Blog Archives - Page 2 of 30 - RedSeal

Navigating the Future of Multi-Cloud Security

The shift to multi-cloud architectures has been a game-changer for organizations seeking agility, scalability, and resilience. While cloud adoption simplifies infrastructure in some ways, it also introduces new security complexities. Each cloud provider has its own controls, security models, and visibility gaps, creating a fragmented security environment that makes risk management harder than ever.

You’re not alone if cloud security feels more like a tangled web than a structured framework. The challenge isn’t just securing data and workloads; it’s understanding what you actually have, where your risks are, and how attackers might exploit them.

The multi-cloud dilemma: More clouds, more complexity

A multi-cloud strategy is great for avoiding vendor lock-in and optimizing costs, but it comes with real security trade-offs. Visibility is inconsistent, security policies don’t always translate across providers, and misconfigurations remain one of the top causes of cloud breaches.

Security teams are left with a familiar set of challenges:

  • Cloud silos obscure risk. Each provider has its own tools, dashboards, and logging formats, making it difficult to get a unified view of security posture.
  • Misconfigurations are everywhere. One wrong setting—an overly permissive identity policy or an unprotected storage bucket—can expose critical data to the Internet.
  • Attackers love complexity. The more fragmented and inconsistent the environment, the easier it is for bad actors to find and exploit security gaps.

The harsh reality? If you can’t see it, you can’t secure it. And in a multi-cloud world, attackers often see the gaps before you do.

Beyond traditional security: Adapting to the multi-cloud reality

Security strategies built for on-prem networks don’t translate neatly into cloud environments. Many organizations rely on traditional perimeter defenses or cloud-native security tools that don’t integrate well across providers.

What’s needed is a shift in approach—one that prioritizes visibility, adaptability, and continuous validation.

  • Prioritize unified visibility. You can’t manage risk without knowing where your assets are, how they’re connected, and what’s exposed. Security teams need a consolidated view across cloud environments, on-prem networks, and hybrid infrastructure.
  • Move beyond static security policies. Cloud environments are dynamic; security should be, too. Policies must adjust in real-time based on risk, rather than relying on manual configurations that quickly become outdated.
  • Think like an attacker. The best way to secure a multi-cloud environment is to understand how an attacker would move through it. Mapping potential attack paths helps identify where security gaps exist before they’re exploited.

Navigating the future of multi-cloud security

As organizations scale their cloud operations, security must become more proactive, automated, and adaptable. Instead of chasing alerts or manually correlating risks across different platforms, security teams should focus on understanding how cloud assets interact and where risk accumulates.

The challenge isn’t just the volume of security data; it’s knowing what’s important and what to do about it. Without a clear view of the full cloud attack surface, teams are forced into reactive firefighting. RedSeal tackles this challenge by mapping hybrid and multi-cloud networks, to enable teams to visualize risk and prioritize security efforts where they matter most.

To take control of multi-cloud security, organizations need to:

  • Unify visibility across environments. Security teams must see the full picture, not just isolated cloud dashboards. RedSeal’s modeling capabilities provide a comprehensive view of cloud and on-prem infrastructure, revealing misconfigurations, unintended access paths, and policy gaps.
  • Simulate attack paths before attackers do. Instead of reacting to breaches, organizations should understand how an attacker would move through their network. RedSeal’s attack path analysis highlights the most likely routes bad actors would take, allowing teams to address weaknesses before they can be exploited.
  • Enforce consistent security policies. Security policies that work in one cloud may not translate to another. RedSeal normalizes security controls across providers, identifying inconsistencies that could leave critical data exposed.
  • Prioritize risk based on real exposure. Not all vulnerabilities are equal. RedSeal helps teams cut through the noise by identifying which risks pose real threats based on actual network reachability—not just theoretical CVEs.

Multi-cloud security isn’t about layering on more tools—it’s about gaining the clarity and control needed to proactively manage risk. With the right strategy and RedSeal’s ability to provide network-wide situational awareness, organizations can stop playing catch-up and start making smarter, data-driven security decisions before attackers strike.

Contact us today.

 

Cyber News Roundup for March 21, 2025

In this week’s cyber news roundup, we delve into a range of critical incidents and updates. From a massive data breach impacting over 500,000 individuals at the Pennsylvania State Education Association, to the active exploitation of vulnerabilities in Fortinet and Apache Tomcat, cyber threats continue to evolve. We’ll also touch on Google’s $32 billion acquisition of Wiz, the U.S. government’s warning on cybersecurity team layoffs, and a ransomware attack in the remote island nation of Yap. Stay tuned as we break down these stories and their implications for cybersecurity. At RedSeal, we’re dedicated to helping organizations proactively manage their cyber exposure and reduce risk, ensuring that threats like these don’t catch you off guard.

 

A Pennsylvania union notifies over 517,000 individuals of a data breach  

The Pennsylvania State Education Association (PSEA) is notifying over 517,000 individuals of a data breach from July 2024, where attackers stole personal, financial, and health data, including Social Security numbers and payment information. The Rhysida ransomware gang claimed responsibility, demanding a 20 BTC ransom. PSEA has not disclosed if it paid. Rhysida has previously attacked major institutions, including the British Library and Lurie Children’s Hospital. Affected individuals are offered free credit monitoring and urged to monitor their accounts. (Bleeping Computer)

 

Veeam patches backup and replication vulnerabilities  

The defect, which has a CVE number and a CVSS score of 9.9, could allow for “remote code execution by authenticated domain users.” It affects numerous backup and replication versions in the 12.x range. According to cybersecurity firm watchTowr, which reported the vulnerability, it is “rooted in a broader issue within Veeam’s deserialization mechanism,” which, watchTowr says, the company has “failed to properly address.” watchTowr also points out that “while the exploitation of the new vulnerability requires for the attacker to be logged in, the authentication requirement is fairly weak.” (SecurityWeek)

 

Nation-state groups hit organizations with Microsoft Windows zero-day  

Researchers at Trend Micro “discovered and reported this particular eight-year-old defect to Microsoft six months ago, but no remediations or fixes have arrived as of yet. The vulnerability does not yet have a CVE number but it “allows attackers to execute hidden malicious commands due to the way Windows displays the contents of shortcut .lnk files, also known as shell link files. According to the researchers’ report, a link to which is included in the show notes, state-sponsored groups have been exploiting the zero-day since 2017, targeting governments, think tanks and organizations in the finance, cryptocurrency, telecom, military and energy sectors, according to researchers. (Cyberscoop and Trend Micro)

 

CISA confirms active exploitation of a critical Fortinet vulnerability  

The US Cybersecurity and Infrastructure Security Agency (CISA) has confirmed active exploitation of a critical Fortinet vulnerability (CVE-2025-24472) in ransomware attacks. The flaw, affecting FortiOS and FortiProxy, allows attackers to gain super-admin privileges via crafted proxy requests. Linked to the Mora_00 ransomware group, it has been exploited to deploy a new strain called SuperBlack. Additionally, CISA flagged a supply chain vulnerability (CVE-2025-30066) in the tj-actions/changed-files GitHub Action, which impacted over 23,000 organizations. Attackers modified the code, exposing CI/CD secrets in GitHub Actions logs. Organizations are urged to patch Fortinet devices (FortiOS 7.0.17, 7.2.13, 7.0.20) and ensure they’re using a secure version of the GitHub Action to prevent further exploitation. (Infosecurity Magazine)

 

Attackers swipe data from Pennsylvania teachers union  

The Pennsylvania State Education Association (PSEA) reported to the Office of the Maine Attorney General that they suffered a breach impacting 517,487 people. The nonprofit said the attack occurred on July 6 and exposed sensitive financial and health information. Although PSEA’s disclosure didn’t explicitly mention ransomware or extortion, it did say that steps were taken to ensure the stolen data was deleted. The Rhysida ransomware gang publicly claimed responsibility for the attack back in September 2024. (The Record and Bleeping Computer)

 

IBM warns of critical vulnerabilities in AIX  

IBM’s Advanced Interactive eXecutive (AIX) operating system rarely makes the cyber news these days. But IBM is now urging its customers to apply patches after disclosing two critical vulnerabilities (CVE-2024-56346 and CVE-2024-56347), one of which carries a maximum severity score of 10. Both flaws are caused by improper process controls and allow remote attackers to execute arbitrary commands. Third-party sources suggest around 9,000 organizations still use the OS, which is generally deployed in critical applications powering high-value industries. IBM said AIX versions 7.2 and 7.3 are both vulnerable and should be updated immediately. (The Register)

 

An Apache Tomcat vulnerability is under active exploitation  

A critical remote code execution (RCE) vulnerability in Apache Tomcat, tracked as CVE-2025-24813, is being actively exploited. The flaw, disclosed on March 10, 2025, allows attackers to gain control of servers via a simple PUT request. Exploits appeared on GitHub just 30 hours after disclosure. Attackers upload base64-encoded payloads via a PUT request, then trigger execution with a GET request using a JSESSIONID cookie. Security tools struggle to detect this due to encoded payloads and multi-step execution. Apache urges immediate updates to Tomcat 11.0.3+, 10.1.35+, or 9.0.99+. Meanwhile, organizations should disable partial PUT support and restrict sensitive file storage. (Cyber Security News)

 

