Blog Archives - RedSeal

Effective Vulnerability Prioritization: A Strategic Approach for Cybersecurity

Today, organizations are inundated with a continuous stream of vulnerabilities and effectively prioritizing them  is crucial to safeguarding critical assets and maintaining operational resilience. Organizations can focus their remediation efforts on the most significant threats by adopting a strategic approach to vulnerability prioritization, optimizing resource utilization, and enhancing their security posture.

Understanding vulnerability prioritization

Vulnerability prioritization involves assessing identified security weaknesses and ranking them based on factors such as potential impact, exploitability, and relevance to the organization’s environment. This process enables security teams to address the most pressing vulnerabilities first, thereby reducing the risk of exploitation and potential breaches. Traditional methods, like the Common Vulnerability Scoring System (CVSS), often rely solely on severity scores. While CVSS provides a standardized measure of severity, it doesn’t always account for the contextual nuances of each organization. Integrating additional factors, such as asset criticality and current threat intelligence, offers a more comprehensive risk assessment.

Modern approaches to vulnerability prioritization

Advancements in vulnerability management have led to the development of methodologies that incorporate predictive insights and stakeholder-specific considerations:

  • Exploit Prediction Scoring System (EPSS): This system evaluates the likelihood of a vulnerability being exploited in the wild, allowing organizations to focus on vulnerabilities with a higher probability of exploitation.
  • Stakeholder-Specific Vulnerability Categorization (SSVC): Developed by the Cybersecurity and Infrastructure Security Agency (CISA), SSVC assists organizations in prioritizing vulnerabilities based on exploitation status, potential safety impacts, and the prevalence of the affected product within their systems.

Best practices for effective vulnerability prioritization

To enhance vulnerability prioritization efforts, organizations should consider the following strategies:

  1. Asset inventory and classification: Maintain a comprehensive inventory of all assets and classify them based on their criticality to business operations. Understanding which assets are most vital helps in assessing the potential impact of vulnerabilities.
  2. Incorporate threat intelligence: Use up-to-date threat intelligence to understand the current threat landscape. This information aids in evaluating vulnerabilities’ exploitability and aligning remediation efforts with real-world threats.
  3. Continuous monitoring and assessment: Implement continuous monitoring to detect new vulnerabilities promptly and reassess the prioritization as the threat environment evolves.
  4. Cross-departmental collaboration: Engage stakeholders from various departments to understand the business context and potential impact of vulnerabilities, ensuring that prioritization aligns with organizational objectives.

Leveraging RedSeal for enhanced vulnerability prioritization

RedSeal’s platform offers comprehensive network visualization and risk-scoring capabilities that can significantly enhance an organization’s vulnerability prioritization process. By providing detailed insights into network architecture and highlighting critical assets, RedSeal enables security teams to:

  • Visualize network exposure: Understand how vulnerabilities could be exploited within the network context, identifying potential attack paths to high-value assets.
  • Assess impact and reachability: Determine the potential impact of vulnerabilities by analyzing their reachability to critical systems, allowing for informed prioritization decisions.
  • Integrate with existing tools: Seamlessly incorporate data from various security tools to provide a unified view of vulnerabilities, enhancing the accuracy of risk assessments.

By integrating RedSeal’s capabilities into their vulnerability management strategy, organizations can move beyond traditional severity-based approaches, focusing remediation efforts where they are needed most and strengthening their overall security posture.

Effective vulnerability prioritization is a cornerstone of proactive cybersecurity management. By adopting modern methodologies, leveraging advanced tools like RedSeal, and adhering to best practices, organizations can systematically address the most critical vulnerabilities, optimize resource allocation, and enhance their resilience against cyber threats.

 

Cyber News Roundup for April 18, 2025

In this week’s roundup, we highlight some critical cybersecurity developments. The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning about multiple Apple 0-day vulnerabilities being actively exploited in the wild. Meanwhile, researchers have uncovered the real IP address behind the Medusa Ransomware Group, offering an unprecedented look into their infrastructure. Additionally, Mustang Panda, the Chinese espionage-focused APT, continues to evolve its tactics, with new tools and backdoors being deployed in targeted attacks.

Stay tuned as we break down the latest insights and what they mean for your security posture.

 

CISA Warns of Multiple Apple 0-day Vulnerabilities Actively Exploited in Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent advisory concerning two actively exploited zero-day vulnerabilities affecting Apple devices, including iPhones, iPads, and Macs . The first vulnerability, CVE-2025-31200, is a memory corruption flaw in the CoreAudio framework that can be triggered by processing maliciously crafted audio files, potentially allowing attackers to execute arbitrary code on the device. The second, CVE-2025-31201, involves a flaw that permits arbitrary read and write operations on system memory, effectively bypassing Apple’s Pointer Authentication security mechanism. These vulnerabilities pose significant risks, enabling attackers to gain unauthorized access and control over affected devices. CISA recommends that users apply the latest security updates provided by Apple promptly and, if necessary, consider temporarily discontinuing the use of affected products until patches are available. (Cyber Security News)

 

Researchers unmask IP addresses behind the Medusa Ransomware Group

Researchers have unmasked the real IP address behind the Medusa Ransomware Group, a notorious operation long hidden on the Tor network. Covsec security experts exploited a severe vulnerability in Medusa’s blog platform, used to post stolen data, bypassing Tor’s anonymity protections. Using a server-side request forgery (SSRF) attack, they ran a simple command that revealed the server’s public IP: 95.143.191.148. Hosted via SELECTEL in Russia, the server runs Ubuntu and exposes insecure services including open SSH with password login. Medusa Locker, active since 2019, has targeted healthcare, education, and manufacturing sectors with double-extortion tactics. This rare technical breakthrough into a Tor-hidden ransomware group offers unprecedented visibility into its infrastructure, demonstrating how poor server security can undermine even the most elusive cybercriminal operations. (Cyber Security News)

 

SonicWall warns of old vulnerability now actively exploited

This warning refers to a security advisory for an SMA 100 series vulnerability that was patched in 2021. It is described as an authenticated arbitrary command execution vulnerability. According to Security Week, “when the patches were announced in September 2021, the vulnerability went largely unnoticed, likely because it was assigned a ‘medium severity’ rating (CVSS of 5.5) and due to its exploitation requiring authentication.” It now turns out that the flaw has been exploited in the wild, forcing Sonic Wall to assign a new CVSS score of 7.2, making it ‘high severity’. (Security Week)

 

Mustang Panda sallies forth

According to a report from Zscaler, the Chinese espionage-focused APT has used an updated backdoor and several new tools in a recent attack. Already proficient in using Windows zero-days, Zscaler says, “the APT is relying on DLL sideloading to execute its malicious payloads and evade detection, deploying all tools as libraries within archives that also contain a vulnerable executable to load them.” The group is “known for targeting government and military entities, as well as NGOs and minority groups, mainly in East Asia, but also in Europe.” (Security Week)

 

MITRE gets last-minute bailout from CISA  

The CVE program, short for Common Vulnerabilities and Exposures, is a publicly available list of known cybersecurity vulnerabilities. Each vulnerability gets a unique ID (like CVE-2025-12345) that helps security professionals, software vendors, and researchers talk about the same issue using the same name—kind of like a universal language for bugs.

