March 2025 - RedSeal

RedSeal: The Ideal Solution for Former Skybox Customers

On February 24, 2025, Skybox shut its doors as Tufin acquired limited assets from the company, leaving Skybox customers without support or service agreements. Now, those who relied on Skybox are stuck in limbo, unsure of what to do next. The uncertainty is real, but here’s the good news: RedSeal is the best partner to help you transition smoothly without losing critical capabilities—and without the financial penalties or operational disruptions.

The situation for Skybox customers

Tufin’s acquisition only covers select assets from Skybox, leaving existing customer contracts behind. This means that Skybox customers must migrate to Tufin or find a new home for their cybersecurity program. While Tufin offers some incentives to make the switch, it doesn’t cover everything Skybox customers need—such as vulnerability management (VM), attack path management (APM), and critical compliance features. All capabilities relied upon to protect a network.

RedSeal is the clear choice

From comprehensive network visibility to advanced vulnerability management and attack path management, RedSeal ensures continuity and enhances your security posture during the migration. Unlike Tufin, RedSeal offers a migration path that keeps critical features intact while giving you access to even more robust capabilities. When you move to RedSeal, you’re taking your security to the next level.

Limited time migration offer

To make this transition even easier, RedSeal is offering a program for Skybox customers. If you have less than six months remaining on your Skybox subscription, we’ll allow you to migrate to RedSeal at no additional cost for those remaining months. If you’re on a perpetual license, we’ll take over support at the same rate you were paying Skybox and move you to a RedSeal subscription within two years. This is your chance to move without the usual hassle or financial burden.

Conclusion

Don’t let the closure of Skybox leave your network security in the dark. With RedSeal, you get a seamless migration, full continuity of your critical security features, and an upgraded platform that will set your organization up for future growth.

Now is the time to act.

Schedule a demo today and see for yourself how RedSeal is the solution you need to stay ahead of the curve.

 

Cyber News Roundup for for March 28, 2025

This week’s cyber news roundup highlights key incidents, including the exposure of over 150 U.S. government database servers, shifting cybersecurity responsibilities to states, and the risk to DNA records following 23andMe’s bankruptcy. We also cover the abuse of Microsoft’s Trust Signing service for malware and a China-linked APT that remained hidden in a telecom network for years.

Stay tuned for more on these evolving threats. At RedSeal, we help organizations manage cyber exposure proactively to stay ahead of these risks.

 

Over 150 government database servers are dangerously exposed to the internet

A recent investigation has revealed a major cybersecurity threat to U.S. government data. Over 150 government database servers—used by agencies like the Departments of Agriculture, Education, and Energy—are exposed to the internet, violating basic security protocols. These databases, hosted on Microsoft’s Azure Gov Cloud, have open ports vulnerable to brute-force attacks and known exploits. The report highlights over 655 unauthorized access attempts and more than 200 real-time data replications, suggesting serious flaws in authentication and data protection. Analysts believe the exposure stems from a rushed federal data centralization effort. Experts are calling for urgent action, including Congressional hearings and audits, to address what could become a catastrophic breach.

The White House is shifting cybersecurity responsibilities from federal agencies to states and local governments. A new executive order from President Trump introduces a National Resilience Strategy, aiming to give local entities more control over defending infrastructure and elections from cyber threats. This move follows cuts to federal cybersecurity teams and programs, leaving states without vital support like vulnerability alerts and free risk assessments. Experts warn this decentralization could lead to fragmented defenses, especially as many states lack the resources and intelligence centers to fill the gap. Cybersecurity professionals say the burden will hit underfunded sectors like schools and small municipalities hardest. Critics argue the shift, combined with federal workforce reductions, undermines national security and leaves states to manage growing cyber risks largely on their own. (GB Hackers)

 

Web service outage in Russia due to reported Cloudflare block

The outages were observed Thursday across numerous Russian regions, affecting platforms including “TikTok, Steam, Twitch, Epic Games, Duolingo and major Russian mobile operators.” Also impacted were banking and government services, and messaging apps such as Telegram and WhatsApp. Industry experts are suggesting the cause of the outage to be the Russian government’s blocking of U.S. based Cloudflare. Russian internet regulator Roskomnadzor recommended that local organizations switch to Russian hosting providers. (The Record)

 

Microsoft Trust Signing service abused to code-sign malware   

Researchers at BleepingComputer and elsewhere are observing more incidences of threat actors using the Microsoft Trusted Signing service to “sign their malware with short-lived, three-day code-signing certificates.” Code-signing certificates make malware appear legitimate, potentially bypassing security filters that block unsigned executables. Extended Validation (EV) certificates are particularly sought after by threat actors due to the increased trust they confer from cybersecurity programs and their ability to help bypass alerts in SmartScreen. A cybersecurity researcher and developer with the wonderful name of Squiblydoo, told BleepingComputer that they believe threat actors are switching to Microsoft’s service out of convenience, especially given that recent changes to EV certificates are causing confusion for users – something threat actors are taking advantage of. (BleepingComputer)

 

FCC alleges Chinese telecom companies are making ‘end run’ around bans   

The Federal Communications Commission’s newly created Council on National Security will conduct a “sweeping investigation of Chinese-made equipment in America’s telecommunications infrastructure,” according to an announcement made on Friday. The focus will be on Chinese companies like Huawei, ZTE, and others, who have been banned from doing business with U.S. companies, but who allegedly continue to exploit loopholes or simply massively underbid other competitors when dealing with smaller U.S. telecommunications providers. (Cyberscoop)

 

23andMe bankruptcy puts millions of DNA records at risk   

23andMe filed for bankruptcy on Monday and many are asking the question, what’s going to happen to all of that personal information? Some have raised major concerns that its vast database of genetic data could be sold off to the highest bidder. While the company insists privacy protections will remain intact, court documents make it clear that all assets—including customer DNA records—are on the table. California’s Attorney General issued a release ahead of the announcement urging users to delete their data immediately, warning that unlike passwords, genetic information is permanent, instructions on how to delete that data can be found in today’s show notes. (The Record)(CyberScoop),(California Attorney General Release)

