
Daily Security Review
410 episodes — Page 1 of 9

Ep 320Palo Alto Networks Uncovers 194,000-Domain Smishing Campaign Linked to “Smishing Triad”
A global smishing campaign of unprecedented scale has been uncovered by Palo Alto Networks, revealing the vast operations of a Chinese-speaking threat actor known as the Smishing Triad. Since January 2024, the group has deployed more than 194,000 malicious domains, impersonating legitimate organizations ranging from toll and postal services to banks, cryptocurrency exchanges, and delivery companies. This campaign, active across the U.S., Europe, Asia, and the Middle East, leverages personalized SMS messages designed to trick recipients into divulging sensitive personal or financial information.Palo Alto Networks’ threat intelligence analysis describes the Smishing Triad as operating under a Phishing-as-a-Service (PhaaS) model—a decentralized criminal ecosystem in which specialized actors handle everything from domain registration and hosting to SMS distribution and phishing kit development. The infrastructure churns through thousands of new domains weekly, with most lasting less than two weeks, making detection and takedown efforts nearly impossible to sustain.Impersonating legitimate entities such as the U.S. Postal Service, India Post, and major financial institutions, the attackers craft highly convincing lures that exploit urgency and trust. Victims are redirected to counterfeit login portals where they unknowingly hand over credentials, Social Security numbers, or banking information. According to Palo Alto Networks, this high-volume, low-lifespan domain model allows the Smishing Triad to evade signature-based defenses and continuously scale their attacks.Beyond its scale, what distinguishes this campaign is its professionalization—an industrialized cybercrime model where phishing capabilities are outsourced and sold as services. As a result, even novice criminals can launch large-scale smishing attacks with minimal technical skill. The report warns that this trend marks a dangerous evolution of the cybercrime economy, merging automation, deception, and distributed infrastructure to sustain a global fraud operation.Palo Alto Networks recommends heightened vigilance, staff awareness training, and strict verification protocols for unsolicited messages, particularly those claiming to be from official entities demanding immediate action. As the Smishing Triad continues to evolve, it stands as a clear reminder that the boundaries between state-linked actors and organized cybercriminal enterprises are increasingly blurred—and that mobile-based phishing remains one of the fastest-growing global threats to individual and enterprise security alike.#SmishingTriad #PaloAltoNetworks #Smishing #PhishingAsAService #Cybercrime #MobileSecurity #SMSPhishing #PhishingCampaign #OpenSourceIntelligence #ThreatIntelligence #Cybersecurity #InformationSecurity #GlobalThreats #PhishingAttack #Infosec #PhaaS #CyberDefense #DarkWeb

Ep 322Operation ForumTroll: Chrome Zero-Day Tied to Italian Spyware Developer Memento Labs
A newly uncovered cyber-espionage operation known as Operation ForumTroll has revealed the resurgence of commercial spyware in state-sponsored surveillance campaigns. According to new research from Kaspersky, the campaign exploited a Google Chrome zero-day vulnerability (CVE-2025-2783) and targeted Russian and Belarusian organizations in government, research, and media sectors. The attacks were traced to tools developed by Memento Labs, the Italian surveillance vendor formerly known as the Hacking Team, whose legacy spyware once sparked global controversy for being sold to authoritarian regimes.The operation began with highly tailored phishing emails disguised as invitations to the “Primakov Readings” — a major international policy forum — luring recipients into visiting short-lived malicious links. Once clicked, victims were redirected to a drive-by exploit that leveraged the Chrome sandbox escape vulnerability, allowing attackers to execute code on the underlying operating system. Kaspersky’s researchers later identified a similar flaw in Firefox (CVE-2025-2857), broadening the attack surface for the same threat actors.Once inside, the attackers deployed a dual-implant structure: a custom spyware loader named LeetAgent, and a far more advanced commercial implant called Dante, developed by Memento Labs. Both tools shared identical persistence mechanisms, specifically COM hijacking, a telltale indicator linking the two. While LeetAgent operated as a modular espionage platform capable of keylogging, code injection, and document theft, the Dante implant exhibited industrial-grade sophistication. Protected by VMProtect obfuscation, Dante was found to contain a central orchestrator module that decrypts and loads AES-encrypted payloads, all bound cryptographically to a specific victim machine—ensuring the spyware could not run elsewhere.Forensic analysis uncovered unmistakable evidence connecting Dante to Hacking Team’s legacy Remote Control Systems (RCS) spyware. Once researchers removed the VMProtect layer, the name “Dante” appeared directly in the code, confirming its lineage. This finding completes a technological chain linking Memento Labs’ “rebooted” surveillance suite to the same underlying codebase once used by Hacking Team—a company whose previous exposure in 2015 caused international uproar.The technical core of Operation ForumTroll rested on CVE-2025-2783, a flaw in Chrome’s Inter-Process Communication (IPC) framework that mishandled Windows pseudo-handles. This allowed attackers to exploit a logic error and execute arbitrary code outside the browser’s sandbox, achieving full system compromise. Before triggering the exploit, the attackers ran an intricate validation process using WebGPU-based hardware checks and ECDH encryption to ensure the victim was a genuine human target, not a researcher or sandbox system—a sophisticated evasion method rarely seen in commercial spyware delivery.Kaspersky’s attribution of Operation ForumTroll to Memento Labs represents one of the clearest connections yet between a commercial surveillance vendor and a state-backed cyber operation. The exposure carries significant implications for the spyware industry, signaling that tools developed under the guise of “lawful interception” continue to reappear in covert geopolitical campaigns. Analysts believe this revelation may force Memento Labs to re-engineer its flagship Dante suite, much as it did when rebranding from Hacking Team years earlier.This operation serves as a powerful reminder of the blurred boundaries between private surveillance companies and state cyber operations—and how vulnerabilities in everyday software can be weaponized through the global spyware market. A full list of Indicators of Compromise (IoCs) from the campaign has been released by Kaspersky to help defenders detect and mitigate related threats.#OperationForumTroll #MementoLabs #HackingTeam #DanteSpyware #LeetAgent #CVE20252783 #ChromeZeroDay #CyberEspionage #Kaspersky #CommercialSpyware #CVE20252857 #Cybersecurity #SpywareMarket #ThreatIntelligence #ZeroDayExploit #APT #SurveillanceTechnology #CyberDefense #Infosec

Ep 321Coveware Reports Historic Drop in Ransomware Payments: Only 23% of Victims Paid in Q3 2025
The global ransomware economy is collapsing under growing resistance from its targets. According to new data from cybersecurity firm Coveware, the third quarter of 2025 saw ransomware payments drop to a historic low, with just 23% of victims paying attackers—a continuation of a six-year downward trend. Even when ransoms were paid, the average payment plunged by 66%, marking one of the most dramatic contractions in cyber extortion profitability to date.This shift is not coincidental. Companies have learned that paying the ransom rarely prevents data leaks, and law enforcement guidance increasingly supports a strict no-payment stance. Privacy attorneys are also advising organizations to refuse payment, particularly in cases of data exfiltration-only attacks, where victims gain little to nothing by complying. As a result, the ransomware “business model” is faltering, with fewer payouts starving the criminal ecosystem that depends on steady Bitcoin inflows.Facing these headwinds, threat groups like Akira and Qilin have pivoted to a high-volume, low-demand strategy. Rather than chasing multi-million-dollar payouts from major enterprises, these gangs are now flooding mid-sized companies with smaller ransom demands—an approach that exploits limited budgets and weaker security postures. The data shows that the median victim size rose to 362 employees, suggesting that attackers are deliberately targeting organizations large enough to pay something, but small enough to lack enterprise-level defenses.Despite these strategic shifts, attackers continue to rely on basic entry points rather than sophisticated exploits. Over half of all ransomware incidents still begin with compromised remote access services, weak passwords, and misconfigured systems. Meanwhile, phishing campaigns and unpatched software vulnerabilities—most of them years old—remain the easiest paths for compromise. This underscores that ransomware operations thrive on poor hygiene, not innovation.Experts view this decline in ransom payments as an encouraging milestone. With fewer victims paying, the economics of ransomware are becoming unsustainable, forcing groups to fragment or lower their demands to stay operational. The Coveware report concludes that this trend represents meaningful progress: the more organizations refuse to pay, the less incentive attackers have to continue. However, the industry must remain vigilant—especially mid-sized companies, which now face a rising tide of smaller but more frequent attacks.As the ransomware economy contracts, the message is clear: resilience and refusal work. By focusing on foundational defenses—multi-factor authentication, strict patching, and secure remote access—organizations can help starve the cyber extortion ecosystem and push ransomware further toward collapse.#Ransomware #Coveware #CyberExtortion #AkiraRansomware #QilinRansomware #Cybersecurity #ThreatIntelligence #RansomwarePayments #Phishing #RemoteAccessSecurity #VulnerabilityManagement #InfoSec #DataBreach #CyberCrime #NoRansomPolicy #CyberDefense #IncidentResponse #Q32025 #CyberThreatReport

Ep 320Firefox Add-Ons Must Declare Data Collection—or Be Rejected
Mozilla is taking a decisive step toward transparency and user control by requiring all Firefox extensions to disclose how they collect and handle personal data. The new mandate introduces a dedicated key—browser_specific_settings.gecko.data_collection_permissions—that every extension must include in its manifest file. Whether or not an extension collects data, developers must explicitly declare their practices, ensuring there is no room for ambiguity.This policy introduces what many are calling a “privacy nutrition label” for browser add-ons, allowing users to see data collection details before installation. The information will be prominently displayed both on the addons.mozilla.org extension listing pages and within Firefox’s about:addons management interface. By placing this information front and center, Mozilla is giving users the ability to make more informed decisions about which extensions they trust with their data.For developers, compliance isn’t optional. Any extension that fails to properly declare its data collection policies will be rejected during the signing process, blocking it from distribution through Mozilla’s add-on store. Even extensions that support older Firefox versions must still offer an immediate, built-in method for users to control data collection after installation. This ensures that all users, regardless of which version they run, retain meaningful privacy controls.Mozilla’s phased rollout begins immediately for new extension submissions and will expand to include all existing extensions by next year. The initiative represents one of the most significant shifts in browser extension policy since Mozilla first opened its add-on ecosystem. By enforcing these clear, structured disclosures, Firefox is setting a new precedent in digital transparency—one that could pressure other browser vendors to follow suit.As privacy concerns continue to grow across the web, this move underscores Mozilla’s longstanding commitment to open, user-first design. For everyday users, it means fewer hidden data practices. For developers, it establishes a clear framework for ethical software distribution. And for the broader tech landscape, it signals a new era where trust and transparency are not optional, but expected.#Mozilla #Firefox #PrivacyUpdate #BrowserExtensions #DataTransparency #UserPrivacy #ManifestV3 #FirefoxAddons #Cybersecurity #OnlinePrivacy #ExtensionPolicy #DataCollection #AppTransparency #TechNews

Ep 319Chainguard’s $3.5 Billion Valuation Signals Massive Investor Confidence in Secure-by-Default Software
Chainguard, the Kirkland, Washington-based cybersecurity company, has announced a landmark $280 million growth funding round led by General Catalyst’s Customer Value Fund (CVF), pushing its total capital raised to nearly $900 million and valuing the firm at $3.5 billion. This new round marks a pivotal phase for Chainguard as it shifts from product-focused development to large-scale go-to-market execution, all while maintaining an ironclad focus on product innovation and security.Founded on the mission to secure the open source software supply chain, Chainguard provides over 1,700 secure-by-default container images, curated language libraries, and purpose-built VM images designed to eliminate known vulnerabilities before they reach production environments. The company’s “secure-by-default” approach has become its defining market differentiator, drastically reducing security and compliance risks for developers and enterprises worldwide.According to CFO Eyal Bar, the funding model is designed to “scale go-to-market investment without diluting ownership or slowing innovation.” This strategic partnership with General Catalyst’s CVF enables Chainguard’s commercial operations to fund their own growth, while preserving capital for research, product engineering, and the next wave of secure software infrastructure development.The infusion of capital also reflects unprecedented investor confidence in Chainguard’s disciplined financial model, rapid scaling capabilities, and unique position within the cybersecurity ecosystem. As enterprise dependence on open source continues to expand, Chainguard’s mission to secure foundational components of modern software development is more critical than ever. With a strong capital structure, a mature go-to-market plan, and a product suite trusted by developers globally, Chainguard is now poised to cement its leadership in the secure software supply chain sector.#Chainguard #OpenSourceSecurity #SoftwareSupplyChain #Cybersecurity #GrowthFunding #GeneralCatalyst #SecureByDefault #DevSecOps #VulnerabilityManagement #InvestmentNews #CloudSecurity #SoftwareEngineering #TechFunding #ContainerSecurity

