Cyber OSINT Overview, Jul 7 - Jul 13, 2025 #
This brief consolidates key updates from 80+ sources, including government organizations, cybersecurity vendors, threat intelligence teams, security research labs, and blogs from cybersecurity communities and professionals. It highlights the most significant threats, vulnerabilities, and developments from the past week to keep you informed.
Most Discussed Topics #
- Microsoft’s July 2025 Patch Tuesday addressed 130 vulnerabilities and was a major point of discussion. The release was highlighted by CVE-2025-47981, a critical, potentially wormable remote code execution (RCE) vulnerability in the Windows SPNEGO NEGOEX protocol with a CVSS score of 9.8. This flaw requires no user interaction or authentication, prompting widespread alerts for immediate patching. Advisories also covered other critical RCE vulnerabilities affecting Microsoft Office, SharePoint, and Windows Routing and Remote Access Service (RRAS), underscoring the broad impact of this month’s updates.
- gov cyber.gc.ca: Microsoft security advisory – July 2025 monthly rollup (AV25-407)
- gov cert.at: Kritische Sicherheitslücke CVE-2025-47981 in Windows SPNEGO - Update dringend empfohlen
- gov cisecurity.org: Critical Patches Issued for Microsoft Products, July 8, 2025
- gov jpcert.or.jp: 注意喚起: 2025年7月マイクロソフトセキュリティ更新プログラムに関する注意喚起 (公開)
- news cyberscoop.com: Microsoft Patch Tuesday addresses 130 vulnerabilities, none actively exploited
- personal krebsonsecurity.com: Microsoft Patch Tuesday, July 2025 Edition
- vendor arcticwolf.com: Microsoft Patch Tuesday: July 2025
- vendor tenable.com: Microsoft’s July 2025 Patch Tuesday Addresses 128 CVEs (CVE-2025-49719)
- vendor thezdi.com: The July 2025 Security Update Review
- Multiple vulnerabilities in Citrix NetScaler ADC and Gateway products were a key focus, especially following reports of active exploitation. The out-of-bounds read vulnerability, CVE-2025-5777, dubbed “Citrix Bleed 2,” gained significant attention due to its potential for exposing sensitive session tokens. CISA added the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog and issued a rare 24-hour patching directive for federal agencies. The incident has drawn comparisons to the widely exploited Citrix Bleed vulnerability from 2023, prompting urgent calls for patching and threat hunting.
- gov advisories.ncsc.nl: NCSC-2025-0196 [1.03] [H/H] Kwetsbaarheden verholpen in Citrix NetScaler ADC en NetScaler Gateway
- gov cyber.gc.ca: Citrix security advisory (AV25-411)
- gov cyber.gc.ca: Vulnerabilities impacting Citrix NetScaler ADC and NetScaler Gateway - CVE-2025-5349, CVE-2025-5777 and CVE-2025-6543 – Update 1
- gov wid.cert-bund.de: [NEU] [mittel] Citrix Systems Virtual Apps and Desktops: Schwachstelle ermöglicht Privilegieneskalation
- gov cisa.gov: CISA Adds One Known Exploited Vulnerability to Catalog
- gov jpcert.or.jp: Weekly Report: 複数のCitrix製品に脆弱性
- news therecord.media: CISA orders agencies to immediately patch Citrix Bleed 2, saying bug poses ‘unacceptable risk’
- vendor fortiguard.fortinet.com: Citrix NetScaler ADC and NetScaler Gateway Vulnerabilities
- Numerous security advisories addressed vulnerabilities in the Linux Kernel, highlighting the continuous effort required to secure this foundational open-source component. The reported flaws could allow local attackers to cause a denial-of-service (DoS), escalate privileges, or manipulate data. The frequent patching cycle, noted across multiple government CERT alerts and vendor updates, underscores the critical importance of maintaining up-to-date kernels to protect a wide array of systems, from servers to embedded devices.
