<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[CISO Talk by James Azar]]></title><description><![CDATA[The latest news and topics from a cybersecurity practitioners discussing Cybersecurity, Privacy, Technology & Geo-Politics. I am a two times Founder and Chief Information Security Officer. All opinions are my own]]></description><link>https://www.cyberhubpodcast.com</link><image><url>https://substackcdn.com/image/fetch/$s_!r32m!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4fb3476-5e78-42fb-a02d-ffcc85932554_1280x1280.png</url><title>CISO Talk by James Azar</title><link>https://www.cyberhubpodcast.com</link></image><generator>Substack</generator><lastBuildDate>Thu, 30 Apr 2026 11:09:16 GMT</lastBuildDate><atom:link href="https://www.cyberhubpodcast.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[James Azar]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[jamesazar@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[jamesazar@substack.com]]></itunes:email><itunes:name><![CDATA[James Azar]]></itunes:name></itunes:owner><itunes:author><![CDATA[James Azar]]></itunes:author><googleplay:owner><![CDATA[jamesazar@substack.com]]></googleplay:owner><googleplay:email><![CDATA[jamesazar@substack.com]]></googleplay:email><googleplay:author><![CDATA[James Azar]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Critical GitHub RCE Vulnerability Allows Full Server Compromise With a Single Git Push, VECT 2.0 Ransomware Revealed as Accidental Data Wiper, ShinyHunters Breach Vimeo]]></title><description><![CDATA[Vimeo confirms ShinyHunters/Anodot breach, GitHub patches CVE-2026-3854 RCE, LiteLLM exploited 36 hours after disclosure, VECT 2.0 wiper masquerades as ransomware, North Korea hunts Web3 execs]]></description><link>https://www.cyberhubpodcast.com/p/critical-github-rce-vulnerability</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/critical-github-rce-vulnerability</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Wed, 29 Apr 2026 13:31:16 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/195825718/de5ebe079e495def4ff4eafb927cc2c5.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p><em>Daily cybersecurity news for security practitioners &#8212; no FUD, just risk, impact, and mitigation. </em></p><h1>&#9749; <strong>Good Morning Security Gang,</strong></h1><p>Today&#8217;s episode is one of those that hits every layer of the stack from SaaS breaches to AI exploitation, from ransomware evolution to geopolitical cyber pressure.</p><p>And if there&#8217;s one theme that ties everything together today, it&#8217;s this:<br>&#128073; Attackers are targeting both the systems that run your environment and the people who have access to them.</p><p>Double espresso in hand, let&#8217;s dive in.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!f4M2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc50b6ba7-beb7-4f2b-9ce5-f0869d6ffa2c_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f4M2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc50b6ba7-beb7-4f2b-9ce5-f0869d6ffa2c_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!f4M2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc50b6ba7-beb7-4f2b-9ce5-f0869d6ffa2c_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!f4M2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc50b6ba7-beb7-4f2b-9ce5-f0869d6ffa2c_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!f4M2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc50b6ba7-beb7-4f2b-9ce5-f0869d6ffa2c_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f4M2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc50b6ba7-beb7-4f2b-9ce5-f0869d6ffa2c_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c50b6ba7-beb7-4f2b-9ce5-f0869d6ffa2c_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:282604,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/195825718?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc50b6ba7-beb7-4f2b-9ce5-f0869d6ffa2c_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f4M2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc50b6ba7-beb7-4f2b-9ce5-f0869d6ffa2c_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!f4M2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc50b6ba7-beb7-4f2b-9ce5-f0869d6ffa2c_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!f4M2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc50b6ba7-beb7-4f2b-9ce5-f0869d6ffa2c_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!f4M2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc50b6ba7-beb7-4f2b-9ce5-f0869d6ffa2c_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>&#129517; <strong>Executive Summary</strong></h1><p>Today&#8217;s episode highlights a convergence of SaaS supply chain breaches, CI/CD vulnerabilities, AI gateway exploitation, and evolving ransomware tactics. At the same time, nation-state actors are doubling down on long-term social engineering campaigns, while governments begin aligning policy and regulation around AI security.</p><p>The risk environment is no longer siloed identity, automation, AI, and human behavior are now interconnected attack surfaces, and attackers are exploiting them simultaneously.</p><h1>&#128240; <strong>Top Stories &amp; Deep Dive Analysis</strong></h1><h2>&#127909; <strong>Vimeo Breach &#8211; Third-Party Risk Continues to Expand</strong></h2><p>Vimeo confirmed a breach stemming from a compromise of its third-party analytics vendor, Anodot, exposing customer data including emails, video metadata, and technical information. ShinyHunters has set a public deadline for ransom payment, threatening to release the data if demands are not met.</p><p>This is part of a broader campaign we&#8217;ve been tracking across multiple organizations, where attackers compromise SaaS ecosystems through third-party integrations rather than direct attacks. The real risk here isn&#8217;t just the exposed data, it&#8217;s the follow-on attacks. Metadata and email exposure enable highly targeted phishing campaigns, especially against content creators and enterprise users relying on Vimeo workflows.</p><h2>&#128187; <strong>GitHub RCE &#8211; One Push to Compromise the System</strong></h2><p>A critical command injection vulnerability in GitHub&#8217;s <code>git push</code> pipeline allows authenticated users with push access to execute remote code on the instance with a single command. While GitHub.com deployed a rapid fix, self-hosted and enterprise environments remain at risk until patched.</p><p>This vulnerability represents a direct threat to the software development lifecycle. CI/CD pipelines are designed for automation and speed, but this same efficiency becomes a liability when exploited. Attackers gaining control of these pipelines can inject malicious code, access secrets, and compromise production environments without needing traditional lateral movement.</p><h2>&#129302; <strong>LiteLLM Exploit &#8211; AI Gateway Becomes Data Exfiltration Tool</strong></h2><p>Attackers began exploiting a pre-authentication SQL injection vulnerability in LiteLLM just 36 hours after disclosure. As a gateway platform connecting multiple AI providers, LiteLLM stores API keys and credentials, making it a high-value target.</p><p>The vulnerability allows attackers to extract sensitive data directly from backend databases, including cloud credentials and API keys. This highlights a growing issue AI orchestration layers are being deployed without the same security rigor as traditional infrastructure, creating new high-risk entry points into enterprise environments.</p><h2>&#128163; <strong>VECT Ransomware &#8211; When Encryption Becomes Destruction</strong></h2><p>Checkpoint Research analyzed VECT ransomware, revealing that its encryption process is fundamentally flawed. Instead of enabling decryption after payment, the malware discards critical data during encryption, effectively making recovery impossible.</p><p>This transforms ransomware into a wiper event disguised as extortion. Organizations impacted by VECT cannot recover data even if they pay, shifting the focus entirely to prevention and resilience. This represents a dangerous evolution where attackers either don&#8217;t care about recovery&#8212;or are unable to provide it.</p><h2>&#129504; <strong>North Korea Campaign &#8211; Six Months of Social Engineering</strong></h2><p>A North Korea-linked group conducted a six-month campaign targeting Web3 executives, using sophisticated social engineering techniques to gain access to wallets, admin panels, and private keys.</p><p>The campaign culminated in a major crypto theft, demonstrating the effectiveness of long-term, relationship-based attacks. Unlike traditional phishing, these operations build trust over time, making them far more difficult to detect and prevent. This reinforces that humans remain one of the most critical and vulnerable attack surfaces.</p><h2>&#128647; <strong>Singapore Infrastructure Incident &#8211; Supply Chain in Critical Systems</strong></h2><p>A cybersecurity incident affecting a contractor involved in Singapore&#8217;s MRT rail and water infrastructure highlights the risk of third-party access to critical systems.</p><p>Even though public-facing data may be available elsewhere, the contractor&#8217;s access to internal systems introduces a potential pathway for attackers into sensitive infrastructure environments. This underscores the importance of tight access control and monitoring for vendors operating within critical sectors.</p><h2>&#127963;&#65039; <strong>White House AI Cyber Huddle &#8211; Policy Meets Technology</strong></h2><p>Senior U.S. officials convened a cybersecurity summit with leading AI and tech executives to address risks associated with advanced AI systems ahead of upcoming releases like Anthropic&#8217;s Mythos.</p><div class="pullquote"><p>"JD Vance, whether you like him or not as vice president, is Ivy League educated, a very smart individual, a younger VP with time in Silicon Valley working with some of the big players in the venture capital space. The West Wing is leading the charge here they're not waiting for the cyber czar or CISA or DHS or even the Pentagon. The White House itself is operating at this level on AI security. We ought to prepare ourselves for board-level questions of what may happen here." James Azar</p></div><p>This signals a shift where AI security is no longer just a technical issue&#8212;it&#8217;s a national priority. Organizations should expect increased scrutiny, regulatory requirements, and board-level discussions around AI risk management in the near future.</p><h2>&#128220; <strong>AI Regulation Advances &#8211; Bipartisan Momentum Builds</strong></h2><p>New bipartisan legislation aims to regulate AI chatbot usage, focusing on fraud prevention, parental controls, and transparency.</p><p>This aligns with broader federal efforts to establish guardrails around AI deployment. For organizations, this means preparing for compliance requirements, data transparency expectations, and enhanced fraud detection responsibilities tied to AI systems.</p><h2>&#128202; <strong>Cyber Insurance Data &#8211; MFA Misconfiguration Leads Losses</strong></h2><p>Cyber insurance data reveals that misconfigured MFA accounts for nearly 26% of total losses, making it the single largest contributor to financial impact. Meanwhile, ransomware represents a smaller portion of incidents but drives the majority of financial damage.</p><blockquote><p>&#8220;Cyber risk isn&#8217;t just technical anymore, it&#8217;s financial, human, and regulatory all at once.&#8221;</p></blockquote><p>This provides a clear, data-driven insight: basic security controls, when misconfigured, can have outsized financial consequences. It also highlights how boards respond more effectively to financial metrics than technical risk descriptions.