PLAY PODCASTS
Daily Security Review

Daily Security Review

410 episodes — Page 5 of 9

Ep 170Salt Typhoon Strikes Again: National Guard, Telecoms, and a Crisis in U.S. Cyber Defense

Salt Typhoon, a sophisticated Chinese state-sponsored cyber threat actor, is conducting one of the most aggressive and sustained espionage campaigns ever uncovered against U.S. critical infrastructure. This episode explores how the group—linked to China's Ministry of State Security—compromised a U.S. state’s Army National Guard, infiltrated telecom giants like AT&T, Verizon, and T-Mobile, and exfiltrated massive volumes of configuration files, call metadata, and wiretap logs.Operating with alarming stealth, Salt Typhoon leveraged zero-day vulnerabilities in network devices, misconfigured infrastructure, and high-privilege accounts lacking MFA. Their goal? Strategic intelligence and counterintelligence dominance—mapping the communications lifelines of U.S. government, military, and private sector entities.We explore:How Salt Typhoon infiltrated over 100,000 routers, including core components of global telecommunications infrastructureThe breach of the National Guard network, including admin credentials and communications with fusion centers across multiple statesExploited vulnerabilities (e.g., CVE-2023-20198, CVE-2023-20273) and GRE tunneling used to maintain persistent accessThe group’s broader footprint, including targets in Canada, universities worldwide, and access to U.S. court-authorized wiretap systemsThe tools and tactics of RedMike (aka Salt Typhoon), from living-off-the-land attacks to custom malware and encrypted exfiltrationWhy this is being called the worst telecom hack in U.S. history—and what it means for national securityAs U.S. officials roll out sanctions, international advisories, and enhanced telecom defenses, Salt Typhoon continues to adapt—illustrating the limitations of reactive security postures in an age of advanced persistent threats. The question is no longer if a breach will happen, but how long it takes to detect and contain it.

Jul 16, 202521 min

Ep 169DragonForce Ransomware Hits Belk: 150GB Data Leak and Operational Chaos

In this episode, we dive into the May 2025 ransomware attack on Belk, the iconic U.S. department store chain, orchestrated by the DragonForce ransomware group—a fast-rising player in the ransomware-as-a-service (RaaS) ecosystem. The cyberattack brought down Belk’s online and in-store operations for days, exfiltrated over 156GB of sensitive data, and sparked legal action following the delayed breach disclosure. With customer names and Social Security numbers compromised and leaked, the impact has rippled far beyond Belk’s systems.We examine how this attack fits into a broader RaaS-fueled campaign against the retail sector, including recent incidents at Marks & Spencer, Co-op Group, and Harrods. DragonForce, leveraging a model built on affiliate partnerships and rebranded ransomware payloads, is lowering the barrier to entry for cybercriminals—enabling less sophisticated actors to inflict enterprise-level damage.This episode covers:The attack timeline and operational disruption across Belk's digital and physical storefrontsWhat DragonForce stole—and why their leak site appearance suggests Belk didn’t pay the ransomThe role of RaaS in expanding ransomware's reach, making powerful attack infrastructure available to anyone with money and motiveHow DragonForce affiliates, including those tied to Scattered Spider, are combining social engineering, credential theft, and advanced TTPs to bypass defensesWhy retail chains are increasingly at risk—and how many still underestimate the severity of the threatKey defensive takeaways: from phishing-resistant MFA to Active Directory hardening, breach simulation exercises, and incident response planningThe Belk breach illustrates the evolving nature of ransomware, where supply chain access, insider tricks, and layered obfuscation tactics are the norm—not the exception. As regulatory scrutiny rises and ransomware groups professionalize, retailers and mid-market enterprises must reframe security not as an IT task, but as a business continuity imperative.

Jul 15, 20251h 20m

Ep 168NVIDIA Issues Urgent Rowhammer Warning: Enable ECC or Risk AI Integrity

In this episode, we dissect a major hardware-level cybersecurity warning issued by NVIDIA, one that directly affects data center operators, AI researchers, and enterprise IT teams using GPU infrastructure. The threat: Rowhammer—a physical DRAM vulnerability that’s now been successfully exploited on GPUs through a new attack method known as GPUHammer.Developed by researchers at the University of Toronto, GPUHammer targets NVIDIA A6000 GPUs, using rapid row activation to induce bit flips in GDDR6 memory, with alarming consequences. In controlled demonstrations, attackers were able to degrade AI model accuracy from 80% to less than 1%—all without ever accessing the model directly.The implications are clear: as GPUs become the backbone of AI infrastructure, memory integrity becomes a cybersecurity priority. And yet, many GPU users still disable ECC (Error Correcting Code) by default due to performance trade-offs—leaving high-value workloads vulnerable to silent corruption.We cover:What Rowhammer is, how it evolved from CPU memory exploits to GPU attacks, and what makes GDDR memory vulnerable.The mechanics of GPUHammer: how researchers bypassed proprietary memory mappings and refresh timings to trigger successful bit flips.Why AI models are especially susceptible, with a single exponent bit flip in a 16-bit float capable of cascading catastrophic results.NVIDIA’s guidance to mitigate the risk, including enabling System-Level ECC—a feature that can detect and correct these bit-level anomalies before they break inference.The trade-offs: enabling ECC can reduce available GPU memory by 6.25% and slow inference workloads by up to 10%.The distinction between On-Die ECC and System-Level ECC, and why only the latter offers end-to-end protection in transit between the GPU and system memory.How to verify and activate ECC, using both out-of-band (Redfish API) and in-band tools (e.g., nvidia-smi) depending on your deployment.As enterprises invest billions in AI-driven infrastructure, the integrity of GPU memory becomes a matter of trust, compliance, and operational resilience. Whether you're managing a multi-tenant ML platform or deploying sensitive models in healthcare or finance, the GPUHammer threat underscores the need to treat memory protection as a security imperative, not an optional performance toggle.

Jul 15, 202540 min

Ep 167Zip Security Secures $13.5M to Simplify and Scale Cyber Defense

In this episode, we spotlight Zip Security, a rising New York-based cybersecurity startup that just closed a $13.5 million Series A funding round, led by Ballistic Ventures. This brings the company’s total raised to $21 million, underscoring growing investor confidence in Zip’s mission: to make enterprise-grade cybersecurity accessible, automated, and affordable—especially for the 95% of businesses that operate without a dedicated security team.Founded in 2022, Zip Security is reimagining the way organizations—particularly SMBs and mid-market firms—secure their operations. Their integrated platform combines security, compliance, and IT automation into a seamless user experience, designed for companies overwhelmed by tool sprawl, resource constraints, and the complexity of modern cyber risk. From endpoint protection and identity access management to mobile device security and secure browsing, Zip’s AI-powered system handles it all—without requiring in-house expertise.We explore:Why traditional cybersecurity models are failing smaller organizations, and why Zip calls today’s services model “broken.”The shift from fragmented point solutions to integrated, AI-driven platforms as the dominant cybersecurity trend.Zip’s focus on the "long tail of the economy"—the smaller businesses at the heart of supply chains, now increasingly targeted by sophisticated attackers.How Zip is leveraging AI and automation to deliver continuous protection, eliminate alert fatigue, and reduce the total cost of ownership.The growing appetite among businesses for platform solutions over best-of-breed tools, especially among those with 100+ employees.The urgent need for simplification in cybersecurity—not just in tools, but also in compliance, training, and operational practices.Where this new funding will go: engineering expansion, market presence, and further platform innovation.In a landscape where cybercrime is projected to cost $12 trillion globally by 2025, the need for scalable, intelligent, and affordable cybersecurity solutions has never been more urgent. Zip Security’s approach, rooted in automation and accessibility, may be what finally closes the protection gap for smaller enterprises—and helps build resilience across the entire digital ecosystem.

Jul 15, 202548 min

Ep 167Century Support Services Breach: 160,000 Identities Compromised in Silent Cyberattack

In this episode, we examine the major data breach at Century Support Services—also operating under the name Next Level Finance Partners—that exposed the personal information of over 160,000 individuals. While the company discovered indicators of a cyberattack as early as November 2023, it wasn’t until May 2024 that investigators confirmed sensitive data had likely been accessed or exfiltrated. The exposed data is deeply sensitive: names, Social Security numbers, dates of birth, driver’s license and passport details, health and financial information, and even digital signatures.This breach is notable not just for its scale, but for its opacity—no ransomware group has claimed responsibility, and the breach remained largely under the radar compared to other high-profile cyber incidents. Yet the implications are just as serious.We dig into what this breach reveals about the current state of cybersecurity and breach response across industries. From the rise of data leakage as a legally defined event to the complexities of breach detection timelines, this incident reflects many of the systemic issues plaguing organizations today.Topics explored include:The anatomy of the Century Support breach: timeline, scope, and the delayed confirmation of data compromise.Legal definitions and disclosure obligations surrounding personal data exposure.The evolution of data breaches since the early 2000s—and why most are still detected by third parties, not the breached company.Common vulnerabilities that enable such breaches: lack of encryption, social engineering, and third-party risk.The dark web economy: how exposed data circulates and why victims face elevated identity theft risk for years.The role of breach response playbooks, including incident containment, legal reporting, and the offer of identity theft protection (and why consumer uptake remains low).Why attackers might remain silent—exploring motivations and the growing role of stealth attacks not associated with ransomware branding.As attacks become more intricate and visibility more difficult, the Century Support Services case underscores a larger truth: data breaches are no longer exceptional events—they are persistent, costly, and often avoidable failures of digital trust.

Jul 15, 202532 min

Ep 166TikTok, China, and the EU: The Battle Over Data Sovereignty

In this episode, we explore the mounting scrutiny TikTok faces over its handling of European user data, with the EU’s Data Protection Commission (DPC) launching a fresh investigation into alleged transfers of data to China. TikTok, owned by Beijing-based ByteDance, is once again in the crosshairs for possible violations of the General Data Protection Regulation (GDPR) — this time following revelations that contradicted previous assurances given during a years-long inquiry.At the heart of the episode lies the broader question: Who controls data in a globalized, politically fractured internet?We delve into the intricate politics of data localization, examining how governments are increasingly treating data flows as matters of sovereignty and national security. With the EU enforcing a rights-based data protection regime and China emphasizing state-centric control through its Personal Information Protection Law (PIPL), companies like TikTok are navigating a legal minefield where compliance in one jurisdiction could mean noncompliance in another.Topics discussed include:TikTok’s €530 million GDPR fine and the new inquiry sparked by undisclosed data transfers to Chinese servers.The role of Project Clover, TikTok’s €12 billion initiative to localize EU user data and build trust through European-based infrastructure and security auditing.How GDPR’s Article 46 requires equivalency in legal safeguards for any cross-border data transfers, and why Chinese laws such as the National Intelligence Law fail that test.The strategic enforcement power of the Irish DPC and how remote access, not just physical storage, is now classified as a “data transfer” under GDPR.The stark contrast between GDPR and China’s PIPL: one centers on individual rights and transparency, while the other prioritizes state surveillance and geopolitical control.The collateral damage to global cloud computing, API efficiency, and data redundancy when localization laws fragment digital ecosystems.Europe’s evolving stance toward Chinese tech firms—once seen through a commercial lens, now increasingly treated as security and sovereignty issues.Through the lens of the TikTok case, this episode unpacks the new realities of digital governance, where data is power, and control over that data is rapidly becoming a tool of foreign policy. For enterprises and policymakers alike, the challenge is not just about compliance, but navigating a digital world divided by legal borders and political agendas.

Jul 11, 202558 min

Ep 166Booz Allen Invests in Corsha: Defending Machine-to-Machine Communication at Scale

As the cybersecurity landscape shifts toward hyperautomation and AI-driven autonomy, a new frontier has emerged: the identity and access security of machines. In this episode, we explore Booz Allen Ventures’ strategic investment in Corsha, a company at the forefront of Machine Identity Provider (mIDP) technology. Their collaboration marks a pivotal moment in redefining how we secure machine-to-machine (M2M) communication, especially in operational environments and critical infrastructure.Corsha’s platform addresses a seismic transformation: machines now outnumber humans in digital ecosystems by a ratio of 50:1—or even 80:1 in some accounts. With the rise of Agentic AI, autonomous software agents are making decisions, executing tasks, and accessing networks without human oversight. This paradigm shift makes human-centric identity models obsolete and demands dynamic, cryptographic, and automated lifecycle management for non-human identities (NHIs).This episode covers:Why identity is the new perimeter—and why it starts with machines.The vulnerabilities in today's identity and access management (IAM) frameworks, particularly in API-heavy, cloud-native environments where machines drive over 90% of all traffic.How Corsha’s mIDP delivers MFA for machines, manages millions of machine credentials, and secures connections across legacy industrial systems and modern cloud deployments.The significance of Corsha’s integration with traditional IdPs like EntraID and AWS IAM, bringing adaptive identity management to autonomous, interconnected ecosystems.The growing strategic alignment between national security imperatives and machine identity solutions. With Zero Trust becoming a mandate across U.S. federal agencies, Corsha’s capabilities directly support mission-critical autonomy, AI governance, and cyber-physical resilience.The role of Booz Allen Ventures in not just funding Corsha but helping scale its solutions for government and industrial sectors. The firm sees Corsha as “foundational infrastructure for next-generation mission systems.”How this investment follows Corsha’s Series A and A-1 rounds, and enables the expansion of Corsha Labs, advancing agentless behavioral identity and AI-enhanced IAM for autonomous systems.We conclude with a forward-looking view: as critical infrastructure, defense systems, and industrial operations become more automated, machine identity will become as central as human authentication is today. With Agentic AI accelerating the pace of change, Corsha—and investments like Booz Allen’s—are laying the groundwork for a secure, autonomous future.