- gov cyber.gc.ca: Red Hat security advisory (AV25-398)
- gov cyber.gc.ca: Ubuntu security advisory (AV25-395)
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- gov wid.cert-bund.de: [UPDATE] [niedrig] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- Multiple security vendors and agencies released a high volume of advisories for enterprise and Industrial Control Systems (ICS) products. CISA published thirteen advisories for ICS equipment from vendors like Siemens, Delta Electronics, Advantech, and KUNBUS, highlighting critical risks such as remote code execution, authentication bypass, and path traversal. Additionally, vendors including Fortinet, Ivanti, SAP, and Adobe released patches for numerous critical vulnerabilities in their respective products, indicating a broad and coordinated effort to address security gaps across enterprise and industrial environments.
- gov cyber.gc.ca: [Control systems] CISA ICS security advisories (AV25-400)
- gov cyber.gc.ca: [Control systems] Schneider Electric security advisory (AV25-403)
- gov cyber.gc.ca: [Control systems] Siemens security advisory (AV25-404)
- gov cyber.gc.ca: Fortinet security advisory (AV25-406)
- gov cyber.gc.ca: Ivanti security advisory (AV25-405)
- gov cyber.gc.ca: SAP security advisory – July 2025 monthly rollup (AV25-402)
- gov cisa.gov: CISA Releases One Industrial Control Systems Advisory
- gov cisa.gov: CISA Releases Thirteen Industrial Control Systems Advisories
Critical Vulnerabilities #
- Microsoft released a patch for CVE-2025-47981, a critical (CVSS 9.8) remote code execution vulnerability in the Windows SPNEGO Extended Negotiation (NEGOEX) protocol. This heap-based buffer overflow flaw can be exploited remotely by an unauthenticated attacker without any user interaction. Due to these characteristics, the vulnerability has the potential for worm-like self-propagation across networks, posing a significant risk to all modern Windows client and server operating systems. Immediate patching is strongly recommended.
- gov cert.at: Kritische Sicherheitslücke CVE-2025-47981 in Windows SPNEGO - Update dringend empfohlen
- news cyberscoop.com: Microsoft Patch Tuesday addresses 130 vulnerabilities, none actively exploited
- personal krebsonsecurity.com: Microsoft Patch Tuesday, July 2025 Edition
- vendor msrc.microsoft.com: SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Remote Code Execution Vulnerability
- vendor thezdi.com: The July 2025 Security Update Review
- Multiple vulnerabilities are being actively exploited in Citrix NetScaler ADC and Gateway appliances, including an out-of-bounds read flaw (CVE-2025-5777) that can lead to sensitive information disclosure, such as session tokens. CISA has added this vulnerability to its Known Exploited Vulnerabilities (KEV) catalog and issued an emergency directive requiring federal agencies to patch within 24 hours. The vulnerability, dubbed “Citrix Bleed 2,” can be exploited remotely without authentication, and organizations are urged to patch immediately and perform threat hunting, as patching does not remediate an existing compromise.
- gov advisories.ncsc.nl: NCSC-2025-0196 [1.03] [H/H] Kwetsbaarheden verholpen in Citrix NetScaler ADC en NetScaler Gateway
- gov cyber.gc.ca: Vulnerabilities impacting Citrix NetScaler ADC and NetScaler Gateway - CVE-2025-5349, CVE-2025-5777 and CVE-2025-6543 – Update 1
- gov cisa.gov: CISA Adds One Known Exploited Vulnerability to Catalog
- news therecord.media: CISA orders agencies to immediately patch Citrix Bleed 2, saying bug poses ‘unacceptable risk’
- A critical remote code execution vulnerability (CVE-2025-47812) with a CVSS score of 10.0 is being actively exploited in Wing FTP Server versions prior to 7.4.4. The vulnerability is a null byte and Lua injection flaw that allows an attacker with anonymous or valid credentials to inject and execute arbitrary system commands with root or SYSTEM privileges. Attackers have been observed using the exploit to download malicious files and install remote management tools. Users are strongly urged to upgrade to version 7.4.4 or later immediately.