Ep 318$1 Million WhatsApp Exploit Withdrawn—Researcher Silent, Meta Calls It “Low-Risk”
The Pwn2Own Ireland 2025 hacking competition was set to feature one of its most anticipated moments — a $1 million zero-click remote code execution exploit against WhatsApp — but the demonstration never happened. Scheduled to be showcased by researcher Eugene of Team Z3, the exploit’s abrupt withdrawal stunned attendees and quickly became the most controversial event of the competition. Organized by Trend Micro’s Zero Day Initiative (ZDI), Pwn2Own had validated the exploit’s entry, fueling expectations that WhatsApp would face a serious zero-day challenge in front of a live audience. Yet when the researcher pulled out hours before the demo, official explanations shifted, and a clash of narratives began to unfold between ZDI, the researcher, and WhatsApp’s parent company, Meta.ZDI initially cited travel issues as the reason for the cancellation, later updating its statement to say the exploit was “not sufficiently prepared for public demonstration.” By evening, ZDI announced that Team Z3 had agreed to a private disclosure, promising to share details confidentially with Meta. Researcher Eugene confirmed the arrangement the following day, explaining that a signed non-disclosure agreement (NDA) prevented him from revealing more and that he wished to maintain anonymity. That silence created a vacuum—one that Meta quickly filled.In a pointed public statement, WhatsApp claimed the researcher’s submission was not viable, describing it instead as two “low-risk bugs” and expressing disappointment that the team withdrew. The language was notably firm, designed to reassure users and minimize perception of risk. Yet, to many in the cybersecurity community, this reframing directly contradicted the exploit’s prior $1 million valuation and ZDI’s validation, raising doubts about whether the exploit had been downplayed for public-relations reasons.Analysts observed that ZDI’s evolving messaging — from travel delays to incomplete preparation — suggested an effort to contain reputational fallout while preserving its credibility as an impartial coordinator. Meanwhile, Meta’s decisive tone allowed it to reclaim control of the narrative, portraying its platform as secure and the withdrawn exploit as exaggerated. For researchers, however, the episode highlighted the power imbalance between independent security experts and major tech vendors, where NDAs and corporate messaging can quickly shape public understanding of an exploit’s true impact.This controversy underscores the fragile relationship between vendors, event organizers, and security researchers. WhatsApp’s choice to publicly downplay the exploit may have protected its image in the short term but risks alienating researchers wary of being discredited after disclosure. The incident serves as a cautionary tale for both sides: that in today’s vulnerability economy, the battle for truth is often fought not in code, but in public communication.#Pwn2Own #WhatsApp #ZeroDay #ZDI #Meta #ExploitWithdrawal #BugBounty #SecurityResearch #CyberSecurity #RCE #Eugene #TeamZ3 #TrendMicro #VulnerabilityDisclosure #HackerCommunity #WhiteHat #InfoSec #Pwn2OwnIreland2025 #NDAs #CyberEvent

Ep 317OpenAI Atlas Omnibox Jailbreak Exposes New AI Security Flaw
A serious vulnerability has been discovered in the OpenAI Atlas omnibox, a hybrid interface designed to handle both URLs and user prompts. Researchers at NeuralTrust revealed that attackers can disguise malicious instructions as URLs to jailbreak the omnibox, taking advantage of how Atlas interprets malformed input. Unlike traditional browsers, Atlas sometimes misclassifies malformed URLs as trusted instructions after a failed inspection, leading the system to execute the embedded commands with elevated trust and fewer safety checks. This parsing flaw allows attackers to effectively hijack the agent’s behavior, transforming a simple navigation request into an opportunity for exploitation.Through this vulnerability, threat actors can use a so-called copy-link trap — embedding the malicious string behind a “Copy Link” button or message. When a user pastes the disguised input into the omnibox, Atlas treats it as a legitimate prompt rather than a web address, potentially directing the user to a phishing site or executing commands within their authenticated session. The exploit could even be used to instruct the AI to delete files from connected cloud accounts, leveraging the user’s session tokens and bypassing normal confirmation checks.The underlying issue is not just a coding oversight but a logical failure in trust boundaries — a design-level problem where the system cannot reliably distinguish between a URL to visit and a command to obey. The result is a dangerous breakdown in user control, allowing a malicious prompt to override user intent, perform cross-domain actions, and sidestep the very safety layers meant to protect against prompt injection.Experts warn that this flaw represents a new class of process-based exploit for agentic AI systems. Because it abuses the underlying methodology of how the omnibox interprets input, the vulnerability could be adapted for countless malicious purposes beyond phishing or file deletion. Defending against it will require architectural changes, including stricter input validation, stronger provenance tracking, and clearer separation of trusted and untrusted instructions. The Atlas omnibox jailbreak shows that as AI interfaces evolve, attackers are learning to weaponize ambiguity — turning text meant to navigate into text that commands, and exploiting the blurred line between user input and system execution.#OpenAI #Atlas #OmniboxJailbreak #NeuralTrust #AIJailbreak #CyberSecurity #PromptInjection #URLExploit #CrossDomainAttack #AgentSecurity #Phishing #ClipboardAttack #AITrust #SafetyByDesign #InfoSec #AIThreats #InputValidation #OmniboxVulnerability #AtlasExploit #AIIntegrity

Ep 316Microsoft Rushes Emergency Fix for WSUS Remote Code Execution Flaw (CVE-2025-59287)
A critical remote code execution (RCE) flaw, tracked as CVE-2025-59287, has put thousands of enterprise networks at risk by exposing the Windows Server Update Service (WSUS) to active exploitation. The vulnerability, rooted in unsafe object deserialization, allows unauthenticated remote attackers to execute arbitrary code with System-level privileges — effectively granting full administrative control over targeted Windows servers. Because WSUS manages how updates are distributed across enterprise networks, a compromised instance can give attackers the ability to manipulate software updates, deploy malware, or hijack patch pipelines at scale.Following the discovery of in-the-wild attacks, Microsoft released out-of-band security updates, emphasizing the urgency of immediate patch deployment. Despite this, researchers from Eye Security and the Dutch National Cyber Security Centre (NCSC) have confirmed active exploitation shortly after a Proof-of-Concept (PoC) exploit was made public. The vulnerability impacts multiple Windows Server versions — including 2012, 2016, 2019, 2022, and 2025 — and requires only that the WSUS Server Role be enabled for successful compromise.Security firm HawkTrace was the first to publish detailed technical analysis and a working PoC, demonstrating how attackers can trigger the deserialization flaw by sending a crafted event to a vulnerable WSUS instance. Within hours of these details going public, threat actors began leveraging the exploit in real-world attacks, highlighting the alarming speed of vulnerability weaponization in modern threat landscapes.As of Eye Security’s latest findings, more than 2,500 WSUS servers worldwide remain exposed and unpatched. Microsoft’s official guidance urges immediate installation of both the initial and follow-up out-of-band patches, while administrators unable to patch immediately are advised to disable the WSUS Server Role as a temporary mitigation to close the attack vector.This incident underscores the critical importance of rapid patch management, proactive monitoring, and layered defenses for infrastructure components that underpin enterprise security ecosystems. The exploitation of CVE-2025-59287 is a stark reminder that attackers move faster than ever — and that every hour between disclosure and patching can mean the difference between defense and disaster.#Microsoft #CVE202559287 #WSUS #WindowsServer #RemoteCodeExecution #PatchNow #CyberSecurity #RCE #Exploit #Vulnerability #HawkTrace #EyeSecurity #DutchNCSC #ZeroDay #MicrosoftPatch #CriticalFlaw #InfoSec #EnterpriseSecurity #SystemPrivileges #WindowsExploit

Ep 316Perplexity Comet AI Browser Launch Exploited in Coordinated Impersonation Scam
The launch of Perplexity’s Comet AI browser — a major step forward in AI-assisted browsing — was almost immediately hijacked by cybercriminals. Within weeks of its July debut, threat intelligence firm BforeAI uncovered a coordinated impersonation campaign designed to exploit public interest in the new product. The campaign involved a web of fraudulent domains, fake mobile apps, and malicious advertisements, all working together to trick users into downloading counterfeit versions of Comet.Attackers registered more than 40 fake domains using typosquatting and brand impersonation, targeting search terms like “Comet,” “AI,” “browser,” and “Perplexity.” These sites often mimicked the official download pages to capture traffic from curious users. Beyond the web, the campaign spread to mobile ecosystems — with fake Comet AI applications appearing on both Google Play and the Apple App Store. One app, “Comet AI Atlas App Info,” impersonated the legitimate product so convincingly that Perplexity’s CEO Aravind Srinivas publicly warned users, confirming the iOS version as “fake and spam.”The malicious operation also leveraged Google Ads and social media promotions to push these fraudulent downloads, reflecting a high degree of coordination and resource management. Analysts believe this was no random phishing spree but a deliberate, financially motivated campaign orchestrated by experienced cybercriminals. Their use of international domain registrars, privacy protection services, and strategically parked domains suggests a sophisticated infrastructure optimized for deception and monetization.The incident underscores a critical truth for the modern tech landscape: every major product launch has become a potential target for brand hijacking and impersonation attacks. As threat actors evolve to exploit hype cycles and emerging technologies, proactive brand monitoring, pre-launch threat modeling, and digital risk protection are now essential defensive measures. The Comet AI case serves as a warning to every technology innovator — cybercriminals are watching every launch, ready to strike before the first user even downloads the real product.#Perplexity #CometAI #BrowserSecurity #CyberAttack #Typosquatting #FakeApps #AppStoreFraud #GooglePlayMalware #SocialEngineering #BrandImpersonation #CyberThreat #AI #DigitalRisk #CyberCrime #ThreatIntelligence #BforeAI #AravindSrinivas #OnlineSafety #Phishing #ScamAlert

Ep 315Lazarus Group Targets European UAV Firms in North Korea’s Drone Espionage Push
A new wave of cyber-espionage attacks reveals North Korea’s deepening effort to steal critical defense technologies from Europe. In a sophisticated campaign dubbed Operation Dream Job, the Lazarus Group — also known as Diamond Sleet and Hidden Cobra — has launched targeted attacks on European defense contractors and UAV (unmanned aerial vehicle) developers. Beginning in March 2025, the hackers posed as recruiters offering lucrative positions to engineers and software developers, luring victims into opening trojanized PDF files. Once opened, these files secretly deployed the ScoringMathTea remote access trojan, giving the attackers full system control and long-term persistence.Forensic evidence reveals the campaign’s deliberate targeting of companies involved in drone component manufacturing and UAV software development. Analysts believe the goal is to steal intellectual property and manufacturing blueprints to accelerate North Korea’s domestic drone production, which closely mirrors U.S. and European UAV designs. The operation also likely serves broader military intelligence goals, including gathering insights into weapon systems deployed in Ukraine.This campaign highlights how cyber-espionage remains central to Pyongyang’s asymmetric warfare strategy, blending digital infiltration with geopolitical opportunism. With evidence showing Lazarus’s malware referencing “drone” keywords within its code, the link between these attacks and North Korea’s UAV ambitions is unmistakable. As global tensions rise, European defense firms face mounting pressure to defend against this persistent, state-backed threat that fuses social engineering, espionage, and military modernization into a single, calculated operation.#LazarusGroup #OperationDreamJob #NorthKorea #CyberEspionage #UAV #DroneTechnology #DefenseIndustry #ScoringMathTea #CyberSecurity #Europe #APT #HiddenCobra #DiamondSleet #CyberThreat #MilitaryEspionage #DroneWarfare

Ep 314Toys “R” Us Canada Confirms Customer Data Breach After Dark Web Leak
Toys “R” Us Canada has confirmed a customer data breach after records from its database appeared on the dark web on July 30, 2025, prompting a full-scale cybersecurity investigation and disclosure to privacy regulators. The company’s internal review, conducted in partnership with third-party experts, verified that an unauthorized party accessed and copied portions of the customer database, exfiltrating personal information including names, mailing addresses, email addresses, and phone numbers.Crucially, the company stated that no financial or highly sensitive data—such as account passwords or credit card details—was compromised. The incident began when security researchers discovered a threat actor posting alleged customer data online, forcing Toys “R” Us Canada to act swiftly to validate the claims, contain the threat, and upgrade its IT security infrastructure.Following the confirmation of the breach, the retailer implemented enhanced security measures, improved access controls, and began notifying affected customers and Canadian privacy regulators, as required by national data protection laws. In its communication to customers, Toys “R” Us Canada advised vigilance against phishing and impersonation scams, warning that attackers often exploit such incidents by sending fraudulent emails or calls that appear to come from legitimate sources.While the compromised data is limited to personal contact details, cybersecurity experts note that this type of exposure still carries significant social engineering and identity theft risk, especially if combined with data from other breaches. The incident underscores the growing trend of retail sector data thefts, where customer information is monetized through dark web marketplaces or used to facilitate targeted phishing campaigns.As the investigation continues, Toys “R” Us Canada’s response highlights the importance of rapid incident detection, transparent communication, and proactive customer protection in managing post-breach fallout. The company maintains that it has taken all necessary steps to strengthen its defenses and restore trust following the exposure.#ToysRUsCanada #DataBreach #CyberAttack #DarkWebLeak #CustomerData #PrivacyBreach #CyberSecurity #RetailBreach #Phishing #InformationSecurity #IncidentResponse #CanadaPrivacy #DataProtection #BreachNotification #PersonalDataExposure #CyberThreat

Ep 313Kyocera’s Motex Lanscope Hit by Active Attacks: Critical 9.8 Exploit Enables Remote Code Execution
A dangerous zero-day vulnerability in Kyocera Communications subsidiary Motex’s Lanscope Endpoint Manager has triggered a global cybersecurity alert after being actively exploited in real-world attacks. Tracked as CVE-2025-61932, this flaw carries a CVSS severity score of 9.8, allowing remote, unauthenticated attackers to execute arbitrary code simply by sending specially crafted packets to a vulnerable system. In effect, it grants full control over enterprise endpoints, turning a trusted management tool into a weapon against its own network.The flaw, caused by improper verification of communication sources, has already been exploited in attacks primarily targeting organizations in Asia — especially Japan, where Lanscope’s adoption is widespread. Japan’s JPCERT/CC confirmed observing potential compromise attempts, and Motex has urged all customers running affected on-premises versions (9.4.7.1 or earlier) to apply emergency patches immediately.As the situation escalated, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) took decisive action by adding CVE-2025-61932 to its Known Exploited Vulnerabilities (KEV) list, citing it as a frequent and dangerous attack vector. Under Binding Operational Directive (BOD) 22-01, CISA has mandated all federal agencies patch their systems within three weeks — a clear signal of the vulnerability’s severity. Though the directive is mandatory only for U.S. federal entities, CISA is strongly advising all organizations worldwide to review the KEV list and prioritize patching.The potential consequences of exploitation are devastating. A successful compromise of Lanscope’s management layer could allow attackers to deploy ransomware across thousands of endpoints, steal sensitive corporate data, and maintain long-term access for espionage or persistence. With confirmed exploitation already underway, time is a critical factor.Cybersecurity analysts stress that this incident underscores the growing trend of supply-chain and endpoint management exploits, where centralized administrative systems become high-value targets. Organizations using Lanscope must act immediately — conducting full asset discovery, validating deployments, and applying Motex’s latest patches without delay.#Lanscope #CVE202561932 #Motex #KyoceraCommunications #CISA #KEVList #ZeroDay #ActiveExploitation #EndpointSecurity #RemoteCodeExecution #CyberAttack #PatchNow #JapanCybersecurity #BOD2201 #CVEAlert #Vulnerability #CISAMandate #NetworkSecurity #JPCERT #CyberThreat