 

China-linked APT hid in telecom network for years   

China-linked APT group Weaver Ant spent over four years inside an Asian telecom provider’s network, using compromised Zyxel routers to hide traffic and infrastructure. Researchers at Sygnia uncovered the intrusion, which relied on web shell tunneling—linking multiple web shells like China Chopper and the custom-built INMemory to move laterally and maintain persistence. The group exfiltrated credentials, access logs, and network configurations while evading detection through encryption, SMB lateral movement, and disabling security logs. (Dark Reading)(Sygnia)(Bleeping Computer)

 

NIST struggles to keep up   

The National Institute of Standards and Technology (NIST) is struggling to clear a growing backlog of CVEs in the National Vulnerability Database (NVD), with a 32% increase in submissions last year exacerbating the issue. Despite maintaining processing rates, the backlog continues to grow, and NIST anticipates even higher submission volumes in 2025. The delays are impacting organizations’ ability to access timely vulnerability data, creating a gap between reported issues and actionable intelligence despite efforts in increasing staff. (Security Week)

 

A Pennsylvania union notifies over 517,000 individuals of a data breach   

The Pennsylvania State Education Association (PSEA) is notifying over 517,000 individuals of a data breach from July 2024, where attackers stole personal, financial, and health data, including Social Security numbers and payment information. The Rhysida ransomware gang claimed responsibility, demanding a 20 BTC ransom. PSEA has not disclosed if it paid. Rhysida has previously attacked major institutions, including the British Library and Lurie Children’s Hospital. Affected individuals are offered free credit monitoring and urged to monitor their accounts. (Bleeping Computer)

 

Veeam patches backup and replication vulnerabilities   

The defect, which has a CVE number and a CVSS score of 9.9, could allow for “remote code execution by authenticated domain users.” It affects numerous backup and replication versions in the 12.x range. According to cybersecurity firm watchTowr, which reported the vulnerability, it is “rooted in a broader issue within Veeam’s deserialization mechanism,” which, watchTowr says, the company has “failed to properly address.” watchTowr also points out that “while the exploitation of the new vulnerability requires for the attacker to be logged in, the authentication requirement is fairly weak.” (SecurityWeek)

 

Nation-state groups hit organizations with Microsoft Windows zero-day   

Researchers at Trend Micro “discovered and reported this particular eight-year-old defect to Microsoft six months ago, but no remediations or fixes have arrived as of yet. The vulnerability does not yet have a CVE number but it “allows attackers to execute hidden malicious commands due to the way Windows displays the contents of shortcut .lnk files, also known as shell link files. According to the researchers’ report, a link to which is included in the show notes, state-sponsored groups have been exploiting the zero-day since 2017, targeting governments, think tanks and organizations in the finance, cryptocurrency, telecom, military and energy sectors, according to researchers. (Cyberscoop and Trend Micro)

 

Have questions? Reach out to RedSeal today to chat with one of our cybersecurity experts or schedule a demo today.

Navigating the Future of Multi-Cloud Security

The shift to multi-cloud architectures has been a game-changer for organizations seeking agility, scalability, and resilience. While cloud adoption simplifies infrastructure in some ways, it also introduces new security complexities. Each cloud provider has its own controls, security models, and visibility gaps, creating a fragmented security environment that makes risk management harder than ever.

You’re not alone if cloud security feels more like a tangled web than a structured framework. The challenge isn’t just securing data and workloads; it’s understanding what you actually have, where your risks are, and how attackers might exploit them.

The multi-cloud dilemma: More clouds, more complexity

A multi-cloud strategy is great for avoiding vendor lock-in and optimizing costs, but it comes with real security trade-offs. Visibility is inconsistent, security policies don’t always translate across providers, and misconfigurations remain one of the top causes of cloud breaches.

Security teams are left with a familiar set of challenges:

  • Cloud silos obscure risk. Each provider has its own tools, dashboards, and logging formats, making it difficult to get a unified view of security posture.
  • Misconfigurations are everywhere. One wrong setting—an overly permissive identity policy or an unprotected storage bucket—can expose critical data to the Internet.
  • Attackers love complexity. The more fragmented and inconsistent the environment, the easier it is for bad actors to find and exploit security gaps.

The harsh reality? If you can’t see it, you can’t secure it. And in a multi-cloud world, attackers often see the gaps before you do.

Beyond traditional security: Adapting to the multi-cloud reality

Security strategies built for on-prem networks don’t translate neatly into cloud environments. Many organizations rely on traditional perimeter defenses or cloud-native security tools that don’t integrate well across providers.

What’s needed is a shift in approach—one that prioritizes visibility, adaptability, and continuous validation.

  • Prioritize unified visibility. You can’t manage risk without knowing where your assets are, how they’re connected, and what’s exposed. Security teams need a consolidated view across cloud environments, on-prem networks, and hybrid infrastructure.
  • Move beyond static security policies. Cloud environments are dynamic; security should be, too. Policies must adjust in real-time based on risk, rather than relying on manual configurations that quickly become outdated.
  • Think like an attacker. The best way to secure a multi-cloud environment is to understand how an attacker would move through it. Mapping potential attack paths helps identify where security gaps exist before they’re exploited.

Navigating the future of multi-cloud security

As organizations scale their cloud operations, security must become more proactive, automated, and adaptable. Instead of chasing alerts or manually correlating risks across different platforms, security teams should focus on understanding how cloud assets interact and where risk accumulates.

The challenge isn’t just the volume of security data; it’s knowing what’s important and what to do about it. Without a clear view of the full cloud attack surface, teams are forced into reactive firefighting. RedSeal tackles this challenge by mapping hybrid and multi-cloud networks, to enable teams to visualize risk and prioritize security efforts where they matter most.