- community reddit.com: Hackers are exploiting critical RCE flaw in Wing FTP Server
- gov cyber.gc.ca: Wing FTP security advisory (AV25-391) - Update 1
- vendor arcticwolf.com: CVE-2025-47812: Wing FTP Server Remote Code Execution Vulnerability Exploited in the Wild
- vendor kevintel.com: CVE-2025-47812: In Wing FTP Server before 7.4.4. the user and admin web interfaces mishandle '\0' bytes, ultimately allowing injection of arbitrary Lua code into...
- vendor huntress.com: Wing FTP Server Remote Code Execution (CVE-2025-47812) Exploited in the Wild
- Multiple critical vulnerabilities have been disclosed in Siemens Industrial Control Systems (ICS) products, impacting industrial operations worldwide. In Siemens SINEC NMS, flaws including SQL injection (CVE-2025-40735) and a missing authentication vulnerability (CVE-2025-40736) could allow an unauthenticated attacker to execute arbitrary code and gain full control. Siemens TIA Administrator contains vulnerabilities (CVE-2025-23364, CVE-2025-23365) that allow for privilege escalation and arbitrary code execution. These vulnerabilities pose a significant risk to critical manufacturing and energy sectors, necessitating immediate updates and network segmentation.
- gov advisories.ncsc.nl: NCSC-2025-0211 [1.00] [M/H] Kwetsbaarheden verholpen in Siemens producten
- gov cyber.gc.ca: [Control systems] Siemens security advisory (AV25-404)
- gov cisa.gov: CISA Releases Thirteen Industrial Control Systems Advisories
- gov cisa.gov: Siemens SINEC NMS
- gov cisa.gov: Siemens TIA Administrator
- A critical unauthenticated SQL injection vulnerability (CVE-2025-25257) has been found in the FortiWeb Web Application Firewall. The flaw exists in the GUI component and can be exploited via crafted HTTP or HTTPS requests, potentially leading to unauthorized SQL command execution and a full system compromise. Although no active exploitation was reported at the time of disclosure, Fortinet products are frequent targets. Organizations are strongly advised to upgrade to a patched version or disable the HTTP/HTTPS administrative interface as a temporary mitigation.
- gov advisories.ncsc.nl: NCSC-2025-0226 [1.01] [M/H] Kwetsbaarheid verholpen in FortiWeb
- gov cisecurity.org: A Vulnerability in FortiWeb Could Allow for SQL Injection
- news gbhackers.com: Fortinet FortiWeb Fabric Connector Flaw Enables Remote Code Execution
- vendor arcticwolf.com: CVE-2025-25257: Critical Unauthenticated SQL Injection Vulnerability in FortiWeb
- Multiple vulnerabilities have been discovered in Git for non-Windows systems, including a critical arbitrary file write flaw (CVE-2025-48384). This vulnerability can be exploited during a
git clone --recursive
operation on a malicious repository, potentially leading to remote code execution by writing a malicious Git Hook script. Proof-of-concept exploits are publicly available, and the vulnerability affects Git CLI versions 2.50.0 and prior, as well as the GitHub Desktop client for macOS. Developers are urged to update to a patched version immediately.
- vendor msrc.microsoft.com: CVE-2025-48384 MITRE: CVE-2025-48384 Git Symlink Vulnerability
- vendor securitylabs.datadoghq.com: CVE-2025-48384: Git vulnerable to arbitrary file write on non-Windows systems
- A chain of four vulnerabilities, collectively dubbed “PerfektBlue,” affects the BlueSDK Bluetooth stack used in millions of vehicles from Mercedes-Benz, Volkswagen, Skoda, and another unnamed manufacturer. The most critical flaw (CVE-2024-45434) is a use-after-free bug in the AVRCP service. An attacker within Bluetooth range could chain these vulnerabilities to achieve remote code execution on the vehicle’s infotainment system, potentially accessing GPS data, audio, and contacts. The complex automotive supply chain has delayed patching, leaving many vehicles exposed.