Ep 313BIND 9 Emergency Patches: ISC Fixes High-Severity Cache Poisoning and DoS Flaws
The Internet Systems Consortium (ISC) has released a series of critical BIND 9 updates to fix multiple high-severity vulnerabilities affecting DNS resolver systems worldwide. The flaws—tracked as CVE-2025-40780, CVE-2025-40778, and CVE-2025-8677—pose serious threats ranging from cache poisoning to denial-of-service (DoS) attacks. These vulnerabilities collectively endanger one of the internet’s most foundational components: the Domain Name System (DNS).The two most severe issues, both scoring 8.6 on the CVSS scale, expose BIND resolvers to cache poisoning. One of them, CVE-2025-40780, originates from a weakness in the Pseudo Random Number Generator (PRNG) used for DNS queries, allowing attackers to predict critical identifiers like source ports and query IDs. The second, CVE-2025-40778, involves overly lenient acceptance of DNS records, which can enable attackers to inject forged or spoofed entries into the cache. Once poisoned, the resolver could redirect users to malicious domains, enabling phishing, credential theft, and data interception across entire organizations.The third flaw, CVE-2025-8677, rated 7.5 (High), introduces a DoS risk that allows adversaries to overwhelm DNS resolvers by sending specially crafted malformed DNSKEY records, consuming CPU resources until DNS services become unavailable. Because nearly all internet-dependent systems rely on DNS resolution, such attacks can lead to massive service disruptions, cutting off critical applications, communications, and business operations.The ISC emphasizes that no workarounds exist for these vulnerabilities — patching is the only mitigation. Updated versions, including BIND 9.18.41, 9.20.15, and 9.21.14, are now available and must be deployed immediately. Though the consortium reports no confirmed in-the-wild exploitation so far, the public disclosure of technical details drastically increases the likelihood of attackers developing weaponized exploits in the near term.For enterprises, this serves as an urgent reminder that DNS security is infrastructure security. Any delay in applying the ISC’s patches exposes networks to redirection attacks, service outages, and data breaches. Immediate updates are critical to maintaining service integrity, preventing manipulation of DNS traffic, and ensuring business continuity.#BIND9 #DNS #ISCSecurity #CVE202540780 #CVE202540778 #CVE20258677 #CachePoisoning #DNSAttack #PRNGFlaw #DenialOfService #CyberSecurity #Vulnerability #PatchNow #DNSResolver #InternetSecurity #ISCVulnerability #SystemAdmin

Ep 312Adobe Confirms Active Exploitation of SessionReaper Vulnerability in Commerce Platforms
A critical new vulnerability is wreaking havoc across the global e-commerce ecosystem. Tracked as CVE-2025-54236 and dubbed SessionReaper, this flaw affects Adobe Commerce and Magento Open Source platforms, allowing attackers to bypass security features and seize control of customer accounts through the Commerce REST API. Despite Adobe releasing emergency hotfixes on September 9, an alarming 62% of Magento sites remain unpatched, leaving tens of thousands of online stores exposed to active exploitation.Security firm Sansec first observed a spike in real-world attacks involving PHP webshell payloads and phpinfo probes used for reconnaissance and persistence. The attacks began almost immediately after the vulnerability was disclosed, accelerated by a premature leak of Adobe’s patch that gave adversaries a head start in developing exploits. Now that exploit code is public, experts warn of an impending surge in automated attacks targeting unpatched systems.Adobe has officially confirmed that the SessionReaper vulnerability is being exploited in the wild, transforming a technical flaw into a full-blown operational crisis for online retailers. Threat actors are using the exploit to hijack customer sessions, manipulate transactions, and exfiltrate sensitive data — threatening both consumer trust and brand integrity.According to Sansec’s telemetry, more than half of all Magento sites remain vulnerable, creating a massive attack surface for opportunistic cybercriminals. The exploit’s simplicity, combined with the widespread use of outdated Commerce installations, means mass compromise events are likely imminent.Cybersecurity professionals emphasize that immediate mitigation is non-negotiable. Administrators must apply Adobe’s September 9 hotfix for all affected versions (2.4.4 through 2.4.7) and monitor for unauthorized API activity or unexpected PHP file uploads. With SessionReaper already tearing through unpatched systems, time is the most critical defense.#AdobeCommerce #Magento #SessionReaper #CVE202554236 #AdobeVulnerability #EcommerceSecurity #Sansec #CyberAttack #Webshell #AccountTakeover #ExploitInTheWild #CVEAlert #PatchNow #RESTAPI #AdobeHotfix #CyberThreats #MagentoSecurity

Ep 311AI Sidebar Spoofing: How Malicious Extensions Hijack ChatGPT and Perplexity Interfaces
Cybersecurity firm SquareX has unveiled a new and alarming threat to users of AI-enabled browsers — a technique called AI Sidebar Spoofing. This sophisticated attack uses malicious browser extensions to create visually identical replicas of legitimate AI sidebars, tricking users into believing they are interacting with trusted AI assistants like ChatGPT Atlas, Perplexity’s Comet, or integrated browser agents such as Copilot in Edge and Gemini in Chrome. Once installed, these extensions inject JavaScript that seamlessly imitates the real AI interface, intercepting and altering prompts and responses.The result? A user unknowingly follows manipulated AI instructions that can lead to phishing scams, credential theft, or the execution of malicious commands directly on their own device. This form of attack weaponizes trust—exploiting not software vulnerabilities, but human behavior. SquareX’s analysis shows that these spoofed sidebars can guide users to install malware, grant remote access, or visit fraudulent websites, all while maintaining the illusion of legitimate AI guidance.The systemic flaw lies in how browsers permit extensions to inject and manipulate on-page content, making this threat platform-agnostic and dangerously widespread. Even though providers like OpenAI enforce strict sandboxing in ChatGPT’s Atlas browser, these safeguards do not protect users from themselves—particularly when deception is this seamless.Cybersecurity experts now warn that AI Sidebar Spoofing represents the next evolution in social engineering attacks, combining psychological manipulation with technical precision. To defend against it, organizations must enforce strict extension controls, retrain users to question AI-provided instructions, and recognize that as AI becomes a daily tool, the human trust layer is the new battlefield in cybersecurity.#AISidebarSpoofing #SquareX #ChatGPTAtlas #PerplexityComet #BrowserSecurity #SocialEngineering #Malware #CyberThreat #AITrust #ExtensionExploits #Cybersecurity #OpenAI #Phishing #AIinSecurity

Ep 310Jewett-Cameron Reports Ransomware Breach Involving Encryption and Data Theft
Oregon-based Jewett-Cameron Company, a manufacturer of fencing, kennels, and specialty wood products, has confirmed that it was the victim of a double-extortion ransomware attack on October 15, 2025, in an incident that disrupted operations and exposed sensitive corporate data. The attackers infiltrated the company’s IT network, deploying encryption and monitoring software, which temporarily halted key business functions and prevented access to core systems.According to an internal memorandum from company leadership, the attackers not only encrypted systems but also stole sensitive data, including financial information intended for an upcoming SEC filing and even images captured from internal video meetings. The stolen material is now being leveraged in a classic double-extortion scheme, with the attackers demanding a ransom to prevent public release of the data.While Jewett-Cameron reports that its cybersecurity insurance is expected to cover the costs of incident response and system recovery, the company acknowledges that the attack has caused significant operational disruptions that could have a material impact on business performance and regulatory timelines. Specifically, the company warns that the downtime could delay its Form 10-K filing and affect investor confidence if sensitive financial data is leaked prematurely.The company’s initial investigation indicates that while the breach affected corporate IT systems, no personal information belonging to employees, customers, or suppliers appears to have been compromised. This limits the potential exposure of third-party data but does not diminish the strategic and reputational risks of the event.Jewett-Cameron has engaged external cybersecurity counsel and forensic specialists to contain the breach, investigate the attack, and restore operations. The company has since contained the intrusion and is working to rebuild systems while evaluating whether to comply with the ransom demand — a complex decision balancing reputational risk, investor relations, and the ethical implications of paying threat actors.The ransomware group behind the attack remains unidentified publicly, but their tactics — combining data encryption with exfiltration and public pressure — align with the growing trend of double-extortion operations that target small and mid-sized manufacturing and supply chain organizations.This incident underscores the escalating risks facing manufacturers and public companies that handle sensitive financial disclosures. The attack on Jewett-Cameron highlights the intersection of operational technology (OT) and corporate IT vulnerabilities, and the increasing tendency for threat actors to weaponize stolen financial data to pressure organizations into ransom payments.As of now, Jewett-Cameron maintains that the intrusion is contained, and system restoration is underway. However, the company warns that even with insurance coverage, the broader consequences — including market volatility, regulatory scrutiny, and reputational damage — could be felt long after the systems come back online.#JewettCameron #Ransomware #Cyberattack #DoubleExtortion #DataBreach #Oregon #ManufacturingSecurity #CyberExtortion #IncidentResponse #CISO #CyberInsurance #OperationalDisruption #DataExfiltration #SEC #Form10K #CyberThreat #BusinessRisk #CyberForensics #EncryptionAttack #SupplyChainSecurity #InformationSecurity #RansomDemand #CyberResilience

Ep 309Star Blizzard’s Malware Makeover: From LostKeys to MaybeRobot
The Russian state-sponsored hacking group Star Blizzard — also tracked as ColdRiver, Seaborgium, and UNC4057 — has undergone a major transformation in its operations following public exposure earlier this year. After researchers at Google detailed its LostKeys malware and PowerShell-based infection chain in June 2025, the group swiftly abandoned those tools, pivoting to a completely rebuilt attack framework that emphasizes simplicity, flexibility, and stealth.Between May and September 2025, Star Blizzard replaced its previous malware suite with a streamlined infection chain built around three new components: NoRobot, YesRobot, and MaybeRobot. This tactical shift underscores the group’s ability to adapt rapidly under pressure — a defining hallmark of nation-state APTs.The evolution began with the introduction of NoRobot (also called BaitSwitch), a malicious DLL loader that initiates the infection chain via a technique known as ClickFix — malicious lure pages that trick victims into executing harmful commands. Once established, NoRobot retrieves a second-stage payload from attacker-controlled servers. Initially, this payload was YesRobot, a Python-based backdoor with limited functionality. But within weeks, Star Blizzard replaced it with MaybeRobot (aka SimpleFix), a far more agile operator-controlled backdoor capable of executing arbitrary files, shell commands, and PowerShell code directly from the attacker’s console.Unlike traditional automated implants, MaybeRobot favors hands-on-keyboard operations, giving human operators granular control for post-exploitation activities. This move marks a deliberate shift toward manual precision attacks, allowing Star Blizzard to minimize detection risk while maintaining strategic flexibility.The group’s technical evolution also extends to its evasion tactics. Star Blizzard has begun rotating its command-and-control infrastructure, altering file paths and DLL export names, and frequently rebranding binaries — all to undermine defenders’ reliance on static indicators of compromise (IOCs). These measures highlight a growing emphasis on anti-signature resilience, making behavioral and heuristic detection the only effective defense strategy.This transformation reveals a disciplined, reactive adversary capable of rebuilding its toolset within months of public disclosure. The operation’s new structure reflects a broader trend among state-backed actors: fewer automated frameworks, more adaptable operator-driven campaigns, and simplified yet hardened delivery mechanisms.For defenders, the implications are clear — signature-based detection is no longer enough. Monitoring behavioral patterns such as rundll32 misuse, command execution anomalies, and short-lived infrastructure is now essential to identifying and mitigating Star Blizzard’s evolving campaigns.#StarBlizzard #ColdRiver #Seaborgium #APT #Russia #CyberEspionage #NoRobot #MaybeRobot #LostKeys #BaitSwitch #ClickFix #MalwareEvolution #ThreatIntelligence #APTUNC4057 #CyberThreat #NationStateHacking #Cybersecurity #MalwareAnalysis #ThreatDetection #Rundll32 #HandsOnKeyboard #EvasionTactics #Infosec #APTActivity #GoogleThreatAnalysis #AdvancedPersistentThreat