</p><h1>&#128736;&#65039; <strong>Action Items for Security Leaders</strong></h1><ul><li><p>&#128272; Rotate credentials and tokens tied to SaaS and AI integrations</p></li><li><p>&#128187; Patch GitHub Enterprise and audit push access permissions immediately</p></li><li><p>&#129302; Upgrade and secure LiteLLM deployments; rotate exposed API keys</p></li><li><p>&#128190; Treat ransomware scenarios as potential wiper events; validate backups</p></li><li><p>&#129504; Implement phishing-resistant MFA, especially for executive accounts</p></li><li><p>&#128647; Audit third-party access to critical infrastructure systems</p></li><li><p>&#127963;&#65039; Prepare board-level briefings on AI security and regulatory risk</p></li><li><p>&#128220; Begin mapping AI data flows and compliance requirements</p></li><li><p>&#128202; Use cyber insurance data to justify budget and control investments</p></li><li><p>&#128269; Monitor for abnormal activity in CI/CD and AI pipeline environments</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/critical-github-rce-vulnerability/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/critical-github-rce-vulnerability/comments"><span>Leave a comment</span></a></p><h2>&#129504; <strong>James Azar&#8217;s CISOs Take</strong></h2><p>What stood out to me today is how attackers are blending technical exploitation with human manipulation. The GitHub RCE and LiteLLM vulnerabilities show how easily automation layers can be compromised, while the North Korea campaign highlights how effective patient social engineering can be. When these two come together&#8212;technical access and human trust&#8212;the impact becomes exponential.</p><p>The second takeaway is that cybersecurity is no longer just about defense&#8212;it&#8217;s about alignment. Alignment between security and business, between technology and policy, and between risk and financial impact. The cyber insurance data makes it clear: when we frame risk in dollars, it resonates. And that&#8217;s how we drive real change at the executive level.</p><p>&#128293; <strong>Stay Cyber Safe.</strong></p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/critical-github-rce-vulnerability?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/critical-github-rce-vulnerability?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/critical-github-rce-vulnerability?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[🎙️ Pre-Stuxnet Malware Resurfaces Amid Tensions | Windows Zero-Click Risk Grows | $2.1B Scam Surge 🚨]]></title><description><![CDATA[Zero-Click Windows Exploits, AI Pipeline RCE, and a $21B Scam Economy, Why Trust and Automation Are Breaking Together]]></description><link>https://www.cyberhubpodcast.com/p/pre-stuxnet-malware-resurfaces-amid</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/pre-stuxnet-malware-resurfaces-amid</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Tue, 28 Apr 2026 13:31:55 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/195710023/d03eeff838c47e63f4632333a13bb946.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<h1>&#9749; <strong>Good Morning Security Gang,</strong></h1><p>Today&#8217;s episode is one of those where you step back and realize just how fast everything is evolving and breaking at the same time.</p><p>We&#8217;ve got zero-click Windows exploitation, AI pipeline RCE, supply chain compromise hitting critical developer ecosystems, a massive spike in social engineering fraud, and even a pre-Stuxnet malware discovery rewriting cyber history.</p><p>&#128073; The theme today is simple: automation and trust are being weaponized simultaneously.</p><p>Double espresso ready, let&#8217;s go.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!d_GV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ac6c339-7c9f-485b-a4b0-12cda56ec4a8_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!d_GV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ac6c339-7c9f-485b-a4b0-12cda56ec4a8_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!d_GV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ac6c339-7c9f-485b-a4b0-12cda56ec4a8_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!d_GV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ac6c339-7c9f-485b-a4b0-12cda56ec4a8_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!d_GV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ac6c339-7c9f-485b-a4b0-12cda56ec4a8_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!d_GV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ac6c339-7c9f-485b-a4b0-12cda56ec4a8_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2ac6c339-7c9f-485b-a4b0-12cda56ec4a8_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:253035,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/195710023?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ac6c339-7c9f-485b-a4b0-12cda56ec4a8_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!d_GV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ac6c339-7c9f-485b-a4b0-12cda56ec4a8_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!d_GV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ac6c339-7c9f-485b-a4b0-12cda56ec4a8_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!d_GV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ac6c339-7c9f-485b-a4b0-12cda56ec4a8_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!d_GV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ac6c339-7c9f-485b-a4b0-12cda56ec4a8_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>&#129517; <strong>Executive Summary</strong></h1><p>Today&#8217;s landscape reflects a convergence of identity abuse, developer ecosystem compromise, AI tooling risk, and large-scale financial fraud. Attackers are leveraging legitimate infrastructure, trusted platforms, and automation pipelines to operate at unprecedented speed and scale.</p><p>We&#8217;re also seeing regression in patching effectiveness, with incomplete fixes enabling zero-click exploitation, and a continued shift toward developer environments and AI pipelines as primary attack surfaces. Meanwhile, consumer fraud is reaching record levels, proving that cyber risk is no longer just enterprise, it&#8217;s societal.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><h1>&#128240; <strong>Top Stories &amp; Deep Dive Analysis</strong></h1><h2>&#127973; <strong>Medtronic Breach &#8211; ShinyHunters Expands the SaaS Playbook</strong></h2><p>Medtronic confirmed unauthorized access to corporate IT systems after ShinyHunters claimed over 9 million records and terabytes of internal data. The company executed its incident response plan, and the leak listing has since disappeared typically a signal of ransom negotiations or payment.</p><p>What matters here is the pattern. This aligns with previous breaches targeting SaaS ecosystems phishing identity providers and pivoting into platforms like Salesforce. Even if no medical devices or patient systems were impacted, the exposure of corporate workflows and PII creates a downstream risk for targeted phishing against healthcare providers and field engineers, expanding the blast radius beyond the initial breach.</p><h2>&#128233; <strong>Robinhood Phishing Abuse &#8211; Legitimate Infrastructure Turned Weapon</strong></h2><p>This is one of the most creative attacks we&#8217;ve seen.</p><p>Attackers created Robinhood accounts using email variations (leveraging Gmail&#8217;s dot normalization), triggering legitimate login notifications sent from Robinhood&#8217;s own infrastructure. These emails passed all authentication checks&#8212;SPF, DKIM, DMARC, but included a malicious link embedded within user-controlled fields.</p><p>This marks a shift from spoofing to platform abuse, where attackers weaponize trusted communication channels themselves. The risk is significant because traditional email defenses are bypassed entirely making detection reliant on application-layer validation and user awareness rather than technical controls alone.</p><h2>&#128176; <strong>$2.1 Billion Social Media Scam Surge &#8211; Cybercrime at Scale</strong></h2><p>The FTC reported that Americans lost over $2.1 billion to social media-driven scams in 2025, an eightfold increase since 2020. Investment scams alone accounted for more than half of that total.</p><p>This isn&#8217;t just a statistic, it&#8217;s a signal. Social platforms have become the primary entry point for fraud, with attackers leveraging trust, relationships, and financial pretexts to drive engagement.</p><p>The real takeaway is that cyber risk is no longer confined to enterprise systems. It&#8217;s now deeply embedded in consumer behavior, social interaction, and financial decision-making, making awareness and education just as critical as technical controls.</p><h2>&#128275; <strong>Checkmarx Breach Escalation &#8211; Source Code Hits the Dark Web</strong></h2><p>Checkmarx confirmed that data from its GitHub repositories, compromised during a March supply chain attack, has now been published on the dark web.</p><p>This escalation removes any ambiguity the exposure is now global and permanent. Attackers previously injected credential-stealing code into GitHub Actions workflows, meaning any environment that interacted with those pipelines may have leaked sensitive tokens or credentials.</p><p>This is a critical moment for defenders: once data is public, response shifts from containment to damage control and credential rotation at scale.</p><h2>&#129513; <strong>73 Malicious VS Code Extensions &#8211; Developer Layer Under Attack</strong></h2><p>Researchers identified 73 fake extensions in the Open VSX marketplace linked to the Glass Worm operation. These extensions initially appeared benign, building trust before later updates introduced malicious payloads.</p><p>The attack chain includes:</p><ul><li><p>Typosquatting popular extensions</p></li><li><p>Delayed activation (&#8220;sleeper&#8221; model)</p></li><li><p>Secondary payload delivery via GitHub-hosted components</p></li></ul><p>This is a direct attack on the developer ecosystem. A single compromised extension can expose source code, credentials, and SSH keys, turning a developer workstation into a high-value entry point for attackers.</p><h2>&#129516; <strong>PyPI Package Hijack &#8211; Supply Chain Risk in Data Engineering</strong></h2><p>The widely used &#8220;elementary-data&#8221; package (1.1M monthly downloads) was hijacked, with attackers publishing a malicious version that exfiltrated credentials, environment variables, and crypto wallets.</p><p>The attack leveraged GitHub Actions script injection to gain access, forge legitimate commits, and distribute compromised builds.</p><p>This highlights a growing trend: attackers targeting CI/CD pipelines and package registries simultaneously, enabling rapid propagation across developer environments and production systems.</p><h2>&#129695; <strong>Windows Zero-Click Vulnerability &#8211; Patch Regression Exploited</strong></h2><p>Akamai revealed that a recent Windows vulnerability (CVE-2026-32202) stems from an incomplete patch to a previous flaw, enabling zero-click exploitation via malicious LNK files.</p><p>Attackers can now trigger NTLM authentication or bypass security prompts simply by having the file present&#8212;no user interaction required.</p><p>This is particularly concerning because it demonstrates patch regression risk, where incomplete fixes create new attack paths. It also reinforces that patching alone is not a guarantee of security.</p><h2>&#129302; <strong>Gemini CLI RCE &#8211; AI Pipeline Becomes Attack Vector</strong></h2><p>A critical vulnerability in Google&#8217;s Gemini CLI allows remote code execution in CI environments by abusing trusted workspace configurations and environment variables.</p><p>In headless or automated environments, the CLI implicitly trusts local files and settings, allowing attackers to embed malicious configurations in repositories that execute upon pipeline invocation.</p><p>This turns AI tooling into a remote execution layer within CI/CD pipelines, expanding the attack surface into automated workflows that often lack human oversight.