To take control of multi-cloud security, organizations need to:

  • Unify visibility across environments. Security teams must see the full picture, not just isolated cloud dashboards. RedSeal’s modeling capabilities provide a comprehensive view of cloud and on-prem infrastructure, revealing misconfigurations, unintended access paths, and policy gaps.
  • Simulate attack paths before attackers do. Instead of reacting to breaches, organizations should understand how an attacker would move through their network. RedSeal’s attack path analysis highlights the most likely routes bad actors would take, allowing teams to address weaknesses before they can be exploited.
  • Enforce consistent security policies. Security policies that work in one cloud may not translate to another. RedSeal normalizes security controls across providers, identifying inconsistencies that could leave critical data exposed.
  • Prioritize risk based on real exposure. Not all vulnerabilities are equal. RedSeal helps teams cut through the noise by identifying which risks pose real threats based on actual network reachability—not just theoretical CVEs.

Multi-cloud security isn’t about layering on more tools—it’s about gaining the clarity and control needed to proactively manage risk. With the right strategy and RedSeal’s ability to provide network-wide situational awareness, organizations can stop playing catch-up and start making smarter, data-driven security decisions before attackers strike.

Contact us today.

 

Cyber News Roundup for March 21, 2025

In this week’s cyber news roundup, we delve into a range of critical incidents and updates. From a massive data breach impacting over 500,000 individuals at the Pennsylvania State Education Association, to the active exploitation of vulnerabilities in Fortinet and Apache Tomcat, cyber threats continue to evolve. We’ll also touch on Google’s $32 billion acquisition of Wiz, the U.S. government’s warning on cybersecurity team layoffs, and a ransomware attack in the remote island nation of Yap. Stay tuned as we break down these stories and their implications for cybersecurity. At RedSeal, we’re dedicated to helping organizations proactively manage their cyber exposure and reduce risk, ensuring that threats like these don’t catch you off guard.

 

A Pennsylvania union notifies over 517,000 individuals of a data breach  

The Pennsylvania State Education Association (PSEA) is notifying over 517,000 individuals of a data breach from July 2024, where attackers stole personal, financial, and health data, including Social Security numbers and payment information. The Rhysida ransomware gang claimed responsibility, demanding a 20 BTC ransom. PSEA has not disclosed if it paid. Rhysida has previously attacked major institutions, including the British Library and Lurie Children’s Hospital. Affected individuals are offered free credit monitoring and urged to monitor their accounts. (Bleeping Computer)

 

Veeam patches backup and replication vulnerabilities  

The defect, which has a CVE number and a CVSS score of 9.9, could allow for “remote code execution by authenticated domain users.” It affects numerous backup and replication versions in the 12.x range. According to cybersecurity firm watchTowr, which reported the vulnerability, it is “rooted in a broader issue within Veeam’s deserialization mechanism,” which, watchTowr says, the company has “failed to properly address.” watchTowr also points out that “while the exploitation of the new vulnerability requires for the attacker to be logged in, the authentication requirement is fairly weak.” (SecurityWeek)

 

Nation-state groups hit organizations with Microsoft Windows zero-day  

Researchers at Trend Micro “discovered and reported this particular eight-year-old defect to Microsoft six months ago, but no remediations or fixes have arrived as of yet. The vulnerability does not yet have a CVE number but it “allows attackers to execute hidden malicious commands due to the way Windows displays the contents of shortcut .lnk files, also known as shell link files. According to the researchers’ report, a link to which is included in the show notes, state-sponsored groups have been exploiting the zero-day since 2017, targeting governments, think tanks and organizations in the finance, cryptocurrency, telecom, military and energy sectors, according to researchers. (Cyberscoop and Trend Micro)

 

CISA confirms active exploitation of a critical Fortinet vulnerability  

The US Cybersecurity and Infrastructure Security Agency (CISA) has confirmed active exploitation of a critical Fortinet vulnerability (CVE-2025-24472) in ransomware attacks. The flaw, affecting FortiOS and FortiProxy, allows attackers to gain super-admin privileges via crafted proxy requests. Linked to the Mora_00 ransomware group, it has been exploited to deploy a new strain called SuperBlack. Additionally, CISA flagged a supply chain vulnerability (CVE-2025-30066) in the tj-actions/changed-files GitHub Action, which impacted over 23,000 organizations. Attackers modified the code, exposing CI/CD secrets in GitHub Actions logs. Organizations are urged to patch Fortinet devices (FortiOS 7.0.17, 7.2.13, 7.0.20) and ensure they’re using a secure version of the GitHub Action to prevent further exploitation. (Infosecurity Magazine)

 

Attackers swipe data from Pennsylvania teachers union  

The Pennsylvania State Education Association (PSEA) reported to the Office of the Maine Attorney General that they suffered a breach impacting 517,487 people. The nonprofit said the attack occurred on July 6 and exposed sensitive financial and health information. Although PSEA’s disclosure didn’t explicitly mention ransomware or extortion, it did say that steps were taken to ensure the stolen data was deleted. The Rhysida ransomware gang publicly claimed responsibility for the attack back in September 2024. (The Record and Bleeping Computer)

 

IBM warns of critical vulnerabilities in AIX  

IBM’s Advanced Interactive eXecutive (AIX) operating system rarely makes the cyber news these days. But IBM is now urging its customers to apply patches after disclosing two critical vulnerabilities (CVE-2024-56346 and CVE-2024-56347), one of which carries a maximum severity score of 10. Both flaws are caused by improper process controls and allow remote attackers to execute arbitrary commands. Third-party sources suggest around 9,000 organizations still use the OS, which is generally deployed in critical applications powering high-value industries. IBM said AIX versions 7.2 and 7.3 are both vulnerable and should be updated immediately. (The Register)

 

An Apache Tomcat vulnerability is under active exploitation  

A critical remote code execution (RCE) vulnerability in Apache Tomcat, tracked as CVE-2025-24813, is being actively exploited. The flaw, disclosed on March 10, 2025, allows attackers to gain control of servers via a simple PUT request. Exploits appeared on GitHub just 30 hours after disclosure. Attackers upload base64-encoded payloads via a PUT request, then trigger execution with a GET request using a JSESSIONID cookie. Security tools struggle to detect this due to encoded payloads and multi-step execution. Apache urges immediate updates to Tomcat 11.0.3+, 10.1.35+, or 9.0.99+. Meanwhile, organizations should disable partial PUT support and restrict sensitive file storage. (Cyber Security News)