Google acquires cybersecurity firm Wiz for $32 billion  

Alphabet’s Google Cloud has acquired cloud-based cybersecurity firm Wiz for $32 billion. Wiz was founded in Israel and was valued at $16 billion in 2024 while preparing for an IPO. This more than doubles Alphabet’s acquisition of Motorola Mobility for $12.5 billion in 2012. The Financial Times’ sources say that Wiz and Alphabet have agreed to a $3.2B termination fee, which lets Wiz run like an independent company, if the deal falls through or is significantly delayed. (The Verge)

 

Google doesn’t deny receiving a secret legal order from the UK government  

Google has refused to deny receiving a secret legal order from the UK government, raising concerns among U.S. lawmakers. A bipartisan group in Congress fears that British authorities may be demanding access to encrypted messages from U.S. tech companies. This follows reports that Apple received a similar order, known as a Technical Capability Notice (TCN), which it is reportedly contesting in a closed court hearing. Lawmakers criticized the secrecy surrounding these orders, arguing it hinders congressional oversight and threatens Americans’ privacy. Under the UK’s Investigatory Powers Act, companies that receive a TCN are barred from confirming it. Experts, including from Britain’s intelligence community, have called for more transparency, with academics warning that the government’s refusal to clarify the situation is unsustainable and unjustifiable. (The Record)

 

The White House is urging federal agencies not to lay off cybersecurity teams  

The White House is urging federal agencies not to lay off cybersecurity teams as they submit budget cut plans. U.S. federal CIO Greg Barbaccia emphasized in an email that cybersecurity is national security and should be protected. The warning comes amid concerns that deep budget cuts mandated by President Trump and adviser Elon Musk could weaken national cyber defenses. Former NSA cybersecurity director Rob Joyce warned that mass layoffs would be “devastating.” The Musk-led Department of Government Efficiency (DOGE) has also drawn criticism for granting unusually broad access to sensitive government data. At the Social Security Administration, officials raised alarms about the security risks posed by DOGE. Meanwhile, the Department of Homeland Security’s CISA has already lost over 130 positions as of mid-February.

Elon Musk reportedly visited the NSA on Wednesday, meeting with leadership to discuss staff cuts and operations. The NSA, a key player in U.S. cybersecurity and home to Cyber Command, is under Musk’s scrutiny as he pushes for government downsizing. His visit signals potential changes to intelligence and cyber operations. While Musk recently called for an NSA overhaul, he hasn’t detailed specific reforms. Intelligence officials are bracing for swift changes that could impact national cybersecurity. (Reuters)

 

Denmark warns of Europe telecom threat  

The cybersecurity agency of Denmark made this warning in a threat assessment published last Thursday warning of “an increase in state-sponsored cyber espionage activities targeting the telecommunications sector in Europe.” Although no direct mention of Salt Typhoon’s activities in the U.S. was made in the statement, nor has there been any confirmation of Salt Typhoon activity in Europe, the Danish agency stated “there have been several attempts at cyber espionage against the European telecommunications sector in the past few years,” and it worries that European governments may “lack the political incentives to make a public attribution even if China is identified as responsible.” (The Record)

 

Micronesian island suffers cyberattack  

To show that nowhere on earth is safe from cybercrime, the tiny island nation of Yap has suffered a ransomware attack, forcing the shutdown of all computers in its government health agency. Yap is one of the four states of the Federated States of Micronesia (FSM) and is located in the middle of the Pacific Ocean equidistant between the Philippines and Guam. Health officials from the island announced the attack, which occurred on March 11, on Facebook, stating that health services are still continuing, but are slower due to systems having been taken offline. (Security Affairs)

 

Have questions? Reach out to RedSeal today to chat with one of our cybersecurity experts or schedule a demo today.

The Secret to Cyber Resilience: Accurate Asset Inventory (…and RedSeal)

Cyber resilience is like home security. You wouldn’t leave your front door unlocked and assume everything inside is safe—so why do the digital equivalent with your network? The key to securing an organization isn’t just having firewalls and detection tools; it starts with knowing exactly what’s on your network. If you don’t know what you have, how can you protect it?

 

The importance of accurate asset inventory

Picture this: You’re running late for a flight, but you can’t find your keys. Why? Because you didn’t put them where they belong. IT security works the same way. If you don’t know where your critical assets are—or worse, if you don’t even know they exist—you can’t secure them.

An accurate asset inventory gives organizations a clear picture of their environment. It catalogs every device, application, and data repository, making sure there are no surprises. Yet, many security teams think they have full visibility—until they deploy a tool that scans their network and suddenly, it’s like finding a hidden basement in their house. That’s not a good feeling.

 

Why asset visibility boosts cyber resilience

Cyber resilience isn’t just about stopping attacks; it’s about bouncing back from them quickly. To do that, organizations need a real-time understanding of their network. A comprehensive asset inventory helps:

  • Identify vulnerabilities – If you don’t know an asset exists, you definitely aren’t patching it.
  • Manage risks – Not all assets are equal. Losing a coffee machine connected to WI-FI is one thing; losing a customer database is another.
  • Ensure compliance – Many security frameworks require an up-to-date inventory. Regulators don’t take “we didn’t know we had that server” as an excuse.

 

The struggle is real: Challenges in asset inventory

  • Everything is changing – Cloud services, mobile devices, and IoT keep popping up like weeds in a garden. You can’t avoid the change, but you can master it. Automatic device discovery and the detection of stale devices and credentials go a long way to calm the chaos.
  • Shadow IT is everywhere. Employees love setting up “temporary” servers or apps without telling IT. Spoiler: Those never stay temporary. Again, discovery to the rescue. The right tools will let you keep track of all the devices connected to your network, removing yet more blind spots, and who wants those?
  • Manual tracking is a nightmare – If you’re relying on spreadsheets, you’re already losing. Networks evolve too fast for manual updates. Nope, manual tracking never works; you need it to be automated and continuous, or you’ll never wake up from the nightmare.

 

How to keep track of everything without losing your mind

There’s hope. Organizations can keep their asset inventory in check by:

  1. Automating discovery – Use tools that continuously scan and update inventories. If you’re still doing this manually, you might as well be writing your network map on a napkin.
  2. Integrating asset data – A single source of truth across cloud and on-prem environments makes life easier.
  3. Auditing regularly – If you haven’t checked your asset inventory in six months, chances are, it’s outdated.
  4. Training staff – A little awareness goes a long way. The fewer rogue devices on your network, the better.

 

Incident response: When asset inventory saves the day

If a cyber incident hits, an up-to-date asset inventory helps security teams pinpoint affected systems fast. It’s the difference between putting out a small kitchen fire and watching your whole house burn down because you didn’t know where the extinguisher was. Knowing asset relationships also helps predict how an attack might spread, making mitigation more effective.

 

Final thoughts

Achieving cyber resilience isn’t about having the fanciest security tools—it’s about knowing what you have and where it is. Accurate asset inventory is the backbone of security. With the right tools, processes, and a little vigilance, organizations can avoid nasty surprises and stay ahead of cyber threats. RedSeal is meticulous about documenting your network assets to keep your network inventory squeaky clean. Contact us today to find out what you can do to keep your (proverbial) house in order. And maybe, just maybe, you won’t have to feel like you just discovered that hidden basement.

 

Cyber News Roundup for March 14, 2025

The growing speed of cybercriminal attacks is moving faster than ever. In this week’s roundup, we cover critical cybersecurity updates, including vulnerabilities in the popular ESP32 Bluetooth chip and a new House bill requiring federal contractors to implement vulnerability disclosure policies. Plus, we discuss the cyberattack impacting X, a breach in the U.S. electric grid by Chinese hackers, and the latest zero-day vulnerabilities. Stay informed with these important cybersecurity developments.

 

Undocumented commands found in Bluetooth chip used by a popular Wi-Fi and Bluetooth devices  

As described in BleepingComputer, “the ubiquitous ESP32 microchip made by Chinese manufacturer Espressif and used by over 1 billion units as of 2023, contains undocumented commands that could be leveraged for attacks. The undocumented commands allow spoofing of trusted devices, unauthorized data access, pivoting to other devices on the network, and potentially establishing long-term persistence.” Researchers from Tarlogic Security, speaking at RootedCON in Madrid point out that ESP32 is “one of the world’s most widely used chips for Wi-Fi + Bluetooth connectivity in IoT (Internet of Things) devices, so the risk is significant.”  (BleepingComputer)

 

House bill requires federal contractors to implement vulnerability disclosure policies  

The bill is named the Federal Contractor Cybersecurity Vulnerability Reduction Act of 2025 and it “instructs the Office of Management and Budget (OMB) to consult with CISA, the Office of the National Cyber Director, NIST, and other relevant departments, and require federal contractors to have a VDP that is consistent with NIST guidelines.” The same is required of the Defense Department. A letter signed by representatives of proponents of the bill including HackerOne, Bugcrowd, Microsoft, Infoblox, Rapid7, Trend Micro, Tenable, and Schneider Electric, state that “contractors, given the vast amount of sensitive data they handle, are prime targets for cyber threats. As a result, the bill ensures all companies contracting with the federal government adhere to security best practices.” (Security Week)

 

Cybercriminals sped up their attacks last year  

Two security companies, CrowdStrike and ReliaQuest, are reporting separately that “in the past year ransomware groups achieved lateral movement within an average of 48 minutes after gaining initial access to targeted environments,” with the fastest breakout time recorded being 51 seconds. This is an improvement – for the threat actors – from 2023 when the average breakout time for interactive cybercrime intrusions was 62 minutes. Adam Meyers, senior vice president of counter adversary operations at CrowdStrike, in making his company’s announcement, added, “not only are these adversaries using different techniques, different capabilities, they’re doing it faster, and they’re iterating faster than many of the enterprises that they’re targeting.” (Cyberscoop)

