Artificial Intelligence & Machine Learning
,
Critical Infrastructure Security
,
Cyberwarfare / Nation-State Attacks
ISMG Editors: China-Linked SharePoint Exploits Raise Alarm
In this week’s update, four ISMG editors discussed the latest SharePoint exploits linked to China, why the security of operational technology is still lagging 15 years after Stuxnet, and a look at the widening divide in the ways enterprises are approaching AI adoption.
See Also: Delivering ROI on AI: How AI transforms customer support efficiency
The panelists – Anna Delaney, director, productions; Mathew Schwartz, executive editor, DataBreachToday and Europe; Chris Riotta, managing editor, GovInfoSecurity; and Tom Field, senior vice president, editorial – discussed:
- How a major SharePoint exploit using Microsoft “ToolShell” zero-day vulnerabilities is linked to multiple Chinese nation-state groups targeting U.S. government systems, and why urgent patching of on-premises servers is needed;
- Why 15 years after Stuxnet critical infrastructure remains so vulnerable, as Iranian nation-state groups increasingly target U.S. water and energy sectors with attacks on OT systems and assets;
- The widening divide between organizations adopting generative AI and those resisting it, as security researcher Chase Cunningham recently warned, the commoditization of AI could dilute its transformational potential.
The ISMG Editors’ Panel runs weekly. Don’t miss our previous installments, including the July 11 edition on whether Russia’s hacker arrests signal real action or a propaganda play and the July 18 edition on how the Seychelles Bank breach mirrors the ‘Panama Papers’ scandal.