Ep 308Keycard Emerges from Stealth with $38M to Secure the Identity of AI Agents
San Francisco-based Keycard has officially emerged from stealth mode, announcing $38 million in funding across seed and Series A rounds to build what may become one of the most critical infrastructure layers of the AI era — identity and access management (IAM) for AI agents. Founded in 2025 by former senior executives from Snyk and Okta, Keycard is taking on the monumental task of securing how autonomous AI systems authenticate, access data, and execute tasks across production environments.The company’s founding thesis is clear: as enterprises move beyond AI experimentation and begin deploying autonomous agents into real-world applications, they face a major security gap. These agents often require direct access to internal systems, APIs, and sensitive data — yet existing IAM systems were designed for humans, not autonomous entities. Keycard’s platform fills this void by introducing a cryptographically verifiable identity layer for non-human actors, enabling organizations to deploy agents safely and confidently.At the heart of Keycard’s approach is a set of groundbreaking architectural features:Cryptographic identity verification ensures that every agent has a provable, tamper-proof identity, making impersonation or spoofing virtually impossible.Dynamic, task-scoped tokens replace static credentials like API keys. These ephemeral tokens are generated in real time, scoped to a specific agent, and valid only for the duration of a given task—dramatically reducing exposure to credential theft and misuse.Runtime contextual access controls allow organizations to enforce adaptive security policies based on live conditions, enabling granular governance over what each agent can access or perform at any given time.Keycard’s $38 million raise includes a $30 million Series A led by Acrew Capital and an $8 million seed round co-led by Andreessen Horowitz (a16z) and Boldstart Ventures, with additional participation from Essence Ventures, Exceptional Capital, Mantis VC, Modern Technical Fund, Tapestry Ventures, and Vermillion Cliffs Ventures. This investor mix underscores broad confidence that Keycard is addressing a foundational problem for the emerging agent economy—the security and governance of autonomous AI systems.According to CEO Ian Livingstone, Keycard’s mission is to unlock the enterprise potential of AI agents by ensuring they operate with the same trust, control, and accountability as human users:“You can’t run AI agents in production until you can trust them — and trust starts with identity and access.”Keycard’s founding team brings together the developer-centric security expertise of Snyk with the identity and governance experience of Okta, creating a unique advantage in building security infrastructure that developers can easily adopt and enterprises can trust at scale. The company plans to use its funding to expand its research and development team, advance its IAM platform, and strengthen its integration with enterprise ecosystems.As the world transitions toward an AI-driven operational model, Keycard is emerging as a pioneer in defining identity for machines. Its platform offers the missing trust layer needed for enterprises to deploy autonomous systems responsibly — combining cryptography, adaptive security, and enterprise-scale architecture to secure the next generation of digital actors.#Keycard #AIIdentity #IAM #AIInfrastructure #AgentSecurity #AIAgents #Cybersecurity #AndreessenHorowitz #AcrewCapital #BoldstartVentures #AITrust #TaskScopedTokens #CryptographicIdentity #Snyk #Okta #AgentEconomy #AIAuthentication #MachineIdentity #AccessControl #AIinEnterprise #AIInnovation #StealthStartup #TechFunding #IdentitySecurity #AICompliance #AIgovernance

Ep 307Critical TP-Link Omada Vulnerabilities Expose Networks to Remote Takeover
Security researchers are urging immediate action after TP-Link disclosed multiple critical vulnerabilities in its Omada gateway line, affecting a wide range of ER, G, and FR series devices. The flaws—now patched by TP-Link—expose organizations to remote code execution, privilege escalation, and full network compromise, making them among the most severe threats to network infrastructure this year.The most dangerous vulnerability, CVE-2025-6542, carries a CVSS score of 9.3 and allows remote, unauthenticated attackers to execute arbitrary operating system commands. In simple terms, it gives hackers the ability to take full control of affected gateways without needing any credentials. Once exploited, this flaw can be used to manipulate traffic, install malware, or pivot into internal systems, effectively neutralizing perimeter defenses and exposing entire networks.Another critical flaw, CVE-2025-7850, is a command injection vulnerability that requires an attacker to already have administrative access to the web management portal. Although it’s an authenticated exploit, it becomes extremely dangerous in scenarios involving compromised credentials, insider threats, or password reuse—turning a single admin account into a complete network breach vector.Two additional high-severity issues, CVE-2025-7851 and CVE-2025-6541, further elevate the risk. One allows an attacker to gain root access, while the other enables OS command execution by an authenticated user. Together, these vulnerabilities create a chainable attack path—where even limited access can rapidly escalate to total control over the gateway and, by extension, the entire network.The consequences of leaving these devices unpatched are severe:Full network compromise: Attackers can monitor or redirect all network traffic, bypass firewalls, and infiltrate internal systems.Data exfiltration: Sensitive data—including PII, financial records, and intellectual property—can be intercepted in transit.Operational disruption: Attackers could disable or corrupt routing functionality, leading to downtime and loss of connectivity.Persistent access: Once inside, attackers could establish stealthy footholds, allowing long-term espionage or follow-on ransomware attacks.TP-Link has released firmware updates to address these flaws and strongly advises all users to apply the patches immediately. Administrators are also urged to change all device passwords after patching to ensure that any previously compromised credentials cannot be reused.These vulnerabilities are part of a growing pattern of attacks against network gateway devices, which have become high-value targets for threat actors seeking to bypass traditional perimeter defenses. Because gateways sit at the heart of enterprise and SMB networks, their compromise often results in total network visibility and control for the attacker.For organizations relying on TP-Link Omada gateways, the message is clear: patch now or risk full compromise. The combination of unauthenticated remote code execution and privilege escalation flaws makes these vulnerabilities critical priority items for immediate remediation.#TPLINK #Omada #CVE20256542 #CVE20257850 #CVE20257851 #CVE20256541 #RemoteCodeExecution #RCE #CommandInjection #NetworkSecurity #FirmwareUpdate #Cybersecurity #RouterVulnerability #GatewayExploit #IoTSecurity #CriticalVulnerabilities #SupplyChainRisk #PatchNow #SecurityAdvisory #CyberThreat #NetworkCompromise #PrivilegeEscalation #DataExfiltration #PerimeterSecurity #CVE #VulnerabilityDisclosure

Ep 307TARmageddon: The Rust Library Flaw Exposing Supply Chains to Remote Code Execution
A critical new vulnerability known as TARmageddon (CVE-2025-62518) has sent shockwaves through the Rust developer community and the broader cybersecurity world. This high-severity desynchronization flaw, discovered in the Async-tar and Tokio-tar libraries, exposes millions of downstream applications to the risk of remote code execution and supply chain compromise. The flaw arises when these TAR parsers process nested archives with mismatched PAX and ustar headers, allowing attackers to smuggle unauthorized file entries that can overwrite critical files on a target system.The discovery was made by Edera, a security research firm, which issued an urgent advisory after identifying that both Async-tar and its popular fork, Tokio-tar, had been abandoned and left unmaintained. With no maintainers to coordinate a fix, Edera initiated a decentralized disclosure process—a rare move in vulnerability response—encouraging downstream developers to patch or migrate independently. This decentralized approach led to quick action by some projects, such as Astral-tokio-tar (patched in version 0.5.6) and Krata-tokio-tar, but others, including Testcontainers and Liboxen, remain exposed pending updates.At its core, TARmageddon’s exploitability comes from how the vulnerable parsers misinterpret archive structure. When encountering a nested TAR file where the ustar header incorrectly specifies a zero-byte file, the parser skips over critical content and begins interpreting the nested TAR’s internal headers as legitimate entries in the parent archive. This allows attackers to inject arbitrary files—a technique that can lead to arbitrary file overwrites and remote code execution. In real-world attacks, this could be leveraged to replace binaries, modify authentication keys, or compromise build pipelines, making it a potent weapon for software supply chain attacks.The incident reveals deeper truths about the modern open-source ecosystem. Despite Rust’s reputation for memory safety, TARmageddon shows that logic flaws—not memory errors—can still produce catastrophic results. Moreover, the widespread use of abandoned dependencies like Async-tar highlights a systemic challenge: critical libraries often go unmaintained while remaining deeply embedded in production systems. This “vulnerable lineage” problem—where one unpatched project infects countless forks and derivatives—poses a significant and growing risk to software supply chains.Edera’s report calls for urgent remediation steps:Migrate to patched forks such as Astral-tokio-tar ≥ 0.5.6 or the updated Krata-tokio-tar.Manually harden TAR parsers by prioritizing PAX headers, validating header consistency, and adding strict boundary checks to prevent desynchronization.Audit dependencies proactively to identify abandoned codebases before vulnerabilities surface.With a CVSS score of 8.1, TARmageddon is more than just another open-source vulnerability—it’s a cautionary tale about the fragility of dependency-driven software ecosystems. It underscores that memory-safe languages do not guarantee security, and that maintaining supply chain visibility is as important as patching the code itself.#TARmageddon #CVE202562518 #Rust #AsyncTar #TokioTar #SupplyChainSecurity #OpenSourceVulnerability #RemoteCodeExecution #Desynchronization #PAXHeaders #Ustar #RustSecurity #DependencyRisk #EderaSecurity #SoftwareSupplyChain #CyberRisk #CVE #AppSec #VulnerabilityDisclosure #AstralTokioTar #KrataTokioTar #PatchNow #SecurityAlert #MemorySafe #SoftwareSecurity

Ep 306Vidar 2.0: The C-Rewritten Stealer Poised to Dominate the Cybercrime Market
A new evolution in information-stealing malware has arrived — and it’s already drawing serious attention from researchers and defenders alike. The release of Vidar 2.0 represents a complete transformation of the long-running Vidar infostealer, which has been rewritten entirely in C and equipped with multi-threading and advanced anti-analysis mechanisms. This overhaul not only boosts performance but makes detection exponentially more difficult, setting the stage for a potential new era in cybercrime operations.Security researchers warn that infections from Vidar 2.0 are expected to surge through Q4 2025, as this reengineered variant fills the vacuum left by the decline of Lumma Stealer. The developer behind Vidar — active and trusted in underground markets since 2018 — has released a product that combines speed, stealth, and resilience into a single, deadly package.The most alarming innovation is Vidar 2.0’s ability to bypass Chrome’s App-Bound encryption, a defense mechanism introduced in 2024 to protect browser-stored credentials. Instead of attempting to decrypt protected data on disk, Vidar 2.0 sidesteps these controls entirely by injecting malicious code directly into live Chrome processes and extracting encryption keys straight from memory. This in-memory attack vector effectively neutralizes one of the browser’s most advanced security protections.Other major technical upgrades include:A C-language rewrite, reducing dependencies and shrinking the malware’s footprint to evade signature detection.Multi-threaded data collection, allowing it to steal multiple data types—passwords, cookies, cryptocurrency wallets, and cloud credentials—simultaneously, minimizing its dwell time on infected machines.A polymorphic builder that automatically alters each build’s structure, producing unique, detection-resistant variants.Robust anti-analysis defenses, from debugger and sandbox detection to hardware and timing checks that allow Vidar 2.0 to shut down in controlled environments.Vidar 2.0’s operational flow reflects a professional-grade architecture. Once inside a victim’s system, it rapidly harvests data from browsers, crypto wallets, communication apps like Telegram and Discord, and even Steam accounts. After data collection, it captures screenshots and packages everything for exfiltration via Telegram bots or Steam-hosted URLs, cleverly leveraging legitimate services to conceal its communications.From a market perspective, Vidar 2.0 is emerging as a clear successor to Lumma Stealer, offering superior capabilities at competitive prices. Its developer’s reputation, combined with its advanced architecture, ensures strong adoption within the Malware-as-a-Service (MaaS) economy. Trend Micro analysts predict Vidar 2.0 could become the dominant stealer in circulation by late 2025, reshaping the threat landscape for credential theft and data exfiltration.For defenders, Vidar 2.0 underscores a broader trend in the cybercrime ecosystem: malware that’s not just faster and stealthier, but smarter and more adaptive. With its in-memory attacks and polymorphic evasion, this stealer exemplifies the next generation of threats that blend speed, sophistication, and commercial viability — a dangerous combination for enterprises and individuals alike.#Vidar2 #Infostealer #Cybercrime #Malware #CredentialTheft #LummaStealer #TrendMicro #DataExfiltration #ChromeBypass #CyberThreat #InformationSecurity #ThreatIntelligence #MalwareAnalysis #CyberAttack #PolymorphicMalware #CyberDefense #MalwareAsAService #CProgramming #AIThreats #BrowserSecurity #EncryptionBypass #MemoryInjection #CyberSecurity #ThreatLandscape #Q42025

Ep 305Dataminr Acquires ThreatConnect for $290M to Create the Next Generation of Tailored Threat Intelligence
Dataminr, the AI powerhouse known for its real-time risk and event detection platform, has announced plans to acquire ThreatConnect, a cybersecurity firm specializing in threat intelligence aggregation and response, for $290 million in cash and equity. This strategic move marks a major milestone in the ongoing consolidation of the threat intelligence sector and signals a bold shift toward the next generation of Client-Tailored intelligence—highly contextualized, AI-driven insights designed to bridge the gap between awareness and action.With over $1 billion in total investment, Dataminr has long been recognized for its ability to process vast amounts of public data—ranging from social media posts to cyber threat disclosures—to provide real-time situational awareness. Meanwhile, ThreatConnect, based in Arlington, Virginia, has built a strong reputation as a platform that enables security teams to aggregate, analyze, and act upon threat data, serving over 250 enterprises and government clients, including Nike, Wells Fargo, and multiple national agencies across the U.S., U.K., and Australia.The combination of these two entities represents a synergistic fusion of external and internal intelligence. Dataminr’s global reach in public signal processing meets ThreatConnect’s internal telemetry and contextual depth, forming a unified system capable of producing highly personalized threat intelligence feeds. This merger aims to give organizations not only faster insights but actionable intelligence tailored to their specific environments.As Dataminr CEO Ted Bailey explains, “By uniting our AI platform with the capabilities of ThreatConnect, we will fuse external public data signals and internal client data to pioneer the first-ever real-time Client-Tailored intelligence.” This approach leverages agentic AI systems—autonomous, goal-oriented models designed to interpret both global events and enterprise-specific risks—to deliver precise, context-aware alerts and recommended responses in real time.For Dataminr, the acquisition fills a key gap: while the company has long excelled in detecting events and emerging risks, ThreatConnect provides the internal visibility that turns detection into decisive action. For ThreatConnect, the merger extends its reach beyond cyber-only contexts into the broader multi-domain threat landscape, empowering customers to anticipate both digital and physical risks before they escalate.This acquisition also reflects a wider trend of cybersecurity consolidation. In 2025 alone, more than 330 M&A deals have been announced across the cybersecurity space, with seven specifically focused on threat intelligence firms. The rapid pace of these transactions highlights growing demand for integrated solutions that eliminate silos between external monitoring, internal analytics, and automated response.The Dataminr-ThreatConnect union signals a shift from traditional threat intelligence toward contextual, adaptive intelligence ecosystems that serve as decision-support systems rather than passive data providers. By combining Dataminr’s external AI-driven detection with ThreatConnect’s actionable internal intelligence, the new entity stands poised to redefine how organizations perceive, prioritize, and respond to emerging risks across both the cyber and physical domains.This deal is more than an acquisition—it’s a statement about the future of AI in security operations: an era where real-time, client-specific intelligence will enable enterprises to not just understand what’s happening, but to know exactly what it means for them and how to respond.#Dataminr #ThreatConnect #Cybersecurity #ThreatIntelligence #AI #AgenticAI #MergersAndAcquisitions #ClientTailoredIntelligence #RiskIntelligence #CyberRisk #RealTimeIntelligence #TedBailey #CyberOperations #ThreatDetection #DataFusion #SecurityAutomation #AIinSecurity #ContextualIntelligence #SOAR #SIEM #CyberInnovation #DigitalTransformation #SecurityConsolidation