</p><h2>&#127464;&#127475; <strong>Silk Typhoon Extradition &#8211; State Actors Face Consequences</strong></h2><p>A suspected Chinese cyber operative linked to Silk Typhoon was extradited to the U.S., facing charges tied to the mass exploitation of Microsoft Exchange vulnerabilities.</p><p>This marks a rare but significant development in holding state-aligned actors accountable. While it may not deter all activity, it signals increasing willingness to pursue legal action against cyber operators globally.</p><h2>&#129504; <strong>Pre-Stuxnet Malware Discovery &#8211; Cyber Warfare Started Earlier Than We Thought</strong></h2><p>SentinelLabs uncovered a malware strain predating Stuxnet by at least five years, targeting engineering and simulation platforms used in nuclear research.</p><p>This discovery rewrites the timeline of cyber warfare, showing that sophisticated sabotage capabilities existed as early as 2005.</p><p>The implication is profound: cyber operations as strategic tools have been evolving far longer than most organizations have been defending against them.</p><h1>&#128736;&#65039; <strong>Action Items for Security Leaders</strong></h1><ul><li><p>&#128272; Rotate all credentials tied to Checkmarx and compromised CI pipelines</p></li><li><p>&#128233; Audit transactional email templates for user-controlled input injection</p></li><li><p>&#129513; Restrict developer environments to approved extensions and package sources</p></li><li><p>&#129516; Pin and verify all dependencies in npm and PyPI ecosystems</p></li><li><p>&#129695; Apply Windows patches and monitor for abnormal NTLM authentication activity</p></li><li><p>&#129302; Secure AI tooling in CI/CD pipelines and restrict environment trust boundaries</p></li><li><p>&#128176; Implement organization-wide awareness training on social media scams</p></li><li><p>&#128269; Monitor SaaS platforms for phishing-based identity compromise patterns</p></li><li><p>&#128202; Enhance detection for OAuth abuse and API-based data exfiltration</p></li><li><p>&#127757; Incorporate geopolitical cyber activity into risk modeling and response plans</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/pre-stuxnet-malware-resurfaces-amid/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/pre-stuxnet-malware-resurfaces-amid/comments"><span>Leave a comment</span></a></p><h1>&#129504; <strong>James Azar&#8217;s CISOs Take</strong></h1><p>What stood out to me today is how attackers are leveraging trust at every level from email infrastructure to developer tools to AI pipelines. We&#8217;ve spent years building systems to automate and simplify workflows, but in doing so, we&#8217;ve also created pathways that attackers can exploit with minimal friction. The Robinhood case and the Gemini CLI vulnerability are perfect examples of how legitimate systems can be turned into attack vectors.</p><p>The second takeaway is speed. Supply chain attacks, phishing campaigns, and fraud operations are all happening faster than ever before. By the time we detect an issue, attackers have already pivoted, propagated, and monetized. That means our defenses need to evolve not just to prevent compromise, but to detect and respond in near real time. Because in this environment, the organizations that can&#8217;t keep up won&#8217;t just fall behind, they&#8217;ll become targets.</p><p>&#128293; <strong>Stay Cyber Safe.</strong></p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/pre-stuxnet-malware-resurfaces-amid?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/pre-stuxnet-malware-resurfaces-amid?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/pre-stuxnet-malware-resurfaces-amid?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[Cisco IOS XE "Firestarter" Hits KEV, ADT 10M-Record Leak, Gen. Haugh's Iran Escalation Warning, what defenders need to do today.]]></title><description><![CDATA[Federal Backdoors, SaaS Breach Chains, and a 12-Year Linux Flaw&#8212;Why Exposure and Tempo Are Defining Cyber Risk]]></description><link>https://www.cyberhubpodcast.com/p/cisco-ios-xe-firestarter-hits-kev</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/cisco-ios-xe-firestarter-hits-kev</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Mon, 27 Apr 2026 13:31:11 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/195582943/832b9254bd7038f23af58447a7f3342b.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<h1>&#9749; <strong>Good Morning Security Gang,</strong></h1><p>We&#8217;re kicking off the week with a <strong>packed 10-story rundown</strong> that hits everything from federal edge compromises to SaaS breach chains, supply chain worms, and even a 12-year-old Linux root flaw still alive and well.</p><p>If last week was about trust breaking, this week is about <strong>exposure at speed</strong>. Attackers are moving faster, pivoting across ecosystems, and exploiting anything left unpatched, unsegmented, or simply forgotten.</p><p>Double espresso ready; let&#8217;s get into it.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6cmA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa70b7bc0-6fbd-45bb-b8bb-2cc8a182f7a6_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6cmA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa70b7bc0-6fbd-45bb-b8bb-2cc8a182f7a6_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!6cmA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa70b7bc0-6fbd-45bb-b8bb-2cc8a182f7a6_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!6cmA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa70b7bc0-6fbd-45bb-b8bb-2cc8a182f7a6_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!6cmA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa70b7bc0-6fbd-45bb-b8bb-2cc8a182f7a6_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6cmA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa70b7bc0-6fbd-45bb-b8bb-2cc8a182f7a6_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a70b7bc0-6fbd-45bb-b8bb-2cc8a182f7a6_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:243680,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/195582943?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa70b7bc0-6fbd-45bb-b8bb-2cc8a182f7a6_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6cmA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa70b7bc0-6fbd-45bb-b8bb-2cc8a182f7a6_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!6cmA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa70b7bc0-6fbd-45bb-b8bb-2cc8a182f7a6_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!6cmA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa70b7bc0-6fbd-45bb-b8bb-2cc8a182f7a6_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!6cmA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa70b7bc0-6fbd-45bb-b8bb-2cc8a182f7a6_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>&#129517; <strong>Executive Summary</strong></h1><p>Today&#8217;s stories highlight two critical realities:</p><ol><li><p>Exposure is everywhere&#8212;from SaaS identity chains to federal firewalls to developer ecosystems</p></li><li><p>Tempo is accelerating&#8212;attackers are chaining exploits, pivoting faster, and monetizing access almost immediately</p></li></ol><p>We&#8217;re seeing convergence across edge infrastructure compromise, SaaS phishing chains, supply chain propagation, and legacy system exploitation, all amplified by a pace that most organizations struggle to match operationally.</p><h2>&#128737;&#65039; <strong>CISA KEV Additions &#8211; Remote Access Tools Become Enterprise Gateways</strong></h2><p>CISA added multiple actively exploited vulnerabilities to the KEV catalog, including flaws in SimpleHelp, Samsung MagicINFO, and D-Link routers.</p><p>What makes this particularly dangerous is the role these systems play. SimpleHelp, for example, is widely used as a remote support tool. A compromised technician account doesn&#8217;t just impact one system&#8212;it can cascade across every client environment that tool touches.</p><p>This is a recurring pattern: attackers aren&#8217;t targeting endpoints&#8212;they&#8217;re targeting tools that manage endpoints, turning a single foothold into multi-tenant compromise.</p><h2>&#128293; <strong>Firestarter Backdoor &#8211; Federal Cisco ASA Compromise Persists</strong></h2><p>A Linux-based backdoor dubbed <em>Firestarter</em> was discovered on a federal Cisco ASA firewall, persisting even after firmware updates.</p><p>The malware survives by intercepting termination signals and relaunching itself, meaning standard patching or rebooting does nothing to remove it.</p><p>This changes the playbook. Instead of patching, organizations must fully power down, reimage, and rotate all credentials tied to the device.</p><p>The broader implication is serious: edge infrastructure is now a long-term persistence layer for attackers, not just an entry point.</p><h2>&#127968; <strong>ADT Breach &#8211; Phishing to SaaS Chain Hits Again</strong></h2><p>ADT disclosed a breach involving unauthorized access to cloud environments, with attackers leveraging phishing against Okta to gain entry and pivot into Salesforce.</p><p>This is now a well-established attack chain:</p><ul><li><p>Phishing &#8594; Identity provider compromise</p></li><li><p>Pivot &#8594; SaaS platform access</p></li><li><p>Extract &#8594; Customer data at scale</p></li></ul><p>With a 10 million record leak potentially imminent, this case reinforces that SaaS ecosystems are only as secure as the identity layer protecting them.</p><p>And attackers know it.</p><h2>&#129513; <strong>Checkmarx Supply Chain Attack &#8211; CI/CD Integrity at Risk</strong></h2><p>Checkmarx was hit again, with attackers compromising Docker images and VS Code extensions tied to its KICS analysis tool.</p><p>Although exposure lasted less than 90 minutes, that&#8217;s more than enough time in modern pipelines. Any system pulling updates during that window could now be compromised.</p><p>This highlights a key issue: CI/CD pipelines operate at machine speed, but security validation often lags behind, creating a window attackers can exploit repeatedly.</p><h2>&#128039; <strong>Pack2TheRoot &#8211; 12-Year Linux Privilege Escalation Flaw</strong></h2><p>A privilege escalation flaw present since 2014 has been confirmed exploitable across major Linux distributions.</p><p>This vulnerability allows a low-privileged user to escalate to root through PackageKit, meaning any malware landing on a Linux endpoint can immediately gain full control.</p><p>This is not a zero-day, it&#8217;s worse. It&#8217;s a decade-old design flaw that went largely unnoticed, proving that legacy components remain one of the biggest risks in modern environments.</p><h2>&#9889; <strong>Itron Breach &#8211; Utility Supply Chain Risk Expands</strong></h2><p>Itron disclosed unauthorized access to corporate IT systems, though no customer environments were impacted.</p><p>Even so, the implications are significant. Itron operates in the utility and grid-edge ecosystem, meaning any compromise raises concerns about downstream risk to critical infrastructure.</p><p>This reinforces a key shift: attackers are increasingly targeting vendors and suppliers as indirect entry points into high-value environments.</p><h2>&#129516; <strong>NPM &#8594; PyPI Worm &#8211; Cross-Ecosystem Supply Chain Attack</strong></h2><p>The supply chain worm we&#8217;ve been tracking continues to evolve, now spreading across both npm and PyPI ecosystems.</p><p>This worm:</p><ul><li><p>Harvests credentials from developer environments</p></li><li><p>Uses stolen tokens to publish malicious packages</p></li><li><p>Propagates automatically across repositories</p></li></ul><p>This is supply chain compromise at industrial scale. One compromised developer machine can now infect multiple ecosystems within hours, making containment extremely difficult.</p><h2>&#128190; <strong>Vercel Data Leak &#8211; Breach Data Hits Underground Markets</strong></h2><p>Data from the earlier Vercel breach has now surfaced for sale, including access keys, source code, and internal databases.