 

Google acquires cybersecurity firm Wiz for $32 billion  

Alphabet’s Google Cloud has acquired cloud-based cybersecurity firm Wiz for $32 billion. Wiz was founded in Israel and was valued at $16 billion in 2024 while preparing for an IPO. This more than doubles Alphabet’s acquisition of Motorola Mobility for $12.5 billion in 2012. The Financial Times’ sources say that Wiz and Alphabet have agreed to a $3.2B termination fee, which lets Wiz run like an independent company, if the deal falls through or is significantly delayed. (The Verge)

 

Google doesn’t deny receiving a secret legal order from the UK government  

Google has refused to deny receiving a secret legal order from the UK government, raising concerns among U.S. lawmakers. A bipartisan group in Congress fears that British authorities may be demanding access to encrypted messages from U.S. tech companies. This follows reports that Apple received a similar order, known as a Technical Capability Notice (TCN), which it is reportedly contesting in a closed court hearing. Lawmakers criticized the secrecy surrounding these orders, arguing it hinders congressional oversight and threatens Americans’ privacy. Under the UK’s Investigatory Powers Act, companies that receive a TCN are barred from confirming it. Experts, including from Britain’s intelligence community, have called for more transparency, with academics warning that the government’s refusal to clarify the situation is unsustainable and unjustifiable. (The Record)

 

The White House is urging federal agencies not to lay off cybersecurity teams  

The White House is urging federal agencies not to lay off cybersecurity teams as they submit budget cut plans. U.S. federal CIO Greg Barbaccia emphasized in an email that cybersecurity is national security and should be protected. The warning comes amid concerns that deep budget cuts mandated by President Trump and adviser Elon Musk could weaken national cyber defenses. Former NSA cybersecurity director Rob Joyce warned that mass layoffs would be “devastating.” The Musk-led Department of Government Efficiency (DOGE) has also drawn criticism for granting unusually broad access to sensitive government data. At the Social Security Administration, officials raised alarms about the security risks posed by DOGE. Meanwhile, the Department of Homeland Security’s CISA has already lost over 130 positions as of mid-February.

Elon Musk reportedly visited the NSA on Wednesday, meeting with leadership to discuss staff cuts and operations. The NSA, a key player in U.S. cybersecurity and home to Cyber Command, is under Musk’s scrutiny as he pushes for government downsizing. His visit signals potential changes to intelligence and cyber operations. While Musk recently called for an NSA overhaul, he hasn’t detailed specific reforms. Intelligence officials are bracing for swift changes that could impact national cybersecurity. (Reuters)

 

Denmark warns of Europe telecom threat  

The cybersecurity agency of Denmark made this warning in a threat assessment published last Thursday warning of “an increase in state-sponsored cyber espionage activities targeting the telecommunications sector in Europe.” Although no direct mention of Salt Typhoon’s activities in the U.S. was made in the statement, nor has there been any confirmation of Salt Typhoon activity in Europe, the Danish agency stated “there have been several attempts at cyber espionage against the European telecommunications sector in the past few years,” and it worries that European governments may “lack the political incentives to make a public attribution even if China is identified as responsible.” (The Record)

 

Micronesian island suffers cyberattack  

To show that nowhere on earth is safe from cybercrime, the tiny island nation of Yap has suffered a ransomware attack, forcing the shutdown of all computers in its government health agency. Yap is one of the four states of the Federated States of Micronesia (FSM) and is located in the middle of the Pacific Ocean equidistant between the Philippines and Guam. Health officials from the island announced the attack, which occurred on March 11, on Facebook, stating that health services are still continuing, but are slower due to systems having been taken offline. (Security Affairs)

 

Have questions? Reach out to RedSeal today to chat with one of our cybersecurity experts or schedule a demo today.

The Secret to Cyber Resilience: Accurate Asset Inventory (…and RedSeal)

Cyber resilience is like home security. You wouldn’t leave your front door unlocked and assume everything inside is safe—so why do the digital equivalent with your network? The key to securing an organization isn’t just having firewalls and detection tools; it starts with knowing exactly what’s on your network. If you don’t know what you have, how can you protect it?

 

The importance of accurate asset inventory

Picture this: You’re running late for a flight, but you can’t find your keys. Why? Because you didn’t put them where they belong. IT security works the same way. If you don’t know where your critical assets are—or worse, if you don’t even know they exist—you can’t secure them.

An accurate asset inventory gives organizations a clear picture of their environment. It catalogs every device, application, and data repository, making sure there are no surprises. Yet, many security teams think they have full visibility—until they deploy a tool that scans their network and suddenly, it’s like finding a hidden basement in their house. That’s not a good feeling.

 

Why asset visibility boosts cyber resilience

Cyber resilience isn’t just about stopping attacks; it’s about bouncing back from them quickly. To do that, organizations need a real-time understanding of their network. A comprehensive asset inventory helps:

  • Identify vulnerabilities – If you don’t know an asset exists, you definitely aren’t patching it.
  • Manage risks – Not all assets are equal. Losing a coffee machine connected to WI-FI is one thing; losing a customer database is another.
  • Ensure compliance – Many security frameworks require an up-to-date inventory. Regulators don’t take “we didn’t know we had that server” as an excuse.

 

The struggle is real: Challenges in asset inventory

  • Everything is changing – Cloud services, mobile devices, and IoT keep popping up like weeds in a garden. You can’t avoid the change, but you can master it. Automatic device discovery and the detection of stale devices and credentials go a long way to calm the chaos.
  • Shadow IT is everywhere. Employees love setting up “temporary” servers or apps without telling IT. Spoiler: Those never stay temporary. Again, discovery to the rescue. The right tools will let you keep track of all the devices connected to your network, removing yet more blind spots, and who wants those?
  • Manual tracking is a nightmare – If you’re relying on spreadsheets, you’re already losing. Networks evolve too fast for manual updates. Nope, manual tracking never works; you need it to be automated and continuous, or you’ll never wake up from the nightmare.

