTube Channels
    • Acumatica Resources
    • Sage Intacct Resources
    • Sage 100 Resources
    • IT Resource Pages
  • About
    • About SWK
    • Awards & Recognition
    • Life@SWK
    • Careers
    • Success Stories
    • SWK Gives
  • Contact
    • Contact Us
    • Support
    • Our Locations

Cybersecurity Recap – July 2024

July 23, 2024 by Collin Knauer

Home » Blog » Cybersecurity Recap – July 2024

The summer is halfway over, and while you might be taking a vacation soon – hackers and cyber criminals surely are not. We have seen the cybersecurity landscape experience a variety of interesting developments this month, ranging from a massive system outage on Windows computers to simple tips that can save your passwords. Here’s a concise overview of these stories and more.

The CrowdStrike Windows Outage

Discussed around the globe, a recent CrowdStrike update caused Windows computers to crash and display the blue screen of death, affecting companies worldwide. Users first reported the problem on Reddit, indicating that entire organizations could be impacted at the beginning of the outage – a prediction that quickly turned into reality.

The issue stemmed from CrowdStrike’s Falcon Sensor product, which was designed to prevent cyber-attacks, yet malfunctioned and disrupted businesses – impacting transportation from grounding planes in the U.S. to halting trains in the U.K.

Microsoft has been taking mitigation actions and investigating the issue, which began around 6 p.m. Eastern Time on July 19th. Investigators soon realized that the problem was due to a faulty channel file, not a cyberattack, and a workaround was suggested, asking users to boot Windows into Safe Mode, delete a specific system file, and then reboot.

CrowdStrike CEO George Kurtz confirmed the issue is not a cyberattack. However, the workaround is not scalable and requires manual intervention on each system, which presents a challenge for large organizations. Now, we are seeing a significant decline in both CrowdStrike’s stock value and reputation. As more time passes, we will be able to get a better grasp of the implications of this outage.

A Staggering 95% of Organizations Have at Least one Critical Risk

A recent report by OX Security analyzed Supply chain cybersecurity – and came up with a few interesting conclusions. The report found that many applications contained multiple vulnerabilities spanning various stages of the kill-chain, leaving them even more vulnerable to a successful attack. A security exploit referred to as CVE-2024-3094 was discovered, specifically targeting XZ Utils in major Linux distributions demonstrating that attackers continue to use this method effectively.

The widespread presence of these vulnerabilities in code samples highlights persistent risks. On average, AppSec teams monitor 129 applications and handle over 119,000 security alerts annually, with 95% of organizations experiencing at least one high, critical, or apocalyptic risk within their software supply chain, and the average organization facing nine such issues. Additionally, 20% of all applications have high, critical, or apocalyptic issues during the Execution stage. Common vulnerabilities include command injection in 15.4% of applications, sensitive data in log files in 12.4%, and cross-site scripting in 11.4%. Six of the top ten vulnerabilities are linked to poor security practices such as authentication, encryption, exploitable information in logs, and the principle of least privilege.

However, there is some good news. Automated, contextual analysis has reduced the volume of overall alerts by more than 97%, speeding up the identification of critical alerts that organizations need to address. With a faster identification of alerts, companies can recognize and react to a cyber threat before it’s too late.

Healthcare Executive Provides Insight on Cybersecurity

Sunil Dadlani, Chief Information and Digital Officer at Atlantic Health System, will speak at the HIMSS AI in Healthcare Forum on September 5th, about integrating AI-enabled security and cyber defense in healthcare. These information sessions prove to be incredibly important as cyberattack techniques evolve, and so must strategies to protect AI systems.

CIOs, CISOs, and IT leaders need to leverage synergies between AI security and cyber defense. Dadlani’s session, “Dynamic Defense: The Interplay of AI Security and Cyber Threat Mitigation,” will highlight the need for secure AI systems to protect patient data and healthcare operations. AI enhances cybersecurity through advanced threat detection and rapid response, while robust cybersecurity measures protect AI systems. At Atlantic Health System, AI-based identity and access management systems improve security by analyzing user access patterns. Attendees will learn the importance of a comprehensive approach to securing AI solutions, ensuring data security and privacy, and understanding AI’s dual role in enhancing and defending against cyber threats.