- news cyberscoop.com: Researchers identify critical vulnerabilities in automotive Bluetooth systems
- news darkreading.com: 350M Cars, 1B Devices Exposed to 1-Click Bluetooth RCE
Major Incidents #
- McDonald’s experienced a significant data exposure through its AI-powered hiring chatbot, McHire, developed by Paradox.ai. Security researchers discovered that an insecure API allowed access to the personal information of approximately 64 million job applicants. The researchers gained access to the administrator interface of a test restaurant using a simple default password, from which they were able to pivot and access the sensitive applicant data. McDonald’s has since remediated the vulnerability.
- community reddit.com: Would you like an IDOR with that? Leaking 64 million McDonald’s job applications
- vendor malwarebytes.com: McDonald's AI bot spills data on job applicants
- Major UK retailers, including Marks & Spencer (M&S), Co-op, and Harrods, were targeted by significant cyberattacks attributed to the Scattered Spider group. The attacks disrupted online services, contactless payments, and led to the theft of customer data. In response, M&S was forced to take its online store offline for nearly seven weeks. The UK’s National Crime Agency (NCA) has since arrested four individuals in connection with these incidents.
- news cyberscoop.com: UK arrests four for cyberattacks on major British retailers
- news thecyberexpress.com: UK NCA Arrests Four in Cyberattacks on M&S, Co-op, and Harrods
- personal krebsonsecurity.com: UK Arrests Four in ‘Scattered Spider’ Ransom Group
- The Australian airline Qantas suffered a data breach affecting up to 6 million customers after a third-party customer service platform used by an offshore call center was compromised. The exposed data includes personal information and frequent flyer numbers. Qantas stated that it has contained the incident, notified the relevant authorities, and is enhancing its security measures. This breach highlights the significant risks associated with third-party service providers and their access to sensitive customer data.
- personal troyhunt.com: Weekly Update 460
- vendor research.checkpoint.com: 6th July – Threat Intelligence Report
- vendor malwarebytes.com: Qantas: Breach affects 6 million people, “significant” amount of data likely taken
- A fire at the Ramses Central Exchange, a key telecommunications datacenter in Egypt, caused a major internet disruption across the country. National connectivity dropped to as low as 44% of ordinary levels, affecting critical services such as banking, mobile payments, and online trade. The prolonged outage, which lasted over 48 hours, highlights the vulnerability of critical infrastructure and the widespread economic and social impact of such incidents.
- The technology distributor Ingram Micro experienced a significant outage caused by a ransomware attack attributed to the SafePay group. The attack led to the shutdown of internal systems, including its website and online ordering platforms like Xvantage and Impulse. The disruption, which began before a major holiday weekend, affected customer operations and highlighted the ongoing threat of ransomware to critical supply chain and distribution services.
- news darkreading.com: Ransomware Attack Triggers Widespread Outage at Ingram Micro
- news darkreading.com: Ingram Micro Up and Running After Ransomware Attack
- vendor research.checkpoint.com: 6th July – Threat Intelligence Report
- Luxury fashion brand Louis Vuitton disclosed that its UK operation was hit by a cyberattack on July 2, resulting in the theft of customer data. The compromised information includes names, contact details, and purchase histories. The company reassured customers that financial data was not accessed but warned of potential phishing and fraud attempts. This incident follows similar breaches at other LVMH brands, including Dior and Louis Vuitton’s Korean division, indicating a pattern of attacks against the luxury retail sector.
- news theguardian.com: Louis Vuitton says UK customer data stolen in cyber-attack
- The gaming community faced a significant security incident when the PC version of ‘Call of Duty: WWII’ was temporarily taken offline due to reports of a remote code execution (RCE) vulnerability. Players reported that attackers were able to hijack their PCs during live multiplayer matches, enabling actions like forcing shutdowns and displaying unwanted content. The incident highlights the risks associated with older game titles, particularly those using peer-to-peer networking, and prompted the game to be pulled from Microsoft’s Game Pass service pending a fix.