 

How to keep track of everything without losing your mind

There’s hope. Organizations can keep their asset inventory in check by:

  1. Automating discovery – Use tools that continuously scan and update inventories. If you’re still doing this manually, you might as well be writing your network map on a napkin.
  2. Integrating asset data – A single source of truth across cloud and on-prem environments makes life easier.
  3. Auditing regularly – If you haven’t checked your asset inventory in six months, chances are, it’s outdated.
  4. Training staff – A little awareness goes a long way. The fewer rogue devices on your network, the better.

 

Incident response: When asset inventory saves the day

If a cyber incident hits, an up-to-date asset inventory helps security teams pinpoint affected systems fast. It’s the difference between putting out a small kitchen fire and watching your whole house burn down because you didn’t know where the extinguisher was. Knowing asset relationships also helps predict how an attack might spread, making mitigation more effective.

 

Final thoughts

Achieving cyber resilience isn’t about having the fanciest security tools—it’s about knowing what you have and where it is. Accurate asset inventory is the backbone of security. With the right tools, processes, and a little vigilance, organizations can avoid nasty surprises and stay ahead of cyber threats. RedSeal is meticulous about documenting your network assets to keep your network inventory squeaky clean. Contact us today to find out what you can do to keep your (proverbial) house in order. And maybe, just maybe, you won’t have to feel like you just discovered that hidden basement.

 

Cyber News Roundup for March 14, 2025

The growing speed of cybercriminal attacks is moving faster than ever. In this week’s roundup, we cover critical cybersecurity updates, including vulnerabilities in the popular ESP32 Bluetooth chip and a new House bill requiring federal contractors to implement vulnerability disclosure policies. Plus, we discuss the cyberattack impacting X, a breach in the U.S. electric grid by Chinese hackers, and the latest zero-day vulnerabilities. Stay informed with these important cybersecurity developments.

 

Undocumented commands found in Bluetooth chip used by a popular Wi-Fi and Bluetooth devices  

As described in BleepingComputer, “the ubiquitous ESP32 microchip made by Chinese manufacturer Espressif and used by over 1 billion units as of 2023, contains undocumented commands that could be leveraged for attacks. The undocumented commands allow spoofing of trusted devices, unauthorized data access, pivoting to other devices on the network, and potentially establishing long-term persistence.” Researchers from Tarlogic Security, speaking at RootedCON in Madrid point out that ESP32 is “one of the world’s most widely used chips for Wi-Fi + Bluetooth connectivity in IoT (Internet of Things) devices, so the risk is significant.”  (BleepingComputer)

 

House bill requires federal contractors to implement vulnerability disclosure policies  

The bill is named the Federal Contractor Cybersecurity Vulnerability Reduction Act of 2025 and it “instructs the Office of Management and Budget (OMB) to consult with CISA, the Office of the National Cyber Director, NIST, and other relevant departments, and require federal contractors to have a VDP that is consistent with NIST guidelines.” The same is required of the Defense Department. A letter signed by representatives of proponents of the bill including HackerOne, Bugcrowd, Microsoft, Infoblox, Rapid7, Trend Micro, Tenable, and Schneider Electric, state that “contractors, given the vast amount of sensitive data they handle, are prime targets for cyber threats. As a result, the bill ensures all companies contracting with the federal government adhere to security best practices.” (Security Week)

 

Cybercriminals sped up their attacks last year  

Two security companies, CrowdStrike and ReliaQuest, are reporting separately that “in the past year ransomware groups achieved lateral movement within an average of 48 minutes after gaining initial access to targeted environments,” with the fastest breakout time recorded being 51 seconds. This is an improvement – for the threat actors – from 2023 when the average breakout time for interactive cybercrime intrusions was 62 minutes. Adam Meyers, senior vice president of counter adversary operations at CrowdStrike, in making his company’s announcement, added, “not only are these adversaries using different techniques, different capabilities, they’re doing it faster, and they’re iterating faster than many of the enterprises that they’re targeting.” (Cyberscoop)

 

Cyber attack allegedly behind X outages  

Elon Musk blamed a “massive cyberattack” on multiple X outages on Monday, while hacking group Dark Storm Team claimed responsibility. According to Downdetector, reports of outages spiked throughout the morning, with peaks at 6 a.m., 10 a.m., and 11:30 a.m. ET, impacting tens of thousands of users. Newsweek and other outlets report that Dark Storm Team, a pro-Palestinian hacking group known for targeting NATO countries and Israel, took credit for the attack via Telegram. While Musk suggested a large, coordinated group or nation-state may be involved, X is still dealing with intermittent issues as of this recording. (ZDNet)

 

CISA warns of critical Ivanti and VeraCode vulnerabilities  

The US Cybersecurity and Infrastructure Security Agency (CISA) has added three critical Ivanti Endpoint Management vulnerabilities (CVE-2024-13159, CVE-2024-13160, CVE-2024-13161) to its Known Exploited Vulnerabilities (KEV) catalog. These path traversal flaws (CVSS 9.8) allow unauthenticated attackers to leak sensitive information remotely. CISA also flagged two VeraCode vulnerabilities, including CVE-2024-57968 (CVSS 9.9), an unrestricted file upload flaw, and CVE-2025-25181, an SQL injection vulnerability. The agency urges all organizations to immediately patch these issues to prevent cyberattacks. Ivanti software has faced multiple exploitations in 2025, with previous Connect Secure and Cloud Service Appliance vulnerabilities actively targeted by threat actors. (Infosecurity Magazine)

 

Researchers report increased activity from the SideWinder APT group  

Researchers at Securelist report increased activity from the SideWinder APT group in 2024, with enhanced malware, expanded targets, and global reach. Traditionally focused on military and government entities, the group now targets maritime, logistics, and nuclear sectors across South Asia, Southeast Asia, the Middle East, and Africa. Using spear-phishing emails, SideWinder exploits the CVE-2017-11882 vulnerability to deploy StealerBot, a post-exploitation toolkit. Their malware, disguised as legitimate DLL files, includes advanced evasion techniques like Control Flow Flattening. SideWinder rapidly adapts, modifying malware within five hours of detection. Their continued reliance on old vulnerabilities underscores the importance of patching outdated systems to defend against sophisticated threats targeting critical infrastructure worldwide. (Cyber Security News)