Jul 11, 202533 min

Ep 165WSUS Meltdown: Global Sync Failures and the Shift Toward Cloud Patch Management

Windows Server Update Services (WSUS) has long been a cornerstone of enterprise patch management—but recent global synchronization failures have raised serious questions about its future viability. In this episode, we dissect the widespread outage that left organizations unable to sync critical Windows updates, unpacking both the technical cause and the broader implications for IT teams worldwide.In July 2025, system administrators across the US, UK, India, and Europe found their WSUS servers stuck in failed sync loops, thanks to a problematic update revision from Microsoft. With WSUS servers globally attempting full synchronizations simultaneously, Microsoft's update infrastructure was overwhelmed. The result? Timeout errors, stalled deployments, and massive headaches for IT teams already stretched thin.We walk through the exact symptoms of the incident—including IIS errors, .NET timeouts, and SoftwareDistribution.log anomalies—and the server-side fix that ultimately resolved it. But as we explore the root causes, it's clear this wasn’t just a one-off issue. Firewall misconfigurations, bloated WSUS databases, mismanaged application pools, and MIME-type conflicts all contribute to WSUS’s growing fragility.To keep WSUS functioning, organizations must implement rigorous maintenance routines:Regular SUSDB health checks for superseded, obsolete, and declined updatesIIS application pool tuning to prevent 503 errorsSQL and PowerShell-based cleanup scripts for reindexing, shrinking, and update pruningFirewall and service configuration audits to ensure all dependencies are running and reachableEven with these best practices, many experts believe WSUS is reaching end-of-life in spirit, if not in official terms. Microsoft's increasing emphasis on cloud-native solutions, like Windows Update for Business (WUfB) and Microsoft Endpoint Configuration Manager (MECM), signals a strategic departure from the manual, high-maintenance nature of WSUS.We explore modern alternatives that offer automation, scalability, and security:WUfB + Intune: Cloud-native patching with faster deployment and tighter endpoint integrationMECM (formerly SCCM): Hybrid control with support for complex environments and third-party appsThird-party platforms: Like Vicarius vRx, providing cross-platform patching, scripting, and virtual remediationAs security threats accelerate and zero-day exploits demand rapid mitigation, patch management can no longer rely on legacy systems prone to breaking under pressure. This episode makes it clear: now is the time to re-evaluate your patching strategy, invest in automation, and position your organization for secure, sustainable operations in a post-WSUS world.

Jul 11, 202527 min

Ep 164Cracking eSIM: Exposing the Hidden Threats in Next-Gen Mobile Security

eSIM technology has transformed the way we connect—but has it also introduced new vulnerabilities into the heart of modern telecommunications?In this deep-dive episode, we dissect the security architecture, remote provisioning systems, and critical attack surfaces of embedded SIM (eSIM) technology, now deployed in billions of mobile, consumer, and IoT devices worldwide. While eSIMs offer convenience, flexibility, and integration benefits, a growing body of research reveals severe flaws in their design and implementation—flaws that allow profile hijacking, cloning, and even eavesdropping on private communications.We begin by tracing the evolution of Subscriber Identity Module (SIM) technology into today’s eUICC-based eSIM architecture, reviewing the GSMA’s role in standardizing eSIMs for machine-to-machine (M2M), consumer, and IoT deployments. We unpack the core remote provisioning components, such as SM-SR, SM-DP+, LPA, and IPA, and explain how they interact to enable over-the-air SIM profile installation and switching—technically elegant, but increasingly a security liability.The heart of the episode delves into high-impact vulnerabilities that continue to shake the telecom industry:Memory exhaustion attacks that brick eSIMs by orphaning profile containersMalicious profile locking that disables switching to other networksCloning and profile hijacking, demonstrated in 2025 by researchers who extracted private cryptographic keys from real-world GSMA-certified eUICCsUndetected Java app injection, allowing rogue code to be embedded in live profilesCritical failures in Java Card VM implementations, enabling type confusion and remote profile manipulationWe also discuss the wider systemic implications, including:How attackers cloned an Orange eSIM and hijacked a subscriber’s identity undetectedWhy “tamper-proof” certification claims are now under scrutinyThe limitations of current GSMA security fixes and certification frameworksWhy hardware security modules (HSMs) and cryptographic audits are essential for true resilienceThe tension between convenience and control in mobile ecosystems—and what’s at stake if security doesn’t catch up with innovationAs vendors scramble to issue patches and strengthen defenses, the telecom industry faces an urgent reckoning: Can eSIM technology remain viable without complete trust in its secure elements? And are operators, vendors, and standard bodies doing enough to prevent the next wave of remote SIM exploitation?Whether you're a telecom engineer, a cybersecurity professional, or an executive responsible for device security, this episode reveals the high-stakes battle for the security of our mobile identities—and what it will take to protect billions of connected users from invisible compromise.

Jul 11, 202516 min

Ep 163Qantas Breach and Beyond: Cybersecurity Risks in Australia’s Digital Supply Chains

As Australia contends with a growing wave of cybersecurity incidents, this episode explores the intersection of national privacy laws, global supply chain vulnerabilities, and public trust in digital security. The recent Qantas data breach—affecting over 5 million customers—was the latest high-profile case to expose how fragile third-party service relationships can compromise even the most reputable organizations. But Qantas is not alone. The aviation sector, and critical infrastructure more broadly, is now a primary target for sophisticated cyberattacks fueled by digitization and undersecured supply chains.We begin with an overview of Australia’s privacy and data protection framework, governed by the Privacy Act, Cyber Security Act, Spam Act, and other related legislation. The Office of the Australian Information Commissioner (OAIC) plays a central role in enforcement, requiring timely breach notifications, secure data handling practices, and clear definitions around personal and sensitive information. Recent legislative amendments are pushing toward more stringent accountability, but enforcement still faces gaps, particularly in the context of global data transfers and outsourced operations.We then widen the lens through insights from ENISA’s latest supply chain cybersecurity report, which examines how organizations across the EU are struggling to implement consistent practices around vendor risk, vulnerability management, and patching. Despite having policies on paper, many essential entities lack dedicated resources, cybersecurity roles, or real-time visibility into their third-party environments. In an interconnected world, supply chain security is only as strong as its weakest link—a lesson repeatedly demonstrated in sectors like aviation, healthcare, and critical infrastructure.The Qantas breach, caused by an attack on a third-party call center platform, underscores the increasing relevance of this risk. Similar incidents at Cathay Pacific, SITA, and U.S. airports point to airlines becoming soft targets due to legacy systems, widespread outsourcing, and the complexity of digital ecosystems. Attackers, including state-aligned threat groups, are leveraging phishing, credential theft, and software vulnerabilities to breach these layered environments.We also discuss:The FAA’s proposed cybersecurity rules for aviation systems and how global regulators are responding to emerging threatsWhy call centers have become high-value entry points for attackers targeting sensitive personal informationBest practices for breach response, including credit monitoring, fraud alerts, and legal safeguards for affected individualsPublic sentiment in Australia, where consumers are expressing growing frustration with repeated breaches and lack of corporate accountabilityActionable recommendations for companies: strong access controls, continuous monitoring, role-based restrictions, and transparent supplier auditsThe challenge of aligning technical, operational, and legal safeguards across jurisdictions in a rapidly evolving threat landscapeUltimately, this episode emphasizes that strong cybersecurity is not just a technical challenge—it’s a governance and trust imperative. As breaches continue to mount and regulations tighten, both organizations and individuals must adapt to protect their digital assets, reputations, and rights.

Jul 10, 20251h 3m

Ep 162Taiwan Sounds the Alarm: TikTok, WeChat, and the Chinese Data Threat

In this episode, we examine Taiwan’s growing alarm over Chinese mobile applications, especially TikTok and WeChat, in light of rising global concern over data privacy and foreign surveillance. A recent inspection by Taiwan’s National Security Bureau (NSB) revealed that these apps aggressively collect personal data and transmit it to servers located in mainland China—where national laws require that user data be made available to Chinese government authorities upon request.Taiwan’s warning isn’t isolated—it echoes fears expressed by governments across the world, from the United States to India to European regulators, who see apps like TikTok, WeChat, and others as national security risks. At the center of this debate lies the Data Security Law (DSL) of the People’s Republic of China, a sweeping mandate that compels companies to store data within China and hand it over for national intelligence purposes. Taiwan’s NSB highlighted violations such as the unauthorized collection of facial recognition data, contacts, geolocation, and more—actions that could be leveraged for foreign surveillance, espionage, or influence operations.We explore:The mechanics of data collection by TikTok, WeChat, and similar Chinese-developed apps—including how these apps access sensitive personal information far beyond what's needed for their core functionality.How Chinese national laws—especially the DSL, Cybersecurity Law, and National Intelligence Law—enable state access to user data stored by any company operating in or connected to China.Taiwan’s broader national security context, including cyberattacks and espionage targeting its infrastructure, which raise the stakes for data security.Parallel concerns from other nations, including EU investigations into unlawful data transfers, India’s outright bans on hundreds of Chinese apps, and ongoing U.S. debates about TikTok's fate.The potential for foreign influence through content curation, especially via algorithmic targeting of political messages and behavioral profiling enabled by biometric data collection.Regulatory dilemmas facing democracies: how to balance free markets and open technology with the imperative to protect citizens’ data and national infrastructure.Taiwan’s alignment with global trends in confronting China-developed software—not just through advisories but also through technological countermeasures and increased cyber resilience efforts.The episode also covers what average users can do: re-evaluating app permissions, avoiding features with poor transparency, and understanding the geopolitical stakes behind seemingly innocuous mobile platforms.

Jul 9, 20251h 6m

Ep 162The Evolution of Atomic macOS Stealer: Backdoors, Keyloggers, and Persistent Threats

This episode exposes the growing menace of Atomic macOS Stealer (AMOS) — a rapidly evolving malware-as-a-service (MaaS) platform targeting macOS users worldwide. Once seen as a simple data stealer, AMOS has matured into a potent, long-term threat featuring keyloggers, a persistent backdoor, and system-level access, all designed to exfiltrate data and maintain control over compromised systems.AMOS now enables threat actors to remotely execute commands, spy on users, and re-infect devices even after reboot, thanks to advanced macOS persistence techniques like LaunchDaemons and hidden binary scripts. Its infection chain relies on social engineering, counterfeit applications, and tampered DMG installers — making even savvy Mac users vulnerable.This episode explores:AMOS's evolution from stealer to full-platform malware with persistent remote accessKey features of the latest version, including a keylogger and embedded backdoor capable of running arbitrary commandsReal-world attack vectors, such as phishing campaigns, cracked software, poisoned torrents, and fake job ads targeting cryptocurrency holders and freelancersThe use of macOS persistence mechanisms (LaunchDaemons, osascript, ScriptMonitor) and Gatekeeper evasionCross-platform development in GoLang, allowing the malware to operate seamlessly across Mac architecturesThe global impact, with campaigns spanning over 120 countries and rising infection rates in the U.S., U.K., France, and CanadaHow AMOS compares to Cthulhu Stealer and North Korea-aligned tools like RustBucket and macOS BeaverTailPractical security steps to detect and mitigate AMOS, including IOC monitoring, digital signature verification, and behavioral endpoint defensesAMOS has rapidly become one of the top three most detected macOS threats, signaling a paradigm shift in Mac-targeted malware. With crypto wallets, browser data, and personal credentials at risk, this episode is essential listening for anyone in cybersecurity, IT, or using Macs in high-risk industries.