- personal grahamcluley.com: Smashing Security podcast #425: Call of Duty: From pew-pew to pwned
- vendor malwarebytes.com: Gamers hacked playing Call of Duty: WWII—PC version temporarily taken offline
Emerging Threats #
- Threat actors are increasingly using AI to enhance social engineering attacks, including sophisticated phishing and voice-cloning scams. An AI-powered attack impersonated the US Secretary of State using deepfake voice and text messages sent via Signal to other high-level government officials. Similarly, AI-generated search engine summaries have been observed suggesting phishing sites instead of legitimate login pages. These incidents demonstrate a growing trend of leveraging AI to create highly convincing and targeted attacks that bypass traditional defenses and manipulate human trust.
- gov health-isac.org: Readying hospital defenses for the AI-powered phishing surge
- news darkreading.com: Rubio Impersonator Signals Growing Security Threat From Deepfakes
- news zdnet.com: Someone used AI to impersonate a secretary of state - how to make sure you're not next
- vendor blog.knowbe4.com: AI-Generated Summaries Mistakenly Suggest Phishing Sites
- vendor malwarebytes.com: Deepfake criminals impersonate Marco Rubio to uncover government secrets
- Malicious browser extensions are being used to compromise end-user devices at scale, affecting millions of users on both Chrome and Edge. These extensions, often disguised as legitimate tools like volume boosters or VPNs, are used to scrape data, hijack user sessions by intercepting web traffic, and redirect users to malicious sites. In one campaign, extensions turned nearly a million browsers into a botnet for a paid web-scraping service. This trend highlights the significant risk posed by the browser as an attack surface and the need for greater scrutiny of extensions, even those from official web stores.
- news arstechnica.com: Browser extensions turn nearly 1 million browsers into website-scraping bots
- news darkreading.com: Chrome Store Features Extension Poisoned With Sophisticated Spyware
- vendor malwarebytes.com: Millions of people spied on by malicious browser extensions in Chrome and Edge
- The LogoKit phishing kit is being used in widespread campaigns targeting government, banking, and logistics sectors. This toolkit automates the creation of convincing phishing pages by dynamically fetching company logos and favicons based on the victim’s email domain, which is passed as a URL parameter. The phishing sites, often hosted on legitimate services like AWS S3 to evade detection, use Cloudflare Turnstile to appear more credible. This tactic allows attackers to efficiently scale their credential theft operations across various industries with minimal manual effort.
- news thecyberexpress.com: LogoKit Phishing Kit Used in Government, Banking and Logistics Attacks: Cyble
- The Iranian-backed ransomware-as-a-service (RaaS) group Pay2Key has resurfaced as Pay2Key.I2P, demonstrating advanced capabilities and clear geopolitical motivations. Linked to the Fox Kitten APT and Mimic ransomware, the group is offering an 80% profit share for affiliates who attack Western targets, particularly in the US and Israel. This resurgence highlights a trend of ideologically driven ransomware campaigns that merge financial extortion with state-aligned cyber warfare objectives, expanding their attack surface with new tools like a Linux-targeted ransomware build.
- news darkreading.com: Pay2Key Ransomware Gang Resurfaces With Incentives to Attack US, Israel
- vendor morphisec.com: Pay2Key’s Resurgence: Iranian Cyber Warfare Targets the West
- An Initial Access Broker (IAB) campaign, attributed with medium confidence to Gold Melody (UNC961), is exploiting leaked ASP.NET Machine Keys to compromise IIS servers. This technique allows the attacker to perform View State deserialization attacks, executing malicious payloads directly in the server’s memory. This in-memory approach minimizes forensic artifacts, making the intrusion difficult to detect. The IAB uses custom Go-based tooling for persistence and reconnaissance, targeting organizations across finance, manufacturing, and transportation sectors in Europe and the US.
- vendor threats.wiz.io: In-Memory IIS Attacks via View State Deserialization (Campaign)
- vendor unit42.paloaltonetworks.com: GoldMelody’s Hidden Chords: Initial Access Broker In-Memory IIS Modules Revealed
- The DoNot APT group (APT-C-35), linked to Indian state interests, has expanded its operations to target European government entities. A recent spear-phishing campaign impersonated European defense officials to lure victims into downloading the LoptikMod malware from a Google Drive link. This malware is designed to exfiltrate system information and maintain persistence. This shift from its traditional focus on South Asian targets indicates a broadening of the group’s cyber-espionage objectives and capabilities.