Managed by MITRE Corporation and funded by the U.S. government, the program plays a critical role in threat intelligence, patch management, and security automation. It’s the backbone for many tools and databases, including the National Vulnerability Database (NVD), and it helps defenders prioritize which issues to fix first. Think of it as the Dewey Decimal System of cybersecurity flaws.

In a critical development for global cybersecurity, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has extended funding for the Common Vulnerabilities and Exposures (CVE) program, reportedly for eleven months, preventing an imminent lapse in this essential service.

The funding extension comes just hours before the program’s contract was set to expire. MITRE had warned that a break in service could lead to significant disruptions, including the deterioration of national vulnerability databases, challenges for tool vendors, and impediments to incident response operations.

Amid these developments, a group of CVE Board members announced the formation of the CVE Foundation, a non-profit organization aimed at ensuring the long-term stability and independence of the CVE program. The Foundation seeks to mitigate the risks associated with reliance on a single government sponsor by establishing a dedicated entity focused on maintaining the integrity and availability of CVE data for defenders worldwide.

Concurrently, MITRE Corporation is facing significant organizational changes, announcing plans to lay off 442 employees at its McLean, Virginia location by June 3, 2025. These layoffs are attributed to the cancellation of contracts by the Department of Energy, reflecting broader challenges in the federal contracting landscape.

The swift action by CISA to extend funding underscores the critical importance of the CVE program in maintaining national and global cybersecurity infrastructure. The establishment of the CVE Foundation represents a proactive step toward ensuring the program’s resilience and independence in the face of funding uncertainties. (Bleeping Computer and The Verge)

 

Texas votes to spin up their very own Cyber Command  

The Trump administration has voiced its intentions to shift responsibilities from the federal government to the states. The Texas House has passed legislation to create a new state cybersecurity agency, the Texas Cyber Command, aimed at defending against growing cyber threats. Backed by $135 million over two years, the command would operate through the University of Texas System, based at UT San Antonio. It will focus on cyber threat response, forensics, and training, while centralizing efforts previously handled by the Department of Information Resources. Governor Abbott has called the bill an emergency priority amid rising cyberattacks on Texas infrastructure. (Texarkana Gazette)

 

Krebs exits SentinelOne after security clearance pulled  

Following up on a story we brought to you Friday on Cyber Security Headlines, Chris Krebs has resigned as SentineOne’s Chief Intelligence and Public Policy Officer, effective immediately. This follows a presidential order that revoked Krebs’ security clearance and ordered a review of CISA’s conduct under his leadership. In a farewell note to SentialOne staff, Krebs said, “I want to be clear: this is my decision, and mine alone. This is my fight, not the company’s. This will require my complete focus and energy. It’s a fight for democracy, for freedom of speech, and for the rule of law. I’m prepared to give it everything I’ve got.” (SecurityWeek)

 

CISA warns of potential data breaches caused by legacy Oracle Cloud leak  

In another follow-up to a story we covered last week, Federal officials at CISA on Wednesday warned of the potential fallout of a data breach impacting Oracle. The incident surfaced when the alleged hacker boasted on social media that they were selling Oracle’s stolen data on cybercriminal forums. The claims were substantiated by CloudSEK, CybelAngel and several other cybersecurity firms. Last week, Oracle admitted that credential data was stolen “from two obsolete servers” but not from its Oracle Cloud Infrastructure (OCI). CISA said, “The compromise of credential material, including usernames, emails, passwords, authentication tokens, and encryption keys, can pose significant risk to enterprise environments.” The agency urged organizations to reset passwords for affected services, review source code for potential issues, monitor authentication logs, and report any incidents to authorities.  (The Record)

 

Government CVE funding set to end today  

MITRE confirmed to Reuters that its contract to fund the Common Vulnerabilities and Exposures, the familiar CVE database, expires on April 16, today. CISA confirmed the status of the contract, saying “we are urgently working to mitigate impact and to maintain CVE services on which global stakeholders rely.” Reuters did not receive comment from CISA or MITRE as to why the contract lapsed. (Yahoo)

 

China accuses US of launching ‘advanced’ cyberattacks, names alleged NSA agents  

China has accused three alleged U.S. operatives of conducting cyberattacks during February’s Asian Games in Harbin. According to Chinese authorities, the individuals, reportedly linked to the NSA, targeted event management systems holding sensitive personal data. The cyberattacks allegedly disrupted Games operations and extended to critical infrastructure in Heilongjiang province, including energy, telecom, and defense institutions, as well as tech giant Huawei. China claims the attacks caused serious national harm and has urged the U.S. to stop its alleged cyber operations. While offering no concrete evidence, China says it will take further steps to protect its cybersecurity. The U.S. has not responded to the accusations. Both countries routinely blame each other for cyber espionage, fueling ongoing tensions in cyberspace. (Reuters)

 

Hertz confirms customer info, drivers’ licenses stolen in data breach  

Hertz has confirmed a data breach affecting customers of its Hertz, Thrifty, and Dollar brands, stemming from zero-day vulnerabilities in Cleo’s file transfer platform exploited by the Clop ransomware gang. Stolen data may include names, contact details, driver’s license and credit card information, and, in some cases, Social Security and government IDs. Though no misuse has been reported yet, leaked data has appeared on Clop’s extortion site, and Hertz is offering affected individuals two years of free identity monitoring. (BleepingComputer)

 

Major banks limit information sharing following breach of Treasury Department’s OCC  

Several major U.S. banks, including JPMorgan Chase and BNY Mellon, have paused electronic communications with the Office of the Comptroller of the Currency (OCC) following a major breach of the agency’s email system, Bloomberg reports. Hackers accessed over 100 accounts for more than a year, prompting fears that sensitive data—such as banks’ cybersecurity reports and even National Security Letters—may have been exposed. The OCC is working with Microsoft, CrowdStrike, and Mandiant to investigate. Though on-site examiners still have access, banks worry the compromised data could aid future cyberattacks. The incident, now deemed a “major” breach, has triggered congressional scrutiny and raised serious concerns about the OCC’s cybersecurity safeguards, with experts warning that trust between banks and regulators has been fundamentally shaken. (Bloomberg)

 

Chinese espionage group leans on open-source tools to mask intrusions  

In a new campaign observed by researchers at Sysdig, Chinese espionage group UNC5174 has been using open-source tools like VShell and WebSockets to mask its presence in recent campaigns. Researchers note the group’s use of these tools to communicate with command-and-control infrastructure and perform post-exploitation tasks, which point to a shift away from custom-built malware. This marks a new approach for UNC5174, which has historically relied on bespoke malware for attacks targeting Western governments, technology companies, and research institutions. (CyberScoop)

 

Have questions? Reach out to RedSeal today to chat with one of our cybersecurity experts or schedule a demo today.