 

Ballista Botnet hits TP-Link devices  

A new report from the Cato CTRL team details how threat actors exploit a high-severity command injected vulnerability to execute code on TP-Link Archer AX-21 routers to deploy the botnet ultimately. This flaw isn’t new, the first evidence of exploitation dates back to April 2023. The researchers saw the Ballista campaign using the flaw in January 2025. The attackers use a shell script to execute a malware binary across various system architectures, which opens the door to remote code execution or a denial of service. The researchers noted the malware can erase itself once execution begins, covering its tracks while spreading to other routers. Newer Ballista variants use TOR network domains rather than hardcoded IP addresses, indicating its under active development. Research by Censys found that Ballista infected over 6,000 devices across Brazil, Poland, the United Kingdom, Bulgaria, and Turkey. (The Hacker News)

 

Apple issues emergency updates for a zero-day WebKit vulnerability  

Apple has issued emergency security updates to patch CVE-2025-24201, a zero-day WebKit vulnerability actively exploited in targeted attacks. The flaw, an out-of-bounds write issue, allows malicious web content to escape the Web Content sandbox, potentially enabling unauthorized actions. The update affects iOS, iPadOS, macOS, Safari, visionOS, and tvOS. Apple warns that the vulnerability was used in sophisticated attacks on older iOS versions. This is Apple’s third zero-day fix in 2025, following similar patches in January and February. Users should update immediately to mitigate risks, as Apple has not disclosed attacker details or targets. (Cyber Security News)

 

Microsoft Patches 57 Security Flaws, Including 6 Actively Exploited Zero-Days 

Microsoft released patches for 57 security flaws, including 6 actively exploited zero-days affecting Windows Kernel, NTFS, FAT File System, and Microsoft Management Console. Exploits involve use-after-free, integer overflow, and heap-based buffer overflow, with PipeMagic malware used in targeted attacks. Threat actors can chain vulnerabilities to execute remote code via malicious VHD files. The U.S. Cybersecurity and Infrastructure Security Agency – or CISA – has ordered federal agencies to apply fixes by April 1, 2025. (The Hacker News)

 

China’s Volt Typhoon Hackers Dwelled in US Electric Grid for 300 Days  

Security firm Dragos published a case study revealing that the Chinese hacker group Volt Typhoon infiltrated the U.S. electric grid through a breach at Littleton Electric Light and Water Departments (LELWD) in Massachusetts. The hackers had access to the utility’s network for over 300 days, collecting sensitive operational technology (OT) data, including information on energy grid operations. This data could be used for future targeted attacks. Volt Typhoon, linked to the Chinese government, has been previously associated with espionage and attacks on U.S. critical infrastructure. (Security Week)

 

In Memoriam: Mark Klein, AT&T Whistleblower Who Revealed NSA Mass Spying  

Mark Klein, the former AT&T technician who exposed a secret NSA surveillance program, has died. Klein revealed that the NSA had installed a secret room at AT&T’s San Francisco office, where internet data was copied and routed to the government. In 2006, he brought over 100 pages of evidence to the Electronic Frontier Foundation, which led to lawsuits against the NSA and increased public awareness of mass surveillance. Despite threats from AT&T, Klein stood by his claims, inspiring reforms and greater scrutiny of government spying. (EFF)

 

A UK hospital finds thousands of unwelcome guests on their network  

Our device inventory desk tells us that the Princess Alexandra Hospital in the UK) recently discovered that PlayStations, coffee machines, and even passing electric cars were connecting to its network. Deputy director of ICT Jeffery Wood admitted, “Our attack surface was much bigger than we thought,” after finding 5,000–10,000 unknown devices lurking in their system. This alarming revelation came during a trial of a cyber exposure platform, part of a broader tech modernization effort.

With no dedicated cybersecurity team, the hospital’s infrastructure staff handles security, integrating automated tools, XDR, and AI-driven protections. Network segmentation has even freed the marketing team to use Apple devices—previously banned. However, zero-trust security remains a distant dream. Deputy Director Wood says the hospital is embracing a “one NHS” partnership model rather than siloed vendor relationships, but warns: “This isn’t just cyber risk. This is risk. Attacks could harm our patients.”

Nothing like a cybersecurity audit to find out your MRI machine shares a network with someone’s PS5. (Computing)

 

Medusa ransomware continues to attack infrastructure  

In a joint alert released March 12, CISA, the FBI, and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are warning that as of February of this year, “Medusa developers and affiliates have impacted over 300 victims from a variety of critical infrastructure sectors with affected industries including medical, education, legal, insurance, technology, and manufacturing.” The group, which is unrelated to MedusaLocker, engages in double extortion, and use phishing and unpatched vulnerabilities for initial access. The group’s practices include “disabling security software, terminating processes related to backups, security, data sharing, and communication, and erasing shadow copies to prevent file recovery.” A link to the alert is available in the show notes to this episode. (Security Week and CISA)

 

DoJ seeks to break up Google  

As posted in The Cyberwire, “on Friday, the Department of Justice (DOJ) submitted a request that would aim to break up Google by forcing the company to sell Chrome. In its filing, the DOJ stated that Google’s illegal conduct has created an economic goliath, one that wreaks havoc over the marketplace to ensure that no matter what occurs, Google always wins.” These filings follow a 2023 antitrust case in which “Google was found guilty of monopolistic practices regarding the company’s search engine services,” as well as a second antitrust lawsuit from 2024 that is “examining whether the company has also engaged in monopolistic behaviors related to its advertising business.” The ruling, expected this summer, “has the potential to significantly impact how Google operates, how users interact with its services, and the overall landscape of the search engine business.” (The Cyberwire)

 

Chinese spy group exploits Juniper Networks routers  

Researchers at Mandiant are warning of a state-backed espionage group operating out of China, UNC3886, targeting routers made by Juniper Networks. This is a group we reported on in June 2023, when they were exploiting a VMware ESXi zero-day. In this latest report Mandiant says the group was involved in a project to deploy custom backdoors on Junos OS routers and that the group’s focus is “mainly on defense, technology, and telecommunication organizations located in the U.S. and Asia.” They pointed out that the affected routers were running end-of-life hardware and software, but also that the malware deployed on the Juniper routers “demonstrates that UNC3886 has in-depth knowledge of advanced system internals.” (The Record

 

Have questions? Reach out to RedSeal today to chat with one of our cybersecurity experts or schedule a demo today.