- news hackread.com: DoNot APT Hits European Ministry with New LoptikMod Malware
- The AI supply chain is becoming a significant attack vector, with attackers hiding malicious code in open-source models and packages. In one notable incident, a malicious extension for the Cursor AI IDE, named ‘solidityai.solidity-1.0.9’, was used to download and execute the Quasar backdoor and a crypto stealer, leading to the theft of $500,000 from a blockchain developer. This highlights the risk of using unvetted open-source components in development environments and the need for robust AI supply chain security measures.
- vendor blogs.cisco.com: Securing an Exponentially Growing (AI) Supply Chain
- vendor securelist.com: Code highlighting with Cursor AI for $500,000
Regulatory and Policy Updates #
- CISA has added several actively exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, mandating federal agencies to patch them on accelerated timelines. Notably, CVE-2025-5777, a flaw in Citrix NetScaler products, was given an emergency 24-hour remediation deadline due to the unacceptable risk it poses. Other additions include older vulnerabilities in PHPMailer (CVE-2016-10033) and Ruby on Rails (CVE-2019-5418), reinforcing the importance of patching both new and legacy systems to defend against active threats.
- Microsoft has finalized plans for Windows 10 Extended Security Updates (ESU) as the operating system’s end-of-support date of October 14, 2025, approaches. Commercial customers will face a tiered pricing model starting at $61 per device for the first year, with costs doubling annually for up to three years. For consumers, Microsoft is offering a free one-year ESU subscription to those who use Windows Backup or Microsoft Rewards, providing a temporary bridge for users on hardware ineligible for a Windows 11 upgrade.
- The US Treasury Department has sanctioned individuals and companies involved in North Korea’s illicit IT worker schemes. The sanctions target a North Korean national linked to the Andariel hacking group and a Russian man whose companies employed North Korean IT workers. These schemes generate revenue for North Korea’s weapons programs and pose an insider threat, as these workers have been known to introduce malware into corporate networks. This action underscores the international effort to disrupt North Korea’s funding streams derived from cybercrime and illicit labor.
- news cyberscoop.com: Treasury slaps sanctions on people, companies tied to North Korean IT worker schemes
- The Healthcare and Public Health Sector Coordinating Council (HSCC) testified before the U.S. Senate, urging significant reforms to national healthcare cybersecurity policy. Citing budget constraints and the increasing threat landscape, the HSCC called for a pause on HIPAA Security Rule updates to allow organizations to focus resources on current threats. They also advocated for enhanced visibility into critical infrastructure, reauthorization of government-industry collaboration channels like CIPAC, and greater cybersecurity accountability for third-party vendors to improve the sector’s overall resilience.
- The European Union’s new Product Liability Directive (PLD) now explicitly classifies software, including AI and digital services, as ‘products.’ This change subjects them to strict liability, meaning non-compliance with cybersecurity requirements or a failure to provide necessary security updates can be legally considered a product defect. This regulatory shift increases the accountability of software and AI developers, forcing them to prioritize security-by-design principles to mitigate potential legal and financial risks.
- gov ctoatncsc.substack.com: CTO at NCSC Summary: week ending July 13th
- The UK’s Intelligence and Security Committee of Parliament released a report on Iran, highlighting its ‘ferociously well-resourced’ intelligence services and significant asymmetric strength in cyber capabilities. The report states that Iranian espionage poses a considerable threat to the UK and its interests. This assessment aligns with a joint alert from US agencies warning of potential targeted cyber activity by Iranian-affiliated actors against US critical infrastructure, underscoring the geopolitical tensions manifesting in cyberspace.
- gov ctoatncsc.substack.com: CTO at NCSC Summary: week ending July 13th
- gov health-isac.org: Health-ISAC Hacking Healthcare 7-3-2025
- Let’s Encrypt has begun issuing free TLS certificates for IP addresses, a shift from its traditional domain-only model. This initiative aims to enhance security for devices accessed directly via IP, such as home IoT devices and servers without a domain name. While intended to improve encryption accessibility, security experts caution that this could also be abused by phishing campaigns, as attackers could use a valid, browser-trusted certificate for a malicious IP-based site, potentially lulling users into a false sense of security.