 

Vulnerability Management and Attack Path Management – RedSeal Outweighs the Competition

Skybox users have long relied on advanced vulnerability management (VM) and attack path management (APM) to safeguard their networks. With the transition to Tufin, many organizations are discovering that certain capabilities they once depended on are being treated differently. RedSeal, however, takes these critical features to the next level, offering a more integrated and dynamic approach to both VM and APM.

RedSeal’s superior vulnerability management
Effective vulnerability management requires more than just identifying potential weaknesses—it’s about understanding which ones can truly be exploited and where they fit within your network. While other platforms may provide basic vulnerability scanning, RedSeal’s topology-aware platform takes vulnerability management a step further. We seamlessly integrate data from leading scanners like Tenable, Qualys, and Rapid7 (a full list of integrations can be found here), mapping it directly to the network’s topology. By linking vulnerabilities to actual attack paths, RedSeal provides context-driven risk scoring, ensuring that security teams are prioritizing the vulnerabilities that pose the greatest threat based on real-world access.

RedSeal’s superior attack path management
Attack path management is a critical component of network defense, and RedSeal excels in this area by continuously calculating all potential attack paths, factoring in real-time changes to the network. Unlike static models, RedSeal’s dynamic approach ensures that new configurations, devices, and network adjustments are always accounted for. By providing an always-updated view of attack paths, RedSeal empowers teams to proactively mitigate the most likely risks before they can be exploited, rather than relying on assumptions or outdated data.

RedSeal’s advantage
RedSeal offers a proactive, predictive approach to both vulnerability management and attack path management. By integrating with existing vulnerability scanners and using network context to guide decision-making, RedSeal gives teams the tools to make smarter, faster decisions, addressing vulnerabilities in their true context—where they matter most. Our integrated view ensures that organizations are not just identifying vulnerabilities but prioritizing those that are truly exploitable, ultimately reducing risk and bolstering network defenses.

When it comes to vulnerability management and attack path management, RedSeal doesn’t just offer a solution—we provide a smarter, more powerful way to protect your network. Our platform’s ability to link vulnerabilities with attack paths and continuously update with real-time network changes gives organizations a clear, actionable roadmap to risk reduction. If you’re looking for a more dynamic and reliable way to manage your security posture, schedule a demo today and see for yourself how RedSeal is the solution you need to stay ahead of the curve.

 

Transforming Threat Detection: The Power of CTEM and RedSeal in Cybersecurity

Organizations across the globe face a barrage of cyber threats that are becoming more sophisticated and pervasive. Adapting to these emerging threats requires a proactive and comprehensive approach to threat investigations, ensuring that vulnerabilities are identified and mitigated before they can be exploited. RedSeal enhances an organization’s ability to navigate this complex threat environment effectively.

 

Understanding the evolving threat landscape

Cyber adversaries continually refine their tactics, techniques, and procedures (TTPs), making it imperative for organizations to stay ahead of potential threats. Traditional reactive security measures are no longer sufficient; a proactive stance is essential. This involves continuous monitoring, regular vulnerability assessments, and a robust incident response plan. The Cybersecurity and Infrastructure Security Agency (CISA)

 

The role of Continuous Threat Exposure Management (CTEM)

A strategic approach to cybersecurity involves Continuous Threat Exposure Management (CTEM), which focuses on proactively addressing cyber risks in alignment with business priorities. CTEM encompasses a five-step process that includes scoping, discovery, prioritization, validation, and mobilization. By implementing CTEM, organizations can systematically manage exposures that pose risks to security, compliance, or business operations.

 

RedSeal’s contribution to proactive threat management

RedSeal integrates with numerous networking and security tools to streamline and accelerate the CTEM process. By creating a dynamic model of an organization’s hybrid network, RedSeal provides unparalleled visibility into network configurations, enabling the identification of hidden assets, misconfigurations, unintended connections, and policy violations. This comprehensive understanding allows security teams to prioritize remediation efforts effectively.

One of RedSeal’s key capabilities is attack path analysis. By simulating potential attack scenarios, RedSeal identifies all possible ways an attacker could move laterally within the network. This insight enables organizations to fortify their defenses by addressing vulnerabilities before they can be exploited. Additionally, RedSeal supports compliance reporting by providing evidence of due diligence and proactive risk management, which is crucial in today’s regulatory environment.

 

Best practices in threat detection and response

Effective threat detection and response require a Regular vulnerability assessments and penetration testing are essential to proactively identify and address security weaknesses. Implementing a comprehensive incident response plan ensures that organizations can respond swiftly and effectively to security incidents, minimizing potential damage. Establishing a clear escalation path and automating response procedures further enhance the efficiency of threat management efforts.

 

The importance of cyber threat hunting

Beyond automated detection systems, proactive threat hunting involves security experts actively searching through networks and systems to detect and neutralize advanced threats that may bypass traditional defenses. This approach enables the identification of hidden threats and the implementation of timely countermeasures. To be effective in this effort, security experts need to understand best practices and approves to help effectively identify these threats. RedSeal regularly runs workshops that help security pros gain the needed skills.

 

Conclusion

Adapting to emerging cyber threats necessitates a proactive and comprehensive approach to threat investigations. By embracing strategies like Continuous Threat Exposure Management and leveraging solutions like RedSeal, organizations can gain the visibility and insights needed to identify vulnerabilities, prioritize remediation efforts, and strengthen their overall security posture. Implementing best practices in threat detection and response, along with proactive threat hunting, further empowers organizations to stay ahead in the ever-evolving cybersecurity landscape.

For more than 20 years, RedSeal has been a trusted partner for organizations across industries, helping them strengthen their cybersecurity posture. Reach out today to learn more about how we can support your cybersecurity framework.

 

Cyber News Roundup for April 11, 2025

This week’s Cyber News Roundup brings you the latest cybersecurity headlines, where new risks and vulnerabilities continue to emerge. From Forescout’s report on the riskiest connected devices to advanced phishing campaigns, these incidents highlight the need for stronger, more proactive security strategies. RedSeal helps organizations mitigate these evolving threats by offering robust network visibility and risk exposure management to stay ahead of cybercriminals. Read on to catch up on the critical threats making waves this week.