</p><p>Although the listing was removed, the assumption must be that the data is already circulating.</p><p>The attack chain starting with infostealer malware and OAuth token theft&#8212;shows how endpoint compromise can quickly escalate into cloud environment exposure.</p><h2>&#128241; <strong>Apple App Store &#8211; 26 Fake Crypto Wallet Apps Discovered</strong></h2><p>Kaspersky identified 26 malicious crypto wallet apps on Apple&#8217;s App Store, impersonating major platforms like Coinbase and MetaMask.</p><p>These apps harvested recovery phrases and even used OCR to extract sensitive data from screenshots.</p><p>This challenges a long-held assumption: app stores are no longer a reliable trust boundary, especially for financial applications.</p><h2>&#127757; <strong>Iran Threat Model &#8211; From Destruction to Influence</strong></h2><p>Industry leaders are reframing Iran&#8217;s cyber posture, suggesting a shift from large-scale infrastructure attacks to targeted opportunistic breaches amplified through information operations.</p><p>Instead of shutting down power grids, the focus is now:</p><ul><li><p>Breach a target</p></li><li><p>Publicize it</p></li><li><p>Amplify impact through media</p></li></ul><p>This aligns with broader geopolitical trends where perception and narrative are as valuable as technical impact.</p><h1>&#127919; <strong>Key Takeaway</strong></h1><p>&#128073; <strong>Exposure + Speed = Modern Cyber Risk</strong></p><p>Attackers are no longer waiting. They&#8217;re exploiting, pivoting, and monetizing in real time.</p><h1>&#128736;&#65039; <strong>Action Items for Security Leaders</strong></h1><ul><li><p>&#128272; Patch all KEV-listed vulnerabilities immediately</p></li><li><p>&#128293; Reimage and hard reset compromised edge devices (do not rely on patching alone)</p></li><li><p>&#129513; Enforce phishing-resistant MFA across identity providers</p></li><li><p>&#128269; Audit SaaS integrations, especially Okta and Salesforce chains</p></li><li><p>&#128640; Validate CI/CD pipelines and restrict external dependency pulls</p></li><li><p>&#128039; Patch Linux systems and monitor for privilege escalation activity</p></li><li><p>&#129516; Rotate all npm and PyPI tokens and enforce strict credential hygiene</p></li><li><p>&#9889; Conduct vendor risk assessments for critical infrastructure suppliers</p></li><li><p>&#128241; Restrict unverified mobile app installations through MDM policies</p></li><li><p>&#127757; Prepare incident response playbooks for reputational and information warfare scenarios</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/cisco-ios-xe-firestarter-hits-kev/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/cisco-ios-xe-firestarter-hits-kev/comments"><span>Leave a comment</span></a></p><h1>&#129504; <strong>James Azar&#8217;s CISOs Take</strong></h1><p>What stood out to me today is how much of our risk is tied to systems we assume are already secure. Whether it&#8217;s a firewall that survives patching, a SaaS chain built on identity trust, or a Linux component that&#8217;s been around for over a decade, attackers are finding value in what we&#8217;ve stopped questioning. That&#8217;s the real challenge, we&#8217;re defending what we see, while attackers exploit what we&#8217;ve forgotten.</p><p>The second takeaway is tempo. Every story today reflects a faster cycle from compromise to propagation to monetization. Supply chain worms spread in hours. SaaS breaches turn into data leaks within days. If our detection and response don&#8217;t match that speed, we&#8217;re always going to be behind. The future of security isn&#8217;t just about control it&#8217;s about <strong>keeping up</strong>.</p><p>&#128293; <strong>Stay Cyber Safe.</strong></p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/cisco-ios-xe-firestarter-hits-kev?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/cisco-ios-xe-firestarter-hits-kev?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/cisco-ios-xe-firestarter-hits-kev?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[This Week in Cybersecurity #49]]></title><description><![CDATA[Your weekend catch-up on the most critical cybersecurity stories of the week, curated by James Azar and the CyberHub Security Gang.]]></description><link>https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-49</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-49</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Fri, 24 Apr 2026 15:12:37 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!4eCm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7176628-2c84-4c86-a959-e949aeaa00ca_1920x1080.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3><strong>Good Morning, Security Gang!</strong></h3><p>James is settling into new-parent mode &#8212; running on three hours of sleep and double espresso, which, as he puts it, is excellent preparation for a career in cybersecurity incident response. Welcome to the party, baby Azar.</p><div class="pullquote"><p><em>&#8220;A career in cyber will help you understand what it&#8217;s like to only function on three or four hours of sleep. If you&#8217;ve ever been through an incident, you know the marathon you&#8217;re going through in the hours and days post-event until you get the all-clear signal. Your career kind of prepares you for parenting &#8212; so don&#8217;t hold back, go make yourself some little ones, join the party, it&#8217;s a blast!&#8221;</em></p></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4eCm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7176628-2c84-4c86-a959-e949aeaa00ca_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4eCm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7176628-2c84-4c86-a959-e949aeaa00ca_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!4eCm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7176628-2c84-4c86-a959-e949aeaa00ca_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!4eCm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7176628-2c84-4c86-a959-e949aeaa00ca_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!4eCm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7176628-2c84-4c86-a959-e949aeaa00ca_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4eCm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7176628-2c84-4c86-a959-e949aeaa00ca_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f7176628-2c84-4c86-a959-e949aeaa00ca_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2724425,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/195358974?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7176628-2c84-4c86-a959-e949aeaa00ca_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4eCm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7176628-2c84-4c86-a959-e949aeaa00ca_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!4eCm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7176628-2c84-4c86-a959-e949aeaa00ca_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!4eCm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7176628-2c84-4c86-a959-e949aeaa00ca_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!4eCm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7176628-2c84-4c86-a959-e949aeaa00ca_1920x1080.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>This week&#8217;s briefing comes at you from a threat environment that is, frankly, firing on every cylinder simultaneously. Let&#8217;s set the stage:</p><p>France&#8217;s national identity agency confirmed a breach exposing up to 19 million records names, birthdates, addresses, civil status, a foundational identity dataset now in attacker hands. A self-propagating npm worm is autonomously spreading malicious code across developer ecosystems, targeting both npm and PyPI in a single chain. Microsoft issued an emergency out-of-band patch for an <strong><a href="http://asp.net/">ASP.NET</a></strong> Core authentication forgery flaw. Cisco&#8217;s SD-WAN control plane vulnerability landed on CISA&#8217;s KEV list with a hard federal deadline. The Vercel breach confirmed exactly how AI OAuth integrations create insider-equivalent access through third-party tools. And Lotus wiper malware is actively burning Venezuelan energy infrastructure no ransomware, no negotiation, just destruction.</p><p>Meanwhile, April 2026 is on pace to be the worst month for crypto theft since February 2025, with over $606 million lost in 18 days including Lazarus Group&#8217;s $290 million KelpDAO exploit. North Korea is running a financial operation that functions less like a hacking group and more like a nation-state treasury department.</p><p>The through-line across every story this week is trust. Every attack exploited something that was supposed to be safe an authentication cookie, an OAuth grant, a sandboxed AI environment, a national identity database, a ransomware negotiation firm. Once attackers compromise trust at any layer, everything built on top of it inherits the risk.</p><p>Coffee cup cheers. Let&#8217;s get into it.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><h3><strong>&#127760; Geopolitical Cyber Warfare</strong></h3><p><strong>Lotus Wiper Malware Targets Venezuelan Energy Infrastructure</strong></p><p>Lotus wiper malware is actively targeting energy and utility organizations in Venezuela, operating at a low level to erase data, eliminate recovery mechanisms, and render systems unrecoverable. Unlike ransomware, there is no negotiation, no ransom demand, and no recovery path. The intent is permanent operational disruption specifically targeting power generation and distribution infrastructure. This is cyber operations being deployed as a tool of strategic disruption, not financial crime. Wiper attacks don&#8217;t negotiate. They erase.</p><p><strong>ZionSiphon Malware Targets Water Treatment and Desalination Systems</strong></p><p>ZionSiphon malware is targeting water treatment and desalination infrastructure, with code that specifically references chlorine handling processes and water purification systems including references to water supply manipulation. This isn&#8217;t theoretical. Early-stage OT malware with real-world consequence potential is already in the wild. We saw what nearly happened in Oldsmar, Florida, where a single analyst prevented a chlorine dosing attack. This is that playbook evolving. Baseline OT behavior and monitor for any unauthorized process changes immediately.</p><p><strong>Sweden Attributes Heating Plant Attack to Russian-Linked Actors</strong></p><p>Swedish officials confirmed attribution of a cyberattack on a district heating plant to a pro-Russian group connected to Russian intelligence. The attack failed operationally. But intent is the story. Civilian infrastructure heating, power, water is being targeted not to destroy, but to create societal pressure and psychological instability. Gray-zone warfare doesn&#8217;t require success to be effective. The attempt alone achieves its geopolitical objective.</p><p><strong>Iranian Reconnaissance: 12,000 Systems Scanned</strong></p><p>More than 12,000 systems were scanned in a campaign mirroring Iranian reconnaissance patterns. Combined with nearly 4,000 U.S. industrial devices remaining internet-exposed, this represents active pre-positioning at scale. Scanning is preparation, not attack. The attack comes later with precision, against targets already mapped.</p><p><strong>AgingFly Malware Targets Ukrainian Government and Hospitals</strong></p><p>The AgingFly malware strain continues targeting Ukrainian government agencies and healthcare systems a deliberate campaign against the institutions that sustain public life during conflict. Disrupting hospitals and government services doesn&#8217;t require military action. It just requires persistence and the right malware.