Jul 8, 202545 min

Ep 162CitrixBleed Returns: CVE-2025-5777 and the Exploitation of NetScaler Devices

In this episode, we dissect CitrixBleed 2—a newly disclosed and actively exploited vulnerability affecting Citrix NetScaler ADC and Gateway appliances. Tracked as CVE-2025-5777 (and possibly also CVE-2025-6543), this critical flaw mirrors the notorious original CitrixBleed by allowing attackers to extract sensitive memory content, including user session tokens, through crafted POST login requests.Despite Citrix’s claims that there’s no active exploitation, threat intelligence reports from security researchers and government agencies like CISA tell a different story: public proof-of-concept exploits are circulating, and attacks have been observed as early as mid-June. The vulnerability stems from a format string misuse involving the snprintf function, allowing memory leakage in small byte increments—enough for determined attackers to reconstruct sensitive data, hijack authenticated sessions, and potentially access administrative utilities.We cover everything from the technical mechanics of the vulnerability to the strategic mitigation steps enterprises must take. Affected systems include NetScaler MPX, VPX, SDX, and NetScaler Gateway, making the scope of risk widespread, especially in large-scale remote access and cloud deployments.In this episode, we unpack:How CVE-2025-5777 works, including the format string flaw and session token exposureIndicators of active exploitation and CISA’s inclusion of related CVEs in its KEV catalogThe timeline and evidence suggesting exploitation began weeks before disclosureWhy slow patch adoption is increasing risk across industriesA guided breakdown of the NetScaler Secure Deployment Guide, covering:Strong authentication, MFA, and password securityRole-based access control (RBAC) and session managementSecure traffic segmentation, ACL configuration, and TLS hardeningApp-layer protections like WAF and rewrite policies for cookie securityLogging, SNMP configuration, and remote syslog best practicesDNSSEC and cryptographic key managementHow to verify patch status via the NetScaler Console and initiate remediation scansThis episode delivers a clear message: Patch now, monitor aggressively, and revisit your NetScaler hardening strategy. With public exploits in circulation and attackers harvesting session tokens, this vulnerability represents a pressing concern for enterprises relying on Citrix infrastructure.

Jul 8, 20251h 2m

Ep 162SAP’s July 2025 Patch Day: Critical Flaws, CVE-2025-30012, and Ransomware Risk

In this episode, we break down SAP’s July 2025 Security Patch Day—a high-stakes moment for any enterprise relying on SAP’s core business applications. With 27 new and 4 updated security notes released, including seven rated as critical, this patch cycle directly targets some of the most serious vulnerabilities seen in SAP environments in recent memory.At the center of this month’s update is CVE-2025-30012, a critical unauthenticated command execution flaw in SAP Supplier Relationship Management (SRM). Initially classified as high priority, this vulnerability has now been escalated to critical status due to its severe impact. Also in the spotlight: a remote code execution bug in SAP S/4HANA and SCM (CVE-2025-42967), and four insecure deserialization vulnerabilities affecting SAP NetWeaver Java systems—longtime targets for threat actors and ransomware groups alike.While there are no confirmed in-the-wild exploits for these new issues, history tells us that such gaps don’t remain unexploited for long. Just earlier this year, vulnerabilities in SAP’s Visual Composer framework were actively exploited by ransomware operators like BianLian and RansomEXX. As threat actors grow more sophisticated and supply chain targets grow more lucrative, patch speed has never been more important.This episode covers:The vulnerabilities patched in SAP’s July advisory and their real-world riskWhy CVSS scoring matters—and how SAP determines what counts as "critical"The SAP vulnerability lifecycle, and how organizations can use structured frameworks for patch and incident managementKey lessons from past exploits, including zero-day activity targeting SAP systemsThe shared security model in cloud deployments like RISE with SAP—and what you’re responsible for vs. what SAP handlesWhy alert fatigue and delayed patching are existential threats in SAP environmentsHow to verify your patch level, interpret SAP Notes, and ensure you’re protectedWe also discuss how critical tools like SecurityBridge, NIST-aligned vulnerability workflows, and proactive community engagement can help mitigate threats and support SAP admins, DevSecOps teams, and CISOs navigating the growing complexity of ERP security.

Jul 8, 20251h 2m

Ep 161106GB Exposed? Telefónica, HellCat, and the Silent Data Breach

In this episode, we explore a shadowy and unconfirmed—but highly consequential—data breach at Spanish telecommunications giant Telefónica. Allegedly orchestrated by the HellCat ransomware group, the breach involves a staggering 106GB of exfiltrated data, including internal communications, customer records, and employee information. Telefónica has yet to acknowledge the breach publicly, while the threat actor “Rey” released a 5GB sample to support their claim, pointing to a Jira server misconfiguration as the entry point.We unpack the evolving tactics of HellCat—a ransomware gang known for targeting Atlassian’s Jira platform—and examine how such misconfigurations continue to expose sensitive data across major organizations like NASA, Google, and Yahoo. Telefónica is no stranger to HellCat; a similar attack occurred in January, making this latest breach appear not only credible but also indicative of ongoing remediation failures.But this isn’t just a story about technical lapses—it’s also a warning shot for every organization subject to the GDPR and Spain’s national data protection laws. We dig into the regulatory implications, potential fines, and legal obligations that Telefónica could face if the breach is confirmed.You'll also hear why Atlassian’s Jira platform has become a soft target for threat actors, and what companies need to do to harden their SaaS deployments against similar threats. Finally, we explore frameworks for responsible breach response—from immediate containment to post-incident review—and what every enterprise should learn from this growing wave of misconfiguration-fueled cyberattacks.Key discussion points include:The anatomy of the Telefónica breach and the leaked dataHow HellCat exploits Jira misconfigurations and infostealer-compromised credentialsThe broader trend of Atlassian-based intrusions across multiple industriesGDPR and NLOPD obligations: What counts as a notifiable breach?Regulatory fines, reputational risks, and the right to compensationBest practices for SaaS security and breach response in 2025This episode is a must-listen for CISOs, privacy officers, IT security professionals, and legal teams navigating the intersection of cybersecurity failures and regulatory exposure.

Jul 7, 202550 min

Ep 160Ingram Micro’s SafePay Ransomware Breach: Human-Operated Threats and Supply Chain Fallout

The recent ransomware attack on Ingram Micro, a global technology distribution giant, reveals not only a sophisticated human-operated cyber assault—but also the fragile state of modern supply chain cybersecurity. In this episode, we break down how attackers, believed to be affiliated with the SafePay ransomware group, penetrated Ingram Micro’s infrastructure, reportedly by exploiting a Palo Alto GlobalProtect VPN vulnerability and leveraging stolen credentials. The breach disrupted the company’s website and order systems, impacting partners and resellers worldwide.This case is a microcosm of a much larger threat: ransomware groups are evolving, using targeted, manual operations rather than automated malware blasts. And when a company like Ingram Micro gets hit, the downstream effects ripple through entire IT ecosystems.This episode explores the deeper story behind the headlines, including:Human-operated ransomware tactics, including credential theft, privilege escalation, lateral movement, and double extortion.The critical vulnerability CVE-2024-3400 in GlobalProtect, which is being actively exploited in real-world ransomware campaigns.SafePay’s emergence in 2025 as a serious actor, using stolen VPN credentials and backdoor persistence methods to deploy ransomware discreetly.How human-operated ransomware attacks differ from commodity malware—and why they're more dangerous.The risks of supply chain dependence, as illustrated by partners experiencing delays and business interruptions from Ingram Micro’s outage.The importance of adopting a Cybersecurity Supply Chain Risk Management (C-SCRM) strategy using NIST’s framework.Key mitigation steps, including enforcing multi-factor authentication (MFA), hardening remote access tools, implementing network segmentation, and maintaining robust offline backups.Best practices for incident response and recovery, based on guidance from CrowdStrike, Microsoft, and NCSC.How ransomware threat actors are becoming increasingly selective, strategic, and efficient—often targeting misconfigured enterprise platforms as initial entry points.The Ingram Micro attack is a reminder that resilience isn’t just about stopping the ransomware—it’s about preparing for its inevitable arrival. For organizations operating in the cloud, distributing hardware, or serving as a linchpin in digital ecosystems, the lessons from this breach are urgent and universal.

Jul 7, 202559 min

Ep 159The Illusion of Shutdowns: What Hunters International's Closure Really Means

In a sudden and cryptic announcement, the notorious ransomware group Hunters International has declared its shutdown, citing “recent developments” and pledging to release decryption keys to victims. Active since late 2022 and suspected to be a rebrand of the earlier Hive ransomware gang, Hunters International has been responsible for attacks on nearly 300 organizations across various industries. Yet, cybersecurity experts believe this announcement is less about remorse—and more about reinvention.In this episode, we dissect what this “shutdown” really means. Far from disappearing, the group may already be operating under a new name: World Leaks. This episode explores the lifecycle of ransomware gangs and how rebranding, splintering, and strategic pauses are common tactics used to throw off law enforcement and improve operational resilience.Key discussion points include:The lifecycle of ransomware groups, from emergent to established, using the GRIT taxonomy.How rebranding is used to evade law enforcement pressure and manage public perception, especially after high-profile disruptions.The Hive–Hunters–World Leaks lineage, and what indicators point to continuity rather than closure.Why law enforcement actions rarely shut down ransomware permanently, often leading to splinter or successor groups.The business model of ransomware, including double extortion, data leak sites, and Ransomware-as-a-Service (RaaS).Which sectors remain most vulnerable—including manufacturing, professional services, finance, and education—and how victim selection is increasingly based on financial footprint and data value.The significance of public communications and tactics like apologies, targeting rules, and ethics messaging used to shape ransomware groups' public image.The importance of ransomware payment tracking via blockchain, with insights into Bitcoin-based laundering operations and the transparency paradox of public ledgers.The value of Ransomware Susceptibility Index™ (RSI) metrics to help organizations prioritize defenses and understand their exposure.This case study of Hunters International exemplifies the strategic fluidity of modern ransomware operations—where shutting down may simply mean rebooting under a different brand. For defenders, staying ahead means recognizing these patterns, maintaining continuity in threat intelligence, and preparing for the next iteration before it strikes.

Jul 7, 202542 min

Ep 159CISA Flags CVE-2025-6554: Patching Chrome’s Critical Flaw Before It’s Too Late

A newly discovered and actively exploited zero-day vulnerability in Google Chrome has sent ripples through the cybersecurity community. Known as CVE-2025-6554, this critical type confusion flaw in Chrome’s V8 JavaScript and WebAssembly engine enables remote attackers to perform arbitrary read/write operations or execute code via a single malicious webpage. With active exploitation confirmed and inclusion in CISA’s Known Exploited Vulnerabilities catalog, organizations are under urgent pressure to patch all affected systems—immediately.In this episode, we break down what makes this vulnerability especially dangerous, why Google’s Threat Analysis Group (TAG) is paying close attention, and what this incident tells us about the state of browser security, enterprise patch management, and memory safety technologies. Though Google has released patches for Chrome and other Chromium-based browsers—including Microsoft Edge, Brave, and Vivaldi—the scale of exposure across platforms is massive.Key topics we explore include:Technical breakdown of CVE-2025-6554: How type confusion in the V8 engine leads to total compromise.Sandboxing in V8: How Chrome's V8 Sandbox mitigates memory corruption—and what this exploit bypassed.Indicators of nation-state exploitation: The role of Google’s TAG and what it implies about the attackers.Patching priorities: Why immediate updates to versions 138.0.7204.96/.97 (Windows/Linux) and .92/.93 (macOS) are non-negotiable.Beyond Chrome: The ripple effect on all Chromium-based browsers and Electron-based applications.Patch management best practices: From realistic testing environments and system categorization to rollback procedures, KPIs, and automation.With CVE-2025-6554 being the fourth zero-day in Chrome this year, this isn’t just a browser issue—it’s a litmus test for security readiness. As attackers grow faster and more sophisticated, your ability to rapidly detect, prioritize, and patch vulnerabilities is more crucial than ever.Whether you're managing an enterprise IT infrastructure, leading an AppSec team, or securing a fleet of endpoints, this episode will arm you with both the technical insight and operational perspective needed to respond decisively to this threat—and to the next one.

Jul 7, 202540 min

Ep 158ANSSI vs. Houken: France Battles Advanced Chinese Hacking Threat

In this episode, we uncover a high-stakes cyber campaign targeting the heart of French digital infrastructure. ANSSI, France’s national cybersecurity agency, has exposed a Chinese-linked hacking group known as Houken (UNC5174 or Uteus) responsible for a widespread espionage operation since late 2024. This state-adjacent threat actor infiltrated critical sectors including government, media, transport, telecom, and finance using an arsenal of sophisticated tactics—blending zero-day exploits, rootkits, and stealthy post-exploitation tools.The Houken group leveraged multiple zero-day vulnerabilities in Ivanti Cloud Service Appliances (CSA)—CVE-2024-8190, CVE-2024-8963, and CVE-2024-9380—to gain initial access. But this wasn’t just about intrusion; Houken’s operators dug in deep: stealing credentials, moving laterally, and deploying a rare Linux kernel-mode rootkit capable of hijacking any inbound TCP traffic while remaining virtually invisible to traditional defenses.What sets this campaign apart isn’t just its technical sophistication—it’s the hybrid nature of the threat. ANSSI suggests Houken may be a cyber mercenary group, simultaneously working in the service of China’s Ministry of State Security (MSS) and pursuing financial gains, such as cryptocurrency mining and reselling system access. This “multiparty approach” signifies a dangerous evolution in cybercrime—where espionage and monetization coexist within a single operational framework.We delve into:The attack chain: from zero-day exploitation to credential harvesting and stealth persistence.The rootkit sysinitd.ko: a kernel module granting root-level command execution while avoiding detection.Defense evasion tactics: including timestomping, log deletion, and self-patching vulnerabilities to lock out rival threat actors.Houken’s toolkit: a mix of commodity utilities (Nmap, Netcat, Fscan) and custom implants (PHP webshells, SparkRAT, Neo-reGeorg).Operational clues that tie activity to China Standard Time (UTC+8) and highlight probable MSS alignment.This is more than a breach. It’s a signal that cyber mercenary operations are maturing, and European states are squarely in the crosshairs. The Houken campaign forces a reconsideration of perimeter defenses, zero-day management, and detection strategies for advanced persistent threats.Whether you’re a security architect, CISO, or public sector technologist, this episode provides a deep and essential briefing on one of the most sophisticated cyber espionage efforts uncovered in 2025.