 

A new report reveals routers’ riskiness  

Forescout’s 2025 Riskiest Connected Devices report reveals routers are now the riskiest devices in enterprise networks, responsible for over half of the most critical vulnerabilities. Device risk overall has jumped 15% from last year. While computers hold the most bugs, routers, firewalls, and ADCs top the list for severity, often exploited as zero-days. The top 20 riskiest device types now include 12 newcomers like PoS systems and healthcare workstations. IoMT devices also carry major threats. Retail leads in risk exposure, followed by finance, government, healthcare, and manufacturing. Over 50% of non-legacy Windows devices across sectors still run Windows 10, nearing end-of-support. There’s also a shift away from encrypted SSH to unencrypted Telnet. Forescout warns modern threats span IT, IoT, OT, and IoMT, demanding broader, cross-domain security strategies. (SecurityWeek)

 

Windows Defender Antivirus Bypassed Using Direct Syscalls & XOR Encryption  

Researchers have uncovered a method to bypass Windows Defender antivirus by using direct system calls (syscalls) combined with XOR encryption, as detailed in a recent cybersecurity study. By employing shellcode encryption and injecting malicious code into both local and remote processes, they avoided detection from Defender’s static and dynamic analysis. Direct syscalls allowed them to bypass user-mode API monitoring, while XOR encryption obscured the shellcode, making it harder to detect. The approach, tested in a controlled lab, highlights the need for stronger defenses against such advanced evasion tactics, as traditional antivirus solutions struggle to counter these sophisticated methods. (Cyber Security News)

 

Nissan Leaf cars can be hacked for remote spying and physical takeover  

Researchers at PCAutomotive, a pentesting and threat intelligence company specializing in the automotive and financial sectors, services industries revealed the hacking potential last week at Black Hat Asia 2025. Focusing on the second generation Nissan Leaf made in 2020, they were able to “use the infotainment system’s Bluetooth capabilities to infiltrate the car’s internal network. They were then able to escalate privileges and establish a command and control channel over cellular communications to maintain stealthy and persistent access to the EV directly over the internet, up to and including being able to control the steering when while a car was in motion. (Security Week)

 

Infosec experts warn of China Typhoon retaliation against tariffs  

Referring to the White House imposition of tariffs on China, cybersecurity advisor Tom Kellermann warns that China may “retaliate with systemic cyber attacks as tensions simmer over.” Speaking to The Register, he points out how the various “Typhoon” campaigns “have given them a robust foothold within critical infrastructure that will be used to launch destructive attacks. Trade wars were a historical instrument of soft power. Cyber is and will be the modern instrument of choice.” In a separate interview with The Register, Annie Fixler, director of the Center on Cyber and Technology Innovation at the Foundation for Defense of Democracies, said, “to the extent that China is holding back on conducting certain types of cyberattacks, it may feel less restrained now.” (The Register)

 

U.S. Comptroller suffers ‘major incident’  

On Tuesday, the U.S. Treasury Department’s Office of the Comptroller of the Currency (OCC) characterized their recent email system breach as a “major incident.” In late February, Microsoft alerted officials to the incident which abused an OCC email administrator account. The initial investigation found no evidence of impact on the financial sector and concluded that only a “limited number” of email accounts were affected. However, new reports from Bloomberg and Microsoft indicate that 103 email accounts with emails totaling 150,000 were compromised and contained highly sensitive financial information. The attack commenced in May of last year, nine months prior to its discovery. It remains unclear who is behind the attack. (SecurityWeek)

 

Phishing kits now vet victims in real-time  

Threat actors have been spotted employing a new evasion tactic called ‘Precision-Validated Phishing.’ This new technique uses real-time email validation through either validation service API calls or JavaScript code to ensure phishing content is shown only to pre-verified, high-value targets. If an invalid target is identified, they are either presented with an error message or directed to benign sites. Email security firm Cofense said this new tactic is blocking visibility for researchers who typically enter fake or controlled email addresses to map the credential theft campaign. Ultimately, this reduces detection rates and prolongs the lifespan of phishing operations. (Bleeping Computer)

 

Hackers target bugs in EC2 sites to steal AWS credentials  

F5 Labs has observed hackers exploiting Server-Side Request Forgery (SSRF) vulnerabilities in websites hosted on AWS Elastic Cloud Compute (EC2) instances. The attackers are using credentials from extracted EC2 Metadata to escalate their privileges and access S3 buckets and other AWS services. The attacks are targeting instances running on AWS’s older metadata service, IMDSv1, that allows anyone with access to retrieve the metadata. The system has been superseded by IMDSv2, which requires session token authentication to protect websites. F5 researchers said that the malicious activity culminated between March 13 and 25, 2025 and behavioral patterns strongly suggest that it was carried out by a single threat actor. (Bleeping Computer)

 

Google’s latest Android update addresses two zero-days  

Google’s April 2025 Android Security Bulletin addresses multiple critical vulnerabilities, including two zero-days—CVE-2024-53150 and CVE-2024-53197—actively exploited in targeted attacks. Both impact the Linux kernel’s ALSA USB-audio driver and pose serious risks to Android devices running versions 12 through 15. CVE-2024-53150 allows information disclosure via an out-of-bounds read, while CVE-2024-53197 enables privilege escalation through memory corruption triggered by malicious USB devices. These flaws may bypass standard device locks and resemble methods used by surveillance firms. Google and Samsung have released urgent patches, with fixes included in the 2025-04-05 security level. The continued targeting of Android underscores the ecosystem’s security challenges, with Google reporting a significant rise in zero-day attacks. Users are urged to update devices immediately to avoid exploitation. (Cyber Security News)

 

AI outphishes human red teams  

Move over chess grandmasters—AI has now leveled up to out-hustle human red teams in the world of phishing. According to cybersecurity firm Hoxhunt, their AI phishing agent, code-named JKR (yes, like “Joker”), beat human-crafted phishing attempts by 24% in March. That’s a glow-up from last year, when JKR lagged 31% behind. Think of it as a Skynet-meets-email moment. JKR adapts like a social engineering ninja, customizing bait with user-specific context like job roles and locations. It’s not just phishing—it’s precision phishing, in bulk. Hoxhunt says this could make mass phishing campaigns as effective as today’s spear-phishing attempts. Great.

The Anti-Phishing Working Group also reported a global spike in phishing sites and smishing scams, including hilariously off-target toll collection texts. So, while humans still bring creativity, AI brings scale, 24/7 hustle, and zero need for coffee. Experts say defending against AI-driven threats will still require one vital element: human judgment. We’d have more good judgment if it weren’t constantly busy cleaning up after bad judgment.

(GovInfo Security)

 

Windows Remote Desktop Service Vulnerability Let Attackers Execute Malicious Code Remotely  

Critical vulnerabilities in Windows Remote Desktop Services (RDS), specifically CVE-2025-24035 and CVE-2025-24045, both rated with a CVSSv3 score of 8.1. These Remote Code Execution (RCE) flaws could allow unauthorized attackers to execute malicious code over a network, potentially compromising entire systems. CVE-2025-24035 stems from improper memory handling, while CVE-2025-24045 requires an attacker to win a race condition, though Microsoft deems exploitation “more likely” for both. Successful attacks could severely impact confidentiality, integrity, and availability. The article notes additional vulnerabilities addressed by Microsoft, including six actively exploited flaws, urging organizations to apply patches and follow security best practices like enabling Network Level Authentication and restricting RDP access to mitigate risks.

