Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
History
Technology
Sports
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/fd/9f/f0/fd9ff0c5-3993-f747-1bb1-2171784a0212/mza_9959698819672030276.jpg/600x600bb.jpg
The 10 Minute Cyber Fix
The Small Business Cyber Security Guy Productions
17 episodes
1 day ago
Your daily cybersecurity briefing for UK small businesses and tech enthusiasts. Every weekday morning, cybersecurity consultant Lucy Harper delivers the cyber intelligence you need to protect your business in just ten minutes. No jargon, no fear-mongering, just practical advice about current threats targeting UK SMEs. From ransomware attacks hitting local businesses to new phishing campaigns, each episode explains what's happening, why it matters, and exactly what you can do about it. Perfect for your morning commute or coffee break. Every M-F Listen Notes
Show more...
Technology
RSS
All content for The 10 Minute Cyber Fix is the property of The Small Business Cyber Security Guy Productions and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Your daily cybersecurity briefing for UK small businesses and tech enthusiasts. Every weekday morning, cybersecurity consultant Lucy Harper delivers the cyber intelligence you need to protect your business in just ten minutes. No jargon, no fear-mongering, just practical advice about current threats targeting UK SMEs. From ransomware attacks hitting local businesses to new phishing campaigns, each episode explains what's happening, why it matters, and exactly what you can do about it. Perfect for your morning commute or coffee break. Every M-F Listen Notes
Show more...
Technology
https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_nologo/44186783/44186783-1754312919083-98876f78f0b59.jpg
Workday Breach: The Rise of Voice Phishing Attacks
The 10 Minute Cyber Fix
10 minutes
4 months ago
Workday Breach: The Rise of Voice Phishing Attacks

Episode Summary

HR giant Workday falls victim to ShinyHunters' sophisticated social engineering campaign, exposing how simple phone calls can bypass enterprise-grade security. Host Lucy Harper breaks down the attack methods and provides actionable defence strategies for UK businesses facing this escalating threat.

What You'll Learn

  • How the ShinyHunters group uses voice phishing to breach major corporations including Workday, Google, and Adidas
  • The technical methods behind social engineering attacks targeting Salesforce and CRM systems
  • Why UK SMEs face higher risk and the four hundred thousand pound ransom already paid by one victim
  • Four immediate action steps to protect your business from sophisticated voice phishing campaigns
  • Advanced OAuth security measures and connected application monitoring strategies


Critical Statistics Mentioned

  • Over 11,000 organisations use Workday services, including sixty percent of Fortune 500 companies
  • Four hundred thousand pounds ransom payment made by one company to prevent data leak
  • Ten-day delay between Workday's breach discovery and public disclosure
  • August 6th discovery date versus August 16th disclosure timeline
  • Multiple major corporations targeted including Adidas, Google, Qantas, Allianz Life, Louis Vuitton, Dior, Tiffany & Co, and Chanel
  • Eight-digit connection codes used by criminals to link malicious data extraction tools
  • Third-party CRM platform compromised rather than core Workday systems
  • English-speaking employees specifically targeted at multinational corporations


Key Sources & References

  • BleepingComputer: Workday breach disclosure and ShinyHunters campaign details
  • Google Threat Intelligence Group: UNC6040 vishing campaign analysis
  • Malwarebytes: Comprehensive analysis of Salesforce social engineering attacks
  • GBHackers: Workday data breach technical details and impact
  • Computer Weekly: ShinyHunters campaign methodology and attribution
  • Salesforce Ben: Google breach confirmation and industry impact analysis
  • ShadowOpsIntel: Chanel breach details and OAuth security implications
  • Medium: Technical analysis of UNC6040 attack patterns and infrastructure
  • Cybersecurity Dive: Malicious Salesforce tool abuse and extortion tactics


Episode Sponsor

Equate Group - Comprehensive cybersecurity and IT services specialising in social engineering defence training, security operations centre monitoring, and OAuth application security auditing.

Your Next Steps

Implement immediate social engineering verification protocols across your organisation today. Audit all connected applications with administrative access, particularly CRM and cloud platforms. Establish multi-person approval processes for new application integrations. If your business lacks dedicated cybersecurity expertise, professional social engineering defence training becomes essential.

Source Verification Standards

All sources cited in this episode have been fact-checked and verified through multiple authoritative channels. Cybersecurity research firms and threat intelligence groups serve as primary sources for attack methodology and attribution. Financial figures are cross-referenced through industry security publications. UK-specific risk assessment prioritises government and established UK cybersecurity guidance.

Disclaimer

This episode provides general guidance only. Always consult qualified cybersecurity professionals before making critical infrastructure changes. Content is based on independent research and industry best practices.🎧 Subscribe for daily cybersecurity updates

👍 Like this episode if it helped you prepare

Production: Small Business Cyber Security Guy Production

Host: Lucy Harper

Sponsor:

All rights reserved

The 10 Minute Cyber Fix
Your daily cybersecurity briefing for UK small businesses and tech enthusiasts. Every weekday morning, cybersecurity consultant Lucy Harper delivers the cyber intelligence you need to protect your business in just ten minutes. No jargon, no fear-mongering, just practical advice about current threats targeting UK SMEs. From ransomware attacks hitting local businesses to new phishing campaigns, each episode explains what's happening, why it matters, and exactly what you can do about it. Perfect for your morning commute or coffee break. Every M-F Listen Notes