Jul 4, 202533 min

Ep 157Psychological Manipulation and AI Fraud: How Spain Exposed a $12M Scam

In this episode, we examine a growing threat reshaping financial crime in Europe: sophisticated, technology-driven investment fraud. Spanish law enforcement has recently dismantled a fraud operation that spanned multiple years, deceived over 300 victims, and resulted in more than $11.8 million in losses. What made this case particularly notable was the use of high-pressure call centers inside Spain, supported by strategic psychological manipulation, to drive fraudulent investments advertised across social media platforms.The scheme, launched in 2022, mimicked the playbook of larger international fraud networks—slick branding, convincing digital ads, and seemingly personalized pitches to lure in unsuspecting investors. Behind the scenes, victims were connected to well-trained fraud agents posing as investment advisors who used scripted tactics to manipulate emotional trust and urgency.This case, however, is just one node in a much broader web of financial crime being actively investigated across Spain:Authorities arrested 21 individuals and seized luxury vehicles, stacks of cash, and other high-value assets linked to the scheme.In a separate crackdown, Spanish police disrupted a ring that laundered over €500 million, highlighting the scale and integration of illicit finance operations within legitimate economic channels.Another scam exploited AI-generated advertisements and deepfakes to lure cryptocurrency investors into fake opportunities, netting €19 million.We unpack the evolving tactics used by fraudsters, including:Social engineering techniques that exploit emotional triggers and authority bias.The use of AI and deepfakes to create authentic-looking investment platforms and personalities.Affinity fraud, where scammers target members of specific communities or shared identity groups to exploit trust.The integration of cryptocurrency and decentralized finance (DeFi) to obscure money trails and enable rapid laundering.This episode also dives into the regulatory landscape, including how the EU’s Anti-Money Laundering Directive (AMLD) and organizations like FATF and Moneyval are attempting to curb these activities through stricter oversight, risk-based frameworks, and obligations for financial and non-financial intermediaries to report suspicious transactions.As these fraud rings adopt increasingly advanced tools—ranging from Telegram social engineering to metaverse impersonations—Spain’s efforts signal a broader shift: financial crime is becoming cybercrime, and law enforcement must keep pace.Whether you’re a financial compliance professional, cybersecurity lead, or simply someone navigating digital investments, this episode is your briefing on where the threat landscape is heading—and what can be done to stay one step ahead.

Jul 4, 202517 min

Ep 157CVE-2025-20309: Critical Cisco Root Access Flaw Threatens VoIP Security

A devastating vulnerability—CVE-2025-20309—has been discovered in Cisco’s Unified Communications Manager (Unified CM) and its Session Management Edition (SME), threatening the security of over a thousand internet-exposed VoIP systems globally. In this episode, we break down this critical flaw, which scores a perfect CVSS 10.0, and explore why it's one of the most dangerous telecom vulnerabilities in recent memory.The vulnerability stems from unchangeable hardcoded SSH root credentials inadvertently left in production code during development. Exploitable without authentication, this flaw grants remote attackers full root access to affected systems—an open door to full system takeover, VoIP eavesdropping, lateral movement, and even ransomware deployment.We discuss:What is CVE-2025-20309? A look at the hardcoded credential flaw impacting versions 15.0.1.13010-1 to 15.0.1.13017-1 of Cisco Unified CM.How bad is it? Full root access, unauthenticated, with over 1,000 vulnerable instances publicly exposed—especially in critical sectors across the U.S. and Asia.Threat actor implications: APT groups like APT28, APT41, and MuddyWater are known to exploit similar flaws. CloudSEK warns that access brokers may soon target and monetize these systems on darknet forums.What’s at stake:VoIP traffic manipulation: Intercept SIP/RTP streams for surveillance or disruption.Call log and voicemail exfiltration.Deployment of persistent malware and ransomware.Lateral movement to other enterprise systems.Mitigation roadmap:Patch immediately using Cisco’s released patch file: ciscocm.CSCwp27755_D0247-1.cop.sha512.Upgrade to 15SU3 when released.Monitor logs for root access attempts (/var/log/active/syslog/secure).Restrict administrative access, isolate Unified CM systems, and enforce VPN/firewall segmentation.No workarounds: This is not a flaw you can firewall away. Cisco has confirmed that there are no viable workarounds—patching is the only fix.The bigger picture: This incident also highlights the ongoing risks of default credentials, poor credential hygiene, and overreliance on perimeter defenses in VoIP and UC systems. It’s a reminder that VoIP isn’t just about call quality—it’s a core part of your network infrastructure that demands zero-trust scrutiny.Additional Cisco vulnerabilities: We also briefly touch on two related medium-severity flaws—CVE-2025-20308 (Spaces Connector privilege escalation) and CVE-2025-20310 (stored XSS in Cisco Enterprise Chat)—which, while not yet exploited, reinforce the need for robust Cisco infrastructure hygiene.This episode is essential listening for VoIP admins, network engineers, CISOs, and anyone managing unified communication platforms. Don’t wait for signs of compromise—patch now and audit your exposed assets. Security for voice systems is no longer optional; it’s foundational.

Jul 4, 202541 min

Ep 156macOS Under Siege: NimDoor Malware Targets Telegram, Wallets, and Keychains

A new, highly advanced malware strain—NimDoor—has emerged as the latest cyber weapon in the arsenal of North Korean state-sponsored hackers, specifically targeting macOS systems used by cryptocurrency and Web3 organizations. This episode explores the complex tactics and alarming capabilities of NimDoor, a malware family showcasing a blend of C++ and Nim programming, stealthy persistence mechanisms, and an intense focus on stealing digital assets.First identified in early 2025, NimDoor marks a significant evolution in North Korean cyber operations. Delivered through social engineering on Telegram, the attack chain begins with a deceptive fake Zoom SDK update. Once executed, the malware installs multiple payloads—including GoogIe LLC and CoreKitAgent—designed to establish persistence, exfiltrate data, and communicate with command-and-control servers using TLS-encrypted WebSocket connections and layered RC4 encryption.This episode covers:Anatomy of the NimDoor Infection Chain: How Telegram lures and fake SDKs lead to multi-stage infections on macOS.Advanced Persistence via Signals: A rare signal-based persistence mechanism enables NimDoor to reinstall itself if terminated—an unusually resilient feature for macOS malware.Targeted Data Theft: NimDoor steals sensitive browser data, cryptocurrency wallet credentials, Telegram's encrypted databases, macOS Keychain items, and even command histories.Why Nim Matters: The use of Nim, a lesser-known and rarely detected language in malware development, allows attackers to evade traditional antivirus and EDR solutions while enabling sophisticated binary construction.North Korea’s Cyber Objectives: The Lazarus Group and its affiliated APTs are not just stealing information—they are funneling stolen cryptocurrency to fund the North Korean regime, bypassing sanctions.macOS as a Target: This attack busts the myth of Apple’s invincibility, illustrating how macOS is now firmly in the crosshairs of nation-state threat actors.Modular Payloads and Exfiltration Tools: From C++ loaders to Nim-compiled components and Bash scripts like upl and tlgrm, the malware’s design is optimized for flexibility and maximum data theft.How to Defend:Don’t trust third-party cryptocurrency tools—especially if shared via chat platforms like Telegram.Train teams to recognize fake software prompts and suspicious update requests.Apply the principle of least privilege, and implement strict application allowlists.Patch aggressively and monitor for unexpected outbound connections over wss (WebSocket over TLS).Understand that malware written in Nim is no longer exotic—it's active and dangerous.The NimDoor campaign represents a convergence of nation-state strategy, programming innovation, and cryptocurrency exploitation. For Web3 builders, crypto investors, and cybersecurity professionals, it’s a wake-up call that threat actors are not just evolving—they're innovating faster than ever.

Jul 3, 202543 min

Ep 156Cisco Unified CM Vulnerability: Root Access Risk for Enterprise VoIP Networks

A newly disclosed vulnerability—CVE-2025-20309—in Cisco's Unified Communications Manager (Unified CM) and Session Management Edition has sent shockwaves through enterprise VoIP and IT security teams. The flaw stems from hardcoded root SSH credentials that could allow unauthenticated remote attackers to gain full control of affected systems. In this episode, we unpack the gravity of this vulnerability and its broader implications for VoIP security.Cisco has issued a patch to remove the backdoor account from affected versions, but the vulnerability’s CVSS score of 10.0 underscores the risk to organizations still running unpatched systems. A successful exploit could enable attackers to manipulate network topology, execute denial-of-service attacks, intercept VoIP traffic via port mirroring, or even erase logs and implant persistence mechanisms. While no active exploitation has been reported, the risk is far from theoretical.This episode explores both the technical and strategic dimensions of VoIP security, including:Understanding CVE-2025-20309: How static root credentials opened the door to full system compromise and why this vulnerability is especially dangerous in a Unified CM context.VoIP-Specific Security Risks: The inherent architectural vulnerabilities of VoIP, including its tight QoS constraints, encryption-induced latency, NAT complications, and its integration with dynamic, open networks.Protocol-Level Complexity: Challenges introduced by SIP, H.323, and NAT traversal protocols like STUN, TURN, and ICE—and how attackers can exploit these for interception or disruption.Encryption Dilemmas: Why SRTP, IPsec, and key management schemes like MIKEY offer needed protection but also introduce latency, jitter, and crypto-engine bottlenecks that VoIP networks struggle to absorb.Hardening VoIP Systems:Change default device passwords and audit all endpoints, including phones and switches.Separate voice and data networks where possible to reduce attack surface.Apply VoIP-aware firewalls and intrusion detection tools.Encrypt both signaling and media streams with SRTP or H.235 where feasible.Use Session Border Controllers (SBCs) or Application Layer Gateways (ALGs) to manage NAT traversal securely.Legal and Compliance Considerations: Interception laws, call record retention, and regulatory requirements differ for VoIP—organizations must consult legal counsel to avoid unintended violations.What Cisco Admins Must Do Now: Guidance for patching, log review for potential indicators of compromise, and securing remote access to Unified CM environments going forward.VoIP systems are increasingly integral to enterprise communications—and increasingly targeted. This episode stresses that security must evolve with functionality, and that modern communications infrastructure cannot afford to overlook foundational flaws like hardcoded credentials.

Jul 3, 202556 min

Ep 156Forminator Flaw Exposes WordPress Sites to Takeover Attacks: Vulnerability Threatens 600,000+ Sites

A critical new WordPress vulnerability—CVE-2025-6463—has been discovered in the widely used Forminator plugin, affecting over 600,000 active installations and putting hundreds of thousands of websites at risk of full compromise. In this episode, we dive deep into the mechanics, risks, and remediation of this arbitrary file deletion flaw and explain what every WordPress administrator, developer, and security professional needs to know.At the heart of this issue is improper validation in how the Forminator plugin handles file paths when deleting form entries. This allows unauthenticated attackers to inject file paths into form submissions—even in fields not meant to accept files—and trick the system into deleting critical WordPress files like wp-config.php. The result? A full site reset, granting attackers an opportunity to seize control of the site.Here’s what we unpack in this episode:The CVE-2025-6463 Vulnerability: How the exploit works, which function is flawed (entry_delete_upload_files), and why unsanitized file arrays in form fields make this so dangerous.Real-World Impact: Deleting wp-config.php can reset a WordPress site, giving an attacker a window to install a fresh site under their control.Scope of Exposure: Over 400,000 sites remain unpatched, and many administrators may not even be aware they’re running outdated versions of the Forminator plugin.The Fix in Version 1.44.3: We discuss how the patch restricts deletions to specific field types, limits file deletions to safe directories, and enforces path normalization and filename sanitization.Why WordPress Sites Are Frequent Targets: A broader look at WordPress security—including why abandoned plugins, weak file permissions, brute force attacks, and poor update hygiene continue to lead to compromises.Best Practices to Secure WordPress:Always keep core, themes, and plugins up to dateRemove unused plugins and themes completely—not just deactivate themSet secure file permissions (755 for directories, 644 for files, and 400 or 440 for wp-config.php)Use activity logs, 2FA, and limit login attemptsDisable file editing in wp-config.phpTurn off PHP error reporting in production environmentsUse reputable security plugins like Jetpack or Wordfence for real-time protectionThe Role of Hosting Providers: Why choosing a secure hosting platform with automatic backups, patching, and server-level firewalls makes a huge difference in your site’s security posture.Mitigating Plugin-Related Risks: We explain how to monitor plugins using services like WPScan and how to respond swiftly to new CVEs.This is a wake-up call for the WordPress community: A single vulnerable plugin can bring down an entire website. Whether you manage one site or hundreds, understanding this threat and acting fast can be the difference between a minor maintenance task and a full-blown compromise.