Cyber News Roundup for March 6, 2025

In this week’s roundup, gain insight into critical developments in cybersecurity. We’ve got highlights from sectors lagging in NIS2 compliance and the urgent need for improvement. Explore how hackers are exploiting legal loopholes to avoid detection, making it harder for law enforcement to tackle cybercrime. We also cover the latest on state-sponsored cyberattacks, including charges against Chinese hackers and evolving tactics by Silk Typhoon. Stay informed with expert insights to stay ahead of these rapidly emerging threats. Let’s dive in.

 

Six Critical Infrastructure Sectors Failing on NIS2 Compliance  

A recent report from Enisa, published on March 6, 2025, highlights that six critical infrastructure sectors—health, gas, and digital infrastructure among them—are lagging in compliance with the EU’s NIS2 directive. The health sector struggles with complex supply chains, legacy systems, and insecure medical devices, while the gas sector needs better incident readiness. Digital infrastructure, including internet exchanges and cloud services, is notably immature in its cybersecurity practices. Enisa is collaborating with EU Member States to provide guidance and improve sector maturity to meet these essential security standards. (Infosecurity)

 

Differing names for hackers hinders law enforcement, says security agent  

According to an article in Cyberscoop, an investigator, who cannot be named, stated, during a speech that cannot be identified, that malicious hackers take full advantage of the lack of standardized names for their operations, since the justice system was set up long ago and is not built for the sophistication of international criminal cyber gangs. One particular problem involves the fact that the groups make use of the Public Access to Court Electronic Records (PACER) system. They use it to study affidavits and learn how investigations are opened and conducted. In addition, the agent added, “there are disincentives for law enforcement agencies and agents from different districts to work together. “Everyone wants to get theirs, … everyone wants their stats, because that’s what they’re judged on.” (Cyberscoop)

 

U.S. charges Chinese infrastructure hackers  

As quoted in BleepingComputer, “the U.S. Justice Department has charged Chinese state security officers along with APT27 and i-Soon hackers for network breaches and cyberattacks that have targeted victims globally since 2011. The victims include “U.S. federal and state government agencies, foreign ministries of multiple governments in Asia, U.S.-based dissidents, as well as a prominent religious organization in the United States.” i-Soon also goes by the name Anxun Information Technology. (BleepingComputer)

 

Silk Typhoon evolves to exploit common IT solutions  

The Chinese espionage group Silk Typhoon, also known as Hafnium, has been identified by security researchers at Microsoft Threat Intelligence, to be “increasingly exploiting common IT solutions, such as remote management tools and cloud applications, to gain initial access.” Silk Typhoon is one of the best-resourced and technically adept state-sponsored threat actors, targeting IT services, healthcare, government agencies and higher education institutions, globally. Recent activity by the group includes “abusing stolen API keys and credentials from privilege access management (PAM) systems, cloud application providers, and cloud data management companies.” These activities allow the group to “infiltrate downstream customer environments, conduct reconnaissance and exfiltrate data related to U.S. government policy, legal processes and other areas of strategic interest. Microsoft says the group also uses password spray attacks, scanning public repositories like GitHub for leaked corporate passwords. (InfoSecurity Magazine)

 

Google patches 43 Bugs, including two   

sneaky zero-daysIn March 2025, Google released security updates addressing 43 vulnerabilities in Android, notably two zero-days actively exploited in targeted attacks. One, identified as CVE-2024-50302, is a high-severity information disclosure flaw in the Linux kernel’s Human Interface Device driver. This vulnerability was reportedly leveraged by Serbian authorities using an exploit chain developed by Israeli firm Cellebrite to unlock confiscated devices. The exploit chain also included a USB Video Class zero-day (CVE-2024-53104) and an ALSA USB-sound driver zero-day, discovered by Amnesty International’s Security Lab in mid-2024. Google had previously provided fixes for these vulnerabilities to OEM partners in January. (Google)

 

CISA flags vulnerabilities exploited in the wild  

The Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) catalog to include several critical security flaws, underscoring the importance of timely remediation to protect organizational networks.

The newly added vulnerabilities are:​

  • CVE-2024-4885: A critical path traversal vulnerability in Progress WhatsUp Gold, which could allow unauthenticated remote code execution.​
  • CVE-2023-20118: A medium-severity command injection vulnerability in Cisco Small Business RV Series Routers, enabling arbitrary command execution or authentication bypass. Notably, Cisco has stated it will not release a fix for this issue.​
  • CVE-2022-43769 and CVE-2022-43939: A pair of vulns, both affecting Hitachi Vantara Pentaho BA Server, which involve special element injection and authorization bypass.
  • CVE-2018-8639: And an improper resource shutdown or release flaw in Microsoft Windows Win32k, which could be exploited to execute arbitrary code.