</p><h3><strong>&#128165; Destructive Attacks &amp; Ransomware</strong></h3><p><strong>NHS Ransomware: Two Years Later, Still Broken</strong></p><p>Nearly two years after a ransomware attack, NHS healthcare services in London are still dealing with operational fallout thousands of delayed procedures, disrupted diagnostics, and persistent system degradation. This is the story the headlines missed when the initial incident faded. Ransomware is not a data problem with a recovery timeline. It is a multi-year operational crisis, and in healthcare, that crisis is measured in patient outcomes. Cyber incidents don&#8217;t end when systems come back online. They end when operations fully recover and in healthcare, that may take years.</p><p><strong>Gentleman Ransomware and SystemBC: Reading the Pre-Attack Signals</strong></p><p>Ransomware groups are deploying SystemBC malware as the pre-attack staging layer establishing proxy tunnels, encrypted C2 channels, and persistent access before ransomware is ever deployed. By the time encryption begins, attackers have already mapped the environment, harvested credentials, and established control. The real opportunity to stop ransomware is at this stage. Detecting SystemBC is detecting the attack before it completes.</p><p><strong>Akira Ransomware Hits Defense Supply Chain Manufacturers</strong></p><p>Akira continues targeting manufacturing and engineering firms that serve as suppliers to larger enterprises in aerospace and defense. A breach at this tier doesn&#8217;t stay contained, it cascades through dependencies, exposing sensitive design data and disrupting production across interconnected supply chains. Supply chain ransomware risk is ecosystem risk, not single-organization risk.</p><p><strong>Insider Threat: Ransomware Negotiator Sold Victim Data to BlackCat</strong></p><p>A ransomware negotiation consultant pleaded guilty to collaborating with attackers providing BlackCat with negotiation strategies and victim data from clients who trusted them with incident response. Third-party vendors, consultants, and incident responders often have deeper access than internal staff during a crisis. That access must be governed like privileged access with monitoring, segmentation, and time-limited grants not trusted on the basis of relationship alone.</p><h3><strong>&#128275; Data Breaches &amp; Identity Exposure</strong></h3><p><strong>France National ID Breach: 19 Million Records</strong></p><p>France&#8217;s national identity agency ANTS confirmed a breach exposing up to 19 million records full names, birthdates, addresses, and civil status. This is not a breach of a loyalty program or a retail database. This is a foundational identity dataset, and its exposure cascades into every system that relies on identity verification for years. The French government has already warned citizens to anticipate smishing and phishing campaigns built from this data. For any organization operating in France or authenticating French users, this is a direct inherited risk. Identity verification confidence across this population has degraded.</p><p><strong>AI Threat to Global Banking: Speed vs. Oversight</strong></p><p>Financial leaders issued warnings this week that advanced AI models could destabilize portions of the global banking system not through dramatic hacks, but through the gap between AI-driven fraud velocity and human oversight capacity. AI is enabling automated fraud, accelerating attack decision-making, and executing at speeds that regulated institutions cannot match with manual review processes. The risk is systemic fraud operating faster than detection and response. Human approval gates for high-risk AI-driven financial transactions are a necessary architectural control.</p><p><strong>Vercel Breach via AI OAuth Integration</strong></p><p>The Vercel breach is the most important AI supply chain case study of the week. Attackers did not breach Vercel directly. They compromised a third-party AI tool Context AI harvested credentials from an employee there, and used the OAuth permissions that tool had been granted to access Vercel&#8217;s internal environment. OAuth grants are often broad, persistent, and uninspected. Once inside, the attacker reached environment variables, API keys, and internal infrastructure operating with legitimate access, triggering no alerts. An AI tool with unrestricted OAuth scope is functionally indistinguishable from an insider.</p><p><strong>McGraw-Hill Salesforce Misconfiguration: ShinyHunters Claims 45 Million Records</strong></p><p>ShinyHunters continues its Salesforce-centric campaign with McGraw-Hill as the latest documented victim, claiming 45 million records from a misconfigured Salesforce-hosted web page rather than the core enterprise tenant. The campaign has also touched 7-Eleven, Pitney Bowes, Canada Life, and Aman Resorts within the same two-week window. SaaS misconfigurations do not confine their blast radius to the page they&#8217;re located on. Audit every externally reachable SaaS integration not just the primary tenant.</p><p><strong>DraftKings Credential Stuffing: 60,000 Accounts, No Zero-Days Required</strong></p><p>The DraftKings credential stuffing case involved 60,000 compromised accounts monetized using nothing more than reused passwords from prior breaches. No zero-days. No advanced techniques. Just the persistent reality that credential reuse remains one of the most effective attack methods in existence. The attack is as old as breach databases. It keeps working because password hygiene still fails at scale.</p><p><strong><a href="http://booking.com/">Booking.com</a> and Rockstar Gaming: Trust-Based Cloud Access</strong></p><p><strong><a href="http://booking.com/">Booking.com</a></strong> confirmed a breach tied to credential or support workflow compromise rather than infrastructure attack. Rockstar Games data was accessed via a compromised Snowflake environment through a third-party analytics platform. Both cases follow the same pattern: no forced entry, legitimate access used maliciously, no immediate detection. Cloud and SaaS security monitoring must include behavioral anomaly detection for API and integration access not just perimeter controls.</p><h3><strong>&#128373;&#65039; Nation-State &amp; Advanced Persistent Threats</strong></h3><p><strong>Lazarus Group: $290 Million KelpDAO Exploit</strong></p><p>North Korea&#8217;s Lazarus Group specifically the TraderTraitor cluster executed a $290 million exploit against KelpDAO through a multi-stage attack chain: compromising the downstream RPC endpoint that a decentralized verifier network relied on, using DDoS to force failover to the poisoned endpoint, then spoofing cross-chain messages through KelpDAO&#8217;s single-verifier configuration. April 2026 is now the worst month for crypto theft since February 2025, with over $606 million lost across 18 days. North Korea&#8217;s crypto operations have crossed from crime into nation-state-scale financial warfare. The Bybit playbook is being refined and repeated.</p><p><strong>APT Using Microsoft Outlook Inboxes for Command-and-Control</strong></p><p>A sophisticated APT group is using Microsoft Outlook inboxes as a covert C2 channel. The malware authenticates via Azure AD, retrieves encrypted commands from designated mail folders, executes them locally, and returns results through the same channel all over legitimate Microsoft infrastructure. Traditional network filtering and reputation-based detection are ineffective because the traffic is indistinguishable from normal Outlook usage. This is living-off-trusted-cloud at its most operationally sophisticated.</p><p><strong>Scattered Spider Guilty Plea: Social Engineering at Scale</strong></p><p>A Scattered Spider member pleaded guilty to attacks that used phishing, SIM swapping, and identity manipulation to breach major platforms and extract millions in financial assets. The techniques worked not because of technical sophistication but because human-layer attacks consistently bypass technical controls. Law enforcement is catching up. The techniques, however, continue to evolve and are being adopted broadly across threat actor communities.</p><p><strong>North Korea&#8217;s $280 Million Drift Theft: Full Post-Mortem</strong></p><p>The Drift crypto theft post-mortem confirms the operation involved fake companies, sustained relationship-building over months, physical conference attendance, and social engineering before any technical exploitation occurred. North Korea is operating cybercrime as a corporate function patient, organized, and designed for maximum yield. Security models that don&#8217;t account for this level of persistence and organizational investment are not modeling the actual threat.</p><h3><strong>&#128737;&#65039; Vulnerabilities &amp; Active Exploitation</strong></h3><p><strong>Microsoft Defender Zero-Days: Security Tools as Attack Vectors</strong></p><p>Microsoft issued emergency patches for three actively exploited zero-days in Defender for Endpoint that allowed attackers to tamper with detection mechanisms effectively disabling security visibility while remaining on the endpoint. EDR is no longer just a defensive layer. It has become part of the attack surface. Organizations operating with a single EDR solution are operating with a single point of failure. Layer endpoint security products. If attackers can silence Defender, they cannot simultaneously silence a second independent product.</p><p><strong>Microsoft <a href="http://asp.net/">ASP.NET</a> Core Emergency Patch: Authentication Cookie Forgery</strong></p><p>Microsoft issued an out-of-band emergency patch for a critical <strong><a href="http://asp.net/">ASP.NET</a></strong> Core vulnerability allowing attackers to forge authentication cookies through improper HMAC validation. No phishing, no token theft just a forged cookie and full authenticated access. For public-facing applications relying on <strong><a href="http://asp.net/">ASP.NET</a></strong> Core, patch immediately and rotate all data protection keys generated by vulnerable versions.</p><p><strong>Microsoft Domain Controller Patch Failure: Cascading Identity Disruption</strong></p><p>Microsoft&#8217;s April patch cycle introduced instability in domain controllers triggering reboot loops and cascading authentication failures across login systems, VDI environments, and identity infrastructure. Identity systems must have controlled deployment pipelines with staged rollout and pre-deployment validation. Patching identity infrastructure with the same urgency and process as workstation endpoints creates systemic operational risk.</p><p><strong>Cisco SD-WAN CVE-2026-20133: CISA KEV, Federal Deadline Active</strong></p><p>CISA added Cisco SD-WAN CVE-2026-20133 to the Known Exploited Vulnerabilities catalog with a rapid federal patch deadline. The vulnerability allows unauthenticated attackers to extract sensitive data from the SD-WAN manager the centralized control plane governing routing, segmentation, and policy enforcement across all branch locations. Compromising this system is not lateral movement. It is centralized network dominance. Patch by the federal deadline, or before it.</p><p><strong>MOVEit WAF and Kemp LoadMaster: Breaking the Shield</strong></p><p>Progress Software patched multiple vulnerabilities in MOVEit WAF and Kemp LoadMaster, including command injection flaws and a WAF bypass allowing crafted requests to evade inspection. These are systems designed to protect enterprise edges and the vulnerabilities turn them into entry points. Given MOVEit&#8217;s history with mass exploitation campaigns, enterprise patching urgency here should match federal agency timelines.</p><p><strong>Spinnaker RCE: Unauthenticated Access to Production Pipelines</strong></p><p>Two unauthenticated remote code execution vulnerabilities in Spinnaker the continuous delivery platform managing cloud deployments allow attackers to execute commands within cloud driver components. Spinnaker has access to deployment logic, credentials, and production infrastructure. Exploitation is not just a breach of infrastructure it is a compromise of software delivery integrity with downstream impact on everything Spinnaker touches.