Jul 3, 202550 min

Ep 156Kelly Benefits Breach: Over 550,000 Victims and the Rising Identity Theft Crisis

In one of the latest large-scale data breaches to hit the U.S. private sector, Kelly Benefits, a provider of payroll and benefits administration services, disclosed a significant cybersecurity incident impacting over 553,000 individuals. The breach, which occurred in December 2024 but was only revealed in April 2025, exposed sensitive personal information—including names, Social Security numbers, financial data, and even medical records—of employees linked to over 40 partner organizations, such as Aetna Life Insurance and United Healthcare.This episode explores what really happened, why this breach matters, and how it fits into the growing wave of identity theft driven by third-party vendor compromises. We take you through:The Scope of the Kelly Benefits Breach: What data was stolen, how many entities were affected, and why the delayed disclosure has legal and ethical ramifications.The Invisible Cost of Vendor Vulnerabilities: How breaches at service providers can cascade downstream, exposing thousands of individuals tied to organizations with no direct involvement in the original breach.The Growing Identity Theft Epidemic: With over 500,000 individuals exposed in this incident alone, we look at how breaches like this contribute to financial fraud, medical identity theft, and long-term privacy violations.Common Identity Theft Tactics: From phishing and spoofing to malware and physical document theft, threat actors exploit every avenue to steal and monetize personal information.Warning Signs of Identity Theft: Unfamiliar accounts, strange billing activity, and credit applications you didn’t submit—learn what to look for and when to act.What Victims Can Do Now: We provide a step-by-step recovery roadmap:Freeze your credit at all three bureausMonitor all financial and health accountsUse the FTC's IdentityTheft.gov to file official reportsReplace compromised IDs and secure your digital identityOrganizational Responsibilities: What companies like Kelly Benefits (and those they serve) should have in place: risk assessments, vendor security audits, encryption policies, and phishing-resistant multi-factor authentication (MFA).Best Practices for Prevention:Use strong, unique passwords and MFAKeep devices patched and software up to dateSecure personal Wi-Fi and avoid public networks for sensitive accessBeware of phishing, spoofing, and suspicious attachmentsPeriodically check your credit reports for unfamiliar activityWe also spotlight the legal rights of breach victims, including placing fraud alerts, disputing fraudulent accounts, and demanding removal of bad information from credit reports. The episode underscores a critical point: identity theft is no longer a matter of “if,” but “when”—and preparation is your best defense.Whether you're an affected individual, an employer relying on third-party benefit providers, or a cybersecurity professional tasked with securing sensitive PII, this episode offers critical insights and practical takeaways.

Jul 3, 20251h 8m

Ep 155FileFix, HTA, and MotW Bypass—The Alarming Evolution of HTML-Based Attacks

A newly disclosed exploit dubbed FileFix is redefining how attackers bypass Microsoft Windows' built-in security protections—specifically the Mark-of-the-Web (MotW) mechanism. Developed and detailed by security researcher mr.d0x, this attack takes advantage of how browsers save HTML files and how Windows handles HTA (HTML Application) files. The result? Malicious scripts can execute without warning, bypassing the very safeguards designed to flag untrusted code.In this episode, we break down how FileFix works, why it’s effective, and what makes it uniquely dangerous. Unlike many malware campaigns, FileFix doesn’t rely on zero-day exploits or complex payloads—instead, it exploits the weakest link in the chain: human behavior.Key topics include:Understanding FileFix Mechanics: How a simple rename from .html to .hta can convert a saved webpage into a launchpad for malicious code execution—without triggering MotW protections.Social Engineering at the Core: FileFix depends on user interaction. By designing convincing phishing lures, attackers guide users to unknowingly bypass their own defenses—a modern twist on old tricks.The Role of mshta.exe: This deprecated Windows binary remains powerful and dangerous. We examine how attackers use it to execute scripts and why defenders should consider disabling or removing it entirely.MotW Bypass Techniques: Beyond FileFix, we dive into container-based bypasses (.iso, .img), and how utilities and encoding tricks (e.g., RLO, double extensions, invisible Unicode) help malware evade detection.Masquerading and Human Blind Spots: From fake filenames like Invoice.pdf.exe to Unicode manipulation, attackers exploit user assumptions and default system behaviors to hide malware in plain sight.Detection and Mitigation Strategies: We offer a practical set of defenses:Disable or restrict mshta.exe through AppLocker or WDACBlock or quarantine .html, .htm, and .hta email attachmentsEnable file extension visibility across endpointsTrain users to recognize suspicious file behaviors and social engineering luresImplement behavioral detection—e.g., alert when mshta.exe spawns powershell.exeWhy FileFix Matters Now: With the rise of AI-generated content and increasingly polished phishing infrastructure, low-tech, high-impact attacks like FileFix are gaining new relevance. The simpler the technique, the broader its reach.As Windows continues to harden its systems, attackers are shifting focus to user-driven execution paths. FileFix exemplifies this shift—blending psychological manipulation with deep technical understanding of system behaviors. For defenders, the challenge is clear: technical controls must be matched by human-aware defenses.This is a must-listen for enterprise defenders, SOC analysts, and red teamers tracking the latest in Windows exploitation tactics. If your security strategy still assumes technical exploitation is the biggest threat, FileFix is your wake-up call.

Jul 2, 202546 min

Ep 154Sophisticated Cyberattack on the International Criminal Court: Justice in the Crosshairs

The International Criminal Court (ICC), the world’s foremost tribunal for prosecuting war crimes, genocide, and crimes against humanity, has confirmed yet another sophisticated cyberattack, highlighting the persistent threat facing high-profile global institutions. This marks the second targeted intrusion against the ICC in recent years, and although the organization successfully detected and contained the attack, critical questions remain—who was behind it, what data may have been compromised, and how can institutions like the ICC defend against increasingly complex threats?In this episode, we examine the June 2025 cyber incident targeting the ICC’s internal systems. While the technical specifics remain undisclosed, the context is telling: mounting geopolitical tensions, high-profile arrest warrants for global leaders, and a growing wave of politically motivated cyber intrusions.Key insights include:The strategic targeting of international justice institutions and how the ICC’s sensitive caseload (including cases involving heads of state) may drive cyber interest from state-aligned actors.A review of the ICC’s cyber resilience measures and how their swift containment of the breach reflects a mature security posture—but also underscores the limits of transparency in cyber disclosures.The critical need for integrated resilience strategies, merging business continuity, disaster recovery, cybersecurity, and incident response into a unified framework.The lifecycle of a well-structured incident response: from identification and containment to post-incident forensics and recovery.Lessons for international organizations and government agencies, particularly those engaged in politically sensitive or human rights-related work.A discussion on common organizational gaps—such as siloed planning, inadequate testing, or lack of senior leadership engagement—that can weaken cyber preparedness even in highly secure institutions.The escalating geopolitical risk of cyber conflict, where disinformation, sabotage, and espionage become tools of statecraft targeting justice systems, election infrastructures, and human rights advocates.This incident reinforces the reality that even the most globally respected institutions must constantly evolve their cyber defenses. As the line between geopolitics and cyberspace continues to blur, organizations like the ICC are not just administering justice—they're operating on the front lines of global cyber warfare.For CISOs, risk leaders, and those in public international service, this episode is a call to action: build resilience not just for business continuity, but for mission continuity in a world where digital systems are both your greatest strength—and your greatest vulnerability.

Jul 2, 202519 min

Ep 154Critical Flaws in Microsens NMP Web+ Threaten Industrial Network Security

In a major red flag for the industrial cybersecurity community, three newly disclosed vulnerabilities in Microsens NMP Web+, a popular network management solution used across critical infrastructure, have revealed just how fragile many ICS environments remain. The flaws—two rated critical and one high—allow unauthenticated attackers to bypass authentication, generate forged JWTs, and execute arbitrary code, potentially enabling full system compromise with no credentials required.Discovered by security researcher Noam Moshe, the vulnerabilities demonstrate how a combination of weak authentication mechanisms and insecure file handling can open the door to devastating attacks. While patches have now been released, some vulnerable systems remain internet-exposed, prompting urgent warnings from CISA—especially for those in the critical manufacturing sector.In this episode, we dive into what went wrong, why these bugs are so dangerous, and how this incident reflects a deeper and systemic challenge in ICS security.Topics covered include:The technical anatomy of the vulnerabilities (CVE-2025-49151, CVE-2025-49153, CVE-2025-49152) and how attackers can chain them for full remote access.Why ICS systems—unlike traditional IT—face unique challenges around patching, downtime tolerance, and legacy software dependencies.The dangerous rise of internet-exposed ICS systems, with over 145,000 devices globally found accessible via public scans.The critical role of vendor patching, network segmentation, and compensating controls when downtime prevents immediate updates.Strategic best practices like:Building dedicated ICS test environments for patch validationUsing firewalls and virtual patching to buy time when updates can’t be appliedAdopting zero-trust architecture and isolating OT from business IT networksThe persistent convergence of IT and OT networks, creating new attack surfaces if not tightly managedReal-world consequences of ICS vulnerabilities: from ransomware shutting down production lines to malware causing device malfunction and downtimeMicrosens isn’t the only vendor in the spotlight—this episode sheds light on an industry-wide problem where security is often deprioritized in favor of uptime, and vendors may still use outdated design practices like hardcoded credentials or unexpired tokens.For CISOs, OT engineers, and asset owners in manufacturing, energy, and industrial sectors, this is a critical wake-up call. Patching can’t be reactive—it must be strategic, tested, and integrated with operational priorities. Because when ICS systems go down, it’s not just data at risk—it’s the infrastructure behind national economies and physical safety.

Jul 2, 202543 min

Ep 153Qantas Data Breach: Third-Party Hack Exposes Millions of Frequent Flyers

In a stark reminder of the aviation industry's growing exposure to cyber threats, Australian airline Qantas recently confirmed a serious data breach—this time not from its own systems, but from a third-party platform used by one of its customer contact centers. The breach exposed personal data for up to six million customers, including names, dates of birth, contact details, and frequent flyer numbers. Although financial and passport information were not affected, the scale and nature of the compromise have sent shockwaves through the sector.This episode unpacks what happened, why it matters, and what the broader aviation and cybersecurity communities can learn from this breach.We examine:The anatomy of the Qantas breach—how attackers infiltrated a call center platform, bypassing internal security safeguards.The suspected involvement of Scattered Spider, a notorious cybercrime group adept at vishing, MFA bypass, and social engineering tactics.Why third-party risk is the aviation industry’s Achilles’ heel, with many airline vendors holding poor cybersecurity ratings and limited defenses.The rising tide of ransomware, DDoS attacks, and nation-state aggression aimed at aviation networks.How the aviation industry’s focus on physical security has historically come at the expense of digital resilience—and why that must change.The Qantas breach also surfaces urgent regulatory, reputational, and operational questions:Under Australia’s updated Privacy Principle 11, what constitutes “reasonable steps” to protect customer data?Are airlines truly ready for evolving mandates from regulators like the U.S. TSA, the EU, and ICAO?How do communication failures during cyber incidents amplify public distrust, and what does Qantas’s response tell us about effective crisis management?With billions flowing into aviation cybersecurity and cyber insurance costs climbing, industry stakeholders must address the weakest links—especially vendor ecosystems and human-centric attack vectors. That includes upgrading to phishing-resistant MFA, simulating real-world social engineering attacks, and implementing rigorous access controls across third-party platforms.Whether you're a CISO at an airline, a cybersecurity leader in transportation, or a vendor in the aviation supply chain, this episode offers critical insights into managing cyber risk in one of the world’s most high-stakes industries.

Jul 2, 202524 min

Ep 152Berlin Regulator Targets DeepSeek AI Over Data Transfers to China

Germany’s battle over digital sovereignty and data privacy has intensified, with the Berlin Commissioner for Data Protection formally requesting that Google and Apple remove the DeepSeek AI application from their app stores. The move stems from allegations that DeepSeek, a Chinese-developed generative AI platform, violates the EU’s General Data Protection Regulation (GDPR) by unlawfully collecting data from German users and transferring it to Chinese servers—beyond the EU’s legal jurisdiction and outside GDPR’s protections.This episode explores the broader implications of this takedown request under Article 16 of the EU Digital Services Act (DSA) and unpacks what this means for AI platforms, app store governance, and global data flows.We go beyond the headlines to examine:How GDPR governs cross-border data transfers, and why transfers to China often fall short of EU legal adequacy requirements.The clash of data philosophies between the EU’s GDPR and China’s PIPL, revealing a deeper regulatory rift grounded in individual rights versus state sovereignty.Why DeepSeek’s refusal to comply voluntarily triggered enforcement escalation, and how this signals a tougher European stance on foreign AI apps operating in the single market.The role of the Digital Services Act (DSA) in compelling app platforms like Google and Apple to act on national regulatory concerns—even when raised by a single EU state authority.The risk of fragmenting global data flows and creating incompatible governance zones, hindering both trade and innovation.What this action reveals about the “Brussels Effect”—the EU’s growing influence on global digital regulation—and how that’s reshaping how tech firms build and deploy AI.We also situate the DeepSeek case within broader global dynamics, including:Rising tensions around AI regulation, national security, and data localizationHow multinational firms struggle to comply with competing privacy frameworksThe environmental and economic costs of fragmented data governanceRegulatory uncertainty around AI tools' collection, training data use, and transparencyThis is a must-listen episode for privacy professionals, compliance officers, digital policymakers, AI developers, and global tech executives navigating today’s increasingly territorial data landscape.