(Cyber Security News)

 

WhatsApp vulnerability could facilitate remote code execution  

Meta has patched a serious vulnerability in the WhatsApp desktop app for Windows that could let attackers trick users into executing malicious code via spoofed file types. The flaw involved MIME type manipulation, making harmful files appear safe (like images or documents). While there’s no evidence it has been exploited in the wild, users are urged to update to version 2.2450.6 to stay protected. (SecurityWeek)

 

CISA Warns of CrushFTP Vulnerability Exploitation in the Wild  

A critical authentication bypass vulnerability in CrushFTP, identified as CVE-2025-31161, has been actively exploited by remote attackers following a disrupted disclosure process, prompting the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to add it to its Known Exploited Vulnerabilities (KEV) catalog. The flaw, affecting unpatched versions of CrushFTP v10 and v11, allows unauthenticated access with a CVSSv3.1 severity score of 9.8, posing a significant risk of full system compromise. Initially disclosed responsibly by Outpost24 with a 90-day non-disclosure period, the process was undermined when VulnCheck published a separate CVE (CVE-2025-2825) without coordination, accelerating exploitation after a proof-of-concept exploit emerged. As of March 30, 2025, 815 systems remained unpatched, down from 1,800 two days prior, highlighting the urgency for organizations to apply updates as federal agencies face a mitigation deadline of April 28, 2025. This incident follows a pattern of file transfer software vulnerabilities, with CrushFTP previously targeted by a zero-day exploit in April 2024. (Infosecurtiy Magazine)

 

PoisonSeed campaign weaponizes CRM system  

Researchers at Silent Push found a new campaign that uses customer relationship management and bulk email systems to send out phishing emails with crypto seed phrases to potential victims. These emails claim to be from Coinbase, urging users with self-custodial wallets to transfer assets. The seed phrases are included in transfer instructions for setting up new wallets, which grants threat actors access to them. It’s estimated that Coinbase users have lost roughly $46 million in crypto assets since mid-March. The campaign has used a variety of providers to spam people, including Hubspot, Mailchimp, Mailgun, SendGrid, and Zoho. (Security Week)

 

State-backed actors could have exploited ESET flaw  

The cybersecurity firm ESET confirmed a flaw reported by Kaspersky researchers that could be used by threat actors to plant a malicious DLL and execute it with ESET’s antivirus scanner to bypass system defenses. ESET patched the issue and maintains it didn’t find any evidence of it being exploited in the wild. However, Kaspersky researchers claim the suspected state-backed threat group ToddyCat used the flaw in a campaign, using a modified version of EDRSandBlast to load the malicious DLL under the name TCDSB to execute payloads. ESET said it hasn’t seen the suspected DLLs to review them, but regardless, the approach would have required admin privileges to perform the attack. (The Record)

 

Have questions? Reach out to RedSeal today to chat with one of our cybersecurity experts or schedule a demo today.

 

RedSeal Named Finalist for 2025 SC Awards: Best Continuous Threat Exposure Management (CTEM) Solution

RedSeal, a leader in proactive threat exposure management, today announced its recognition as a finalist in the prestigious 2025 SC Awards for Best Continuous Threat Exposure Management (CTEM) Solution. This nomination underscores RedSeal’s commitment to delivering innovative solutions that empower organizations to navigate the complexities of modern cybersecurity and proactively manage their evolving attack surface.

The SC Awards, now in their 28th year, honor outstanding achievements by cybersecurity professionals, leaders, and organizations dedicated to safeguarding digital assets. The 2025 SC Awards entries were evaluated across 33 specialty categories by a distinguished panel of judges, comprised of cybersecurity professionals, industry leaders, and members of the CyberRisk Alliance CISO community, representing sectors such as healthcare, financial services, education, and technology.

The SC Award committee noted, “In a world where attack surfaces are expanding, RedSeal empowers organizations to understand and manage their security risks with unmatched precision. By delivering comprehensive network modeling, continuous exposure assessments, and attack path analysis, RedSeal helps businesses stay ahead of cyber threats in real time.”

RedSeal’s selection as a finalist further highlights its pioneering approach to CTEM, specifically its patented validation-before-prioritization methodology. This unique capability enables organizations to accurately identify and rapidly mitigate genuine, exploitable threats, including those posed by sophisticated APT groups and critical vulnerabilities, often within hours of deployment.

“Being recognized as a finalist in the SC Awards for Best CTEM Solution is a powerful validation of our vision and the hard work of our team,” said Greg Enriquez, CEO of RedSeal. “In today’s dynamic threat landscape, continuous and accurate exposure management is paramount. This nomination reaffirms our commitment to providing solutions that go beyond simple vulnerability identification, offering actionable intelligence that significantly reduces risk and optimizes security operations for our customers.”

The SC Award committee also highlights that “A trusted solution among government agencies, financial institutions, and Fortune 500 enterprises, RedSeal continues to enhance its capabilities with AI-driven risk scoring, cloud security posture management, and proactive attack surface reduction. Its strong customer satisfaction ratings affirm that organizations rely on RedSeal to navigate today’s complex cybersecurity landscape with confidence.”

RedSeal’s comprehensive CTEM platform supports organizations by providing:

  • Unparalleled Network Visibility: A holistic view across complex, interconnected IT, OT, IoT, and cloud environments, eliminating blind spots.
  • Proactive Threat Intelligence: Defense aligned with CISA advisories, identifying and addressing real-time threats from advanced adversaries.
  • Intelligent Validation and Prioritization: A patented approach that accurately determines exploitability, focusing resources on critical risks and saving significant time.
  • Continuous and Automated Exposure Discovery: Ongoing identification of vulnerabilities, misconfigurations, and segmentation violations, enabling proactive risk mitigation.
  • Risk-Driven Remediation Orchestration: Prioritization based on business impact and exploitability, providing actionable insights and integrating with existing security workflows for efficient remediation.

RedSeal is at the forefront of addressing the critical need for continuous, context-aware security in today’s high-risk, highly regulated industries. Learn more about how RedSeal supports comprehensive CTEM strategies and contact RedSeal today for a demo.

Learn more at www.cyberriskalliance.com.

Cyber News Roundup for April 4, 2025

In this week’s roundup, we cover a series of significant cybersecurity incidents and developments from around the globe. Europol’s takedown of a major child exploitation platform, Kidflix, underscores the real-world consequences of cybercrime, while concerns over AI misuse and data leaks continue to grow. Meanwhile, a joint advisory warns of the escalating threat posed by fast flux tactics, and new vulnerabilities highlight ongoing risks for cloud services and enterprise systems.

As organizations continue to face evolving threats, RedSeal’s proactive exposure management helps identify and mitigate risks across complex networks, ensuring a more secure defense against emerging cyber threats. From high-profile cyberattacks to critical system breaches, this roundup highlights the increasing need for vigilance and robust cybersecurity measures across industries.