</p><p><strong>Marimo RCE: AI Tooling Exploited Within Hours of Disclosure</strong></p><p>The Marimo remote code execution vulnerability was exploited within hours of disclosure, with attack chains incorporating Hugging Face as a staging platform and decentralized C2 infrastructure. AI development tools are now enterprise attack surfaces operating without the security rigor applied to traditional infrastructure. Isolation, network egress restriction, and patching for AI tooling must match enterprise security standards.</p><p><strong>AI Sandbox Escape: Terrarium Vulnerability Enables Root Access</strong></p><p>A critical vulnerability in Cohere&#8217;s open-source Terrarium project allows sandboxed AI-generated code to escape containment and execute at the host level with root privileges through improper WebAssembly and JavaScript prototype handling. Terrarium is widely deployed to execute AI-generated code safely. This vulnerability eliminates that safety boundary entirely. Any untrusted AI-generated script in a vulnerable Terrarium environment can compromise the host, extract secrets, and move laterally. AI infrastructure is being deployed with pre-2010 security assumptions.</p><p><strong>Fortinet Sandbox: Unauthenticated Root Command Execution</strong></p><p>A critical Fortinet Sandbox vulnerability allows unauthenticated command execution as root, with public exploit code already available. Security appliances with public exploits become trusted footholds with administrative access the moment they are successfully targeted. Patch immediately and treat every security tool as part of the attack surface, not just the defense.</p><p><strong>Apache ActiveMQ: Old Bugs, Active Exploitation</strong></p><p>Apache ActiveMQ vulnerabilities are being actively exploited, often chained with default credentials and legacy flaws. Middleware sitting deep in application environments is a persistent, quiet attack surface. Default credentials must be eliminated across every middleware component in enterprise environments. There is no acceptable reason for default credentials to survive past deployment.</p><p><strong>Anthropic MCP: Architectural RCE Risk Across AI Development Tools</strong></p><p>A critical design flaw in Anthropic&#8217;s Model Context Protocol introduces remote code execution risk across a wide ecosystem of AI development tools with millions of downloads and hundreds of thousands of instances in scope. The vendor&#8217;s position that the behavior is &#8220;by design&#8221; raises serious concerns about security maturity in AI framework development. Audit and restrict all MCP integrations and AI agent frameworks for scope, permissions, and network access.</p><p><strong>ICS Patch Tuesday: OT Exposure Continues</strong></p><p>Siemens, Schneider Electric, Rockwell, and five additional major industrial vendors released advisories. OT environments accumulate vulnerability over time through operational continuity constraints and infrequent patching cycles. Dedicated OT vulnerability management processes separate from IT patch workflows are required to address this accumulating risk.</p><p><strong>Mirai Botnets: End-of-Life D-Link Routers Actively Exploited</strong></p><p>Two Mirai botnet campaigns are actively exploiting command injection vulnerabilities in discontinued D-Link routers. End-of-life devices that are never inventoried, never retired, and never replaced become permanent participants in attacker infrastructure. Asset visibility for all network-connected devices including legacy and end-of-life equipment is a foundational security requirement, not a maturity milestone.</p><p><strong>Oracle: 481 Patches Across 28 Product Families</strong></p><p>Oracle released 481 security patches in one of the largest patch cycles in its history arriving in the same week as Microsoft&#8217;s emergency patches and the broader vendor patch deluge. The risk here is not just vulnerability. It is patch fatigue. When security teams are overwhelmed, prioritization degrades and critical fixes are delayed or missed. Triage ruthlessly by attack surface exposure and business criticality.</p><h3><strong>&#129302; AI, Supply Chain &amp; Developer Threats</strong></h3><div class="pullquote"><p><em>&#8220;The pattern is brutal and consistent: your endpoint product is being weaponized against you, your patch pipeline is breaking the infrastructure it&#8217;s supposed to protect, your AI tool chain from notebook servers to the MCP standard itself is a fresh RCE buffet, nation-state crews are draining DeFi bridges for a quarter billion at a time, Shiny Hunters is turning Salesforce connected apps into a breach factory, volumetric DDoS can still take major social platforms offline for days, and millions of unencrypted FTP servers still leak credentials across the public internet.&#8221;</em></p></div><p><strong>Self-Propagating npm Worm: Autonomous Cross-Ecosystem Spread</strong></p><p>A malicious npm package targeting the widely used &#8220;pg&#8221; database ecosystem includes a self-propagating worm that steals developer tokens and republishes malicious versions autonomously across accessible packages. Once it finds a valid npm token, it enumerates accessible packages, injects malicious code, publishes new versions, and repeats cascading through the ecosystem within hours. The worm also targets PyPI, making this a cross-ecosystem supply chain attack. One compromised developer environment can infect the broader ecosystem before a human analyst has time to respond. Revoke and rotate all npm and PyPI tokens across every developer environment immediately.</p><p><strong>Cisco Talos Q1 2026 Report: Phishing Reclaims Top Spot</strong></p><p>Cisco Talos&#8217; Q1 2026 Incident Response report confirms phishing has re-emerged as the leading initial access vector, accounting for over one-third of incidents. What changed is not the technique it&#8217;s the effectiveness. Adversary-in-the-middle phishing kits and real-time MFA bypass capabilities have fundamentally elevated phishing success rates. User awareness training developed even twelve months ago does not reflect the current threat. Update training programs to explicitly address MFA bypass techniques.</p><p><strong>Glassworm: Zig-Based Dropper Targets Developer IDEs</strong></p><p>Glassworm evolved with a new variant using a Zig-based dropper to target developer environments and IDE ecosystems. Attackers moving into the development lifecycle mean they influence what gets built not just what runs in production. Enforce signed plugin requirements, approved extension lists, and strict access controls across all developer tooling environments.</p><p><strong>BlueSky DDoS: Availability as a Security Dimension</strong></p><p>A multi-day DDoS attack against BlueSky disrupted core platform functionality for an extended period. Availability is a security property and as organizations and users adopt decentralized architectures and alternative platforms, the DDoS threat surface expands. Pre-defined DDoS mitigation plans and tested response procedures must be in place before the attack begins.</p><p><strong>2.4 Million Exposed FTP Servers: Basic Hygiene Still Failing</strong></p><p>Over 2.4 million internet-facing FTP servers continue to operate without encryption providing cleartext credential transmission to any attacker willing to look. This is not a sophisticated threat. It is a global-scale failure of basic security hygiene that has persisted for years. Eliminate cleartext protocols. Enforce encryption across all services. There is no operational justification for unencrypted FTP in 2026.</p><h3><strong>&#9878;&#65039; Law Enforcement &amp; Policy</strong></h3><p><strong>Scattered Spider Guilty Plea: Tyler B Sentenced</strong></p><p>A Scattered Spider member pleaded guilty to charges involving approximately $8 million in SIM-swap-driven fraud and data theft. Law enforcement is demonstrating meaningful enforcement capability against technically sophisticated social engineering actors. The techniques, however, are spreading to broader threat actor communities faster than enforcement can deter them.</p><p><strong>DDoS-for-Hire Network Disrupted: 75,000 Users Warned</strong></p><p>Law enforcement disrupted a DDoS-for-hire infrastructure, seizing domains and issuing warnings to over 75,000 registered users. Disruption creates friction and raises cost for criminal operators. It does not permanently eliminate the capability &#8212; cybercrime ecosystems rebuild on new infrastructure. Continuous monitoring remains essential.</p><p><strong>North Korean IT Worker Sentencing</strong></p><p>Two individuals were sentenced for supporting North Korea&#8217;s fake IT worker scheme the regime-funded operation placing operatives inside global companies as legitimate remote employees. These enforcement actions represent meaningful progress in attributing and prosecuting an operation that has been running for years. The threat, however, continues.</p><p><strong>FCC Cybertrust Mark: IoXT Alliance Named Lead Administrator</strong></p><p>The FCC Cybertrust Mark program for connected device security has a new lead administrator in the IoXT Alliance, putting the consumer IoT security baseline program back on track after UL&#8217;s withdrawal. Any policy framework that raises the minimum security floor for connected devices has direct defensive value given the persistent exploitation of routers and IoT endpoints.</p><h3><strong>&#9989; This Week&#8217;s Priority Action List</strong></h3><p><strong>Immediate (Do This Now)</strong></p><ul><li><p>Patch Cisco SD-WAN CVE-2026-20133 &#8212; CISA KEV with federal deadline, unauthenticated control plane access</p></li><li><p>Patch Microsoft <strong><a href="http://asp.net/">ASP.NET</a></strong> Core authentication cookie forgery &#8212; emergency out-of-band patch, rotate all data protection keys immediately</p></li><li><p>Patch Microsoft Defender for Endpoint zero-days &#8212; EDR tampering enabling silent attacker persistence</p></li><li><p>Revoke and rotate ALL npm and PyPI developer tokens &#8212; self-propagating worm is actively spreading</p></li><li><p>Patch MOVEit WAF and Kemp LoadMaster &#8212; WAF bypass and command injection with public exposure</p></li><li><p>Patch Spinnaker RCE &#8212; unauthenticated access to production deployment pipelines</p></li><li><p>Patch Fortinet Sandbox &#8212; public exploit code available for unauthenticated root execution</p></li><li><p>Patch Marimo and audit all Hugging Face integrations for indicators of compromise</p></li></ul><p><strong>Short-Term (This Month)</strong></p><ul><li><p>Audit ALL OAuth grants across Microsoft 365 and Google Workspace, Vercel breach is the template for AI OAuth pivot attacks</p></li><li><p>Layer endpoint security with a second independent EDR product single EDR creates single point of failure</p></li><li><p>Implement staged deployment pipelines for identity infrastructure patches separate from workstation cycles</p></li><li><p>Enforce just-in-time access and session recording for all third-party incident response and consulting access</p></li><li><p>Implement object-level authorization testing in all application security release gates</p></li><li><p>Enforce cryptographic signature verification before any software installation in enterprise environments</p></li><li><p>Update phishing awareness training to explicitly include MFA bypass and adversary-in-the-middle techniques</p></li><li><p>Replace or isolate all end-of-life D-Link routers and unmanaged network devices</p></li><li><p>Eliminate all cleartext FTP services 2.4 million exposed servers is a collective failure, don&#8217;t be part of it</p></li><li><p>Implement human approval gates for high-risk AI-driven financial transactions</p></li></ul><p><strong>Strategic (This Quarter)</strong></p><ul><li><p>Establish dedicated OT vulnerability management processes independent of IT patch cycles</p></li><li><p>Conduct comprehensive audit and restriction of all MCP integrations and AI agent framework permissions</p></li><li><p>Isolate AI execution environments with network egress restrictions and runtime monitoring</p></li><li><p>Enforce multi-verifier models in all blockchain and DeFi architectures single verifier is a single point of failure</p></li><li><p>Build dedicated fast-lane patch processes for internet-facing infrastructure separate from workstation cadence</p></li><li><p>Plan post-breach identity degradation response for regions with national identity database exposure (France)</p></li><li><p>Stress test offline backup integrity and recovery procedures &#8212; wiper malware eliminates recovery paths</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-49/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-49/comments"><span>Leave a comment</span></a></p><h3><strong>&#127897;&#65039; James Azar&#8217;s CISO&#8217;s Take</strong></h3><p>When I look at this week in its entirety, every story ties back to the same root cause: trust being extended to systems, tools, integrations, and people without continuous validation and attackers exploiting exactly that gap. France&#8217;s national identity database. Authentication cookies. OAuth grants to AI tools. Outlook inboxes used as C2 channels. A ransomware negotiator feeding victim intelligence to BlackCat. These aren&#8217;t exotic attacks. They are the logical consequence of building systems on trust assumptions that were never designed to be verified continuously. And in 2026, that design assumption is the vulnerability. Control planes are the target this week SD-WAN managers, WAF admin APIs, Spinnaker pipelines, OAuth tokens all one unauthenticated bug or over-scoped consent grant away from total compromise.