Jul 1, 202543 min

Ep 151CISA Flags Citrix NetScaler Flaws: What CVE-2025-6543 Means for Federal and Private Networks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added multiple Citrix NetScaler vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog—an urgent signal for federal agencies and private enterprises alike. At the center of this update is CVE-2025-6543, a memory overflow flaw affecting NetScaler ADC and Gateway appliances, which could lead to Denial of Service attacks under specific configurations. This joins earlier additions from 2023, including CVE-2023-6548 and CVE-2023-6549, covering code injection and buffer overflow vulnerabilities.In this episode, we explore why NetScaler vulnerabilities are drawing heightened attention, how they are actively being exploited, and what organizations must do to stay ahead of increasingly sophisticated cyber threats. But the scope of this episode goes far beyond Citrix. We delve into the latest intelligence on:Active APT campaigns like Swan Vector, which leverages OAuth abuse, DLL sideloading, and Cobalt Strike to infiltrate institutions across Taiwan and JapanThe rise of “Shadow AI” in enterprises, where unsanctioned GenAI tools introduce hidden risks like data exfiltration, training leakage, and geopolitical exposureA roundup of critical vulnerabilities, including high-severity flaws in Cisco ISE (CVE-2025-20281/20282), Veeam Backup, Roundcube Mail Server, and Trend Micro PolicyServer—all being actively targeted or at high riskKey insights from the episode:Why CISA’s KEV catalog should be a top priority for every organization’s patch management strategyHow vulnerabilities like CVE-2025-6543 can be weaponized in real-world attacks, and why even memory overflows in peripheral configurations matterBest practices for hardening Citrix NetScaler environments, including RBAC, TLS restrictions, session timeouts, and audit loggingThe strategic implications of APT groups abusing legitimate services like Google Drive and PrintDialog.exe to remain stealthyHow organizations can shift from blocking to secure AI enablement, using real-time browser monitoring and open-source LLMs tuned for enterprise contextThe consequences of lagging on patches: RCE, privilege escalation, SQL injection, and OS command execution across enterprise infrastructureThe episode also covers TWCERT/CC’s alerts on actively exploited vulnerabilities in ASUS routers, Acer software, Zyxel devices, and SAP systems—underscoring the truly global and cross-sector nature of the threat landscape.This episode is essential listening for security architects, IT managers, CISOs, and vulnerability management teams trying to cut through the noise and act on what truly matters. With mandated remediation deadlines (like July 21, 2025, for CVE-2025-6543) now baked into CISA advisories, the time to act is now.

Jul 1, 202556 min

Ep 151Cato Networks Secures $359M to Fuel AI-Powered SASE Expansion

Cato Networks just raised $359 million in Series G funding, pushing its valuation past $4.8 billion and its total funding beyond the $1 billion mark—a milestone that cements its place as one of the most formidable players in the rapidly expanding Secure Access Service Edge (SASE) market. In this episode, we unpack what this massive investment means for the future of enterprise cybersecurity, AI integration, and network transformation.Founded in 2015, Cato has built a cloud-native platform that seamlessly unifies SD-WAN, security services, and a global private backbone across more than 85 Points of Presence. With over 3,500 customers already on board, Cato offers a tightly integrated, single-vendor solution that simplifies operations while delivering enterprise-grade security and network performance.This funding round is more than just a headline—it’s a validation of Cato’s unique vision in a market projected to exceed $28.5 billion by 2028. We explore how Cato is using this capital to scale its AI-powered threat detection, expand its global infrastructure, and accelerate feature innovation across its SASE stack.Key topics covered:Why investors are pouring hundreds of millions into SASE—and why Cato is leading the packThe advantages of Cato’s single-vendor architecture vs. multi-vendor patchworksHow Cato’s AI-driven engine enhances threat detection and incident responseEnterprise customer success stories from Elkjøp, Häfele, Swissport, Carlsberg, and othersThe shift from legacy MPLS to Cato’s converged, cloud-native model—and the cost savings that come with itCato’s performance advantages in global markets, including ChinaThe strategic importance of Zero Trust Network Access (ZTNA), XDR, and integrated CASB/DLP featuresA comparison of Cato with major competitors like Zscaler, Netskope, and Palo Alto NetworksThe operational simplicity enabled by “plug-and-play” Cato Sockets and a true single-pane-of-glass dashboardWhat this round means for Cato’s roadmap, customer reach, and long-term visionAs enterprises face mounting pressure to secure increasingly complex hybrid and global infrastructures, Cato Networks is emerging as the go-to platform for organizations seeking agility, performance, and security—all in one place.

Jul 1, 202517 min

Ep 151Chrome’s Latest Zero-Day: CVE-2025-6554 and Remote Code Execution Risks

A new high-severity zero-day vulnerability in Google Chrome—CVE-2025-6554—has sent shockwaves across the cybersecurity landscape. This episode dives into the technical details, real-world impact, and broader implications of this actively exploited flaw. Tracked as a type confusion bug in Chrome’s V8 JavaScript engine, the vulnerability allows attackers to remotely execute code by luring users to malicious HTML pages—a powerful vector for surveillance, espionage, or criminal exploitation.We break down the story behind the vulnerability, discovered by Google’s own Threat Analysis Group, and examine what it reveals about the state of browser security today. Chrome users across all platforms have been urged to update immediately to patched versions, as threat actors are already leveraging this exploit in the wild.In this episode, we cover:What CVE-2025-6554 is and how it works: A type confusion bug that opens the door to remote code execution via a malicious webpage.Why this matters: This is the fourth actively exploited Chrome vulnerability in 2025—part of a disturbing trend in targeted, zero-day browser attacks.The evolving threat landscape: Cybercriminals and state-sponsored actors alike are embracing ransomware-as-a-service, phishing campaigns, and social engineering to exploit browser flaws.The hidden complexity of browser security: IT teams face a logistical nightmare patching browsers across diverse devices, configurations, and hybrid work environments. Misconfigured browsers become open doors for attackers.Type confusion explained: We break down how dynamic typing in JavaScript can be manipulated to bypass security controls—and why it’s so dangerous.Enterprise implications: With over 2 billion users relying on Chrome, organizations must take proactive steps: patch promptly, configure securely, segment work and personal browsing, and monitor emerging threats.Remote Code Execution (RCE): Why this class of vulnerabilities remains one of the most feared in cybersecurity, with the potential for full system compromise.We also explore best practices and future-forward strategies, including:Implementing Zero Trust policiesAdopting AI-driven browser isolation and threat detectionUsing segmented browser profiles for corporate and personal useEducating users on phishing and social engineering tacticsInvesting in enterprise-grade secure browsing solutionsChrome’s latest zero-day is more than just a technical footnote—it’s a signal flare for the growing complexity and urgency of browser-based security. Whether you're a security architect, IT manager, or just trying to keep your organization protected in an increasingly dangerous web environment, this episode offers critical insights and actionable takeaways.

Jul 1, 202554 min

Ep 150Russia’s 16KB Curtain: Cloudflare Throttling and the Future of the RuNet

Russia has entered a new phase of digital authoritarianism. In a sweeping move, Russian Internet Service Providers (ISPs) have begun systematically throttling access to Cloudflare and other Western-backed services, including infrastructure giants Hetzner and DigitalOcean. This throttling is so severe that it restricts downloads to just 16 kilobytes per connection—effectively rendering affected websites unusable. It’s a chilling technical development dubbed the “16KB Curtain.”In this episode, we explore Russia’s strategic effort to isolate its internet from the global web—a campaign known as digital sovereignty. This isn’t just a geopolitical talking point. It’s an active campaign of infrastructure control, information censorship, and aggressive filtering. We examine:The mechanics of the 16KB throttle: How it works, what it breaks, and why it’s so effective.Cloudflare’s position: The company has confirmed it cannot mitigate the throttling—this is not a technical glitch, it’s a political weapon.The broader pattern: Throttling is only part of a sweeping campaign to restrict VPNs, disrupt anti-censorship tools like Psiphon, and elevate domestic tech over foreign services.But this isn't just about website access. It’s about the future of RuNet—a Russian internet fenced off from global influence. The Kremlin’s vision includes a national DNS system, deep packet inspection at scale, and mandates for domestic apps and cloud infrastructure. Yet, behind this ambition lies a critical weakness: Russia’s ongoing dependence on Western and Chinese technologies, from chips to software.We also unpack:The expansion of mobile internet blackouts across over 30 regions—even those far from conflict zones.The illusion of self-sufficiency: Despite homegrown efforts in CPUs and software, Russia still lacks foundational capabilities in 5G, storage, and OS development.Impact on Russian citizens and international companies: Users are increasingly isolated. Businesses are forced to exit or adapt to a tech landscape dictated by the state.In a world where censorship increasingly masquerades as cybersecurity, Russia is pioneering an extreme model of network control—one that may be replicated elsewhere. Whether you work in global IT infrastructure, cybersecurity, or international policy, this episode reveals the high-stakes intersection of technology, politics, and freedom of information.

Jun 30, 20251h 45m

Ep 150Ahold Delhaize Data Breach: 2.2 Million Employee Records Exposed

Ahold Delhaize, one of the world’s largest food retailers, is now the subject of one of the most significant ransomware breaches in recent U.S. history. Affecting over 2.2 million current and former employees, this incident—claimed by the cybercrime group INC Ransom—highlights the rising threat posed by ransomware-as-a-service operations targeting enterprise systems across critical sectors.In this episode, we unpack the breach, its long-delayed public disclosure, and the sensitive data exposed—including Social Security numbers, financial accounts, health records, and employment data. While customer payment information appears unaffected, the breach underscores systemic vulnerabilities in enterprise cybersecurity, especially around internal systems and employee data.We also explore the evolving tactics of modern ransomware groups, such as:Double extortion: stealing and threatening to leak sensitive data in addition to encrypting systemsInitial access via known vulnerabilities (e.g., Citrix NetScaler) and social engineeringSkipping encryption altogether, focusing solely on pure extortionTargeting soft spots like IT help desks and internal apps, rather than traditional perimeter defensesINC Ransom, a relatively new but increasingly active ransomware group, has used these methods in over 250 attacks, including hits on government and healthcare systems. The Ahold Delhaize incident represents their largest breach by data volume to date.We also examine the legal and regulatory implications of the breach:Potential class action lawsuits for negligence and delayed notificationRisks under HIPAA if health data is involvedCompliance issues under state breach notification laws and privacy regulationsImpacts of international frameworks like GDPR for global operationsAs ransomware attacks grow in scale and sophistication, this breach signals broader challenges for enterprise resilience. We'll discuss what went wrong, how businesses can prepare, and what steps every organization should consider now:Implementing Zero Trust architecturesStrengthening employee training and phishing defensesEnhancing vendor and internal app securityRegular resilience audits and incident response testingThis episode is essential listening for CISOs, IT leaders, legal teams, and anyone involved in protecting sensitive data across large, distributed enterprises. The Ahold Delhaize breach isn’t just a warning—it’s a roadmap of how today’s attackers are bypassing yesterday’s defenses.

Jun 30, 202537 min

Ep 150Why Canada Banned Hikvision: National Security vs. Geopolitics

Canada has taken a definitive stance in the escalating global scrutiny of Chinese technology, ordering surveillance giant Hikvision to cease all operations within its borders. Citing national security concerns and acting on the advice of intelligence agencies, the Canadian government has banned the use of Hikvision products across its public sector, initiated reviews of existing installations, and aligned itself with a growing international movement to curtail the influence of Chinese state-linked tech.This podcast unpacks the details of Canada’s decision and places it within the broader geopolitical, regulatory, and cybersecurity context. Hikvision, already the subject of U.S. sanctions due to its alleged role in surveillance activities in China’s Xinjiang region, now finds itself at the center of a new wave of Western pushback. The ban raises serious questions about the intersection of security, foreign investment, human rights, and technology policy.In this episode, we explore:The Canadian government's justification for banning Hikvision, based on classified intelligence and national security assessmentsHikvision's rebuttal and China’s diplomatic protest, framing the ban as a politically motivated and discriminatory actThe growing body of restrictions against Chinese technology in the U.S., including NDAA §889, CFIUS interventions, and state-level bansConcerns over Hikvision’s alleged role in surveillance of Uyghur populations and its connection to broader human rights issuesThe tactics used by Chinese tech firms to circumvent restrictions, such as “white-labeling” of devicesKey risks associated with Chinese-made surveillance equipment, including backdoors, weak encryption, and remote server controlHow Canada’s updated Investment Canada Act (ICA) is reshaping the foreign investment landscape with pre-closing reviews, enhanced penalties, and increased focus on SOEsThe trend of “de-risking” versus “decoupling” from Chinese tech and what this means for Canada’s digital infrastructure strategyThe geopolitical fallout of the ban, especially as it relates to Canada-China relations and ongoing concerns about cyberespionage campaigns targeting Canadian networksStrategic considerations for critical infrastructure, public procurement, and private sector organizations in response to the shifting regulatory terrainThis episode is essential for anyone tracking global technology policy, cybersecurity, and national security in the digital age. As nations wrestle with balancing innovation, economic cooperation, and the imperative to secure their critical systems, Canada’s Hikvision ban signals a decisive step—and a broader trend of growing friction between Western democracies and Chinese state-linked technology providers.