 

Cyber attack allegedly behind X outages  

Elon Musk blamed a “massive cyberattack” on multiple X outages on Monday, while hacking group Dark Storm Team claimed responsibility. According to Downdetector, reports of outages spiked throughout the morning, with peaks at 6 a.m., 10 a.m., and 11:30 a.m. ET, impacting tens of thousands of users. Newsweek and other outlets report that Dark Storm Team, a pro-Palestinian hacking group known for targeting NATO countries and Israel, took credit for the attack via Telegram. While Musk suggested a large, coordinated group or nation-state may be involved, X is still dealing with intermittent issues as of this recording. (ZDNet)

 

CISA warns of critical Ivanti and VeraCode vulnerabilities  

The US Cybersecurity and Infrastructure Security Agency (CISA) has added three critical Ivanti Endpoint Management vulnerabilities (CVE-2024-13159, CVE-2024-13160, CVE-2024-13161) to its Known Exploited Vulnerabilities (KEV) catalog. These path traversal flaws (CVSS 9.8) allow unauthenticated attackers to leak sensitive information remotely. CISA also flagged two VeraCode vulnerabilities, including CVE-2024-57968 (CVSS 9.9), an unrestricted file upload flaw, and CVE-2025-25181, an SQL injection vulnerability. The agency urges all organizations to immediately patch these issues to prevent cyberattacks. Ivanti software has faced multiple exploitations in 2025, with previous Connect Secure and Cloud Service Appliance vulnerabilities actively targeted by threat actors. (Infosecurity Magazine)

 

Researchers report increased activity from the SideWinder APT group  

Researchers at Securelist report increased activity from the SideWinder APT group in 2024, with enhanced malware, expanded targets, and global reach. Traditionally focused on military and government entities, the group now targets maritime, logistics, and nuclear sectors across South Asia, Southeast Asia, the Middle East, and Africa. Using spear-phishing emails, SideWinder exploits the CVE-2017-11882 vulnerability to deploy StealerBot, a post-exploitation toolkit. Their malware, disguised as legitimate DLL files, includes advanced evasion techniques like Control Flow Flattening. SideWinder rapidly adapts, modifying malware within five hours of detection. Their continued reliance on old vulnerabilities underscores the importance of patching outdated systems to defend against sophisticated threats targeting critical infrastructure worldwide. (Cyber Security News)

 

Ballista Botnet hits TP-Link devices  

A new report from the Cato CTRL team details how threat actors exploit a high-severity command injected vulnerability to execute code on TP-Link Archer AX-21 routers to deploy the botnet ultimately. This flaw isn’t new, the first evidence of exploitation dates back to April 2023. The researchers saw the Ballista campaign using the flaw in January 2025. The attackers use a shell script to execute a malware binary across various system architectures, which opens the door to remote code execution or a denial of service. The researchers noted the malware can erase itself once execution begins, covering its tracks while spreading to other routers. Newer Ballista variants use TOR network domains rather than hardcoded IP addresses, indicating its under active development. Research by Censys found that Ballista infected over 6,000 devices across Brazil, Poland, the United Kingdom, Bulgaria, and Turkey. (The Hacker News)

 

Apple issues emergency updates for a zero-day WebKit vulnerability  

Apple has issued emergency security updates to patch CVE-2025-24201, a zero-day WebKit vulnerability actively exploited in targeted attacks. The flaw, an out-of-bounds write issue, allows malicious web content to escape the Web Content sandbox, potentially enabling unauthorized actions. The update affects iOS, iPadOS, macOS, Safari, visionOS, and tvOS. Apple warns that the vulnerability was used in sophisticated attacks on older iOS versions. This is Apple’s third zero-day fix in 2025, following similar patches in January and February. Users should update immediately to mitigate risks, as Apple has not disclosed attacker details or targets. (Cyber Security News)

 

Microsoft Patches 57 Security Flaws, Including 6 Actively Exploited Zero-Days 

Microsoft released patches for 57 security flaws, including 6 actively exploited zero-days affecting Windows Kernel, NTFS, FAT File System, and Microsoft Management Console. Exploits involve use-after-free, integer overflow, and heap-based buffer overflow, with PipeMagic malware used in targeted attacks. Threat actors can chain vulnerabilities to execute remote code via malicious VHD files. The U.S. Cybersecurity and Infrastructure Security Agency – or CISA – has ordered federal agencies to apply fixes by April 1, 2025. (The Hacker News)

 

China’s Volt Typhoon Hackers Dwelled in US Electric Grid for 300 Days  

Security firm Dragos published a case study revealing that the Chinese hacker group Volt Typhoon infiltrated the U.S. electric grid through a breach at Littleton Electric Light and Water Departments (LELWD) in Massachusetts. The hackers had access to the utility’s network for over 300 days, collecting sensitive operational technology (OT) data, including information on energy grid operations. This data could be used for future targeted attacks. Volt Typhoon, linked to the Chinese government, has been previously associated with espionage and attacks on U.S. critical infrastructure. (Security Week)

 

In Memoriam: Mark Klein, AT&T Whistleblower Who Revealed NSA Mass Spying  

Mark Klein, the former AT&T technician who exposed a secret NSA surveillance program, has died. Klein revealed that the NSA had installed a secret room at AT&T’s San Francisco office, where internet data was copied and routed to the government. In 2006, he brought over 100 pages of evidence to the Electronic Frontier Foundation, which led to lawsuits against the NSA and increased public awareness of mass surveillance. Despite threats from AT&T, Klein stood by his claims, inspiring reforms and greater scrutiny of government spying. (EFF)

 

A UK hospital finds thousands of unwelcome guests on their network  

Our device inventory desk tells us that the Princess Alexandra Hospital in the UK) recently discovered that PlayStations, coffee machines, and even passing electric cars were connecting to its network. Deputy director of ICT Jeffery Wood admitted, “Our attack surface was much bigger than we thought,” after finding 5,000–10,000 unknown devices lurking in their system. This alarming revelation came during a trial of a cyber exposure platform, part of a broader tech modernization effort.

With no dedicated cybersecurity team, the hospital’s infrastructure staff handles security, integrating automated tools, XDR, and AI-driven protections. Network segmentation has even freed the marketing team to use Apple devices—previously banned. However, zero-trust security remains a distant dream. Deputy Director Wood says the hospital is embracing a “one NHS” partnership model rather than siloed vendor relationships, but warns: “This isn’t just cyber risk. This is risk. Attacks could harm our patients.”

Nothing like a cybersecurity audit to find out your MRI machine shares a network with someone’s PS5. (Computing)

 

Medusa ransomware continues to attack infrastructure  

In a joint alert released March 12, CISA, the FBI, and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are warning that as of February of this year, “Medusa developers and affiliates have impacted over 300 victims from a variety of critical infrastructure sectors with affected industries including medical, education, legal, insurance, technology, and manufacturing.” The group, which is unrelated to MedusaLocker, engages in double extortion, and use phishing and unpatched vulnerabilities for initial access. The group’s practices include “disabling security software, terminating processes related to backups, security, data sharing, and communication, and erasing shadow copies to prevent file recovery.” A link to the alert is available in the show notes to this episode. (Security Week and CISA)

 

DoJ seeks to break up Google  

As posted in The Cyberwire, “on Friday, the Department of Justice (DOJ) submitted a request that would aim to break up Google by forcing the company to sell Chrome. In its filing, the DOJ stated that Google’s illegal conduct has created an economic goliath, one that wreaks havoc over the marketplace to ensure that no matter what occurs, Google always wins.” These filings follow a 2023 antitrust case in which “Google was found guilty of monopolistic practices regarding the company’s search engine services,” as well as a second antitrust lawsuit from 2024 that is “examining whether the company has also engaged in monopolistic behaviors related to its advertising business.” The ruling, expected this summer, “has the potential to significantly impact how Google operates, how users interact with its services, and the overall landscape of the search engine business.” (The Cyberwire)

 

Chinese spy group exploits Juniper Networks routers  

Researchers at Mandiant are warning of a state-backed espionage group operating out of China, UNC3886, targeting routers made by Juniper Networks. This is a group we reported on in June 2023, when they were exploiting a VMware ESXi zero-day. In this latest report Mandiant says the group was involved in a project to deploy custom backdoors on Junos OS routers and that the group’s focus is “mainly on defense, technology, and telecommunication organizations located in the U.S. and Asia.” They pointed out that the affected routers were running end-of-life hardware and software, but also that the malware deployed on the Juniper routers “demonstrates that UNC3886 has in-depth knowledge of advanced system internals.” (The Record

 

Have questions? Reach out to RedSeal today to chat with one of our cybersecurity experts or schedule a demo today.

Cyber News Roundup for March 6, 2025

In this week’s roundup, gain insight into critical developments in cybersecurity. We’ve got highlights from sectors lagging in NIS2 compliance and the urgent need for improvement. Explore how hackers are exploiting legal loopholes to avoid detection, making it harder for law enforcement to tackle cybercrime. We also cover the latest on state-sponsored cyberattacks, including charges against Chinese hackers and evolving tactics by Silk Typhoon. Stay informed with expert insights to stay ahead of these rapidly emerging threats. Let’s dive in.