Ep 304Veeam Acquires Securiti AI for $1.725 Billion to Unite Data Resilience, Security, and AI
In one of the largest cybersecurity acquisitions of 2025, Veeam Software has announced plans to acquire Securiti AI for $1.725 billion in cash and stock, signaling a fundamental shift in how enterprises will secure, manage, and govern their data in the age of artificial intelligence. The deal, expected to close in the fourth quarter, will bring together two industry powerhouses: Veeam, the global leader in data resilience and recovery, and Securiti AI, a pioneer in data security posture management (DSPM) and governance.Veeam’s move is not just a product expansion—it’s a bold repositioning. The company is evolving from a data protection vendor into a strategic enabler of trusted AI, addressing one of the most pressing challenges facing modern enterprises: fragmented, ungoverned data. By combining Securiti AI’s data intelligence and governance capabilities with Veeam’s robust backup and recovery infrastructure, the unified platform will enable organizations to understand, secure, recover, and ultimately leverage their data to power AI safely and transparently.As Veeam CEO Anand Eswaran explains, “We’ve entered a new era for data. It’s no longer just about protecting data from threats—it’s about ensuring it’s governed and trusted to power AI transparently.” This vision captures the emerging consensus across industries that the success of enterprise AI initiatives depends not on more models, but on better-managed, compliant, and trustworthy data.At the core of this acquisition is Rehan Jalil, founder and CEO of Securiti AI, who will join Veeam as President of Security and AI. Jalil’s track record speaks volumes: his previous ventures include Elastica, acquired by Blue Coat (later part of Symantec for $4.7B), and WiChorus, acquired by Tellabs for $180M. His leadership brings deep expertise in building scalable, security-driven platforms—positioning Veeam to execute this integration with both speed and precision.The combined entity aims to deliver a unified data control solution capable of eliminating silos between backup, governance, and security—a convergence that reflects a broader market trend. In 2025 alone, over 330 cybersecurity M&A deals have been announced, with nearly 15% targeting the data security sector, underscoring how the battle for control of the data layer has become the defining frontier of enterprise cybersecurity.Veeam’s acquisition of Securiti AI is thus more than a merger—it’s a declaration of intent. It signals the end of fragmented data management and the beginning of a new era where resilience, governance, and AI readiness converge under a single platform. The move redefines how organizations will approach both cybersecurity and artificial intelligence, setting a new industry standard for trusted, governed data ecosystems capable of powering the next generation of intelligent business operations.#Veeam #SecuritiAI #Cybersecurity #MergersAndAcquisitions #DataSecurity #AI #DSPM #DataGovernance #AnandEswaran #RehanJalil #DataResilience #DataManagement #TrustedAI #EnterpriseAI #CloudSecurity #DataProtection #BackupAndRecovery #SecurityConsolidation #TechAcquisition #GovernedData #CyberInnovation #AIEnablement #UnifiedSecurity #DigitalTransformation #SecurityPosture

Ep 303Defakto Raises $30.75 Million to Redefine Machine Identity Security
California-based cybersecurity firm Defakto has raised $30.75 million in Series B funding, led by XYZ Venture Capital, bringing its total investment to roughly $50 million. The new capital will power the company’s rapid expansion in product development and global market reach for its identity and access management (IAM) platform—one specifically designed to secure non-human identities like AI agents, services, and workloads.In a world where automated systems now outnumber human users, enterprises are facing an identity crisis. Traditional IAM tools—built for people, not machines—have left a dangerous gap filled with static credentials and overprivileged service accounts. These outdated security mechanisms create massive attack surfaces, leaving organizations vulnerable to credential theft, supply chain compromise, and insider risk.Founded by Danny Oliveri and Eli Nesterov, Defakto’s mission is nothing short of transformative: to eradicate secrets entirely. Instead of managing hard-coded credentials or tokens, the company’s platform replaces them with dynamic, just-in-time identities that grant access only when and where it’s needed. This shift fundamentally changes how machine-to-machine authentication operates—turning identity from a liability into an adaptive, policy-driven control mechanism.Defakto’s technology integrates seamlessly across AWS, Azure, Google Cloud, and hybrid environments, enabling unified control over identity lifecycles regardless of platform. The company’s approach provides a comprehensive control plane for non-human identities, handling their creation, use, and retirement with precision and automation.The Series B investor lineup reads like a strategic dream team: alongside lead investor XYZ Venture Capital are The General Partnership, Bloomberg Beta, WndrCo, Adverb Ventures, J.P. Morgan, and Michael Coates, former CISO of Twitter. J.P. Morgan’s participation signals strong enterprise demand from regulated sectors like finance, while Coates’ involvement provides crucial technical validation from the CISO community.CEO Danny Oliveri captures the vision succinctly:“We didn’t build another tool to give you more visibility or manage secrets. We built a platform to eradicate them—to eliminate overprivileged access and give enterprises the same foundation for machines and AI that IAM gave them for people.”With this fresh injection of capital, Defakto is doubling down on product innovation and go-to-market execution. Its roadmap centers on supporting new classes of AI agents and automation pipelines while accelerating enterprise adoption through strategic integrations and customer-driven enhancements.As organizations grapple with the explosion of non-human users, Defakto’s platform is poised to become a cornerstone of modern cybersecurity architecture. By tackling one of the fastest-growing risks in enterprise IT—machine identity sprawl—Defakto’s Series B round positions it to lead a new category in IAM: dynamic, AI-ready identity security for the automated age.#Defakto #Cybersecurity #IAM #IdentitySecurity #SeriesB #AI #MachineIdentity #NonHumanIdentities #CloudSecurity #Automation #AWS #Azure #GoogleCloud #SecretsManagement #ZeroTrust #FundingNews #XYZVentureCapital #StartupFunding #AccessManagement #CyberInnovation #SecurityArchitecture

Ep 303Dr. Allan Friedman Joins NetRise: The Father of SBOMs Goes Private to Fuse AI and Supply Chain Security
In a landmark move for the cybersecurity industry, Dr. Allan Friedman — often called the Father of SBOMs — has joined supply chain security firm NetRise as a strategic advisor. Friedman’s transition from his influential role at CISA marks a pivotal moment where public policy meets private innovation. His mission: to push the Software Bill of Materials (SBOM) initiative beyond regulatory mandates and into AI-powered operational reality.At CISA, Friedman spearheaded the global conversation around SBOMs — the machine-readable inventories that give organizations visibility into what’s inside their software. Now, by joining forces with NetRise, a leader in AI-driven supply chain risk analysis, Friedman aims to transform SBOMs from compliance artifacts into living data streams that power intelligent threat detection and response.This partnership comes at a crucial time. Although President Biden’s Executive Order 14028 mandates SBOMs for federal software procurement, the broader private sector has yet to fully operationalize them. Together, Friedman and NetRise plan to change that by marrying SBOM data with artificial intelligence to provide actionable, context-aware insight into software vulnerabilities.Friedman argues that AI doesn’t replace SBOMs—it depends on them. “AI is only as good as the data it consumes,” he notes, “and the SBOM provides that data.” NetRise CEO Thomas Pace agrees, emphasizing that AI cannot yet solve the supply chain problem alone—it needs the visibility SBOMs deliver. Their collaboration promises to bridge that gap, turning static inventories into dynamic intelligence pipelines.The implications reach far beyond one company. As defense and enterprise leaders like Kirsten Davies, the nominee for DoD CIO, advocate for integrating SBOM analysis with automated tools and continuous monitoring, this alliance sets the tone for the next evolution in cybersecurity: the fusion of policy-driven transparency and AI-driven risk management.By bringing together the originator of SBOMs and a company built to operationalize them, this partnership signals the start of a new era for software assurance—one where visibility, automation, and intelligence converge to defend the global supply chain.#SBOM #AllanFriedman #NetRise #SupplyChainSecurity #Cybersecurity #AI #SoftwareSecurity #ExecutiveOrder14028 #CISA #RiskManagement #VulnerabilityIntelligence #ThomasPace #DevSecOps #ZeroTrust #SoftwareSupplyChain #ArtificialIntelligence #FederalCybersecurity #Compliance #SecurityInnovation

Ep 302Pwn2Own Automotive 2026: $3 Million Bounty Targets Tesla and EV Infrastructure Flaws
The upcoming Pwn2Own Automotive 2026 hacking contest, hosted by Trend Micro’s Zero Day Initiative (ZDI), is set to redefine the economics of automotive cybersecurity. With a record-breaking $3 million prize pool, the event provides a transparent, market-driven valuation of the most dangerous vulnerabilities facing the connected vehicle ecosystem. Through six major competition categories — including Tesla, in-vehicle infotainment (IVI), EV chargers, and automotive operating systems — researchers will compete to expose critical flaws in systems that control modern transportation.The centerpiece of this year’s contest is once again Tesla, where the stakes are highest. Exploits that achieve remote control or unconfined root access to the autopilot system could earn hackers up to $500,000 plus a Tesla vehicle. Lesser but still significant rewards are offered for compromising CAN bus communications, electronic control units (ECUs), or achieving persistent root access on infotainment or autopilot modules. The high-value Tesla payouts illustrate what cybersecurity experts already know: the closer an exploit gets to core driving functions, the higher its financial and safety impact.Beyond vehicle control, ZDI has expanded the scope of Pwn2Own 2026 to include Level 3 superchargers and the Open Charge Alliance (OCPP) protocols that manage electric vehicle charging networks. Successful attacks on these infrastructures could yield up to $60,000, underscoring growing concern about the security of public charging ecosystems. Also on the list are critical automotive operating systems such as Android Automotive OS, BlackBerry QNX, and Automotive Grade Linux — foundational technologies whose compromise could ripple across entire fleets and supply chains.The financial structure of the contest effectively maps the automotive threat landscape by severity:High-risk: Tesla vehicle exploits, especially those enabling root access or remote control.Medium-risk: EV superchargers and Automotive OS vulnerabilities, reflecting systemic risk across vehicle ecosystems.Low-to-medium risk: Infotainment systems, consumer-grade chargers, and protocol-level attacks — which often serve as pivot points for deeper intrusions.By converting exploit difficulty and real-world impact into financial terms, Pwn2Own Automotive 2026 demonstrates the market’s implicit understanding of which attack vectors are most dangerous. As connected vehicles and EV infrastructure grow in complexity, contests like this act as controlled battlegrounds for discovering — and fixing — the vulnerabilities that could define the next generation of automotive cyber threats.#Pwn2Own #Pwn2OwnAutomotive2026 #TrendMicro #ZeroDayInitiative #ZDI #Tesla #Cybersecurity #AutomotiveSecurity #VehicleHacking #AutonomousVehicles #EVCharging #Superchargers #BlackBerryQNX #AndroidAutomotive #AutomotiveGradeLinux #CANBus #AutopilotHack #RootAccess #CVE #ConnectedCars #ElectricVehicles #Infosec #CarHacking #AutomotiveCyberRisk #CyberDefense #HackingContest #ZeroDay #VehicleExploits #EVSecurity #TechNews

Ep 301China Claims NSA Breached National Time Network, Threatening Finance and Defense Stability
China’s Ministry of State Security (MSS) has publicly accused the U.S. National Security Agency (NSA) of conducting a multi-year cyber espionage campaign targeting its National Time Service Center, a critical component of China’s national infrastructure responsible for maintaining and distributing standard time. According to China, the attacks — allegedly conducted between 2022 and 2024 — involved the use of “special cyberattack weapons” and targeted both personnel and internal network systems to steal sensitive data.The MSS asserts that the NSA’s operations threatened the stability of key national sectors including finance, power, defense, and transportation, all of which depend on synchronized time for real-time operations and national coordination. The National Time Service Center serves as the temporal backbone of China’s digital and physical systems; any successful compromise could have caused massive disruption — from financial transaction failures to communication blackouts and even defense system degradation.The report outlines a detailed picture of how such an attack could trigger cascading failures across critical sectors. A disruption of precise time synchronization could cripple high-frequency trading, paralyze air traffic control, desynchronize power grids, and compromise military command and control. Analysts note that this type of attack represents a potent form of asymmetric cyber warfare, offering the potential for large-scale disruption without physical confrontation.However, despite the seriousness of the claims, China provided no verifiable evidence to substantiate its allegations. The public accusation arrives amid intensifying cyber tensions between the U.S. and China, as both governments exchange claims of espionage, hacking, and interference. The timing of this statement suggests it may also serve a strategic counter-narrative to ongoing Western intelligence reports that accuse China of conducting its own global cyber operations.While the geopolitical implications are still unfolding, the accusation underscores a larger truth: time synchronization systems are becoming strategic assets in modern cyber warfare. As digital infrastructure grows more interconnected, control of — or attacks on — time itself could become a new front in state-sponsored cyber conflict.#China #NSA #CyberEspionage #CyberAttack #NationalTimeServiceCenter #Beijing #Washington #CyberWarfare #CriticalInfrastructure #Finance #Defense #PowerGrid #Communications #CascadingFailure #AsymmetricWarfare #MSS #NationalSecurityAgency #CyberConflict #InformationSecurity #Geopolitics #DigitalWarfare #USChinaTensions #Espionage #StateSponsoredAttack #TimekeepingInfrastructure #CyberThreat #GlobalSecurity #CyberDefense #CyberStrategy #Infosec #TechNews