Advanced Auto Parts Face a Massive Breach

Advance Auto Parts is notifying over 2.3 million people of a data breach involving stolen personal data. The company operates 4,777 stores and 320 Worldpac branches, serving 1,152 independently owned Carquest stores across North America and the Caribbean. On June 5, 2024, a hacker named ‘Sp1d3r’ began selling a 3TB database allegedly containing 380 million Advance customer records, orders, transaction details, and other sensitive information. On June 19, Advance confirmed the breach via a Form 8-K filing, stating it only affected current and former employees and job applicants. The breach was part of a broader campaign targeting Snowflake accounts using stolen credentials, impacting several companies. Advance’s internal investigation revealed that the breach impacted 2,316,591 people, with unauthorized access lasting from mid-April to May 24, 2024. The stolen data includes full names, Social Security numbers (SSNs), driver’s licenses, and government ID numbers, primarily from job applicants. Affected individuals are offered 12 months of complimentary identity theft protection and credit monitoring services through Experian, with enrollment available until October 1, 2024. They are advised to be vigilant for unsolicited communications, monitor accounts closely, activate fraud alerts, and consider placing a credit freeze. The number of affected individuals reported by Advance is significantly lower than the 380 million records claimed by ‘Sp1d3r’. Samples of the stolen data suggest customer information may have been exposed, though it’s unclear if customer notifications will follow. BleepingComputer contacted Advance Auto Parts for clarification, but no comment was immediately available.

A Hacker Leaked Almost 10 Billion Passwords, Here’s how you can Stay Safe

A hacker has recently leaked an alarming 10 billion passwords, significantly heightening security risks for users effected. This breach, discovered on July 4, includes 9.94 billion passwords compiled in RockYou2024. This compilation merges data from RockYou2021, which had 8.4 billion passwords—many related to social media—with newer breaches and data cracked by the hacker. Additionally, the “Mother of All Breaches” includes 26 billion pieces of personal data. The RockYou2024 leak emphasizes the urgent need to bolster account security. If you haven’t updated passwords for accounts compromised in previous breaches, such as the Ticketmaster breach, or if you reuse passwords, you may be vulnerable to credential stuffing attacks. To enhance your security, adopt the following measures: use unique, random, and strong passwords for each account, and avoid easily guessed strings by opting for complex ones. Implement a password manager to handle and enter these complex passwords, choosing from dedicated managers or those included in antivirus suites, or built-in options from Apple, Google, and Microsoft. Additionally, activate two-factor authentication (2FA) where possible to add an extra security layer, using one-time passcodes generated by an app or hardware dongles for better protection. Consider upgrading to passkeys, which offer superior security compared to 2FA by being unique, not requiring memorization, and being immune to phishing. Passkeys are easier to manage and can be stored in many major password managers.

Contact the Cyber-Experts Today

Oftentimes, the most challenging aspect of staying safe online is keeping up with the constant developments affecting the cybersecurity world. Fortunately, the experts at SWK will do it for you. Contact us today and work with a team of cybersecurity professionals who will dedicate their attention to save you both time, money, and reputation by implementing preventative measures against hackers.

Category: Blog, Cybersecurity, IT Services

Sidebar

Recent Posts

  • How Your ERP Software Impacts Tariff Costs
  • How a Recreational Play Structure Builder Laid the Groundwork for Their Lasting Growth
  • Why Financial Services Firms Need Phishing Defense
  • Acumatica General Ledger Training – Key Tips & Tricks
  • Sage Intacct vs. Sage 500: Best ERP for CFOs and Financial Leaders
  • What is the Relationship Between Cybersecurity and Cyber Insurance? 
  • Guide for Sage Intacct Credit Card Management

Categories

Ready to take the next step?

Contact SWK today to get in touch with one of our experts. We’ll go over your business challenges and unique needs, and see where you can unlock new value from your technology and make your operations run easier.

Get in touch!

Our Latest Posts

Cargo ship "Tokyo Triumph" loaded with shipping containers in various colors, representing international trade and supply chains affected by tariffs impacting manufacturing operations.

How Your ERP Software Impacts Tariff Costs

Read moreHow Your ERP Software Impacts Tariff Costs
Recreational Play Structure

How a Recreational Play Structure Builder Laid the Groundwork for Their Lasting Growth

Read moreHow a Recreational Play Structure Builder Laid the Groundwork for Their Lasting Growth
Hands holding an open silver padlock over a laptop keyboard, symbolizing cybersecurity vulnerabilities that phishing attacks exploit in financial services firms

Why Financial Services Firms Need Phishing Defense

Read moreWhy Financial Services Firms Need Phishing Defense

Awards and Accreditations

Top work places in NJ 2020.
Acumatica the Cloud ERP gold certified partner.
The Gold Microsoft partner logo on a black background.
Sage business partner diamond logo.
Dell Technologies Gold Partner
Sage tech partner logo.

Stay in the know!

Subscribe for exclusive ERP, process automation, IT and cybersecurity news.

Twitter
  • Facebook
  • YouTube
  • LinkedIn

Home
About
Contact

Support
Screen Connect
Pay Online
Downloads

SWK logo.

Headquarters:
120 Eagle Rock Ave, Suite 330
East Hanover, NJ 07936

Contact:
info@swktech.com
(877) 979-5462

Copyright © 2025 · SWK Technologies, Inc. · All Rights Reserved · Terms of Use · Privacy Policy

This site uses cookies to collect information about your browsing activities in order to provide you with more relevant content and promotional materials, and help us understand your interests and enhance the site. By continuing to browse this site you agree to the use of cookies. Visit our privacy policy to learn more.I understand