Jun 30, 202552 min

Ep 150Scattered Spider Takes Flight: Inside the Cybercrime Group’s Move into Aviation

As the aviation industry becomes more digitally interconnected, its exposure to sophisticated cyber threats continues to grow. One of the most dangerous actors in this space—Scattered Spider, a financially motivated and technically skilled cybercrime group—has recently shifted its focus to target the aviation sector. With recent incidents involving Hawaiian Airlines, WestJet, and others, global concern is rising over the safety of airline IT systems, vendor infrastructure, and the broader aviation supply chain.This episode unpacks how Scattered Spider operates, why the aviation industry is increasingly at risk, and what this means for cybersecurity readiness in one of the world’s most critical sectors. Known for its deep social engineering tactics, the group bypasses MFA, exploits IT help desks, abuses third-party vendor trust, and deploys ransomware in record time. As the FBI, CISA, and leading cybersecurity firms like Mandiant and Palo Alto Networks sound the alarm, airlines and their partners are being forced to rethink how they defend against these agile, persistent attackers.In this episode, we cover:The evolving cyber threat landscape facing the aviation industryA breakdown of Scattered Spider’s tactics, including phishing, SIM swapping, and help desk impersonationHow the group maintains persistent access using federated identity and RMM toolsSuspected links between Scattered Spider and recent incidents at Hawaiian Airlines and WestJetThe aviation supply chain as a prime vulnerability—why low-scoring vendors pose high risksWhy airlines face a 2.9x greater breach risk when they fall below an 'A' cybersecurity ratingICAO's cybersecurity strategy pillars and what global coordination could look like in practiceCISA’s mitigation guidance: offline backups, phishing-resistant MFA, patching, and moreThe role of third-party risk management and “security by design” in preventing future breachesWhy the FBI discourages ransom payments—and what alternatives existThis episode isn’t just a cautionary tale for airlines—it’s a wake-up call for any sector that relies on sprawling digital ecosystems and third-party providers. With Scattered Spider expanding its target footprint, now is the time for the aviation sector and its partners to elevate their defenses, harden human factors, and embrace a security culture built for the borderless age of cyberwarfare.

Jun 30, 202543 min

Ep 149Fortnite and the FTC: How Epic Games Misled Players into Unwanted Purchases

In a landmark case that reshapes the conversation around digital ethics, the Federal Trade Commission’s $520 million settlement with Epic Games over its Fortnite monetization tactics highlights a critical issue facing the modern digital economy: the weaponization of interface design to manipulate users. Central to the case is the use of “dark patterns”—subtle yet deceptive design strategies intended to steer users, including children, into making unintended purchases.This episode dissects how Epic’s design choices—like omitting purchase confirmation screens and placing critical purchase functions adjacent to navigation buttons—led to millions in unauthorized transactions. We examine how these practices violated consumer trust and triggered a massive regulatory backlash, resulting in a historic payout, ongoing refund distributions, and industry-wide scrutiny of monetization practices.In this episode, we explore:The specifics of the FTC’s case against Epic Games and the broader legal contextHow interface design was manipulated to encourage accidental or unwanted in-game purchasesThe psychological mechanisms behind dark patterns and how they exploit user behaviorReal-world consequences: unauthorized purchases by minors and account lockouts for users who disputed chargesA breakdown of the refund process and what affected players can expectCommon types of dark patterns—from roach motels and confirm shaming to hidden costs and privacy “zuckering”Why these tactics are so effective, and how they’ve quietly shaped modern digital platformsRegulatory response and future enforcement—how the FTC and other agencies are adaptingWhat companies must do to comply with emerging standards around user consent and interface transparencyThe role of consumer awareness in pushing back against exploitative game designThis case isn’t just about Fortnite—it’s a cautionary tale for the entire tech industry. As digital experiences become more immersive and monetization models more aggressive, the Epic Games settlement is a watershed moment in defining ethical boundaries for user interface design, especially when the audience includes minors. For developers, regulators, and consumers alike, this episode offers a timely, in-depth look at the shifting landscape of digital rights and design accountability.

Jun 27, 202554 min

Ep 148Microsoft 365 Direct Send Exploited: How Phishing Emails Masquerade as Internal Messages

Phishing has long been a favored weapon of cybercriminals, but a recent revelation about Microsoft 365’s Direct Send feature has elevated the threat to a new level—from inside the firewall. Designed for internal systems to send notifications without authentication, Direct Send can be abused by malicious actors to spoof emails that appear to originate from trusted internal sources. Without compromising a single user account, attackers can craft phishing messages that bypass standard defenses like DMARC and SPF, exploiting an organization’s own email infrastructure against it.In this episode, we dive deep into how this vulnerability is being exploited, why it remains a blind spot in many organizations’ security architectures, and how to effectively defend against it. Drawing on insights from security researchers and real-world abuse cases, we explore the technical mechanics and organizational gaps that make this attack vector so potent.What you’ll learn:How Microsoft 365’s Direct Send works—and why it lacks proper authentication controlsThe mechanics of the exploit: Using PowerShell and smart host predictability to impersonate internal usersWhy SPF, DKIM, and DMARC checks fail to stop these spoofed internal emailsHeader and behavioral indicators that reveal Direct Send abuse in actionThe critical role of DMARC policy enforcement (moving from monitoring to reject mode)Best practices to disable or restrict Direct Send usage without disrupting hybrid Exchange environmentsHow attackers leverage trusted internal appearances to gain user trust and credentialsBroader email security protocols—SPF, DKIM, and DMARC—and how they function togetherThe importance of phishing-resistant MFA, continuous user training, and strong password policiesHow small and medium businesses can close these gaps even without large cybersecurity teamsThis case serves as a stark reminder: cybercriminals are constantly looking for ways to subvert legitimate features in everyday software. Without holistic security strategies, including behavioral analysis and protocol enforcement, even built-in functionality can become a backdoor for credential theft, malware deployment, and lateral movement within corporate networks.

Jun 27, 202541 min

Ep 148Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Risk

A critical flaw in the Open VSX Registry—an open-source alternative to the Visual Studio Code Marketplace—recently put over 8 million developers at risk of mass compromise. This vulnerability, discovered in the platform’s GitHub Actions workflow, exposed a super-admin publishing token that could have enabled malicious actors to overwrite or inject malware into any extension in the registry. Given the widespread use of Open VSX in platforms like Gitpod, Google Cloud Shell, and Cursor, the consequences could have been devastating.This episode explores the depths of this security lapse and the broader risks posed by extension marketplaces and IDE plugin ecosystems. Drawing parallels with SolarWinds and other landmark supply chain attacks, we examine how trusted development tools can become covert delivery mechanisms for sophisticated intrusions.You'll learn:How GitHub workflow misconfigurations enabled access to a powerful OVSX_PAT tokenWhat could’ve happened: full control over extensions, silent malware injection, and compromised developer machinesWhy IDE plugins are now a preferred attack vector for adversaries, and how they bypass traditional defensesCommon methods of plugin compromise, from trojanized forks to dependency confusion and hijacked update mechanismsWhy MITRE added “IDE Extensions” as a formal attack technique in its ATT&CK framework in 2025Best practices for marketplace providers—like sandbox testing, verified publishers, and extension signature verificationWhat developers and enterprises can do to defend: plugin audits, runtime permission monitoring, and network segmentationWhy software supply chain trust must shift toward Zero Trust principles for IDEs and extension ecosystemsAs the developer environment becomes a frontline target, this case underscores the urgency of treating every plugin, dependency, and update path as a potential threat vector. The patch may have arrived in time—but the lessons remain vital for every organization that relies on open developer tooling.

Jun 27, 202547 min

Ep 148CitrixBleed 2: Critical NetScaler Vulnerability Enables Session Hijacking and MFA Bypass

A new critical vulnerability in Citrix NetScaler ADC and Gateway systems, dubbed CitrixBleed 2 (CVE-2025-5777), has emerged as a serious threat to remote access infrastructure. This memory exposure flaw allows unauthenticated attackers to extract session tokens directly from device memory — enabling session hijacking and even bypassing multi-factor authentication (MFA). With early evidence of exploitation in the wild and eerie similarities to the original CitrixBleed (CVE-2023-4966), the risk to enterprise environments is substantial.The vulnerability is caused by insufficient input validation, leading to out-of-bounds memory reads when NetScaler is configured as a Gateway or AAA virtual server. Once session tokens are exfiltrated, attackers can impersonate legitimate users and gain persistent access — often without triggering alerts or violating login controls. Cybersecurity researchers, including ReliaQuest, assess with medium confidence that active exploitation is underway.This episode breaks down the mechanics of CitrixBleed 2 and explores how it fits into the broader landscape of session hijacking threats and identity-centric attacks. Topics include:How CVE-2025-5777 enables unauthorized access via session token exposureTechnical comparisons with the original CitrixBleed vulnerabilitySession hijacking techniques at both network and application levels, including TCP desynchronization and token theftThe second NetScaler vulnerability disclosed (CVE-2025-6543) and its denial-of-service impactMitigation steps, including patching to versions 14.1-43.56, 13.1-58.32, or 13.1-37.235Defense-in-depth recommendations, including phishing-resistant MFA, endpoint detection and response (EDR), and token revocation protocolsIncident and vulnerability response strategies aligned with CISA playbooksCitrixBleed 2 is more than a software bug — it’s a gateway for attackers to silently bypass identity safeguards and establish footholds in enterprise networks. Rapid patching is essential, but long-term protection depends on layered controls, resilient MFA design, and disciplined incident response planning.

Jun 27, 202518 min

Ep 147OneClik Cyberattack Campaign Targets Energy Sector Using Microsoft ClickOnce and AWS

A sophisticated cyber-espionage campaign named OneClik is actively targeting energy, oil, and gas organizations using a combination of legitimate cloud infrastructure and novel attack techniques. The campaign, attributed to an unknown but likely state-affiliated actor, leverages Microsoft's ClickOnce deployment technology to deliver custom Golang-based malware known as RunnerBeacon. The use of AWS APIs for command-and-control (C2) communications allows OneClik to operate within trusted cloud environments, making detection by traditional tools extremely difficult.The campaign reflects broader trends in critical infrastructure cyber threats — particularly the abuse of legitimate services to “live off the land” and the use of advanced anti-analysis techniques to avoid detection. RunnerBeacon exhibits environment-aware behavior, anti-debugging checks, and is compiled in Golang to evade traditional antivirus scanning. While attribution remains inconclusive, indicators suggest a potential link to China-affiliated actors.This episode explores how OneClik fits into the evolving threat landscape and what defenders should know:How Microsoft’s ClickOnce technology is abused in phishing emails for stealthy malware deploymentThe use of AWS cloud services as a trusted C2 infrastructure to bypass detectionRunnerBeacon’s anti-debugging and sandbox-evasion mechanisms, including RAM and domain checksThe targeting of nuclear and energy facilities as part of broader geopolitical cyber pressureRecent ransomware trends in the energy sector, with attacks up 80% year-over-yearThe rise of Golang malware in cyber campaigns and its impact on defensive toolingThe critical importance of supply chain and credential monitoring in energy networksOneClik underscores a modern cyber warfare model: sophisticated, cloud-native, and evasive. As threat actors move deeper into the supply chains and IT layers of critical infrastructure, defenders must evolve beyond perimeter controls to emphasize behavioral detection, threat attribution, and real-time intelligence. For cybersecurity leaders in energy and utilities, understanding this campaign is essential to preparing for what comes next.