- vendor malwarebytes.com: Free certificates for IP addresses: security problem or solution?
Security Operations #
- New frameworks are emerging to help organizations manage AI-related security risks. The Cloud Security Alliance (CSA) released its ‘Artificial Intelligence Controls Matrix,’ a vendor-agnostic framework for securely developing and operating AI systems. Concurrently, SANS Institute and OWASP have partnered to standardize a comprehensive set of AI security controls. These initiatives aim to provide actionable guidance for developers and security teams to address the unique challenges posed by AI, from data poisoning and model theft to prompt injection and supply chain attacks.
- The security industry is advocating for a shift in how AI and LLM systems are tested, moving beyond static prompt engineering. Experts argue that effective penetration testing must treat these systems as conversational and account for their ability to interpret intent, which can be manipulated by attackers. Recommended practices include scenario-driven testing that explores adversarial context manipulation, running AI modules in sandboxed environments, and implementing human-in-the-loop reviews for any actions involving elevated access or critical decision-making.
- vendor bishopfox.com: You’re Pen Testing AI Wrong: Why Prompt Engineering Isn’t Enough
- Oligo Security has introduced the Application Attack Matrix, a new, open-source framework designed to complement MITRE ATT&CK by focusing specifically on application-layer threats. The matrix aims to fill gaps in existing frameworks by providing a more granular taxonomy for categorizing attacks that exploit application vulnerabilities, such as various types of code injection and supply chain compromises. This community-driven effort is intended to help security teams better understand, define, and defend against attacks that occur within the application context, regardless of the underlying infrastructure.
- news cyberscoop.com: Oligo Security strives to fill application-layer gaps in MITRE ATT&CK framework
- 0patch has released micropatches for ‘WSPCoerce,’ a coerced authentication vulnerability in the Windows Search Protocol that Microsoft has classified as a ‘wont-fix’ issue. This technique allows an attacker to force a target system to authenticate to an attacker-controlled machine, revealing NTLM credentials that can be used in relay attacks. The micropatches prevent this by restricting remote search requests to the target machine itself, thereby neutralizing the threat on both currently supported and legacy Windows systems where disabling NTLM is not feasible.
- The concept of an Isolated Recovery Environment (IRE) is gaining importance as a critical defense against destructive ransomware attacks. Unlike traditional disaster recovery sites, an IRE is a fully segregated environment with no shared authentication or persistent network links to production systems. Its purpose is to store immutable backups and provide a clean, secure space to restore and validate critical systems after a major compromise where production backups are also assumed to be compromised. This approach is crucial for ensuring business continuity when adversaries deliberately target backup infrastructure.
- vendor cloud.google.com: Isolated Recovery Environments: A Critical Layer in Modern Cyber Resilience
- The implementation of foundational cybersecurity controls, such as CIS Controls 1 (Inventory and Control of Enterprise Assets) and 2 (Inventory and Control of Software Assets), remains a key focus for security teams. Community discussions highlight the challenges and strategies involved in achieving comprehensive asset visibility, which is crucial for effective vulnerability management and risk reduction. These discussions emphasize the need for robust asset management processes and tools to build a strong security posture from the ground up.
- community reddit.com: What was your strategies in implementing the CIS controls 1 & 2
- Estonia has enhanced its national mobile application, ‘Eesti äpp’, with a new digital identity verification feature. This allows users to prove their identity directly from their smartphone by presenting a QR code containing their ID card or passport data to service providers. While this function is currently limited to Estonia and does not replace the physical document, it represents a significant step in digital identity innovation. The initial launch saw high user interest, causing temporary technical glitches, but the service was quickly restored.