Ep 301Cl0p Ransomware Targets Oracle E-Business Suite in Global Data Extortion Spree
A new wave of Cl0p ransomware attacks has struck organizations worldwide by exploiting vulnerabilities in Oracle’s E-Business Suite (EBS) — a mission-critical enterprise management platform used by corporations and universities across the globe. The ongoing campaign, attributed to FIN11, highlights the group’s shift toward exploiting high-value business systems for maximum leverage in data extortion schemes. Victims range from Envoy Air, a subsidiary of American Airlines, to prestigious academic institutions like Harvard University and the University of the Witwatersrand in South Africa.The threat actors reportedly stole and leaked over 26GB of corporate data, claiming it originated from American Airlines systems, though Envoy Air maintains that no customer or sensitive data was exposed. Other victims have also had files posted to the Cl0p leak site, indicating that they refused to pay ransom demands. The group’s attack lifecycle follows a familiar yet devastating pattern — exploit, exfiltrate, extort, and expose — and emphasizes how quickly operational disruptions can turn into reputational crises when data is publicly released.At the heart of this campaign are vulnerabilities within Oracle EBS, including a zero-day flaw (CVE-2025-61882) and potentially CVE-2025-61884, which Oracle has patched but not fully clarified as exploited. The zero-day allowed attackers to infiltrate unpatched systems, exfiltrate sensitive data, and apply intense ransom pressure through public shaming on dark web leak platforms. Oracle’s subsequent updates confirm that the flaw was actively exploited in the wild, underscoring the urgent need for enterprises to prioritize EBS patch management and vulnerability scanning.The campaign’s attribution to FIN11 and the Cl0p ransomware group highlights the blurred lines within modern cybercrime ecosystems, where overlapping threat clusters share infrastructure and tooling. Mandiant’s intelligence suggests multiple subgroups may operate under the FIN11 umbrella, complicating attribution and response efforts.This incident serves as a stark reminder that core enterprise platforms are now prime targets for ransomware operators. As the Cl0p group continues to evolve from traditional encryption-based attacks to pure data-theft and extortion, organizations must assume that compromise equates to exposure — and that operational security now extends to the ERP layer.#Cl0p #FIN11 #Oracle #EBusinessSuite #CVE202561882 #CVE202561884 #Ransomware #DataBreach #EnvoyAir #AmericanAirlines #HarvardUniversity #UniversityoftheWitwatersrand #OracleVulnerabilities #CyberCrime #Extortionware #DataExfiltration #LeakSite #ZeroDayExploit #Mandiant #CyberAttack #InformationSecurity #PatchManagement #ThreatIntelligence #CyberExtortion #EnterpriseSecurity #OracleEBS #RansomOps #SecurityBreach #DarkWebLeaks #CyberRisk #Infosec

Ep 300WhatsApp Wins Landmark Case Against NSO Group Over Spyware Attacks
After six years of intense litigation, WhatsApp has secured a decisive legal victory against the NSO Group, the controversial spyware maker accused of exploiting a zero-day vulnerability to infect more than 1,400 users with surveillance malware. On October 17, 2025, a U.S. District Court issued a permanent injunction that bars NSO from targeting WhatsApp users, reverse engineering the app, or creating new accounts. The ruling marks a historic moment in the battle between secure communication platforms and the spyware industry, effectively cutting NSO off from one of the world’s largest messaging ecosystems.The court’s decision, led by Judge Phyllis Hamilton, reframes unauthorized access as a commercial harm — asserting that WhatsApp’s core product is informational privacy, and NSO’s intrusions directly interfered with that value. This legal reasoning sets a transformative precedent: it turns privacy itself into a defensible commercial right. Tech platforms can now cite this case as a blueprint for dismantling spyware operations through litigation, rather than purely through technical defenses.Financially, the ruling reshaped the balance of liability. While an initial $167 million punitive damages award was dramatically reduced to just over $4 million, the decision still sets a precedent that punitive damages can reach up to nine times compensatory awards. The case highlights how litigation costs, operational bans, and reputational fallout can devastate even well-funded surveillance firms.Beyond the numbers, the reputational impact on NSO Group is immense. The company, long accused of enabling authoritarian regimes to spy on journalists, activists, and dissidents, can no longer hide behind claims of client misuse. WhatsApp’s legal win publicly dismantles the “plausible deniability” defense that spyware vendors have relied on for years.Compounding the risk, NSO’s recent acquisition by U.S. investors introduces new exposure under American jurisdiction, potentially inviting further litigation, sanctions, and scrutiny from regulators. For the entire spyware sector, this case serves as a wake-up call: the era of unchecked digital surveillance is ending, replaced by a new era of accountability and legal containment.#WhatsApp #NSOGroup #Spyware #ZeroDay #CyberSecurity #Privacy #DataProtection #CourtRuling #DigitalSurveillance #PermanentInjunction #Meta #PhyllisHamilton #Litigation #PunitiveDamages #InformationalPrivacy #SpywareBan #LegalPrecedent #HumanRights #TechLaw #CyberLaw #Infosec #PrivacyRights #DigitalAccountability #CyberEspionage #PegasusSpyware #USCourt #SurveillanceTech #SecurityNews #Encryption #CyberEthics #WhatsAppCase

Ep 299Google Project Zero Exposes Dolby Decoder Flaw Enabling Zero-Click Android Exploits
A newly discovered vulnerability in Dolby’s Unified Decoder has sent shockwaves through the cybersecurity world. Tracked as CVE-2025-54957, the flaw — uncovered by Google Project Zero — is a critical out-of-bounds write vulnerability that allows remote code execution (RCE) when a specially crafted audio file is decoded. The issue stems from an integer overflow in the decoder’s buffer length calculation, leading to memory corruption that can be exploited by attackers.What makes this flaw particularly dangerous is its potential for zero-click exploitation on Android. Because Android automatically decodes incoming audio messages using Dolby’s Unified Decoder, attackers can trigger the exploit simply by sending a malicious audio file — no user interaction required. In controlled tests, Google’s researchers demonstrated full code execution within the media codec context on modern Android devices, including the Pixel 9 and Samsung S24.The impact, however, varies across platforms. Windows users are somewhat safer, as Microsoft confirmed user interaction is needed for successful exploitation. macOS and iOS users face a lesser — but still significant — risk, as the exploit currently causes process crashes rather than full code execution. Nonetheless, this flaw underscores the growing risk of vulnerabilities in multimedia components that are deeply integrated into everyday devices.The vulnerability’s discovery and disclosure timeline show a coordinated effort between Google, Dolby, and Microsoft, leading to patched updates across major platforms. Still, the event highlights a disturbing trend — how even audio processing routines can become vectors for silent, remote attacks. With the attack surface expanding into unexpected territories like sound decoders, the case of CVE-2025-54957 is a stark reminder that in modern cybersecurity, no data stream is inherently safe.#CyberSecurity #Dolby #CVE202554957 #GoogleProjectZero #AndroidSecurity #RemoteCodeExecution #BufferOverflow #MemoryCorruption #ZeroClickExploit #Microsoft #Apple #macOS #Windows #VulnerabilityDisclosure #PatchTuesday #Infosec #AudioSecurity #ExploitResearch #MobileSecurity #DigitalSafety #TechNews

Ep 298AISLE Launches AI Cyber Reasoning System to Shrink Patch Times from Weeks to Minute
AISLE has entered the cybersecurity arena with an AI-native Cyber Reasoning System (CRS) built to do what most tools don’t: fix vulnerabilities—fast. While attackers increasingly use AI to weaponize new flaws in roughly five days, most organizations still average ~45 days to remediate critical issues. AISLE’s answer is an autonomous remediation pipeline that identifies, prioritizes, generates patches, and verifies the results against a continuously updated software-stack twin, collapsing MTTR from weeks to minutes.At the heart of AISLE’s approach is a closed-loop workflow tuned for both known and zero-day vulnerabilities. The CRS continuously analyzes first-party and third-party code, going beyond signature checks to surface complex classes of bugs—race conditions, business-logic flaws, and missing authentication—that traditional scanners miss. When the system proposes a fix, it spins up an on-the-fly Docker image of a stack twin to run targeted validation and regression testing. Only after the patch passes verification does AISLE push changes directly to Git, completing the remediation cycle without waiting on external vendor patches.AISLE’s positioning is explicitly defender-first. CEO Ondrej Vlcek argues that AI has so far tilted the economics of cyber in favor of attackers; AISLE intends to flip that advantage by removing the human bottleneck from remediation. For adoption, the company offers configurable autonomy: customers can start in copilot mode (human-in-the-loop review and approvals) and graduate to full automation as trust builds. The vision is ambitious—self-defending software stacks capable of sustaining a state of “zero exploitable zero days.”Early traction underscores the thesis. In initial weeks, AISLE reports 100+ newly discovered vulnerabilities across cornerstone projects like the Linux kernel, OpenSSL, cURL, and the Apache stack—evidence that the system can proactively surface and neutralize high-impact issues before they’re broadly exploited. Strategically, AISLE’s end-to-end automation addresses the market’s real choke point: not finding more alerts, but closing them with verified fixes at machine speed.For security leaders facing relentless vuln volume, third-party lag, and shrinking patch windows, AISLE proposes a pragmatic on-ramp to autonomy—meet existing workflows today, automate tomorrow, and aim for minutes-level remediation at scale. If widely adopted, AISLE’s CRS model could reset expectations for MTTR, reduce breach exposure windows, and materially shift cyber’s cost curve back toward the enterprise. #AISLE #CyberReasoningSystem #AutonomousRemediation #AIforCyberDefense #ZeroDay #VulnerabilityManagement #MTTR #DevSecOps #SoftwareTwin #Docker #GitOps #SupplyChainSecurity #Linux #OpenSSL #cURL #Apache #SecurityAutomation #CopilotMode #HumanInTheLoop #SelfDefendingStacks

Ep 297Microsoft Blunts “Vanilla Tempest”: 200 Malicious Certificates Revoked
In early October 2025, Microsoft executed a targeted disruption against Vanilla Tempest—the threat actor also tracked as Vice Society—after uncovering a streamlined, high-impact campaign that deployed Rhysida ransomware through a cleverly staged infection chain. The operation leaned on SEO poisoning to funnel victims searching for “Microsoft Teams” installers to attacker-controlled domains (e.g., teams-download[.]buzz, teams-install[.]run). Once downloaded and launched, the fake Teams setup quietly pulled down a digitally signed copy of the Oyster backdoor, a foothold Vanilla Tempest has leveraged since at least mid-2023. With Oyster running, the actors had the persistent access needed to drop their endgame: Rhysida.What made this campaign unusually slippery wasn’t a zero-day—it was trust. Vanilla Tempest abused code-signing to cloak both the lure and post-compromise tooling, fraudulently obtaining signatures from reputable providers including Trusted Signing, DigiCert, GlobalSign, and SSL[.]com. Signed binaries blended into enterprise environments, sidestepping application controls and reputation-based defenses that often flag or throttle unsigned executables. By spreading their bets across multiple certificate authorities, the group complicated blocklists and stretched the window of undetected activity.Microsoft’s counterpunch was decisive: more than 200 certificates were revoked, immediately degrading the campaign’s ability to evade detection and making malicious binaries far easier for defenders to quarantine. While this revocation spree dealt a material blow to Vanilla Tempest’s infrastructure and tooling, seasoned defenders know the story doesn’t end here. Financially motivated crews adapt. Expect the group to pursue fresh certificates, tweak their SEO poisoning playbooks, and continue targeting sectors where urgency and downtime risk are highest—especially education and healthcare, Vice Society’s longstanding hunting grounds.For security teams, the disrupted campaign is a blueprint of the group’s current TTPs and a reminder that trust anchors (like code signing) are a critical attack surface. Prioritize browser and DNS filtering to blunt SEO-poisoning funnels, enforce publisher allowlists and certificate pinning where feasible, and watch for the telltale sequence: suspicious software acquisition → signed loader execution → Oyster C2 beacons → Rhysida staging. Treat “signed” as not synonymous with safe; validation must include reputation, issuance timing, and anomalous publisher metadata. Microsoft’s revocations bought defenders time—use it to harden controls, refine detections, and pressure the adversary’s next move.#Rhysida #ViceSociety #VanillaTempest #OysterBackdoor #Microsoft #CodeSigningAbuse #CertificateRevocation #TrustedSigning #DigiCert #GlobalSign #SSLcom #SEOPoisoning #Ransomware #EducationSecurity #HealthcareSecurity #ThreatIntelligence #Malware #Infosec

Ep 296The “Shotgun” Botnet: How RondoDox Hijacks Routers, Cameras, and Servers Worldwide
A new and fast-growing botnet dubbed RondoDox is shaking up the global cybersecurity landscape with its “shotgun” exploitation strategy, targeting over 50 known and unknown vulnerabilities across a vast array of internet-connected devices. First detected in mid-2025, the botnet has expanded rapidly, infecting routers, servers, cameras, and DVRs from more than 30 different vendors.Researchers at Trend Micro and CloudSek describe RondoDox as a loader-as-a-service operation, distributing alongside notorious malware like Mirai and Morte. Once inside, compromised devices are hijacked for cryptocurrency mining, DDoS attacks, and as footholds for enterprise intrusions. The botnet’s operators rotate their command-and-control infrastructure and disguise traffic as legitimate network activity to stay ahead of detection efforts.Astonishingly, attacks attributed to RondoDox have surged 230% since mid-2025, underscoring how quickly it’s scaling across the global internet. Its exploitation toolkit includes both publicly known CVEs and non-public vulnerabilities, many of which remain unpatched. With its wide compatibility across architectures like ARM, MIPS, and Linux, RondoDox is proving dangerously adaptable and persistent.This episode examines how RondoDox works, why its “shotgun” exploitation method is so effective, and what it signals about the evolving malware-as-a-service ecosystem driving modern cyberattacks.#RondoDox #Botnet #CyberSecurity #DDoS #Cryptojacking #Mirai #Morte #TrendMicro #CloudSek #IoTSecurity #VulnerabilityManagement #CISA #CyberThreats #InfoSec #NetworkSecurity #MalwareAsAService #ZeroDay #ExploitCampaign #Cybercrime