 

Six Critical Infrastructure Sectors Failing on NIS2 Compliance  

A recent report from Enisa, published on March 6, 2025, highlights that six critical infrastructure sectors—health, gas, and digital infrastructure among them—are lagging in compliance with the EU’s NIS2 directive. The health sector struggles with complex supply chains, legacy systems, and insecure medical devices, while the gas sector needs better incident readiness. Digital infrastructure, including internet exchanges and cloud services, is notably immature in its cybersecurity practices. Enisa is collaborating with EU Member States to provide guidance and improve sector maturity to meet these essential security standards. (Infosecurity)

 

Differing names for hackers hinders law enforcement, says security agent  

According to an article in Cyberscoop, an investigator, who cannot be named, stated, during a speech that cannot be identified, that malicious hackers take full advantage of the lack of standardized names for their operations, since the justice system was set up long ago and is not built for the sophistication of international criminal cyber gangs. One particular problem involves the fact that the groups make use of the Public Access to Court Electronic Records (PACER) system. They use it to study affidavits and learn how investigations are opened and conducted. In addition, the agent added, “there are disincentives for law enforcement agencies and agents from different districts to work together. “Everyone wants to get theirs, … everyone wants their stats, because that’s what they’re judged on.” (Cyberscoop)

 

U.S. charges Chinese infrastructure hackers  

As quoted in BleepingComputer, “the U.S. Justice Department has charged Chinese state security officers along with APT27 and i-Soon hackers for network breaches and cyberattacks that have targeted victims globally since 2011. The victims include “U.S. federal and state government agencies, foreign ministries of multiple governments in Asia, U.S.-based dissidents, as well as a prominent religious organization in the United States.” i-Soon also goes by the name Anxun Information Technology. (BleepingComputer)

 

Silk Typhoon evolves to exploit common IT solutions  

The Chinese espionage group Silk Typhoon, also known as Hafnium, has been identified by security researchers at Microsoft Threat Intelligence, to be “increasingly exploiting common IT solutions, such as remote management tools and cloud applications, to gain initial access.” Silk Typhoon is one of the best-resourced and technically adept state-sponsored threat actors, targeting IT services, healthcare, government agencies and higher education institutions, globally. Recent activity by the group includes “abusing stolen API keys and credentials from privilege access management (PAM) systems, cloud application providers, and cloud data management companies.” These activities allow the group to “infiltrate downstream customer environments, conduct reconnaissance and exfiltrate data related to U.S. government policy, legal processes and other areas of strategic interest. Microsoft says the group also uses password spray attacks, scanning public repositories like GitHub for leaked corporate passwords. (InfoSecurity Magazine)

 

Google patches 43 Bugs, including two   

sneaky zero-daysIn March 2025, Google released security updates addressing 43 vulnerabilities in Android, notably two zero-days actively exploited in targeted attacks. One, identified as CVE-2024-50302, is a high-severity information disclosure flaw in the Linux kernel’s Human Interface Device driver. This vulnerability was reportedly leveraged by Serbian authorities using an exploit chain developed by Israeli firm Cellebrite to unlock confiscated devices. The exploit chain also included a USB Video Class zero-day (CVE-2024-53104) and an ALSA USB-sound driver zero-day, discovered by Amnesty International’s Security Lab in mid-2024. Google had previously provided fixes for these vulnerabilities to OEM partners in January. (Google)

 

CISA flags vulnerabilities exploited in the wild  

The Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) catalog to include several critical security flaws, underscoring the importance of timely remediation to protect organizational networks.

The newly added vulnerabilities are:​

  • CVE-2024-4885: A critical path traversal vulnerability in Progress WhatsUp Gold, which could allow unauthenticated remote code execution.​
  • CVE-2023-20118: A medium-severity command injection vulnerability in Cisco Small Business RV Series Routers, enabling arbitrary command execution or authentication bypass. Notably, Cisco has stated it will not release a fix for this issue.​
  • CVE-2022-43769 and CVE-2022-43939: A pair of vulns, both affecting Hitachi Vantara Pentaho BA Server, which involve special element injection and authorization bypass.
  • CVE-2018-8639: And an improper resource shutdown or release flaw in Microsoft Windows Win32k, which could be exploited to execute arbitrary code.

Federal agencies are mandated to address these vulnerabilities by March 24, 2025. CISA strongly recommends that all organizations, regardless of sector, prioritize the remediation of these vulnerabilities to mitigate potential exploitation risks. And, we have the CVEs for all these vulnerabilities in our selected reading for you should you need them. (SC Media)

 

3 VMware Zero-Day bugs allow sandbox escape  

Broadcom is telling VMware customers to patch three actively exploited zero-day vulnerabilities affecting ESXi, Workstation, and Fusion. These flaws allow attackers with admin access to escape virtual machines and compromise the underlying host, which can lead to data exfiltration, malware deployment, and service disruption. CISA has added the vulnerabilities to its exploited list, requiring federal agencies to patch by March 25th. (Dark Reading)

 

Meet Rayhunter: a new open-source tool from EFF to detect cellular spying  

The EFF launched an open-source tool called Rayhunter, designed to detect cell-site simulators… or devices that mimic cell towers to track phones and potentially intercept data. Rayhunter runs on a $20 Orbic mobile hotspot and monitors control traffic to identify suspicious activity, like forced downgrades to vulnerable 2G networks. Users get alerts for anomalies and can review logs. EFF expects Rayhunter to help build defenses against CSS and inform legal efforts to regulate their use. (EFF)

 

Cyber Command ordered to halt offensive operations against Russia during Ukraine negotiations   

The Record reports that US Defense Secretary Pete Hegseth has ordered Cyber Command to halt offensive cyber operations against Russia. The full scope of the directive is unclear, but it doesn’t include the NSA or its signals intelligence operations targeting Russia. The Washington Post cites a current US official familiar with the order as saying the pause is meant to last only as long as negotiations over the war in Ukraine continue. The Post says the operations being halted “could include exposing or disabling malware found in Russian networks before it can be used against the United States, blocking Russian hackers from servers that they may be preparing to use for their own offensive operations, or disrupting a site promoting anti-U.S. propaganda.”

The New York Times observes that “Former officials said it was common for civilian leaders to order pauses in military operations during sensitive diplomatic negotiations, to avoid derailing them. Still, for President Trump and Mr. Hegseth, the retreat from offensive cyberoperations against Russian targets represents a huge gamble. It essentially counts on Mr. Putin to reciprocate by letting up on what many call the ‘shadow war’ underway against the United States and its traditional allies in Europe.”

The Pentagon declined to comment on the report. A senior Defense official told the Record, “Due to operational security concerns, we do not comment nor discuss cyber intelligence, plans, or operations. There is no greater priority to Secretary Hegseth than the safety of the Warfighter in all operations, to include the cyber domain.” (The Record)

 

CISA denies claims of deprioritizing Russian threats  

CISA is pushing back against reports that it has been directed to stop tracking Russian cyber threats, calling the claims “fake” and a risk to national security. This is an update to a story that first appeared over the weekend, in which The Guardian reported that a memo deprioritizing Russia was issued—an allegation that CISA and DHS officials deny, with one calling the report “garbage.” Meanwhile, The Record, The New York Times, and The Washington Post confirm that U.S. Cyber Command has been ordered to pause offensive cyber operations against Russia while negotiations over the war in Ukraine continue. Lawmakers on both sides are criticizing any shift, warning that it could weaken U.S. defenses against Russian cyber threats. (The Record)(Bleeping Computer)(CyberScoop)

 

Latin America’s escalating cybersecurity crisis  

Cyber threats in Latin America are growing faster than anywhere else, with attacks surging 53% year-over-year and organizations facing nearly 40% more weekly incidents than the global average. Experts point to political instability, lagging cybersecurity adoption, and the rapid rise of financial tech. Some of the most impacted industries include healthcare, communications, and governments with an average of 3,000-4,000 attacks per week. These attacks are particularly affecting Brazil, where cybercriminals exploit inexperienced users and even collaborate with cartels. (Dark Reading)

 

CISA flags Cisco and Windows flaws  

U.S. federal agencies have until the end of the month to address flaws in Cisco and Windows systems. CISA reports these flaws, CVE-2023-20118 and CVE-2018-8639, allow attackers to execute arbitrary commands and gain elevated privileges on vulnerable devices, with exploitation currently underway. While the agency has noted these flaws being actively exploited, it has not provided any specific details surrounding the malicious activity or who may be responsible. You can learn more about these specific flaws in the show notes of today’s episode. (Bleeping Computer)

 

Multiple local governments experience cyberattacks  

New year, same problem. Several local government agencies are grappling with cyberattacks that have disrupted services, including Anne Arundel County, Maryland, which has been dealing with limited services for over a week. While major services like 911 remain operational, county officials are still investigating the incident and cannot confirm if it’s a ransomware attack. The trend continues across multiple states, with other local agencies, including the Cleveland Municipal Court and Missouri’s Department of Conservation, also affected by ongoing attacks. At this time, most of the government agencies have not provided any additional information other than they are investigating the incident. (The Record)

 