Wins #
- The UK’s National Crime Agency (NCA) arrested four individuals in connection with a series of high-profile cyberattacks against major retailers, including Marks & Spencer, Co-op, and Harrods. The suspects, aged 17 to 20, face charges of blackmail, money laundering, and Computer Misuse Act offenses. This law enforcement action is a significant step in disrupting the activities of the prolific Scattered Spider cybercrime group, which has been linked to these disruptive retail attacks as well as intrusions at numerous other companies.
- gov ctoatncsc.substack.com: Retail cyber attacks: NCA arrest four for attacks on M&S, Co-op and Harrods
- news cyberscoop.com: UK arrests four for cyberattacks on major British retailers
- news thecyberexpress.com: UK NCA Arrests Four in Cyberattacks on M&S, Co-op, and Harrods
- news darkreading.com: 4 Arrested in UK Over M&S, Co-op, Harrods Hacks
- personal krebsonsecurity.com: UK Arrests Four in ‘Scattered Spider’ Ransom Group
- An attacker who exploited a vulnerability in the GMX decentralized exchange to steal $42 million in cryptocurrency has returned the funds. The hacker agreed to accept a $5 million bug bounty from the platform in exchange for returning the stolen assets. This incident highlights a growing trend in the DeFi space where projects negotiate with white-hat or grey-hat hackers to recover stolen funds, though it does not absolve the attacker of potential legal liability.
- news therecord.media: Hacker returns cryptocurrency stolen from GMX exchange after $5 million bounty payment
- Italian authorities arrested a Chinese national, Xu Zewei, at the request of the United States for his alleged role in the 2020-2021 Microsoft Exchange Server hack. The indictment accuses Xu of acting on behalf of China’s Ministry of State Security to target U.S. universities and researchers involved in COVID-19 research. This arrest is a significant development in holding state-sponsored actors accountable for major cyber-espionage campaigns.
- news cyberscoop.com: Italian authorities arrest Chinese man over Microsoft Exchange Server hack, targeting of COVID-19 researchers
- news darkreading.com: Suspected Hacker Linked to Silk Typhoon Arrested in Milan
- The FBI successfully seized and dismantled several major online marketplaces known for distributing pirated video games, including unreleased titles. The domains, including nsw2u.com and game-2u.com, were responsible for an estimated 3.2 million illegal downloads and approximately $170 million in losses to game developers and publishers. This action marks a significant disruption to a prominent video game piracy network.
- news hackread.com: FBI Seizes Major Sites Sharing Unreleased and Pirated Video Games
- French authorities arrested Russian professional basketball player Daniil Kasatkin at the request of the United States. Kasatkin is suspected of being a negotiator for a ransomware gang that allegedly attacked 900 organizations, including U.S. federal agencies, between 2020 and 2022. This arrest demonstrates the international cooperation involved in pursuing individuals linked to major ransomware operations.
- Indonesian authorities have extradited a Russian citizen, Alexander Zverev, to Russia. Zverev is accused of operating a Telegram channel that sold sensitive personal data obtained from Russian law enforcement and mobile operator databases. This extradition marks a victory in the fight against illicit data brokerage and highlights international cooperation in prosecuting cybercriminals who profit from stolen information.
- news therecord.media: Indonesia extradites Russian accused of selling personal data on Telegram
- A U.S. appeals court has revived a lawsuit filed by El Salvadoran journalists against the Israeli spyware firm NSO Group. The Ninth Circuit Court of Appeals vacated a lower court’s decision to dismiss the case, which was based on the argument that California was not the appropriate forum. This ruling allows the journalists to proceed with their case in U.S. court, representing a significant step in holding spyware manufacturers accountable for their alleged role in targeting journalists and activists.
- news cyberscoop.com: Appeals court clears path for El Salvadoran journos to sue spyware maker
Disclaimer #
The summaries in this brief are generated autonomously by a LLM based on provided system and user prompts. While every effort is made to consolidate accurate and relevant insights, the model may occasionally misinterpret, misrepresent, or hallucinate information. Readers are strongly advised to verify all key points by consulting the original sources linked in the brief for complete context and accuracy.
The brief is created in collaboration with BlackStork and is based on a free template.
Reach out if you have questions or suggestions.