</p><p>The second takeaway is speed. The npm worm demonstrates how quickly compromise propagates when supply chain security is absent. The <strong><a href="http://asp.net/">ASP.NET</a></strong> forgery flaw shows how quickly authentication can be bypassed once a flaw is in the wild. The APT using Outlook for C2 shows how long patient adversaries can persist when detection depends on network indicators instead of behavioral ones. We are operating in an environment where time is the deciding factor, and organizations that cannot detect and respond within the attacker&#8217;s operational window will absorb the full impact. Patch the CVE-2026-20133 today. Audit your OAuth grants this week. Stress test your offline backups before you need them. That is how you reduce the blast radius when not if the next trust assumption fails.</p><p><strong>Stay Cyber Safe.</strong> &#128272;</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-49?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-49?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-49?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><h3></h3>]]></content:encoded></item><item><title><![CDATA[France Titres (ANTS) Breach Exposes Identity Records, Microsoft Ships Out-of-Band ASP.NET Core Emergency Patch, 'CanisterSprawl' npm Worm Hits pgserve, Cohere Terrarium AI Sandbox Cracked Open ]]></title><description><![CDATA[National ID Breach, AI Sandbox Escape, and a Self-Spreading Supply Chain Worm&#8212;When Trust Infrastructure Breaks at Scale]]></description><link>https://www.cyberhubpodcast.com/p/france-titres-ants-breach-exposes</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/france-titres-ants-breach-exposes</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Thu, 23 Apr 2026 13:31:08 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/195190861/c1396cfe8c69322f332ddc70c8219561.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<h1>&#9749; <strong>Good Morning Security Gang,</strong></h1><p>Today&#8217;s episode is absolutely loaded, this is one of those &#8220;everything is breaking at once&#8221; kind of days.</p><p>We&#8217;ve got a national identity breach, an AI sandbox escape, a Microsoft emergency patch, Mirai botnets, a self-propagating npm worm, an APT abusing Outlook for command-and-control, and more.</p><p>If there&#8217;s one theme across every story today, it&#8217;s this:<br>&#128073; The systems we trust to prove identity and enforce boundaries are failing.</p><p>Double espresso in hand&#8212;let&#8217;s get into it.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6Yq6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F989200ff-3241-4372-97f9-8e272dbcf472_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6Yq6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F989200ff-3241-4372-97f9-8e272dbcf472_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!6Yq6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F989200ff-3241-4372-97f9-8e272dbcf472_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!6Yq6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F989200ff-3241-4372-97f9-8e272dbcf472_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!6Yq6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F989200ff-3241-4372-97f9-8e272dbcf472_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6Yq6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F989200ff-3241-4372-97f9-8e272dbcf472_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/989200ff-3241-4372-97f9-8e272dbcf472_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:162880,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/195190861?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F989200ff-3241-4372-97f9-8e272dbcf472_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6Yq6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F989200ff-3241-4372-97f9-8e272dbcf472_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!6Yq6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F989200ff-3241-4372-97f9-8e272dbcf472_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!6Yq6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F989200ff-3241-4372-97f9-8e272dbcf472_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!6Yq6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F989200ff-3241-4372-97f9-8e272dbcf472_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Today&#8217;s threat landscape highlights a systemic breakdown in identity, trust validation, and software supply chains. From a breach exposing millions of national identities in France to AI sandbox failures enabling root access, attackers are exploiting foundational systems that underpin authentication, execution, and trust.</p><p>At the same time, we&#8217;re seeing acceleration in automated propagation (npm worm), credential abuse (ASP.NET flaw), and stealthy persistence (APT via Outlook). Combined with large-scale patch cycles and unpatched legacy infrastructure, the result is a highly volatile environment where one weak trust layer can cascade into widespread compromise.</p><h2>&#127467;&#127479; <strong>France National ID Breach &#8211; 19 Million Records Exposed</strong></h2><p>France&#8217;s national identity agency (ANTS) confirmed a breach impacting up to 19 million individuals, exposing highly sensitive data including full names, birthdates, addresses, and civil status. This isn&#8217;t just another data breach, it&#8217;s a foundational identity dataset leak.</p><p>The real danger lies in downstream impact. With this level of data, attackers can conduct highly targeted phishing, impersonation, tax fraud, healthcare fraud, and even banking account takeovers for years to come. The French government has already warned citizens to expect smishing and phishing campaigns tied directly to this data.</p><p>From a practitioner standpoint, this is a nightmare scenario. Identity is the backbone of authentication systems, and when it&#8217;s compromised at a national level, every organization interacting with those users inherits risk.</p><h2>&#129302; <strong>AI Sandbox Escape &#8211; &#8220;Terium&#8221; Vulnerability Breaks Containment</strong></h2><p>A critical vulnerability in Cohere&#8217;s open-source Terium project allows sandboxed AI-generated code to escape containment and execute at the host level with root privileges.</p><p>This flaw exists in the WebAssembly layer, where improper handling of JavaScript prototypes allows attackers to pivot from a supposedly isolated environment into the underlying Node.js runtime.</p><p>This is significant because Terium is widely used to execute AI-generated code safely. With this vulnerability, there is effectively no sandbox, meaning any untrusted AI-generated script can compromise the host system, extract secrets, and move laterally.</p><p>This reinforces a growing pattern: AI infrastructure is being deployed with pre-2010 security assumptions, and attackers are catching up fast.</p><h2>&#129695; <strong>Microsoft ASP.NET Core Emergency Patch &#8211; Authentication Forgery Risk</strong></h2><p>Microsoft issued an out-of-band patch for a critical ASP.NET Core vulnerability that allows attackers to forge authentication cookies and elevate privileges without valid credentials.</p><p>The flaw lies in improper HMAC validation during cookie handling, effectively allowing attackers to bypass authentication entirely. No phishing, no token theft&#8212;just a forged cookie and access granted.</p><p>This is particularly dangerous for public-facing applications relying on ASP.NET Core, as it directly undermines the integrity of authentication mechanisms.</p><p>The urgency here is clear: patch immediately and rotate all data protection keys generated by vulnerable systems.</p><h2>&#127760; <strong>Mirai Botnets Return &#8211; Exploiting End-of-Life Routers</strong></h2><p>Two separate Mirai botnet campaigns are actively exploiting vulnerabilities in discontinued D-Link routers, which no longer receive security updates.</p><p>Attackers are leveraging command injection flaws to deploy botnet payloads, turning vulnerable devices into part of a distributed attack infrastructure.</p><p>The bigger issue here isn&#8217;t just the botnet, it&#8217;s asset visibility. Organizations often fail to inventory or retire end-of-life devices, leaving them exposed indefinitely.</p><p>These devices don&#8217;t just sit idle they become active participants in attacks.</p><h2>&#129516; <strong>Self-Spreading npm Worm &#8211; Supply Chain Attack Goes Autonomous</strong></h2><p>This is one of the most concerning developments of the day.</p><p>A malicious npm package targeting the widely used &#8220;pg&#8221; ecosystem includes a self-propagating worm that steals developer tokens and republishes itself across other packages.</p><p>Once it finds a valid npm token, it:</p><ul><li><p>Enumerates accessible packages</p></li><li><p>Injects malicious code</p></li><li><p>Publishes new versions</p></li><li><p>Repeats the cycle</p></li></ul><p>This creates a cascading effect where one compromised developer environment can infect the broader ecosystem within hours.</p><p>Even more concerning, the worm also targets PyPI, making it a cross-ecosystem supply chain attack.</p><p>This is the industrialization of software compromise.</p><h2>&#128202; <strong>Cisco Talos IR Report &#8211; Phishing is Back at the Top</strong></h2><p>Cisco Talos&#8217; Q1 2026 report shows phishing has re-emerged as the leading initial access vector, accounting for over one-third of incidents.</p><p>What&#8217;s changed isn&#8217;t phishing itself, it&#8217;s effectiveness. Adversary-in-the-middle kits and MFA bypass techniques have made phishing campaigns far more successful.</p><p>At the same time, exploitation of public-facing applications especially SharePoint continues to drive initial access.</p><p>The takeaway is simple: user awareness training from even a year ago is already outdated.</p><h2>&#128231; <strong>APT Using Outlook for Command-and-Control</strong></h2><p>A sophisticated APT group is using Microsoft Outlook inboxes as a command-and-control channel.</p><p>The malware authenticates via Azure AD, accesses specific mail folders, retrieves encrypted commands from emails, executes them locally, and responds with results.