Malware abuses Microsoft dev tunnels for C2 communication  

In a new twist, cybercriminals are exploiting Microsoft’s dev tunnels service to send data back and forth from malware-infected devices. This service, designed for developers to test apps and collaborate securely, is now being abused to help malware avoid detection. Recently, researchers found two versions of Njrat malware using Microsoft’s dev tunnels to connect to command-and-control servers. The malware communicates through hidden URLs, making it harder for traditional security systems to spot. The malware checks in with its remote servers, reporting its status, and can even spread through USB devices. Experts say that organizations not using dev tunnels should keep an eye on DNS logs for any unusual dev tunnel URLs as a way to spot potential attacks early. (SANS)

 

JavaGhost uses compromised AWS environments to launch phishing campaigns  

Palo Alto Networks’ Unit 42 warns that the JavaGhost threat actor is compromising misconfigured AWS environments and using them to launch phishing campaigns. The group gains entry to the AWS environments via exposed long-term access keys. Once they’ve gained access, the attackers use the victim’s Amazon Simple Email Service (SES) and WorkMail services to send out phishing emails. Since the emails are sent from a legitimate source, they’re more likely to bypass security filters. To defend against these attacks, Unit 42 recommends that AWS users limit access to administrative rights, rotate IAM credentials regularly, use short term/just-in-time access tokens, and enable multi-factor authentication. (PaloAlto)

 

Philippine army suffers cyberattack  

The Philippine Army confirmed a cyberattack after a local hacking group claimed to have breached its systems and accessed confidential documents. Army spokesperson Col. Louie Dema-ala described it as an “illegal access attempt” that was swiftly contained, with no detected data theft or damage. However, digital security group Deep Web Konek reported that hacker group Exodus Security claimed responsibility, alleging it had compromised 10,000 records of active and retired service members. The leaked data reportedly includes personal, military, and financial details, though its authenticity and exact volume remain unverified. Authorities continue to investigate the breach. (The Record)

 

Have questions? Reach out to RedSeal today to chat with one of our cybersecurity experts or schedule a demo today.

Cyber News Roundup for February 28, 2025

In recent cybersecurity news, several high-profile incidents highlight growing threats and vulnerabilities across sectors. Belgium’s State Security Service is investigating a cyber-espionage operation allegedly linked to Chinese hackers, who compromised the agency’s email system. Meanwhile, the PolarEdge botnet is exploiting vulnerabilities in critical edge devices from Cisco, ASUS, and others, while reports reveal a significant increase in the time it takes to patch software vulnerabilities, now averaging eight and a half months. These incidents highlight the urgent need for robust cybersecurity measures to protect both government and private sector infrastructure.

 

A cybersecurity veteran takes CISA’s lead  

Karen Evans, a seasoned federal IT and cybersecurity expert, has been appointed as the Executive Assistant Director for Cybersecurity at the Cybersecurity and Infrastructure Security Agency (CISA). In this prominent role, she will lead efforts to protect federal civilian agencies and the nation’s critical infrastructure against cyber threats. Evans brings extensive experience from her previous positions, including Chief Information Officer at the Department of Homeland Security, Assistant Secretary for Cybersecurity, Energy Security, and Emergency Response at the Department of Energy, and Administrator of E-Government and Information Technology at the Office of Management and Budget. Her appointment fills a key leadership position within CISA, which has been without a permanent director since January 2025. (Cyberscoop)

 

A Belgium spy agency is hacked  

Belgium has initiated a judicial investigation into an alleged Chinese cyber-espionage operation that compromised the email system of its State Security Service (VSSE). Between 2021 and 2023, unidentified Chinese state-sponsored hackers reportedly siphoned off 10% of the agency’s incoming and outgoing emails. The attackers exploited a vulnerability in an email security product from Barracuda Networks, deploying malware strains Saltwater, SeaSpy, and Seaside to establish backdoors into compromised systems. While classified internal communications remained secure, the breach affected an external server handling communications with government ministries and law enforcement, potentially exposing personal data of nearly half the VSSE’s staff and past applicants. Belgian officials have refrained from commenting on the specifics, citing the ongoing nature of the investigation. (The Record)

 

PolarEdge botnet exploits Cisco ASUS, QNAP, and Synology  

According to French cybersecurity company Sekoia, this is a new malware campaign which targets edge devices from Cisco, ASUS, QNAP, and Synology to pull them into a botnet named PolarEdge. It has been operating since at least the end of 2023. The campaign leverages an unpatched end of life CVE-numbered critical security flaw (CVE-2023-20118) that impacts Cisco Small Business routers that could result in arbitrary command execution on susceptible devices. The vulnerability is said to have been used to deliver a TLS backdoor that incorporates the ability to listen for incoming client connections and execute commands. (The Hacker News)

 

Software vulnerabilities take almost nine months to patch  

A State of Software Security report released by Veracode shows the average fix time for software security vulnerabilities has “risen to eight and a half months, a 47% increase over the past five years.” This is also 327% higher than 15 years ago, “largely as a result of increased reliance on third-party code and use of AI generated code.” Furthermore, the report says, “half of all organizations have critical security debt – defined as accumulated high severity vulnerabilities left open for longer than a year, and 70 percent of this critical security debt comes from third-party code and the software supply chain. (InfoSecurity Magazine)

 

Thousands of exposed GitHub repositories, now private, can still be accessed through Copilot  

Security researchers at Israeli cybersecurity company Lasso found that Microsoft Copilot retains access to thousands of once-public GitHub repositories, even after they’ve been set to  private. Using Bing’s cache, Lasso identified over 20,000 affected repositories, exposing sensitive data from major companies like Google, IBM, and Microsoft. Microsoft classified the issue as “low severity.”  (TechCrunch)

 

HaveIBeenPwned Adds 244 Million Passwords Stolen By Infostealers  

HaveIBeenPwned has added 244 million stolen passwords and 284 million compromised email accounts to its database, sourced from 1.5TB of infostealer logs shared on Telegram. The data was linked to a major distribution channel called “Alien Textbase,” which published the logs in 744 files. HIBP also introduced two new APIs allowing domain owners to check for compromised credentials. Infostealers, increasingly used in cyberattacks, spread through phishing, malicious ads, and pirated software, with stolen data fueling major breaches like those affecting Ticketmaster and AT&T. (Infosecurity)

 

CISA adds an Oracle Agile PLM flaw to its Known Exploited Vulnerabilities (KEV) catalog

CISA has added CVE-2024-20953, an Oracle Agile PLM flaw, to its Known Exploited Vulnerabilities (KEV) catalog. The high-severity deserialization vulnerability, patched in January 2024, allows low-privileged attackers to execute arbitrary code. While no public reports confirm active exploitation, experts believe attackers likely use it post-initial access. Oracle vulnerabilities, particularly WebLogic flaws, remain frequent attack targets. (Security Week)

 

A sophisticated macOS malware campaign is distributing Poseidon Stealer  

A sophisticated macOS malware campaign is distributing Poseidon Stealer via a fake DeepSeek AI website, according to cybersecurity researchers. The malware bypasses macOS Gatekeeper and harvests sensitive data, including browser credentials, cryptocurrency wallets, and system keychains. Attackers use malvertising to lure victims to a counterfeit site, delivering the malicious DMG file. Poseidon employs anti-analysis techniques and exfiltrates stolen data via curl POST requests. Security experts recommend restricting osascript execution, using next-gen antivirus (NGAV), and educating users on Terminal-based threats to mitigate the risk.

Meanwhile, a privilege escalation vulnerability in Parallels Desktop remains unpatched, with two exploits publicly disclosed, allowing attackers to gain root access on Macs. Security researcher Mickey Jin bypassed Parallels’ previous fix for CVE-2024-34331, a flaw stemming from missing code signature verification. Despite seven months of warnings, Parallels has not addressed the issue, leaving all known versions vulnerable. Jin urges users to take proactive security measures as attackers could exploit this in the wild. (Bleepingcomputer)

 

Chinese group Silver Fox is spoofing medical software  

A Chinese government-backed hacking group, Silver Fox, is spoofing medical software to infect hospital patients’ computers with backdoors, keyloggers, and cryptominers, according to Forescout’s Vedere Labs. The malware mimics Philips DICOM image viewers and other healthcare applications, tricking victims into installing ValleyRAT, a remote access tool. The attack uses PowerShell commands to evade detection and downloads encrypted payloads from Alibaba Cloud. While targeting individuals, the malware could spread into hospital networks through infected patient devices, posing a major cybersecurity risk to healthcare organizations. (The Register)

 

Cyberattacks targeting ICS and OT surged dramatically last year  

Cyberattacks targeting industrial control systems (ICS) and operational technology (OT) surged dramatically by 87% in 2024, according to cybersecurity firm Dragos. Ransomware attacks on industrial infrastructure also increased by 60%, reflecting heightened geopolitical tensions involving conflicts like Russia-Ukraine and China-Taiwan. Experts warn that state-sponsored groups, such as China’s Volt Typhoon, are infiltrating critical infrastructure, preparing potential future disruptions. Volt Typhoon has notably identified strategic U.S. targets, including power substations critical for military deployments. Alarmingly, non-state cybercriminals are gaining ICS expertise through collaboration with state actors, broadening attack capabilities and risks to critical infrastructure. This shift threatens more frequent, indiscriminate attacks as cybercriminal groups increasingly target industrial systems for financial or disruptive objectives. (Cyberscoop)

 