 

Europol shuts down a major international CSAM platform  

Europol announced the takedown of Kidflix, a major dark web child sexual abuse material (CSAM) platform, calling it the largest child exploitation operation in its history. The multi-year effort led to 79 arrests so far, with 1,393 suspects identified and 39 children rescued. Over 39 countries participated in the investigation. Offenders used cryptocurrency to access the site, which hosted up to 91,000 videos—many previously unknown to law enforcement. German and Dutch authorities seized servers containing 72,000 videos. Users could earn access tokens by tagging content. Europol emphasized the real-world harm behind the platform’s operations, rejecting attempts to frame the case as a purely cyber issue. The platform had 1.8 million users, with around 3.5 new videos uploaded every hour. The investigation remains ongoing.

Elsewhere, a major data leak at GenNomis, an AI image-generation platform by South Korea’s AI-NOMIS, exposed 47.8GB of sensitive data, including 93,000+ images—some appearing to depict underage individuals in explicit content. Discovered by researcher Jeremiah Fowler, the unsecured database also contained deepfakes of celebrities as children and user command logs. The platform, now offline, allowed face-swapping and nude image generation. The incident raises alarm over AI misuse in creating non-consensual, explicit content, especially involving minors, prompting urgent calls for stricter safeguards and developer accountability. (The Record)

 

A joint advisory labels Fast Flux a national security threat  

Fast flux is a technique used by cybercriminals and nation-state actors to evade detection by rapidly rotating DNS records and IP addresses linked to malicious domains. This tactic supports resilient command-and-control (C2) infrastructure and enables persistent malicious activity, such as ransomware, phishing, and botnets. Variants include single flux (rotating IPs) and double flux (changing DNS servers too), often supported by bulletproof hosting services.

A joint advisory from the NSA, CISA, FBI, and international partners warns of fast flux as a national security threat and urges ISPs and cybersecurity providers—especially Protective DNS (PDNS) services—to develop detection and mitigation capabilities. Recommended strategies include DNS analysis, anomaly detection, IP blocking, sinkholing, and threat intelligence sharing. Distinguishing malicious fast flux from legitimate services like CDNs remains a challenge. Organizations are encouraged to verify PDNS protections, train staff on phishing, and participate in collaborative defense efforts to reduce exposure to fast flux-enabled cyber threats.

Meanwhile, House cybersecurity leaders criticized Trump-era cuts to CISA, urging expanded responsibilities instead. Rep. Andrew Garbarino wants CISA central to U.S. cyber efforts, including reauthorizing the 2015 cyber info-sharing law and extending a key grant program. He criticized cuts that harmed operations and signaled support for nominee Sean Plankey. Rep. Eric Swalwell slammed chaotic firings as inefficient and backs legislation to formalize the Joint Cyber Defense Collaborative. Both aim to shield CISA from political attacks and ensure strong congressional support moving forward. (CISA)

 

Google patches Quick Share vulnerability  

The app, formerly known as Nearby Share, is “a peer-to-peer file-sharing utility similar to Apple AirDrop that allows users to transfer files, photos, videos, and other documents between Android devices, Chromebooks, and Windows desktops and laptops in close physical proximity.” Researchers at SafeBreach Labs disclosed details of this new vulnerability that “could be exploited to achieve a denial-of-service (DoS) or send arbitrary files to a target’s device without their approval,” in other words a zero-click. The vulnerability was one of 10 that the researchers discovered last August. (The Hacker News)

 

Juniper Networks and Palo Alto Networks devices in mystery scanning event  

The Register is reporting that scanning of login portals for devices made by both companies has increased substantially in recent weeks. “On Wednesday, SANS Institute’s Johannes Ullrich said he noticed a surge in scans for the username “t128,” which, when accompanied by the password “128tRoutes,” is a well-known default account for Juniper’s Session Smart Networking products.” Internet scanning security firm GreyNoise has also spotted mass probing, in this case directed at the login portals of Palo Alto Networks’ PAN-OS GlobalProtect remote access products. They believe “anonymous scanners are searching for exposed or vulnerable product and noted almost 24,000 unique IP addresses attempting to login over the past 30 days.” (The Register)

 

Russian state railway suffers cyber disruption  

The state-owned railway, RZD, has reported a cyberattack that temporarily disrupted its website and mobile application. This is the second incident this week for Russia’s transit systems, following a Monday attack and disruption on the app and website for Moscow’s subway system. This RZD attack is being confirmed by RZD officials as a DDoS attack, which meant that ticket sales remained operational at physical offices across stations and terminals. No group has yet claimed responsibility for this attack. (The Record)

 

Google Cloud patches a vulnerability affecting its Cloud Run platform  

Google Cloud has patched a vulnerability called ImageRunner, which affected its Cloud Run platform. Discovered by Tenable, the flaw allowed users with certain permissions to modify Cloud Run services and potentially access private container images. In the worst case, attackers could extract secrets and exfiltrate sensitive data. Google says they alerted customers in November 2024 and fully deployed a fix by January 28, 2025. The update now enforces stricter IAM checks during deployments to prevent unauthorized image access.

Elsewhere, Google has launched a beta feature allowing enterprise users to send end-to-end encrypted (E2EE) emails within their organization, with plans to expand it to all Gmail inboxes by year’s end. Unlike S/MIME, Google’s approach doesn’t require certificate management or key sharing, simplifying secure communication. Organizations retain control of encryption keys, keeping messages secure and compliant with regulations. External recipients can access messages via a restricted Gmail interface or S/MIME if supported. Additional Gmail security features, including data loss prevention and AI threat protection, are also now available. (SecurityWeek)

 

North Korean IT worker army expands operations in Europe  

Security researchers with the Google Threat Intelligence Group found that North Korean IT workers are infiltrating European companies using fake identities to secure remote jobs, generating revenue for the DPRK regime…operating through platforms like Upwork and Telegram, with payments processed through cryptocurrency to evade detection. Authorities in the U.S. and UK have issued sanctions and warnings, as some workers have also engaged in extortion using insider knowledge. (Bleeping Computer)

 

Latest Ivanti bug, paired with malware, earns an alert from CISA  

CISA has issued an alert about a powerful malware called Resurge, used by alleged Chinese hackers to exploit a vulnerability in Ivanti security tools. The malware can manipulate system integrity, harvest credentials, and create backdoors, allowing persistent access even after updates. Google-owned Mandiant confirmed that the malware is linked to China-based espionage actors, who have targeted government, defense, and finance sectors since 2020. Ivanti’s Integrity Checker Tool (ICT) was also compromised, making detection harder. CISA urges administrators to reset credentials and factory reset affected Ivanti devices to mitigate risks. (The Record)

 