Ep 296“Inflation Refund” Scam: How Fraudsters Are Stealing Identities Through Texts
A widespread smishing campaign is sweeping across New York, luring residents with fraudulent text messages about an “Inflation Refund” from the Department of Taxation and Finance. These deceptive messages claim that recipients are eligible for a refund and must click a link to “process” it — a ploy designed to harvest personal and financial information. Once clicked, the link leads victims to a phishing page that mimics an official New York government site, requesting details such as names, addresses, Social Security Numbers, and banking information.The scam’s success hinges on confusion surrounding the legitimate New York Inflation Refund program, which automatically sends checks to eligible taxpayers — no applications, links, or personal data submissions required. Governor Kathy Hochul’s office and the Department of Taxation and Finance have issued urgent warnings, emphasizing that New York State will never contact residents by text, phone, or email regarding these payments.Experts warn that falling for this scam can lead to identity theft, fraudulent tax filings, and long-term financial harm. The fraudulent texts even include fabricated deadlines and legal citations to create a false sense of urgency, exploiting trust in official-sounding communication.In this episode, we unpack how this smishing campaign operates, why it’s so effective, and how New Yorkers can recognize and report these scams before they cause irreparable damage.#Smishing #Phishing #NewYork #InflationRefund #CyberFraud #IdentityTheft #KathyHochul #TaxScam #CyberSecurity #SocialEngineering #PII #DataProtection #FinancialFraud #CyberAwareness #ScamAlert #InfoSec

Ep 295Juniper Networks Patches 220 Vulnerabilities in Massive October Security Update
In one of the year’s most extensive patch cycles, Juniper Networks has released its October 2025 security advisories, addressing a staggering 220 vulnerabilities across its product suite — including Junos OS, Junos Space, Junos Space Security Director, and Junos OS Evolved. Of these, nine critical flaws in Junos Space and Security Director stood out, most notably a Cross-Site Scripting (XSS) vulnerability (CVE-2025-59978) that could allow attackers to execute arbitrary commands with administrative privileges.The advisory highlights how more than 200 defects concentrated in Junos Space and Security Director expose the management plane, posing serious risk to network control systems. Successful exploitation could give attackers full administrative access, allowing them to modify configurations, disable defenses, and hijack managed devices.Meanwhile, Junos OS and Junos OS Evolved received crucial updates to patch high-severity Denial-of-Service (DoS) vulnerabilities and medium-severity flaws that could lead to privilege escalation, unauthorized file access, and backdoor creation. Although Juniper confirmed there are no reports of active exploitation, the company issued a strong warning that attackers often reverse-engineer released patches, making immediate application critical.This episode explores what these vulnerabilities mean for enterprise networks, why Juniper’s advisories are a warning sign for other vendors, and how organizations can respond decisively when patches become the only line of defense.#JuniperNetworks #JunosOS #JunosSpace #SecurityDirector #VulnerabilityManagement #PatchTuesday #CyberSecurity #DoS #XSS #PrivilegeEscalation #NetworkSecurity #ZeroDay #ExploitPrevention #InfoSec #CriticalPatch #ITSecurity

Ep 295Linked Exploitation Campaigns Target Cisco, Fortinet, and Palo Alto Networks Devices
Cyber intelligence firm GreyNoise has uncovered what appears to be a coordinated exploitation effort targeting network edge appliances from three major security vendors: Cisco, Fortinet, and Palo Alto Networks. After analyzing overlapping IP subnets, identical TCP fingerprints, and synchronized attack patterns, GreyNoise assessed with high confidence that these separate waves of scanning and brute-force attacks are linked to the same threat actor or group.The report connects this activity to three ongoing campaigns:Cisco ASA and FTD Exploitation: Early September scans occurred weeks before Cisco disclosed two zero-day flaws later tied to the ArcaneDoor espionage campaign, signaling an adversary with privileged vulnerability knowledge.Palo Alto Networks GlobalProtect Attacks: A 500% surge in scanning and 1.3 million login attempts targeted firewall portals within a single week, hinting at large-scale credential harvesting efforts.Fortinet VPN Brute-Forcing: Persistent login attacks correlated with predictive vulnerability cycles, often preceding new Fortinet flaw disclosures by about six weeks.Together, these findings suggest a well-resourced actor conducting synchronized operations to map, exploit, and potentially pre-position within global enterprise networks. The intelligence also offers a crucial defensive takeaway: spikes in brute-force or scanning activity may serve as early warnings of vulnerabilities soon to be revealed.In this episode, we break down how GreyNoise linked these campaigns, why this activity may represent the next evolution of state-linked cyber espionage, and how organizations can use predictive threat signals to move from reactive defense to proactive mitigation.#Cybersecurity #GreyNoise #Cisco #Fortinet #PaloAltoNetworks #ArcaneDoor #ZeroDay #VPN #FirewallSecurity #ThreatIntelligence #BruteForce #ScanningActivity #NetworkSecurity #CyberEspionage #InfoSec #VulnerabilityManagement #SupplyChainSecurity

Ep 294Salesforce Refuses Ransom as Scattered LAPSUS$ Hunters Leak Millions of Records
A new wave of cyber extortion has rocked the enterprise world as the Scattered LAPSUS$ Hunters—a coalition formed from the notorious Lapsus$, Scattered Spider, and ShinyHunters groups—attempted to ransom Salesforce, claiming to have stolen data from 39 of its customers. When Salesforce refused to negotiate, the hackers retaliated by publishing the records of six companies, including Fujifilm, Albertsons, GAP, Qantas, and Vietnam Airlines.The fallout has been severe. Vietnam Airlines saw 7.3 million customer accounts exposed, revealing names, emails, phone numbers, and loyalty details, while Qantas confirmed it was investigating an incident affecting millions of flyers. In contrast, Telstra quickly refuted claims of a 19-million-record breach, proving the data had been scraped from public sources.This attack underscores a dangerous new trend in supply chain extortion, where threat actors leverage a central service provider to pressure its entire client base. It also exposes how modern cybercrime blends real breaches with exaggerated claims to sow panic and force payments.#Salesforce #LAPSUS #DataBreach #CyberExtortion #Qantas #VietnamAirlines #Fujifilm #Albertsons #Telstra #Cybersecurity #Infosec #DarkWeb #SupplyChainAttack #Ransomware

Ep 293Oneleet Secures $33M Series A to Revolutionize Integrated Cybersecurity
Amsterdam-based cybersecurity startup Oneleet has raised $33 million in Series A funding, bringing its total capital to $35 million and positioning itself as one of Europe’s most ambitious new players in the security technology space. Founded in 2022, Oneleet is tackling one of cybersecurity’s biggest pain points: tool fragmentation. Its integrated platform aims to replace the clutter of multiple third-party vendors with a single, streamlined solution that provides attack surface management, code scanning, cloud posture monitoring, penetration testing, and compliance automation — all built and managed in-house.The round, led by Dawn Capital with participation from Y Combinator and other investors, will fund engineering expansion, AI-driven development, and global go-to-market scaling. CEO Bryan Onel describes Oneleet’s mission as building “a single pane of glass for cybersecurity,” offering full-stack visibility and automation across code, infrastructure, and endpoint environments.By consolidating these capabilities under one roof, Oneleet is addressing a growing industry frustration: the inefficiency and risk caused by juggling multiple security tools that rarely integrate smoothly. The platform’s ability to plug directly into cloud providers, repositories, and identity platforms enables organizations to automate protection, ensure regulatory compliance, and maintain continuous monitoring with minimal operational friction.Oneleet’s AI roadmap stands out as a key differentiator. With end-to-end visibility across its own ecosystem, the company plans to leverage proprietary datasets to train predictive models capable of anticipating vulnerabilities before they emerge — a goal that traditional, siloed vendors can’t easily achieve.The $33M Series A marks a milestone not only for Oneleet but for the broader cybersecurity industry, signaling a shift toward platform consolidation as companies seek simplicity, automation, and proactive defense. With its new funding, Oneleet is doubling down on the vision of a unified security stack, built to scale with the complexity of modern digital environments.#Oneleet #cybersecurity #SeriesA #startupfunding #AIsecurity #attacksurfacemanagement #complianceautomation #penetrationtesting #cloudsecurity #infosec #venturecapital #DawnCapital #YCombinator #securityautomation #AmsterdamTech

Ep 293ParkMobile Data Breach Ends in $32.8M Settlement — and a $1 Payout
The final chapter in the ParkMobile data breach saga has arrived—nearly four years after the 2021 cyberattack that compromised the personal information of 22 million users. The class-action lawsuit over the breach has concluded with a $32.8 million settlement, but for most victims, the payout is almost symbolic: a $1.00 credit, split into four $0.25 discounts on service fees, redeemable only through the ParkMobile app before October 2026.The breach, one of the largest consumer data exposures of 2021, leaked names, email addresses, mobile numbers, license plate details, and bcrypt-hashed passwords. Threat actors posted the full 4.5 GB dataset online, allowing widespread access to users’ personal data. Despite the size and severity of the leak, ParkMobile denied any wrongdoing as part of the settlement agreement—a standard legal stance meant to resolve liability without admitting fault.The unusual one-dollar credit system has drawn frustration and mockery from users, who must manually enter a discount code (P@rkMobile-$1) to redeem their compensation. Even then, the credit applies only to specific service fees, not to parking reservations. While the settlement closes the legal dispute, it has reignited public debate about data breach accountability and the meaning of consumer compensation in mass data incidents.More troubling, the settlement’s publicity has sparked a surge in phishing and smishing attacks impersonating ParkMobile. Fraudsters are sending texts and emails claiming to be part of the settlement process, luring victims into clicking malicious links or revealing financial details. ParkMobile has warned that it will never request passwords, payment details, or verification codes via text or email.For users, the takeaway is clear: even years after a breach, the real threat lingers—in the form of scams, reused credentials, and stolen data that never truly disappears. The ParkMobile case is both a cautionary tale and a stark reminder of the modern privacy economy: where millions of compromised identities can ultimately be valued at just one dollar each.#ParkMobile #databreach #classaction #cybersecurity #privacy #infosec #settlement #phishing #smishing #digitalprivacy #cybercrime #datasecurity #onlinedata #consumerprotection #2021breach #ransomware #identitytheft

Ep 292Discord Confirms Data Breach Linked to Third-Party Support Vendor
Discord has confirmed a significant data breach affecting users who interacted with its customer support teams, after hackers compromised a third-party service provider on September 20. The attack exposed a range of personally identifiable information (PII), including names, email addresses, messages, and, for a small number of users, photos of government-issued IDs such as passports and driver’s licenses. Partial billing details and payment histories were also affected.According to the post-mortem, the threat actors—believed to be the Scattered Lapsus$ Hunters (SLH) group—claimed responsibility and demanded a ransom from Discord in exchange for not leaking the stolen data. While Zendesk is suspected to be the compromised vendor, this detail has not yet been officially confirmed. Investigators noted that the stolen data contains “people’s entire identity,” a statement underscoring the potential for identity theft, account hijacking, or crypto-related fraud if the information circulates on dark web marketplaces.Discord responded by isolating and revoking access for the affected vendor, initiating a comprehensive forensic investigation, and notifying law enforcement and all impacted users. The company also enlisted a third-party cybersecurity firm to assess the extent of the breach and prevent future incidents.While the total number of affected accounts remains undisclosed, the breach underscores the risks of third-party dependencies and highlights how vendor security continues to be a major weak point in digital ecosystems. As threat groups increasingly exploit supply-chain and service provider vulnerabilities, platforms like Discord face mounting pressure to reassess vendor access, authentication mechanisms, and data retention practices.This breach serves as a cautionary case for all SaaS operators: security responsibility doesn’t end at your own perimeter—it extends to every partner in your network.#Discord #databreach #cybersecurity #PII #infosec #LapsusHunters #Zendesk #identitytheft #ransomware #privacybreach #thirdpartysecurity #supportbreach #supplychainattack #cyberattack #DarkWeb

Ep 291Weather Station Gateway Exploited: CISA Adds Meteobridge Bug to KEV List
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a stark warning following confirmation that a command injection vulnerability in Meteobridge weather station devices is now being actively exploited. Tracked as CVE-2025-4008, the flaw allows attackers to execute arbitrary commands via an unauthenticated web interface endpoint, exploiting unsanitized user input.While Meteobridge devices are not designed to be internet-facing, security researchers identified around 100 units publicly exposed online, turning an otherwise limited flaw into an accessible target. The vulnerability—found in a CGI shell script—can be exploited with nothing more than a simple HTTP GET request, no authentication required. This makes it an easy entry point for attackers looking to compromise exposed weather data gateways or pivot deeper into connected networks.CISA’s inclusion of this flaw in its Known Exploited Vulnerabilities (KEV) catalog elevates it to high priority, especially for federal agencies, which are mandated to patch it within three weeks under Binding Operational Directive 22-01. The issue was patched by Smartbedded in MeteoBridge version 6.2, released in May 2025, but many devices remain outdated and at risk.The update also expands the KEV catalog with other actively exploited vulnerabilities, including a Samsung zero-day and legacy flaws in Jenkins, Juniper ScreenOS, and GNU Bash (Shellshock)—a reminder that both new and old exploits continue to endanger unpatched systems.CISA’s message is clear: patch management and exposure control are non-negotiable. Any internet-connected management interface—no matter how obscure—represents a critical point of failure. Security teams should immediately patch affected devices, verify they are not exposed online, and review perimeter configurations to prevent similar misconfigurations from becoming the next exploited vector.#CISA #CVE20254008 #Meteobridge #cybersecurity #KEV #commandinjection #infosec #patchmanagement #networksecurity #Shellshock #Samsungvulnerability #Jenkins #Juniper #Smartbedded #federalcybersecurity #BOD2201