Linux backdoor used in the wild  

Researchers at Palo Alto Networks’ Unit 42 discovered an undocumented Linux backdoor called Auto-Color, used by threat actors against government and university targets in North America and Asia from November to December 2024. Researchers don’t know the initial attack vector. If run with root privileges, it installs a malicious library implant, copies itself to the system directory, and modifies files to ensure it executes before other system libraries. Without root access, the malware can still provide remote access to threat actors but lacks persistence. Once running, it uses a custom encryption algorithm to talk with C2 servers. (Bleeping Computer)

 

Researchers uncover zero-day vulnerabilities in a widely used cloud logging utility  

Security researchers at Tenable uncovered zero-day vulnerabilities in Fluent Bit, a widely used logging utility embedded in cloud platforms like AWS, Google Cloud, and Microsoft Azure. The flaws, CVE-2024-50608 and CVE-2024-50609 (CVSS 8.9), exploit null pointer dereference weaknesses in the Prometheus Remote Write and OpenTelemetry plugins, exposing billions of production environments to cyber threats. Attackers can crash Fluent Bit servers or leak sensitive data using simple HTTP requests. These vulnerabilities affect Kubernetes deployments, enterprise logging systems, and compliance workflows, with major users including Cisco, Splunk, and VMware. Patches are available in v3.0.4 and v2.2.3, but unpatched systems remain at high risk. Experts urge immediate updates, API access restrictions, and security audits to prevent widespread service disruptions and data leaks. (Cyber Security News)

 

Researchers uncover a LockBit ransomware attack exploiting a Windows Confluence server  

Security researchers at The DFIR Report have uncovered a LockBit ransomware attack that exploited CVE-2023-22527 in a Windows Confluence server. The attackers gained initial access through a remote code execution (RCE) vulnerability, quickly deploying Mimikatz, Metasploit, and AnyDesk to escalate privileges and move laterally across the network via RDP. They used Rclone to exfiltrate data to MEGA.io before executing the ransomware. PDQ Deploy was leveraged to automate the spread of LockBit across critical systems, ensuring widespread encryption. The entire attack—from initial compromise to ransomware deployment—was completed in just two hours.The researchers emphasize the importance of patching Confluence vulnerabilities, monitoring network activity, and restricting remote access to prevent similar intrusions. This case underscores the growing sophistication and speed of ransomware operations targeting unpatched enterprise applications. (The DFIR Report)

 

Retired Gen. Paul Nakasone warns the U.S. is falling behind in cyberspace  

Retired Gen. Paul Nakasone warned that the U.S. is falling behind in cyberspace, with adversaries expanding their capabilities. Speaking over the weekend at DistrictCon in Washington DC, he cited Chinese-backed breaches and ransomware attacks as evidence of weak cybersecurity. He also expressed concern about cyber operations causing physical damage, predicting future attacks could disable platforms through digital means. Nakasone, now at Vanderbilt University, highlighted AI’s role in cyber offense, including autonomous targeting by AI-powered drones. He questioned the limits of AI-driven cyber weapons and their ability to bypass defenses.

He endorsed a more aggressive U.S. cyber strategy, citing past Cyber Command operations against Russian and Iranian hackers. He emphasized “persistent engagement” to keep cyber enemies in check. Nakasone stressed the need for top cyber talent, warning of recruitment challenges due to past government actions. He acknowledged ongoing Cyber Command reforms but avoided direct criticism of political leadership changes, stating that presidents choose their own advisers. (Cyberscoop)

 

Australia bans Kaspersky over security concerns  

Australia has joined the growing list of countries to ban Kaspersky products from government systems. Citing national security risks and concerns over potential Russian government influence, Australian agencies must remove the software by April 1, though limited exemptions may apply for national security or law enforcement functions. In a statement to multiple outlets, Kaspersky criticized the decision, arguing it lacked technical justification and was driven by geopolitical tensions. This move follows similar bans by the U.S., U.K., and Canada within the last year. (Security Week) (The Hacker News)(Bleeping Computer)(The Record)

 

At RedSeal, we protect your network by providing precise asset visibility and attack path analysis. Our solutions help you proactively manage risks, identify vulnerabilities before they turn into threats, and ensure your defense strategy stays one step ahead. Read on for the full breakdown of this week’s critical cyber news.

Have questions? Reach out to RedSeal today to chat with one of our cybersecurity experts or schedule a demo today.

Tales from the Trenches: Early? It came online early? How do you know?

Today’s Tales from the Trenches is brought to you by Brad Schwab, Senior Security Solutions Consultant.

Regardless the size of your business, things still happen at the “speed of business.” But what does that really mean?  It means that changes do not always happen on the intended schedule, and sometimes they occur before safeguards can be put in place – all in the name of promoting the business.

This exact scenario unfolded for a RedSeal customer. This customer supports a worldwide network that is so big and in such a constant state of flux, that they continually run RedSeal’s Assisted Modeling feature. This feature looks at network device configurations and can determine if there are other missing devices not in the RedSeal Model based on designated Model Issues. Once it has a list of possible missing device targets RedSeal then performs a data collection against the targets to bring them into the model. This process repeats on the new devices and then again on any other new devices. I like to say “missing devices create missing devices…”

Here is what played out from one nightly Assisted Modeling run:

I received a call from a customer’s Head of Network Security Engineering who excitedly exclaimed that a new data center had come online early, unannounced, and that RedSeal had discovered it through Assisted Modeling. Only because of RedSeal was his team aware of the data center coming online. As we looked at the new devices that comprised the data center, things got interesting. The RedSeal deployment was setup to check and monitor all network devices for configuration hardening guidelines that had been designed, tested, and verified via RedSeal Secure Configuration Checks and Segmentation checks via RedSeal Zones and Policies. Then it got interesting.  As we reviewed the new devices in the data center, we discovered something concerning: none of the hardening guidelines had been followed, and no segmentation restrictions were in place. This situation could have posed significant security risks. Thankfully, RedSeal’s Assisted Modeling feature had already flagged these issues, giving the team a crucial heads-up before any potential harm could occur.

Sometimes a new branch, or in this case, a data center may be brought online before customer data is present. However, that would be under strict supervision and not just out of the blue. In this case, the customer was rightfully upset and at the same time very thankful for RedSeal’s Assisted Modeling feature keeping a watchful eye on the network and for the heads up on the configuration and segmentation issues.

At RedSeal, we’re committed to helping you fortify your digital infrastructure, for good. We proactively help visualize your network, identify attack paths, prioritize risk, and help you stay in compliance to ensure your business and customers stay secure.

Reach out to RedSeal or schedule a demo today.

Cyber News Roundup for February 21, 2025

The cybersecurity landscape never rests, and this week’s high-impact stories highlight the ever-evolving nature of threats and vulnerabilities. We’ve got the latest on a penetration test that escalated from a simulated breach to real-life arrests, a $500,000 business email compromise, and the latest on a critical vulnerability affecting Juniper Networks. Plus, don’t miss how Russian hackers are targeting Signal users and the ongoing risks posed by Salt Typhoon.

At RedSeal, we protect your network by providing precise asset visibility and attack path analysis. Our solutions help you proactively manage risks, identify vulnerabilities before they turn into threats, and ensure your defense strategy stays one step ahead. Read on for the full breakdown of this week’s critical cyber news.

 

The pentesters’ breach was simulated — their arrest was not  

And finally, two penetration testers from Threat Spike Labs learned the hard way that miscommunication can be more dangerous than actual hacking. During a simulated breach at a corporate office in Malta, the duo successfully gained unauthorized access, stole a master key card, and retrieved sensitive data—all part of an approved security assessment.

But then, things took a turn. The general manager who authorized the test panicked and called the police, convinced that real criminals were at work. Despite waving their authorization documents like a backstage pass at a concert, the testers were arrested and hauled in for questioning. Later, Curt Hems reflected on the experience: “Penetration tests don’t always end with a report—sometimes they end with flashing lights and handcuffs.”

Lesson learned? Tell law enforcement about security tests before they happen. Ironically, the security test worked—the company’s response was swift, even if it resulted in unnecessary arrests. (Cyber Security News)

 

Minerals company loses $500,000 to BEC scam  

NioCorp Developments, a company that operates a minerals project in southeast Nebraska focusing on the production of niobium, scandium, and titanium, has alerted regulators to a break-in that occurred on February 14. Threat actors allegedly “broke into its information systems, including portions of its email systems,” and misdirected a half-million dollars intended to be sent to a vendor. The company is taking steps to remediate the incident and to search for any additional damage. (The Register)

 

Microsoft working on fix for Windows 11 SSH connections bug  

Following up on a story we covered last November, Microsoft is now testing a fix for an issue that has been around since November which is breaking SSH connections on some Windows 11 22H2 and 23H2 systems. A fix has been included in the Windows 11 Build 26100 in its Release Preview Channel. When the problem first emerged in November, Microsoft said that only a limited number of devices running Windows 11 enterprise, IOT, and education editions were affected but the company is now investigating whether consumer customers using Windows 11 Home or Pro editions may also be at risk. (BleepingComputer)

 

Credential theft puts sensitive corporate and military networks at risk  

Hudson Rock has published an analysis of compromised credentials for sale on criminal marketplaces, finding hundreds of credentials belonging to US military agencies and contractors, Infosecurity Magazine reports. The credentials were likely stolen by infostealer malware delivered via social engineering. The researchers identified credentials belonging to accounts at Lockheed Martin, Boeing, and Honeywell, as well as the US Army and Navy, the FBI, and the Government Accountability Office. Some of the logs also included active session cookies that could allow attackers to bypass multifactor authentication. (infostealers)