GitHub expands security tools after 39 million secrets leaked in 2024  

GitHub has expanded its security tools after detecting over 39 million leaked secrets in repositories in 2024, including API keys and credentials. Despite measures like “Push Protection,” leaks persist due to developer habits and accidental exposure. To combat this, GitHub now offers standalone security products, free organization-wide secret risk assessments, enhanced push protection with bypass controls, AI-powered secret detection via Copilot, and improved detection through cloud provider partnerships. Users are advised to enable push protection, avoid hardcoded secrets, and use secure storage methods. (Bleeping Computer)

 

A covert Chinese-linked network targets recently laid-off U.S. government workers  

A covert Chinese-linked network is allegedly targeting recently laid-off U.S. government workers with fake job ads, aiming to gather sensitive information. Researcher Max Lesser found the campaign uses bogus consulting firms with overlapping websites and fake contact details. One firm, RiverMerge Strategies, posted ads for roles requiring government experience, with connections traced to a Chinese tech company. Some ads ran on LinkedIn and Craigslist but were later deleted. Reuters couldn’t confirm if any hires occurred or direct ties to the Chinese government. U.S. officials warn these tactics mirror past Chinese espionage operations. The FBI confirmed that foreign intelligence often uses fake recruiters to exploit former federal workers’ financial vulnerability. The firms’ activity raises concerns about national security, especially amid recent federal workforce layoffs. (Reuters)

 

Global phishing threat targets 88 countries  

A phishing-as-a-service platform called Lucid is targeting 169 entities across 88 countries, using iMessage and RCS to bypass spam filters and deliver large-scale phishing campaigns. Run by the Chinese cybercriminal group XinXin, Lucid offers over 1,000 phishing domains, auto-generated phishing sites, and pro-grade spamming tools to its subscribers. Victims clicking the links are redirected to fake landing pages impersonating companies like USPS, Amazon, and major banks, where their personal and financial data is stolen. (Bleeping Computer)

 

Samsung data breach tied to old stolen credentials  

Credentials compromised in a 2021 Racoon infostealer infection and never changed led to the leak of 270,000 customer records from Samsung Germany’s ticketing system. The threat actor ‘GHNA’ exploited these stolen Spectos GmbH credentials, which remained unchanged for four years, to access Samsung’s system and expose sensitive customer data, including names, addresses, emails, and transaction details. (Security Week)

 

North Korea’s fake worker schemes getting worse  

North Korean operatives aren’t just freelancing—they’re securing full-time IT and engineering roles, gaining deep access to enterprise networks under legitimate employment. DTEX’s investigation found these insiders operating in Fortune 2000 companies, with privileged access to systems, remote tools, and the ability to pivot into supply chain partners. The workers, often teams posing as one high-performing individual, are funneling salaries back to Pyongyang, but experts warn financial motives could shift to espionage or sabotage. Forcing job candidates to be on camera and show government-issued ID is also not proving to be enough – researchers suggest watching for social red flags, such as candidates looking away for prompts during interviews or avoiding casual conversation about personal interests. (CyberScoop)

 

Have questions? Reach out to RedSeal today to chat with one of our cybersecurity experts or schedule a demo today.

 

That “Low-Risk” Printer Could Be Your Network’s Trojan Horse

Microsoft’s latest heads-up about a critical vulnerability in Canon printer drivers should be a wake-up call for everyone. Seriously, a 9.4 severity score? That’s not just a paper jam waiting to happen—that’s a potential network meltdown. And the fact that it’s tied to outdated drivers and BYOVD-style (bring-your-own-vulnerable-driver) attacks? That’s just plain scary.

We’re talking about attackers potentially hijacking printers to run malicious code. Imagine the chaos. And while Microsoft’s urging users to update their drivers is good advice, it underscores a bigger problem: we’re still dealing with the fallout of neglecting seemingly “low-risk” devices.

Remember that medical provider we worked with? They had a bunch of high-severity vulnerabilities, sure. But it was a “low-risk” printer that almost brought their entire network down. 14,000 hosts. Let that sink in.

During the pandemic, their IT team, understandably swamped, accidentally opened up unrestricted access to this printer. A printer! Something most people wouldn’t give a second thought to. But because RedSeal mapped their network, we saw that this seemingly innocuous device was a direct line to their entire network.

It’s a perfect example of why just scanning for high-severity vulnerabilities isn’t enough. You need to understand how everything connects, how access works, and how seemingly minor risks can become major threats.

This Microsoft vulnerability, and our experience with this medical provider, shows that even in 2025, we’re still fighting the same battles. Keeping drivers updated is basic hygiene, but it’s not enough. You need to look at networks holistically, understand all the access points and how bad actors can move laterally once in, and once validated, prioritize risks based on real-world impact.

Don’t let a “low-risk” device be the crack in your armor. The bad guys are looking for those cracks. At RedSeal, we’re committed to helping you fortify your digital infrastructure, for good. We proactively help visualize your network, identify attack paths, prioritize risk, and help you stay in compliance to ensure your business and customers stay secure.

 

Reach out to RedSeal or schedule a demo today.

RedSeal: The Ideal Solution for Former Skybox Customers

On February 24, 2025, Skybox shut its doors as Tufin acquired limited assets from the company, leaving Skybox customers without support or service agreements. Now, those who relied on Skybox are stuck in limbo, unsure of what to do next. The uncertainty is real, but here’s the good news: RedSeal is the best partner to help you transition smoothly without losing critical capabilities—and without the financial penalties or operational disruptions.

The situation for Skybox customers

Tufin’s acquisition only covers select assets from Skybox, leaving existing customer contracts behind. This means that Skybox customers must migrate to Tufin or find a new home for their cybersecurity program. While Tufin offers some incentives to make the switch, it doesn’t cover everything Skybox customers need—such as vulnerability management (VM), attack path management (APM), and critical compliance features. All capabilities relied upon to protect a network.

RedSeal is the clear choice

From comprehensive network visibility to advanced vulnerability management and attack path management, RedSeal ensures continuity and enhances your security posture during the migration. Unlike Tufin, RedSeal offers a migration path that keeps critical features intact while giving you access to even more robust capabilities. When you move to RedSeal, you’re taking your security to the next level.

Limited time migration offer

To make this transition even easier, RedSeal is offering a program for Skybox customers. If you have less than six months remaining on your Skybox subscription, we’ll allow you to migrate to RedSeal at no additional cost for those remaining months. If you’re on a perpetual license, we’ll take over support at the same rate you were paying Skybox and move you to a RedSeal subscription within two years. This is your chance to move without the usual hassle or financial burden.

Conclusion

Don’t let the closure of Skybox leave your network security in the dark. With RedSeal, you get a seamless migration, full continuity of your critical security features, and an upgraded platform that will set your organization up for future growth.

Now is the time to act.

Schedule a demo today and see for yourself how RedSeal is the solution you need to stay ahead of the curve.

 

Cyber News Roundup for for March 28, 2025

This week’s cyber news roundup highlights key incidents, including the exposure of over 150 U.S. government database servers, shifting cybersecurity responsibilities to states, and the risk to DNA records following 23andMe’s bankruptcy. We also cover the abuse of Microsoft’s Trust Signing service for malware and a China-linked APT that remained hidden in a telecom network for years.