Ep 290DrayTek Issues Critical Patch for Router RCE Flaw (CVE-2025-10547)
A serious unauthenticated remote code execution (RCE) flaw, identified as CVE-2025-10547, has been uncovered in DrayTek’s DrayOS routers. This vulnerability allows attackers to send crafted HTTP or HTTPS requests to the router’s web management interface, potentially leading to memory corruption, system crashes, or full device takeover.The flaw affects 35 models of DrayTek’s Vigor routers, devices widely deployed by small-to-medium businesses (SMBs) and home professionals. While disabling remote access and using properly configured Access Control Lists (ACLs) can protect against WAN-based attacks, the issue remains exploitable from within local networks—a serious risk for any organization lacking strong internal segmentation.Discovered by Pierre-Yves Maes of ChapsVision, the vulnerability highlights how edge devices continue to be high-value targets for cybercriminals. DrayTek has released firmware updates to fix the flaw and urges users to apply patches immediately. Experts warn that historical targeting of DrayTek routers by ransomware operators could make this vulnerability a prime candidate for future weaponization if left unpatched.The key takeaway: update now, tighten access controls, and review network segmentation policies to keep your infrastructure safe.#DrayTek #CVE202510547 #cybersecurity #RCE #networksecurity #infosec #routervulnerability #DrayOS #patchmanagement #SMBsecurity #firmwareupdate

Ep 289FTC vs. Sendit: Lawsuit Alleges Data Theft, Fake Messages, and Subscription Traps
The Federal Trade Commission (FTC) has filed a high-profile lawsuit against Sendit, a social media companion app popular among teenagers, and its CEO. The case accuses the company of breaking three major U.S. laws designed to protect consumers and children online.First, the FTC alleges that Sendit violated the Children’s Online Privacy Protection Act (COPPA) by knowingly collecting personal data—such as phone numbers, birthdates, photos, and usernames—from more than 100,000 children under 13 without parental consent.Second, the lawsuit charges Sendit with deceptive practices under the FTC Act. According to investigators, the app allegedly generated fake anonymous messages—some provocative or sexual in nature—to trick users into engaging more with the app. In addition, Sendit is accused of falsely promising that its premium “Diamond Membership” would reveal the identities of message senders, when in reality, it did not deliver on those promises.Finally, the FTC claims the company violated the Restore Online Shoppers’ Confidence Act (ROSCA) by misleading users about the nature of its paid services. Instead of a one-time payment, users who signed up for the Diamond Membership were automatically billed up to $9.99 per week without clear disclosure—an example of the “dark patterns” regulators are increasingly cracking down on.This lawsuit not only represents a potential turning point for Sendit but also serves as a warning shot to the broader social media and app ecosystem. As regulators increase scrutiny of platforms that target young users, the case underscores the importance of transparency, parental protections, and ethical digital business practices.#FTC #Sendit #COPPA #TeenSafety #DigitalPrivacy #DarkPatterns #SocialMedia #OnlineSafety #ConsumerProtection #DiamondMembership

Ep 288Broadcom Patches VMware Zero-Day: CVE-2025-41244 Exploited by China-Linked UNC5174
Broadcom has released a critical security update addressing six vulnerabilities across VMware products, including four rated high-severity. At the center of the update is CVE-2025-41244, a local privilege escalation flaw affecting VMware Tools and Aria Operations. What makes this vulnerability particularly alarming is that it was actively exploited in the wild as a zero-day since mid-October 2024, nearly a full year before its public disclosure.Security researchers at NVISO Labs attribute the exploitation to UNC5174, a China-linked threat actor with a track record of targeting enterprise systems. The flaw allows a malicious local user with non-admin access to escalate privileges to root on virtual machines, granting complete control of the environment. While the vulnerability requires some level of access, its ease of exploitation makes it a powerful tool for attackers once initial footholds are established.Broadcom confirmed the zero-day exploitation and patched the issue in multiple VMware product families, including VMware Cloud Foundation, vSphere Foundation, Aria Operations, VMware Tools, and Telco Cloud platforms. Beyond CVE-2025-41244, the patch release also fixed additional flaws such as CVE-2025-41245 (information disclosure) and CVE-2025-41246 (improper authorization), highlighting a broader set of risks within the VMware ecosystem.The fact that CVE-2025-41244 was being leveraged for nearly a year before public disclosure underscores both the sophistication of advanced threat actors and the challenges defenders face in detecting zero-day exploitation. This incident also raises key questions about UNC5174’s capabilities—whether the group is actively developing new zero-days or opportunistically exploiting flaws considered “trivial” once discovered.In this episode, we analyze the technical mechanics of the vulnerability, explore how UNC5174 weaponized it, and outline the immediate mitigation steps organizations must take. For enterprises running VMware environments, patching these flaws is critical to preventing full system compromise.#VMware #Broadcom #ZeroDay #CVE202541244 #UNC5174 #Cybersecurity #PrivilegeEscalation #CloudSecurity #VMwareTools #AriaOperations #ChinaLinkedThreatActor

Ep 288Seven Years, £5.5 Billion, 128,000 Victims – The Case of Yadi Zhang
In a historic case that has captured global attention, UK authorities have secured a conviction against Zhimin Qian (also known as Yadi Zhang), the Chinese national at the center of one of the largest financial crime investigations of the decade. Following a seven-year probe by the Metropolitan Police, investigators uncovered an elaborate fraud and laundering scheme that culminated in the seizure of 61,000 Bitcoin—valued at over £5.5 billion—the largest cryptocurrency seizure in history.Between 2014 and 2017, Qian defrauded more than 128,000 victims in China through a fraudulent investment scheme. To obscure the origins of the stolen wealth, she converted the proceeds into Bitcoin and later attempted to launder the funds after relocating to the UK. Working with accomplices, including Jian Wen—who was separately convicted—Qian sought to channel the illicit Bitcoin into real-world assets, from luxury purchases to property investments.What followed was one of the most complex and resource-intensive economic crime investigations ever conducted. The Met’s Economic Crime Command, in partnership with Chinese authorities, meticulously pieced together evidence that linked the seized Bitcoin to the fraud. Their success not only delivered a rare conviction in such a massive crypto-laundering case but also exposed the growing geopolitical challenges of asset recovery. With China and the UK now disputing the ownership of the seized billions, the case highlights both the triumphs and tensions of cross-border law enforcement in the digital era.In this episode, we unpack the anatomy of Qian’s fraud network, the meticulous police work that cracked the case, and the strategic implications for the future of financial crime enforcement. This landmark prosecution is more than a victory for justice—it’s a blueprint for how law enforcement can adapt to the realities of globalized digital finance.#CryptoFraud #Bitcoin #MoneyLaundering #ZhiminQian #YadiZhang #MetropolitanPolice #CryptoSeizure #FinancialCrime #Blockchain #InternationalLaw #EconomicCrime

Ep 287Cisco ASA/FTD Flaws Under Siege: 50,000 Devices at Risk from Active Exploits
Two newly disclosed critical vulnerabilities—CVE-2025-20333 and CVE-2025-20362—are wreaking havoc across the global cybersecurity landscape, with nearly 50,000 Cisco ASA and FTD appliances actively under threat. These flaws enable unauthenticated remote code execution and VPN access compromise, giving attackers an immediate foothold into critical infrastructure. Despite Cisco issuing warnings and patches, exploitation began weeks earlier, suggesting adversaries had advanced knowledge of the flaws.The situation escalated so severely that the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive, ordering federal agencies to identify and patch affected devices within 24 hours—or disconnect them if end-of-life. Still, threat scans show over 48,800 devices remain unpatched, with the largest exposure in the United States.Attackers are deploying sophisticated malware, including the Line Viper shellcode loader and the RayInitiator GRUB bootkit, designed for stealthy persistence and deep system compromise. Reconnaissance scans were observed weeks before public disclosure, underscoring the deliberate and coordinated nature of this campaign.In this episode, we break down the global scope of exposure, the advanced tooling used by attackers, and the national-level response from agencies like CISA. We also explore the organizational risks of slow patch adoption, the catastrophic implications of firewall compromise, and the urgent defensive measures enterprises must take to protect their networks.#Cisco #CVE202520333 #CVE202520362 #ASA #FTD #Firewall #Cybersecurity #CISA #CriticalVulnerabilities #LineViper #RayInitiator #RemoteCodeExecution #VPNCompromise

Ep 287MatrixPDF: The New Phishing Toolkit That Turns Safe PDFs into Cyber Weapons
A new cybercrime toolkit called MatrixPDF is changing the phishing landscape by weaponizing one of the most trusted file formats: PDFs. Marketed on cybercrime forums as an “elite document builder” for phishing simulations and blackteaming, MatrixPDF enables attackers to transform ordinary PDFs into highly convincing phishing lures that bypass email security filters—including Gmail’s native protections.Unlike traditional malware-packed attachments, MatrixPDF-generated PDFs contain no embedded malicious code, making them appear safe to automated scanners. Instead, attackers upload a legitimate document, overlay it with blurred content or fake “secure document” prompts, and insert clickable buttons or JavaScript triggers that redirect victims to credential-harvesting sites or malware downloads. Because the actual malicious activity only occurs after user interaction, the files sail through most security gateways undetected.The toolkit is sold openly via subscription plans ($400/month or $1,500/year), making sophisticated phishing campaigns accessible to a wide range of threat actors. With marketing that disguises it as a “security training tool,” MatrixPDF exploits both human trust and technical blind spots to achieve maximum impact.In this episode, we break down the capabilities of MatrixPDF, explore its operational mechanics, and explain why traditional defenses are failing against this new class of phishing toolkits. We also highlight strategies for defense, including AI-driven content analysis, PDF structure inspection, and sandbox-based URL detonation to protect inboxes from these advanced lures.#Cybercrime #Phishing #MatrixPDF #EmailSecurity #PDFMalware #Cybersecurity #InfoSec #CredentialTheft #AIinSecurity

Ep 286Asahi Brewery Cyberattack Halts Domestic Operations Across Japan
Asahi Group Holdings, Ltd.—the brewer behind some of the world’s most iconic beers, including Peroni and Grolsch—has been hit by a crippling cyberattack that froze its Japan-based operations. Ordering and shipping have been suspended, customer call centers and service desks are offline, and the company has been forced into damage control. While Asahi’s global operations remain unaffected, this incident highlights just how devastating digital breaches can be for even the most established brands.The company has assured the public that, so far, there is no evidence of personal or customer data leakage, but investigations are ongoing. Details about the cause, the attackers, and a recovery timeline remain scarce, leaving both customers and industry partners waiting for answers. This episode explores how the cyberattack unfolded, what it reveals about the fragility of supply chains in the digital age, and how Asahi is managing the public narrative during a crisis that has stopped its domestic business in its tracks.#Asahi #Cyberattack #Brewery #Japan #SupplyChain #DataSecurity #CrisisManagement #Ransomware #BeerIndustry #AsahiGroup

Ep 286Akira Ransomware Exploits SonicWall Flaw with Record-Breaking Speed
The Akira ransomware group has once again raised the stakes in cybercrime by exploiting a critical SonicWall vulnerability—CVE-2024-40766—to infiltrate corporate networks through SSL VPN accounts, even those secured with one-time password multi-factor authentication. Once inside, Akira’s affiliates execute one of the most dangerous tactics in modern ransomware: Living Off the Land. By hijacking legitimate, pre-installed IT tools like the Datto RMM platform and backup agents, the attackers blend in with routine administrative work, making their intrusions nearly invisible to traditional defenses.What makes this campaign even more dangerous is Akira’s operational tempo. According to Arctic Wolf and Barracuda, dwell times are now measured in hours instead of days, giving defenders almost no time to respond. The group also automates authentication attempts and leverages Impacket SMB for rapid network discovery, suggesting a distributed affiliate structure capable of launching simultaneous, scalable attacks.This episode unpacks how Akira turns trusted IT software into attack infrastructure, why the SonicWall flaw remains a critical access point despite being patched, and what early warning signs defenders should monitor—like unexpected VPN logins and anomalous SMB activity. With ransomware now capable of moving faster than incident response teams can react, Akira’s methods signal a dangerous new phase in cyber extortion.#AkiraRansomware #SonicWall #CVE202440766 #Ransomware #VPN #LivingOffTheLand #Impacket #Datto #AffiliateModel #Cybersecurity

Ep 285Ex-Hacktivist “Sabu” Backs SafeHill’s $2.6M Bet on Continuous Threat Management
A new cybersecurity startup with an infamous name attached is making headlines. SafeHill—formerly known as Tacticly—has secured $2.6 million in pre-seed funding to accelerate the development of its continuous threat exposure management (CTEM) platform, SecureIQ. Designed to overcome the shortcomings of traditional, point-in-time penetration testing, SecureIQ blends AI-driven continuous asset discovery with human-validated penetration testing, ensuring security teams focus on real, exploitable risks rather than noise.What makes SafeHill especially noteworthy is the presence of Hector Monsegur, once known to the world as “Sabu,” the leader of the hacktivist group LulzSec. Now reformed and serving as SafeHill’s Chief Research Officer, Monsegur brings an unmatched attacker’s perspective, helping to shape a platform that combines offensive realism with enterprise-grade defense.The company plans to use the funding—led by Mucker Capital and Chingona Ventures—to expand its engineering team, scale its ethical hacking capabilities, and enhance SecureIQ’s real-time monitoring features. With a leadership team that blends commercial expertise with deep offensive security experience, SafeHill is positioning itself as a disruptive force in the cybersecurity market, aiming to deliver the impact of a dedicated team of ethical hackers at scale.#SafeHill #SecureIQ #Cybersecurity #LulzSec #Sabu #HectorMonsegur #CTEM #PenetrationTesting #EthicalHacking #AI #CyberStartup