 

Russian hackers tap into Signal conversations  

Russian state-backed hackers are exploiting Signal’s “linked devices” feature to hijack accounts by tricking targets—often Ukrainian military personnel—into scanning malicious QR codes. Once linked, attackers can intercept messages in real time without fully compromising the victim’s device. Google researchers identified multiple threat groups using this technique, with some embedding QR codes in phishing pages disguised as military applications or security alerts. Signal has rolled out security updates to counter these threats but urging users to take extra precautions when scanning QR codes.(Bleeping Computer)(The Record)(The Hacker News)

 

FBI official provides more detail on Salt Typhoon attack  

A top official at the FBI painted a clearer picture as to the sheer impact of the Salt Typhoon attack, speaking at the 2025 Zero Trust Summit, FBI deputy assistant director Cynthia Kaiser, emphasized the scale and indiscriminate nature of China’s data collection from major telecom providers. Officials say the breach compromised every group of people including, law enforcement information, call records, and even data on American children—raising concerns over its long-term impact. Kaiser asked the crowd, “Can any of you imagine a world in which China would have been stealing information about you as a 13-year-old? That’s precisely what American children are facing. And that’s going to follow them in the future.” Since being exposed last year, the U.S. has since sanctioned a Chinese national and a cybersecurity firm linked to the operation but Salt Typhoon remains active, with ongoing attacks on global networks.  (CyberScoop)

 

Juniper Networks has issued a critical security advisory for an API authentication bypass vulnerability  

Juniper Networks has issued a critical security advisory for CVE-2025-21589, an API authentication bypass vulnerability affecting Session Smart Router, Session Smart Conductor, and WAN Assurance Managed Router products. The flaw, with a CVSS score of 9.8, allows unauthenticated attackers to gain full administrative control by injecting spoofed JWTs, bypassing authentication checks.

Attackers can exploit this flaw to modify routing policies, intercept encrypted traffic, and move laterally across networks. The vulnerability affects multiple software versions and requires network adjacency but no user interaction. Juniper discovered the issue through internal testing, with no known exploitation as of February 18, 2025. Patches are available, and cloud-managed WAN Assurance routers received automatic fixes. Organizations must apply updates immediately, audit configurations, monitor API requests, and implement network segmentation to mitigate risks. Unpatched systems pose serious threats to SD-WAN and 5G infrastructure. (Cyber Security News)

 

CISA warns of an actively exploited iOS vulnerability  

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning about CVE-2025-24200, a zero-day vulnerability in Apple iOS and iPadOS, actively exploited in targeted attacks. The flaw, an authorization bypass in Apple’s USB Restricted Mode, allows attackers with physical access to disable security protections on locked devices, potentially exposing sensitive data.

Apple confirmed the exploit has been used in highly sophisticated attacks against high-value individuals, possibly by state-sponsored groups. The vulnerability affects a wide range of Apple devices, including iPhone XS and later models. Emergency patches were released on February 10, 2025, and CISA urges users to update before March 5. While no specific surveillance vendors are named, the attack methods resemble those used by firms like NSO Group. Users should update immediately and enforce physical security measures. (Cyber Security News)

 

Palo Alto Networks confirms a recently patched firewall vulnerability is being actively exploited  

Palo Alto Networks has confirmed that CVE-2025-0108, a recently patched firewall vulnerability, is being actively exploited. The flaw, disclosed on February 12, allows unauthenticated attackers to bypass authentication and execute PHP scripts via the PAN-OS management interface. Threat intelligence firm GreyNoise detected exploit attempts starting February 13, with attacks originating from nearly 30 unique IPs. The vulnerability can be chained with CVE-2024-9474 for remote code execution, posing a serious risk to unpatched systems.

A proof-of-concept (PoC) exploit is publicly available, and researchers warn that roughly 3,500 PAN-OS management interfaces remain exposed. Palo Alto urges immediate patching, emphasizing that securing external-facing management interfaces is critical. Assetnote, which discovered the flaw, coordinated disclosure with Palo Alto, arguing transparency helps defenders track attacks rather than leaving organizations vulnerable in the dark. (Security Week)

 

New OpenSSH Flaws Enable Man-in-the-Middle and DoS Attacks — Patch Now  

Two security vulnerabilities have been discovered in OpenSSH that could enable man-in-the-middle (MitM) attacks and denial-of-service (DoS) attacks. The MitM vulnerability affects versions 6.8p1 to 9.9p1 when the VerifyHostKeyDNS option is enabled, letting attackers impersonate legitimate servers. The DoS vulnerability affects versions 9.5p1 to 9.9p1, leading to resource exhaustion. Both issues are fixed in OpenSSH 9.9p2, which was released Tuesday. (The Hacker News)

 

Hackers waste no time exploiting a SonicWall proof-of-concept vulnerability  

Hackers are actively exploiting CVE-2024-53704, a high-severity authentication bypass in SonicWall firewalls, after a proof-of-concept (PoC) exploit was published. This vulnerability allows attackers to bypass multi-factor authentication (MFA), access private data, and disrupt VPN sessions. SonicWall released patches in January 2025, but as of February 7, around 4,500 devices remain unpatched. Arctic Wolf warns that cybercriminals often exploit firewall and VPN vulnerabilities for ransomware attacks, citing past incidents involving Akira ransomware. Organizations should immediately update SonicWall firewalls or follow mitigation steps to prevent attacks. Disabling SSLVPN is recommended if patching is not possible, as the public PoC increases the risk of exploitation. (Security Week)

 

Russian threat actors target Microsoft 365 accounts  

Volexity and Microsoft have published separate reports warning that multiple Russian threat actors are launching spearphishing attacks designed to compromise Microsoft 365 accounts. The threat actors are impersonating individuals from the US State Department, the Ukrainian Ministry of Defense, the European Union Parliament, and prominent research institutions. Volexity attributes the campaigns to at least three different Russian groups, including CozyLarch (which overlaps with Cozy Bear). Microsoft describes attacks from a Russian threat actor the company tracks as “Storm-2372.”

Notably, the attacks involve a lesser-known technique called “device code phishing,” in which users are tricked into granting access via the Microsoft Device Code OAuth workflow. Microsoft explains, “In device code phishing, threat actors exploit the device code authentication flow to capture authentication tokens, which they then use to access target accounts, and further gain access to data and other services that the compromised account has access to. This technique could enable persistent access as long as the tokens remain valid, making this attack technique attractive to threat actors.” Volexity says “this method has been more effective at successfully compromising accounts than most other targeted spear-phishing campaigns.” (Volexity, Microsoft)

 

Have questions? Reach out to RedSeal today to chat with one of our cybersecurity experts or schedule a demo today.

 

Network Security at Risk: Why Zero Trust is (Still) Non-Negotiable

As organizations expand their digital footprint and shift to more complex, hybrid infrastructures, traditional security models are no longer sufficient to protect critical networks. Relying solely on a “trust but verify” approach is riskier than ever. The solution? Zero Trust. Although Zero Trust has been a recognized security model for years, its importance has never been more urgent.

What is Zero Trust?

Zero Trust challenges the outdated perimeter-based defense strategy by assuming that threats can exist both inside and outside the network. Every user, device, and service requesting access must be authenticated and continuously validated before being granted permissions. This approach minimizes the risk of unauthorized access and lateral movement within the network, making it a cornerstone of modern cybersecurity strategies.

U.S. Treasury Department slammed by breach

In December 2024, the U.S. Treasury Department fell victim to a sophisticated cyberattack attributed to Chinese state-sponsored hackers. The breach occurred after attackers exploited vulnerabilities in BeyondTrust’s remote support software, gaining unauthorized access to unclassified documents and workstations. This attack highlights the critical need for robust security strategies that extend beyond traditional perimeter defenses, especially in complex networks.

Organizations that adhere to Zero Trust framework, minimize attackers’ abilities to move laterally within the network. With Zero Trust’s “never trust, always verify” model, every user, device, and service are continuously authenticated, regardless of location. This approach enables faster detection and response to threats—reducing the impact of breaches.

UnitedHealth Group breach impacts more than originally expected

In February 2024, a breach involving UnitedHealth Group (UHG) and Change Healthcare exposed the data of approximately 190 million individuals, significantly more than the initial 100 million reported. The BlackCat ransomware group infiltrated Change Healthcare’s network through compromised Citrix server credentials that lacked multi-factor authentication. Over several weeks, the attackers moved across the network, stealing personal, health, and financial data. Despite paying a $22 million ransom to prevent data release, the hackers retained the stolen information.

Again, this breach underscores the urgent need for Zero Trust security models in protecting sensitive healthcare data. By implementing continuous access validation and monitoring, the attackers would have encountered tighter controls, limiting their lateral movement. Zero Trust ensures that even if an entry point was compromised, impact would be minimized, providing stronger defense against future cyberattacks.

RedSeal’s role in Zero Trust security

RedSeal’s exposure management platform is key to the Zero Trust model. By providing detailed, real-time insights into your network topology, RedSeal ensures you have the visibility you need to understand exactly how assets, connections, and services are structured. This visibility is crucial to building a strong foundation for Zero Trust, enabling you to discover, investigate, and act to measurably reduce and mitigate risks.