Stay tuned for more on these evolving threats. At RedSeal, we help organizations manage cyber exposure proactively to stay ahead of these risks.

 

Over 150 government database servers are dangerously exposed to the internet

A recent investigation has revealed a major cybersecurity threat to U.S. government data. Over 150 government database servers—used by agencies like the Departments of Agriculture, Education, and Energy—are exposed to the internet, violating basic security protocols. These databases, hosted on Microsoft’s Azure Gov Cloud, have open ports vulnerable to brute-force attacks and known exploits. The report highlights over 655 unauthorized access attempts and more than 200 real-time data replications, suggesting serious flaws in authentication and data protection. Analysts believe the exposure stems from a rushed federal data centralization effort. Experts are calling for urgent action, including Congressional hearings and audits, to address what could become a catastrophic breach.

The White House is shifting cybersecurity responsibilities from federal agencies to states and local governments. A new executive order from President Trump introduces a National Resilience Strategy, aiming to give local entities more control over defending infrastructure and elections from cyber threats. This move follows cuts to federal cybersecurity teams and programs, leaving states without vital support like vulnerability alerts and free risk assessments. Experts warn this decentralization could lead to fragmented defenses, especially as many states lack the resources and intelligence centers to fill the gap. Cybersecurity professionals say the burden will hit underfunded sectors like schools and small municipalities hardest. Critics argue the shift, combined with federal workforce reductions, undermines national security and leaves states to manage growing cyber risks largely on their own. (GB Hackers)

 

Web service outage in Russia due to reported Cloudflare block

The outages were observed Thursday across numerous Russian regions, affecting platforms including “TikTok, Steam, Twitch, Epic Games, Duolingo and major Russian mobile operators.” Also impacted were banking and government services, and messaging apps such as Telegram and WhatsApp. Industry experts are suggesting the cause of the outage to be the Russian government’s blocking of U.S. based Cloudflare. Russian internet regulator Roskomnadzor recommended that local organizations switch to Russian hosting providers. (The Record)

 

Microsoft Trust Signing service abused to code-sign malware   

Researchers at BleepingComputer and elsewhere are observing more incidences of threat actors using the Microsoft Trusted Signing service to “sign their malware with short-lived, three-day code-signing certificates.” Code-signing certificates make malware appear legitimate, potentially bypassing security filters that block unsigned executables. Extended Validation (EV) certificates are particularly sought after by threat actors due to the increased trust they confer from cybersecurity programs and their ability to help bypass alerts in SmartScreen. A cybersecurity researcher and developer with the wonderful name of Squiblydoo, told BleepingComputer that they believe threat actors are switching to Microsoft’s service out of convenience, especially given that recent changes to EV certificates are causing confusion for users – something threat actors are taking advantage of. (BleepingComputer)

 

FCC alleges Chinese telecom companies are making ‘end run’ around bans   

The Federal Communications Commission’s newly created Council on National Security will conduct a “sweeping investigation of Chinese-made equipment in America’s telecommunications infrastructure,” according to an announcement made on Friday. The focus will be on Chinese companies like Huawei, ZTE, and others, who have been banned from doing business with U.S. companies, but who allegedly continue to exploit loopholes or simply massively underbid other competitors when dealing with smaller U.S. telecommunications providers. (Cyberscoop)

 

23andMe bankruptcy puts millions of DNA records at risk   

23andMe filed for bankruptcy on Monday and many are asking the question, what’s going to happen to all of that personal information? Some have raised major concerns that its vast database of genetic data could be sold off to the highest bidder. While the company insists privacy protections will remain intact, court documents make it clear that all assets—including customer DNA records—are on the table. California’s Attorney General issued a release ahead of the announcement urging users to delete their data immediately, warning that unlike passwords, genetic information is permanent, instructions on how to delete that data can be found in today’s show notes. (The Record)(CyberScoop),(California Attorney General Release)

 

China-linked APT hid in telecom network for years   

China-linked APT group Weaver Ant spent over four years inside an Asian telecom provider’s network, using compromised Zyxel routers to hide traffic and infrastructure. Researchers at Sygnia uncovered the intrusion, which relied on web shell tunneling—linking multiple web shells like China Chopper and the custom-built INMemory to move laterally and maintain persistence. The group exfiltrated credentials, access logs, and network configurations while evading detection through encryption, SMB lateral movement, and disabling security logs. (Dark Reading)(Sygnia)(Bleeping Computer)

 

NIST struggles to keep up   

The National Institute of Standards and Technology (NIST) is struggling to clear a growing backlog of CVEs in the National Vulnerability Database (NVD), with a 32% increase in submissions last year exacerbating the issue. Despite maintaining processing rates, the backlog continues to grow, and NIST anticipates even higher submission volumes in 2025. The delays are impacting organizations’ ability to access timely vulnerability data, creating a gap between reported issues and actionable intelligence despite efforts in increasing staff. (Security Week)

 

A Pennsylvania union notifies over 517,000 individuals of a data breach   

The Pennsylvania State Education Association (PSEA) is notifying over 517,000 individuals of a data breach from July 2024, where attackers stole personal, financial, and health data, including Social Security numbers and payment information. The Rhysida ransomware gang claimed responsibility, demanding a 20 BTC ransom. PSEA has not disclosed if it paid. Rhysida has previously attacked major institutions, including the British Library and Lurie Children’s Hospital. Affected individuals are offered free credit monitoring and urged to monitor their accounts. (Bleeping Computer)

 

Veeam patches backup and replication vulnerabilities   

The defect, which has a CVE number and a CVSS score of 9.9, could allow for “remote code execution by authenticated domain users.” It affects numerous backup and replication versions in the 12.x range. According to cybersecurity firm watchTowr, which reported the vulnerability, it is “rooted in a broader issue within Veeam’s deserialization mechanism,” which, watchTowr says, the company has “failed to properly address.” watchTowr also points out that “while the exploitation of the new vulnerability requires for the attacker to be logged in, the authentication requirement is fairly weak.” (SecurityWeek)

 

Nation-state groups hit organizations with Microsoft Windows zero-day   

Researchers at Trend Micro “discovered and reported this particular eight-year-old defect to Microsoft six months ago, but no remediations or fixes have arrived as of yet. The vulnerability does not yet have a CVE number but it “allows attackers to execute hidden malicious commands due to the way Windows displays the contents of shortcut .lnk files, also known as shell link files. According to the researchers’ report, a link to which is included in the show notes, state-sponsored groups have been exploiting the zero-day since 2017, targeting governments, think tanks and organizations in the finance, cryptocurrency, telecom, military and energy sectors, according to researchers. (Cyberscoop and Trend Micro)

 

Have questions? Reach out to RedSeal today to chat with one of our cybersecurity experts or schedule a demo today.