Federal agencies are mandated to address these vulnerabilities by March 24, 2025. CISA strongly recommends that all organizations, regardless of sector, prioritize the remediation of these vulnerabilities to mitigate potential exploitation risks. And, we have the CVEs for all these vulnerabilities in our selected reading for you should you need them. (SC Media)

 

3 VMware Zero-Day bugs allow sandbox escape  

Broadcom is telling VMware customers to patch three actively exploited zero-day vulnerabilities affecting ESXi, Workstation, and Fusion. These flaws allow attackers with admin access to escape virtual machines and compromise the underlying host, which can lead to data exfiltration, malware deployment, and service disruption. CISA has added the vulnerabilities to its exploited list, requiring federal agencies to patch by March 25th. (Dark Reading)

 

Meet Rayhunter: a new open-source tool from EFF to detect cellular spying  

The EFF launched an open-source tool called Rayhunter, designed to detect cell-site simulators… or devices that mimic cell towers to track phones and potentially intercept data. Rayhunter runs on a $20 Orbic mobile hotspot and monitors control traffic to identify suspicious activity, like forced downgrades to vulnerable 2G networks. Users get alerts for anomalies and can review logs. EFF expects Rayhunter to help build defenses against CSS and inform legal efforts to regulate their use. (EFF)

 

Cyber Command ordered to halt offensive operations against Russia during Ukraine negotiations   

The Record reports that US Defense Secretary Pete Hegseth has ordered Cyber Command to halt offensive cyber operations against Russia. The full scope of the directive is unclear, but it doesn’t include the NSA or its signals intelligence operations targeting Russia. The Washington Post cites a current US official familiar with the order as saying the pause is meant to last only as long as negotiations over the war in Ukraine continue. The Post says the operations being halted “could include exposing or disabling malware found in Russian networks before it can be used against the United States, blocking Russian hackers from servers that they may be preparing to use for their own offensive operations, or disrupting a site promoting anti-U.S. propaganda.”

The New York Times observes that “Former officials said it was common for civilian leaders to order pauses in military operations during sensitive diplomatic negotiations, to avoid derailing them. Still, for President Trump and Mr. Hegseth, the retreat from offensive cyberoperations against Russian targets represents a huge gamble. It essentially counts on Mr. Putin to reciprocate by letting up on what many call the ‘shadow war’ underway against the United States and its traditional allies in Europe.”

The Pentagon declined to comment on the report. A senior Defense official told the Record, “Due to operational security concerns, we do not comment nor discuss cyber intelligence, plans, or operations. There is no greater priority to Secretary Hegseth than the safety of the Warfighter in all operations, to include the cyber domain.” (The Record)

 

CISA denies claims of deprioritizing Russian threats  

CISA is pushing back against reports that it has been directed to stop tracking Russian cyber threats, calling the claims “fake” and a risk to national security. This is an update to a story that first appeared over the weekend, in which The Guardian reported that a memo deprioritizing Russia was issued—an allegation that CISA and DHS officials deny, with one calling the report “garbage.” Meanwhile, The Record, The New York Times, and The Washington Post confirm that U.S. Cyber Command has been ordered to pause offensive cyber operations against Russia while negotiations over the war in Ukraine continue. Lawmakers on both sides are criticizing any shift, warning that it could weaken U.S. defenses against Russian cyber threats. (The Record)(Bleeping Computer)(CyberScoop)

 

Latin America’s escalating cybersecurity crisis  

Cyber threats in Latin America are growing faster than anywhere else, with attacks surging 53% year-over-year and organizations facing nearly 40% more weekly incidents than the global average. Experts point to political instability, lagging cybersecurity adoption, and the rapid rise of financial tech. Some of the most impacted industries include healthcare, communications, and governments with an average of 3,000-4,000 attacks per week. These attacks are particularly affecting Brazil, where cybercriminals exploit inexperienced users and even collaborate with cartels. (Dark Reading)

 

CISA flags Cisco and Windows flaws  

U.S. federal agencies have until the end of the month to address flaws in Cisco and Windows systems. CISA reports these flaws, CVE-2023-20118 and CVE-2018-8639, allow attackers to execute arbitrary commands and gain elevated privileges on vulnerable devices, with exploitation currently underway. While the agency has noted these flaws being actively exploited, it has not provided any specific details surrounding the malicious activity or who may be responsible. You can learn more about these specific flaws in the show notes of today’s episode. (Bleeping Computer)

 

Multiple local governments experience cyberattacks  

New year, same problem. Several local government agencies are grappling with cyberattacks that have disrupted services, including Anne Arundel County, Maryland, which has been dealing with limited services for over a week. While major services like 911 remain operational, county officials are still investigating the incident and cannot confirm if it’s a ransomware attack. The trend continues across multiple states, with other local agencies, including the Cleveland Municipal Court and Missouri’s Department of Conservation, also affected by ongoing attacks. At this time, most of the government agencies have not provided any additional information other than they are investigating the incident. (The Record)

 

Malware abuses Microsoft dev tunnels for C2 communication  

In a new twist, cybercriminals are exploiting Microsoft’s dev tunnels service to send data back and forth from malware-infected devices. This service, designed for developers to test apps and collaborate securely, is now being abused to help malware avoid detection. Recently, researchers found two versions of Njrat malware using Microsoft’s dev tunnels to connect to command-and-control servers. The malware communicates through hidden URLs, making it harder for traditional security systems to spot. The malware checks in with its remote servers, reporting its status, and can even spread through USB devices. Experts say that organizations not using dev tunnels should keep an eye on DNS logs for any unusual dev tunnel URLs as a way to spot potential attacks early. (SANS)

 

JavaGhost uses compromised AWS environments to launch phishing campaigns  

Palo Alto Networks’ Unit 42 warns that the JavaGhost threat actor is compromising misconfigured AWS environments and using them to launch phishing campaigns. The group gains entry to the AWS environments via exposed long-term access keys. Once they’ve gained access, the attackers use the victim’s Amazon Simple Email Service (SES) and WorkMail services to send out phishing emails. Since the emails are sent from a legitimate source, they’re more likely to bypass security filters. To defend against these attacks, Unit 42 recommends that AWS users limit access to administrative rights, rotate IAM credentials regularly, use short term/just-in-time access tokens, and enable multi-factor authentication. (PaloAlto)

 

Philippine army suffers cyberattack  

The Philippine Army confirmed a cyberattack after a local hacking group claimed to have breached its systems and accessed confidential documents. Army spokesperson Col. Louie Dema-ala described it as an “illegal access attempt” that was swiftly contained, with no detected data theft or damage. However, digital security group Deep Web Konek reported that hacker group Exodus Security claimed responsibility, alleging it had compromised 10,000 records of active and retired service members. The leaked data reportedly includes personal, military, and financial details, though its authenticity and exact volume remain unverified. Authorities continue to investigate the breach. (The Record)

 

Have questions? Reach out to RedSeal today to chat with one of our cybersecurity experts or schedule a demo today.