RedSeal’s platform offers:

  • Comprehensive visualization: RedSeal brings all connected network assets into a cohesive interactive model to uncover hidden risks.
  • Attack path analysis: Only RedSeal reveals all the ways threats can breach and spread throughout the network
  • Risk prioritization: With RedSeal, measure true business impact to ensure efficient and effective remediation efforts
  • Continuous compliance: Ensure you’re up to date with external requirements, internal policies, and best practices.

Zero Trust target and advanced activities

This image from the DoD shows how Zero Trust grows in complexity over time as agencies and enterprises attempt to secure their environments across the seven pillars of Zero Trust.

Strengthening your Zero Trust framework

The successful implementation of Zero Trust relies on granular segmentation, comprehensive asset inventories, and real-time monitoring. RedSeal aids in:

  • Macro and micro-segmentation: RedSeal supports both macro-segmentation, which controls access between network segments, and micro-segmentation, which enforces policies within smaller segments, reducing the attack surface.
  • Data flow mapping: RedSeal’s ability to map data flows is essential for identifying unprotected paths and ensuring that all sensitive data is properly secured.

With RedSeal’s insights, you gain the visibility, context, and dynamic network modeling necessary to accelerate your Zero Trust journey. Whether you’re managing on-premises resources, cloud environments, or hybrid systems, RedSeal delivers the actionable insights you need to continuously secure and fortify your network.

Interested in learning more? Download our Zero Trust Solution Brief.

 Partnering with RedSeal for Zero Trust

For more than 20 years, RedSeal has been a trusted partner for organizations across industries, helping them strengthen their cybersecurity posture. By offering a digital twin of your network, RedSeal enables you to better understand and manage security risks, while aligning with industry best practices for Zero Trust.

Reach out today to learn more about how we can support your Zero Trust journey.

Cyber News Roundup for February 14, 2025

In this edition of our Cyber News Roundup, we cover the latest cybersecurity threats and critical updates from around the world. From vulnerabilities in the U.S. Coast Guard’s Maritime Transportation System to malicious mobile apps making their way into app stores, it’s clear that the threat landscape is growing more complex. RedSeal’s exposure management solutions are designed to help organizations stay ahead, providing a comprehensive view of potential vulnerabilities and attack paths.

 

The GAO  identifies cybersecurity gaps in the U.S. Coast Guard’s efforts to secure the Maritime Transportation System

The Government Accountability Office (GAO) has identified cybersecurity gaps in the U.S. Coast Guard’s efforts to secure the Maritime Transportation System (MTS) and issued five recommendations. The Coast Guard must improve incident data accuracy, enhance cyber deficiency tracking, align its strategy with national goals, and address competency gaps in cybersecurity personnel. GAO’s findings, based on reports, inspections, and stakeholder interviews from 2019 to mid-2024, highlight threats from state-sponsored actors (China, Iran, North Korea, Russia) and cybercriminals. Past cyberattacks have disrupted port operations, and future incidents could have severe consequences.

The Coast Guard assists MTS operators with cybersecurity guidance, inspections, and technical support but lacks a complete cybersecurity incident tracking system. GAO also found gaps in its cyber strategy and workforce competencies. The Department of Homeland Security (DHS) concurred with GAO’s recommendations, emphasizing the need for urgent improvements to prevent cyberattacks on critical maritime infrastructure. (Security Week)

 

The White House plans to nominate a new national cyber director

President Donald Trump plans to nominate Sean Cairncross as the next national cyber director, despite his lack of cybersecurity leadership experience. Cairncross, a longtime GOP insider, previously served as CEO of the Millennium Challenge Corporation and held senior roles within the Republican National Committee. If confirmed, he would lead the White House’s Office of the National Cyber Director (ONCD), which was created in 2021 to oversee U.S. cyber strategy. The Biden administration’s approach to ONCD was marked by leadership turnover and concerns about competing power centers. Observers worry the Trump administration may downsize the office, even as the U.S. faces growing cyber threats from China-linked hacking campaigns. Cairncross would replace Harry Coker, who recently left for Maryland’s commerce secretary role. (The Record)

 

This Ad-Tech Company Is Powering Surveillance of US Military Personnel

WIRED and 404 Media jointly report Lithuanian ad-tech company Eskimi was the source of sensitive location data on U.S. military personnel overseas, which was sold by Florida-based data broker Datastream Group. The data included precise coordinates from devices at U.S. military sites in Germany and was collected through SDKs in mobile apps. U.S. Senator Ron Wyden’s office raised national security concerns, contacting Eskimi, Lithuania’s Data Protection Authority, and Google, which listed Eskimi as an Authorized Buyer. The Lithuanian DPA is assessing the situation, and Eskimi could face penalties under GDPR if found in violation. (Wired)

 

Apple and Google take down malicious mobile apps from their app stores

In a follow up from our reporting last week, Apple and Google both removed 20 apps from their app stores after security researchers at Kaspersky discovered they contained malware called SparkCat since March 2024. The malware has been downloaded over 242,000 times, used optical character recognition to scan image galleries for cryptocurrency wallet recovery phrases and other personal information. Google banned the developers and confirmed that its Play Protect feature safeguarded users from known malware versions. Apple did not comment. (TechCrunch)

 

U.S. adversaries increasingly turning to cybercriminals and their malware for help  

According to a Google Threat Intelligence Group report, adversarial governments are increasingly leveraging cybercriminals and their tools to advance cyber-espionage goals, fueled by resource constraints and the operational demands of conflicts like the war in Ukraine. This trend is also observed in China, Iran, and North Korea, where state-sponsored hackers utilize malware and techniques commonly associated with cybercriminals to enhance deniability and cost-efficiency. Google and other cybersecurity firms warn that this growing overlap between state actors and cybercriminals poses a significant national security threat worldwide. (CyberScoop)

 

Elon Musk leads a group of investors making an unsolicited bid to acquire OpenAI  

Elon Musk and a group of investors have made a $97.4 billion unsolicited bid to acquire OpenAI, escalating his ongoing feud with CEO Sam Altman. Altman dismissed the offer on X, jokingly offering to buy Twitter for $9.74 billion, to which Musk responded, “Swindler.” Musk’s consortium, which includes Baron Capital and Valor Management, seeks to restore OpenAI’s original open-source mission. Musk argues that OpenAI has strayed from its founding principles, while his own x.AI follows the values he was promised.

The bid complicates Altman’s efforts to take OpenAI private, as the for-profit arm must fairly value the nonprofit’s assets. Musk also urged California’s attorney general to open competitive bidding. Musk co-founded OpenAI in 2015 but left in 2018. His ongoing legal battles against OpenAI focus on its shift toward profit-driven AI. In other OpenAI news, a hacker named ‘emirking’ claimed on BreachForums to be selling 20 million OpenAI credentials, but experts believe the data originates from infostealer malware, not an OpenAI breach.

OpenAI investigated and found no evidence of a compromise. Threat intelligence firm Kela analyzed the data and confirmed it matches infostealer logs, likely collected from malware like Redline, RisePro, and Vidar. The hacker’s post was later deleted, reinforcing suspicions that the claim was exaggerated. BreachForums is known for hosting misleading data breach claims. (Techspot)

 

Apple patches actively exploited zero-day  

Apple has issued emergency security updates for iOS 18 and iPadOS 18 to fix a zero-day flaw (CVE-2025-24200) that the company says “may have been exploited in an extremely sophisticated attack against specific targeted individuals.” The company explained, “A physical attack may disable USB Restricted Mode on a locked device.” USB Restricted Mode is designed to block forensic tools from accessing data on devices that have been locked for more than an hour. Apple credits the flaw’s discovery to Bill Marczak from the University of Toronto’s Citizen Lab. The company hasn’t shared specifics on the potential exploitation, but BleepingComputer notes that Citizen Lab often focuses on exploits used by commercial spyware tools. (AppleBleepingcomputer)

 

A peak at DeepSeek’s weak security  

According to researchers at AppSOC, DeepSeek’s R1 large language model failed various security tests for business applications, largely due to a lack of comprehensive guardrails. They found that R1 could not prevent users from creating malware 93% of the time. They could also jailbreak away from system safeguards 91% of the time. The model showed stronger scores when it came to leaking training data, failing in 1.4% of attempts. But overall, the researchers found it extremely easy to cause the model to hallucinate and generate toxic or harmful content. (Dark Reading)

 

Sandworm targeting Ukraine with trojanized KMS  

Researchers at EclecticIQ found signs that since late 2023, the Russian cyber-espionage group Sandworm began using fake Windows updates and a trojanized version of Microsoft Key Management Service activators to target victims in Ukraine. There was evidence of seven malware campaigns using these similar lures. The attack starts by attracting victims to typo-squatted domains to get the DcRAT trojan on their machine. From there, it presents a fake Windows activation interface, disables Windows Defender, and delivers a further payload. This approach appears effective due to the prominent use of pirated software in Ukraine, even in the government sector. (Bleeping Computer)

 

Google Tag Manager used to deploy card skimmers  

Just when you thought it was safe to go shopping. A handful of sites were discovered to be using what looked like a typical Google Tag Manager and Google Analytics script for store analytics but included a containerized backdoor that allowed for persistent access, according to researchers at Sucuri. This was used to collect payment information during the checkout process. What vector is being used to get the script onto these sites is unclear. (The Hacker News)

 

Have questions? Reach out to RedSeal today to chat with one of our cybersecurity experts or schedule a demo today.