Jun 26, 20251h 18m

Ep 146Central Kentucky Radiology’s 2024 Data Breach Affects 167,000

In October 2024, Central Kentucky Radiology (CKR), a Lexington-based imaging provider, became the latest victim of a growing trend in healthcare cyberattacks. An unauthorized actor accessed CKR’s systems over a two-day period, compromising sensitive data for approximately 167,000 individuals. The stolen information includes names, Social Security numbers, birth dates, addresses, insurance details, and medical service records — a deeply invasive breach, though no fraud has yet been confirmed.While the nature of the attack has not been publicly confirmed, the system disruption and timing strongly suggest a ransomware event — part of a broader wave of escalating cyber threats against the healthcare sector. The breach wasn’t fully investigated and confirmed until May 2025, with notification letters mailed out to affected individuals in June. CKR is now offering 12 months of complimentary credit monitoring and guidance on identity theft protection, though many patients are left questioning how such a critical breach went undetected for months.In this episode, we examine the CKR breach in the wider context of the healthcare cybersecurity crisis. Topics include:The data compromised in the CKR incident and how it may be exploitedThe suspected role of ransomware and why healthcare is a top targetSystemic vulnerabilities across the sector: outdated software, misconfigured devices, and staffing shortagesThe financial, operational, and reputational consequences of a breach, including regulatory exposureActions affected individuals should take immediately — from freezing credit to enabling two-factor authenticationHow healthcare organizations can improve defenses, including IoT segmentation, EDR deployment, secure cloud storage, and patch managementBroader lessons from this incident that apply across all healthcare systems, regardless of sizeCKR’s experience is a reminder that even small-to-midsize medical providers must adopt enterprise-grade cybersecurity practices. As patient data becomes more valuable — and cybercriminal tactics grow more sophisticated — the margin for error is disappearing.

Jun 26, 202551 min

Ep 146Bonfy.AI Launches $9.5M Adaptive Content Security Platform to Govern AI and Human Data

In a major development at the intersection of cybersecurity and AI governance, Israeli startup Bonfy.AI has officially launched its adaptive content security platform, backed by $9.5 million in seed funding. The company’s mission is bold and timely: to secure content generated by both humans and AI across modern SaaS ecosystems — including high-risk environments like Slack, Salesforce, and AI chatbots such as ChatGPT.As organizations increasingly rely on generative AI tools for productivity and automation, the risks to data privacy, intellectual property, and regulatory compliance have grown sharply. Bonfy.AI’s platform addresses these issues head-on. Unlike traditional DLP (Data Loss Prevention) tools, Bonfy.AI uses self-learning algorithms and contextual analysis to detect and mitigate risks in unstructured content without relying on pre-labeled data or signature-based detection. It analyzes content in real time, flags violations of security policy, and integrates with incident response platforms to provide dynamic remediation — making it a foundational component for enterprises adopting AI tools at scale.This episode dives into:How Bonfy.AI uses business logic and AI to detect risks across human and GenAI-generated contentThe platform’s capabilities in monitoring outputs from tools like ChatGPT, Copilot, and SaaS platformsThe legal and operational risks posed by AI tools, including IP leakage, privacy breaches, and regulatory non-complianceThe shift from static, rules-based security to adaptive content controls based on context and behaviorUse cases including email content review, IP enforcement, and pre-send filters for confidential materialBonfy.AI’s positioning within a rapidly growing landscape of AI governance tools and global regulatory frameworksWith AI-generated content now permeating enterprise workflows, Bonfy.AI offers a much-needed architecture for managing emerging risks without compromising innovation. The platform’s launch signals a broader shift toward adaptive, AI-native security solutions that move beyond outdated DLP models to confront the real threats facing modern organizations.

Jun 26, 20251h 9m

Ep 146Zero-Day Level Cisco ISE Flaws: Urgent Patch Required for Enterprise Security

Cisco has disclosed two critical security vulnerabilities in its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) products, both earning a maximum CVSS severity score of 10.0. These flaws—CVE-2025-20281 and CVE-2025-20282—allow unauthenticated remote attackers to execute arbitrary commands on the underlying operating system with root privileges. The vulnerabilities are unrelated but equally severe, highlighting urgent concerns for organizations relying on Cisco ISE for network access control and identity policy enforcement.CVE-2025-20281 is caused by insufficient input validation in a public-facing API, while CVE-2025-20282 stems from improper file validation that allows malicious file uploads and execution. Cisco has issued patches for both flaws and urges immediate action. Although no public exploits have been reported, the nature of these vulnerabilities makes them highly attractive targets for threat actors seeking initial access, privilege escalation, or lateral movement within enterprise environments.In this episode, we break down the details of these critical flaws, including:How CVE-2025-20281 and CVE-2025-20282 work and what distinguishes themWhich software versions are affected and what patches are availableThe risks associated with remote code execution, including system compromise, data theft, cryptojacking, and ransomware deploymentThe patching process for Cisco ISE and how organizations can verify successful installationBroader RCE mitigation strategies including input validation, network segmentation, and zero-trust architectureThese vulnerabilities underscore the critical importance of timely patching and rigorous software lifecycle management. Cisco’s advisory offers clear instructions, but given the risk profile, security teams should treat remediation as an emergency priority. Even in the absence of confirmed exploitation, the potential impact is equivalent to a full system compromise.For enterprise security professionals, network architects, and incident response teams, this episode delivers actionable intelligence on the nature of the flaws, mitigation pathways, and why RCE in network infrastructure should never be underestimated.

Jun 26, 202554 min

Ep 145U.S. Government Pushes Back on Meta: WhatsApp Labeled a High-Risk App

The U.S. House of Representatives has officially banned the use of WhatsApp on all House-managed devices, citing significant data security risks. This move places WhatsApp alongside other restricted applications like TikTok, ChatGPT, and Microsoft Copilot, reflecting an intensifying government focus on digital security and the reliability of consumer platforms used in official contexts.The House Chief Administrative Officer (CAO) raised several concerns: the lack of transparency in WhatsApp's data protection practices, the absence of stored data encryption, and potential vulnerabilities—particularly in light of a recent spyware attack exploiting a WhatsApp vulnerability. The CAO has instead recommended using alternatives such as Microsoft Teams, Signal, and Wickr.Meta, WhatsApp's parent company, has sharply pushed back against the decision, asserting that WhatsApp provides industry-leading end-to-end encryption by default—security that many of the approved alternatives do not offer. The company also highlighted its swift action against the Paragon Graphite spyware campaign, which exploited a zero-click vulnerability to target civil society members and journalists. Meta blocked the campaign, alerted affected users, and is pursuing legal action.At the center of this debate are critical questions about how communication platforms should be evaluated for government use, and whether default encryption alone is sufficient when transparency and incident history are also factored into risk assessments.In this episode, we explore:The specific reasons behind the House ban and how it aligns with broader tech restrictionsMeta’s defense of WhatsApp’s security model, including its encryption and incident response protocolsThe implications of the Graphite spyware attack and Meta’s responseThe contrast between public perception and institutional cybersecurity standardsWhat this move signals for future tech scrutiny in U.S. government operationsThis discussion goes beyond WhatsApp. It’s about how governments assess the balance between usability, encryption, transparency, and risk in digital tools—and what the growing list of banned apps reveals about shifting cybersecurity priorities.

Jun 25, 202545 min

Ep 145How Cyberattacks on Mainline Health and Select Medical Exposed Over 200,000 Patients

The healthcare industry is facing a relentless wave of cyber threats, as demonstrated by two recent breaches impacting Mainline Health Systems and Select Medical Holdings. In April 2024, Mainline Health experienced a direct ransomware attack by the Inc Ransom group, compromising sensitive data for over 101,000 individuals. Select Medical’s breach, in contrast, occurred through a third-party vendor—Nationwide Recovery Services—exposing records of nearly 120,000 patients. These incidents illustrate the growing vulnerability of healthcare organizations, whether from direct attacks or through weaknesses in their extended vendor networks.As healthcare organizations digitize records, adopt connected medical devices, and rely on cloud services and third-party vendors, the risk landscape grows more complex. Ransomware, hacking, and third-party vendor compromises are now the leading causes of healthcare data breaches—often with serious implications for patient care, financial stability, and organizational reputation.In this episode, we examine:How the Inc Ransom group operates, and why healthcare is a prime targetThe increasing financial and operational impact of ransomware and third-party breachesCommon attack vectors including hacking, phishing, and supply chain vulnerabilitiesWhy third-party risk management is becoming a critical element of healthcare cybersecurityThe direct impacts of breaches on patient safety, care delivery, and mortality ratesRecommended mitigation strategies, from multi-factor authentication and privileged access management to continuous monitoring of vendor ecosystemsThe role of national cybersecurity frameworks, HHS initiatives, and information sharing platforms in building sector resilienceThese recent breaches serve as a wake-up call: healthcare cybersecurity can no longer be reactive or siloed. A comprehensive approach—addressing both internal defenses and third-party risks—is essential to protect sensitive patient data and maintain uninterrupted care.

Jun 25, 202545 min

Ep 144Prometei Botnet’s Global Surge: A Threat to Linux and Windows Systems Alike

Prometei is one of the most persistent and sophisticated botnet threats in circulation today. First identified in 2020—and active since at least 2016—this modular malware continues to evolve rapidly, targeting both Windows and Linux systems across the globe. Originally designed for cryptocurrency mining, Prometei has expanded its capabilities to include credential theft, lateral movement, command execution, and stealthy persistence, making it an adaptable and resilient threat for enterprise environments.In this episode, we examine the latest developments in Prometei’s operations. Recent updates to the malware include a fully integrated backdoor, self-updating features, dynamic domain generation for command-and-control, and a wide range of evasion techniques to bypass detection. The botnet’s architecture allows operators to deploy new modules at will, giving Prometei flexibility typically seen in nation-state campaigns, though researchers currently attribute its activity to a financially motivated Russian cybercriminal group.Prometei’s modules enable it to:Mine Monero cryptocurrency using compromised CPU and GPU resourcesSteal user credentials from memory and the registryMove laterally using exploits like EternalBlue, brute-force attacks, and SMB-based credential reuseMaintain persistence through cron jobs, custom services, and scheduled tasksCommunicate over Tor and I2P networks and use domain generation algorithms for resilient C2 communicationDeploy web shells and covert Apache services on compromised hostsEvade static and dynamic analysis through packing and obfuscation techniquesWith more than 10,000 infections observed worldwide since late 2022—and an expanding geographic footprint—Prometei demonstrates how financially driven threat actors are leveraging advanced techniques to maximize profits while evading security defenses. The malware’s continual adaptation makes detection and mitigation a challenge, even for well-defended networks.This episode offers a deep dive into Prometei’s architecture, capabilities, and evolution. It also covers detection strategies, effective mitigation techniques, and how organizations can strengthen defenses against similar modular threats. For cybersecurity practitioners, threat hunters, and SOC teams, understanding Prometei is essential to improving resilience in today’s threat landscape.

Jun 25, 202541 min

Ep 144The Siemens-Microsoft Antivirus Dilemma Threatening OT Security

This episode examines a serious conflict between Siemens’ Simatic PCS industrial control systems and Microsoft Defender Antivirus. The absence of an "alert only" mode in Defender has created a significant operational risk for plants running Siemens’ systems. Without this functionality, operators must choose between ignoring potential malware detections—remaining unaware of infections—or allowing Defender to quarantine or delete critical files, potentially destabilizing control processes or halting operations entirely.Siemens is actively working with Microsoft to resolve the issue. Until a fix is available, Siemens advises customers to perform risk assessments and carefully configure Defender to minimize the risk of unplanned outages. The incident underscores broader challenges in applying IT security tools within OT environments, where uptime and system availability are paramount.The episode explores key elements of industrial cybersecurity in this context, including:The role of system hardening and reducing attack surfacesImplementing role-based access and password policiesUsing network segmentation to limit the impact of intrusionsAdapting malware protection strategies for OT systemsManaging updates through controlled patching processesBuilding effective incident response capabilitiesThis ongoing conflict between antivirus behavior and operational reliability highlights the complex balancing act required to secure ICS/OT systems. The episode draws from Siemens’ recommendations, industry best practices, and current threat intelligence to provide clear, actionable insights for professionals responsible for securing critical infrastructure.

Jun 25, 20251h 23m

Ep 143Patient Trust on the Line: The Fallout from McLaren Health Care’s 2024 Breach

In this episode, we dive into the 2024 McLaren Health Care data breach that compromised the sensitive information of over 743,000 individuals—just one year after a similar ransomware attack impacted 2.2 million.We’ll unpack the timeline of the attack: how cybercriminals gained unauthorized access between July 17 and August 3, exploiting vulnerabilities in McLaren’s network to steal personally identifiable information (PII) and protected health information (PHI)—including Social Security numbers and medical records.But this is about more than one hospital system. We’ll explore why the healthcare sector has become a prime target for ransomware: a dangerous blend of valuable data, critical infrastructure, underfunded IT security, and human factors. You'll hear why hospitals are often willing to pay ransoms to keep life-saving services online, and how this creates a vicious cycle for attackers to exploit.We’ll also cover broader insights from EU and US sources, including:The prevalence of ransomware in healthcare — 54% of all attacks in recent yearsThe systemic vulnerabilities — from outdated IT and legacy systems to insufficient staff training and third-party risksThe impact on patient trust and care delivery — including delayed treatments and fear around sharing health detailsWhy robust cybersecurity measures, Zero Trust Architecture, and regular employee training are critical mitigation strategiesFinally, we’ll discuss what patients can do if their data is compromised — from understanding credit monitoring’s limits to knowing their legal rights and potential for class action.Whether you're in healthcare, cybersecurity, or simply concerned about data privacy, this episode offers a timely look at how ransomware is reshaping the healthcare landscape—and what must be done to fight back.

Jun 24, 202544 min