</p><p>This technique leverages trusted Microsoft infrastructure, making detection extremely difficult. Traditional network filtering and reputation-based controls are ineffective because the traffic appears legitimate.</p><p>This is a prime example of living off trusted cloud services for stealthy operations.</p><h2>&#128176; <strong>DeFi Exploit &#8211; Ownership Validation Bypassed</strong></h2><p>A DeFi platform was drained of millions after attackers exploited a flaw that incorrectly validated ownership of vault assets.</p><p>Unlike typical exploits involving private keys or reentrancy bugs, this attack manipulated logic to convince the system that the attacker was the legitimate owner.</p><p>This highlights a critical issue in decentralized finance: trust in smart contract logic is often misplaced, and small validation flaws can lead to massive financial loss.</p><h2>&#129521; <strong>Oracle Patch Drop &#8211; 481 Fixes Overwhelms Teams</strong></h2><p>Oracle released 481 security patches across 28 product families, one of the largest patch cycles in its history.</p><p>This comes on top of Microsoft&#8217;s patch load and emergency fixes, creating a significant operational challenge for security teams.</p><p>The risk here isn&#8217;t just vulnerability it&#8217;s patch fatigue. When teams are overwhelmed, prioritization suffers, and critical fixes can be delayed or missed entirely.</p><h1>&#128736;&#65039; <strong>Action Items for Security Leaders</strong></h1><ul><li><p>&#128272; Rotate credentials and enforce phishing-resistant MFA across all users</p></li><li><p>&#129513; Patch ASP.NET Core immediately and rotate authentication keys</p></li><li><p>&#129302; Isolate AI execution environments and restrict network egress</p></li><li><p>&#129516; Revoke and rotate all npm and PyPI tokens across developer environments</p></li><li><p>&#128683; Block malicious package versions and enforce dependency validation</p></li><li><p>&#127760; Replace or isolate all end-of-life networking equipment</p></li><li><p>&#128231; Monitor Microsoft Graph and Outlook API activity for anomalies</p></li><li><p>&#129504; Update phishing training to include MFA bypass techniques</p></li><li><p>&#128176; Conduct smart contract audits with focus on ownership validation logic</p></li><li><p>&#129521; Prioritize patching for internet-facing and high-risk Oracle systems</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/france-titres-ants-breach-exposes/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/france-titres-ants-breach-exposes/comments"><span>Leave a comment</span></a></p><h1>&#129504; <strong>James Azar&#8217;s CISOs Take</strong></h1><p>What stood out to me today is how every single story ties back to trust. Whether it&#8217;s a national identity database, an AI sandbox, a software package registry, or an authentication cookie, attackers are going after the mechanisms that define who and what is trusted. And once they compromise that, everything built on top of it becomes vulnerable.</p><p>The second takeaway is speed. The npm worm shows how quickly compromise can spread. The ASP.NET flaw shows how quickly attackers can exploit authentication. The APT using Outlook shows how long attackers can persist undetected. We are operating in an environment where time is the deciding factor and organizations that cannot detect and respond quickly will fall behind.</p><p>&#128293; <strong>Stay Cyber Safe.</strong></p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/france-titres-ants-breach-exposes?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/france-titres-ants-breach-exposes?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/france-titres-ants-breach-exposes?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[Cisco SD-WAN KEV Federal Deadline, MOVEit WAF Critical RCE Patches, Vercel Breached Via AI OAuth]]></title><description><![CDATA[Control Plane Attacks, AI OAuth Breaches, and OT Destruction&#8212;Why Everything That Runs Your Environment Is Now the Target]]></description><link>https://www.cyberhubpodcast.com/p/cisco-sd-wan-kev-federal-deadline</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/cisco-sd-wan-kev-federal-deadline</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Wed, 22 Apr 2026 13:31:44 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/194992784/a8f5bbd60b4304682ac1fd31ba52f7f5.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>&#9749; <strong>Good Morning Security Gang, </strong></p><p>Today&#8217;s episode hits differently. This isn&#8217;t just another day of vulnerabilities and breaches, this is a shift in where attackers are focusing. They&#8217;re no longer knocking on the front door&#8230;</p><p>&#128073; They&#8217;re going straight for the control systems that run everything.</p><p>Think SD-WAN controllers. Think CI/CD pipelines. Think OAuth integrations.</p><p>&#128161; If it manages your environment, it&#8217;s now a primary target.</p><p>Double espresso ready, let&#8217;s dive in. Coffee Cup Cheers, </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!w_R7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48e25290-39e5-4070-92b3-5ef6cf5fb630_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!w_R7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48e25290-39e5-4070-92b3-5ef6cf5fb630_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!w_R7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48e25290-39e5-4070-92b3-5ef6cf5fb630_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!w_R7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48e25290-39e5-4070-92b3-5ef6cf5fb630_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!w_R7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48e25290-39e5-4070-92b3-5ef6cf5fb630_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!w_R7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48e25290-39e5-4070-92b3-5ef6cf5fb630_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/48e25290-39e5-4070-92b3-5ef6cf5fb630_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:358229,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/194992784?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48e25290-39e5-4070-92b3-5ef6cf5fb630_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!w_R7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48e25290-39e5-4070-92b3-5ef6cf5fb630_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!w_R7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48e25290-39e5-4070-92b3-5ef6cf5fb630_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!w_R7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48e25290-39e5-4070-92b3-5ef6cf5fb630_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!w_R7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48e25290-39e5-4070-92b3-5ef6cf5fb630_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>&#129517; <strong>Executive Snapshot</strong></h1><p>Today&#8217;s stories all point to one uncomfortable truth:<br>Attackers are scaling access by targeting orchestration layers, not endpoints.</p><ul><li><p>&#127919; Control planes are being exploited</p></li><li><p>&#129302; AI integrations are becoming insider threats</p></li><li><p>&#127981; OT systems remain dangerously exposed</p></li><li><p>&#128163; Destructive malware is back on the table</p></li></ul><p>This isn&#8217;t about isolated incidents anymore, it&#8217;s about systemic exposure across modern architectures.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><p></p><h2>&#127760; <strong>Cisco SD-WAN Vulnerability &#8211; Control of the Network Itself</strong></h2><p>CISA&#8217;s addition of the Cisco SD-WAN vulnerability (CVE-2026-20133) to the KEV catalog with a rapid federal patch deadline highlights just how critical this issue is. This flaw allows unauthenticated attackers to extract sensitive data directly from the SD-WAN manager, which acts as the centralized control plane for enterprise connectivity. In practical terms, this system governs routing, segmentation, and policy enforcement across all branch locations. Once compromised, attackers can gain visibility into network topology, harvest credentials, and potentially manipulate traffic flows. This is not lateral movement, it&#8217;s centralized dominance of the network, making it one of the most dangerous classes of vulnerabilities we see today.</p><h2>&#129521; <strong>MOVEit WAF &amp; Load Balancer Vulnerabilities &#8211; Breaking the Shield</strong></h2><p>Progress Software&#8217;s patching of multiple vulnerabilities in MOVEit WAF and Kemp LoadMaster is particularly concerning because these systems are designed to protect enterprise edges. Among the flaws are command injection vulnerabilities and a WAF bypass that allows crafted requests to slip through inspection mechanisms. The implication is severe: attackers can execute commands or bypass defenses without triggering alerts, effectively turning a protective control into an entry point. Given MOVEit&#8217;s history with mass exploitation campaigns, this reinforces that edge security appliances remain high-value and high-risk targets, especially when they sit between external traffic and internal systems.</p><h2>&#129302; <strong>Vercel Breach via AI OAuth &#8211; Trust Exploited Through Integration</strong></h2><p>The Vercel breach is one of the most important case studies of modern cyber risk. Attackers didn&#8217;t exploit Vercel directly&#8212;they compromised a third-party AI tool (Context AI), harvested credentials, and leveraged OAuth permissions to gain access to Vercel&#8217;s internal environment. Because OAuth grants are often broad and persistent, the attacker effectively operated with legitimate access, reaching environment variables, API keys, and internal systems. This attack demonstrates how AI tools and SaaS integrations blur the line between external and internal access, creating blind spots in security monitoring. It also reinforces that OAuth is no longer just a convenience feature, it is a critical identity boundary that must be governed like privileged access.</p><h2>&#128640; <strong>Spinnaker RCE &#8211; Direct Path to Production Environments</strong></h2><p>The disclosure of two unauthenticated remote code execution vulnerabilities in Spinnaker introduces risk directly into the software delivery pipeline. Spinnaker is widely used to manage continuous delivery across cloud environments, meaning it has access to deployment logic, credentials, and production systems. Exploiting these vulnerabilities allows attackers to execute commands within cloud driver components, potentially exposing secrets, altering deployments, or injecting malicious code into production. This is not just a breach of infrastructure, it&#8217;s a compromise of software integrity and trust in application delivery, which can have downstream effects across customers and users.</p><h2>&#127981; <strong>OT &#8220;Bridge Break&#8221; Vulnerabilities &#8211; The Weak Link Between IT and OT</strong></h2><p>Forescout&#8217;s disclosure of 22 vulnerabilities in serial-to-Ethernet converters highlights a persistent and dangerous issue in industrial environments. These devices act as bridges between operational technology (OT) and traditional IT networks, often enabling remote monitoring and control of physical systems. Because they are frequently exposed to the internet and lack modern security controls, they become ideal entry points for attackers. Exploitation could allow manipulation of sensor data, disruption of industrial processes, or lateral movement into broader networks. This is particularly concerning in sectors like manufacturing, utilities, and healthcare, where these systems underpin critical operations. The reality is that OT environments continue to inherit risk from legacy design assumptions that no longer hold true.</p><h2>&#128163; <strong>Lotus Wiper Malware &#8211; Destruction Over Disruption</strong></h2><p>The Lotus wiper malware represents a different class of threat&#8212;one focused on destruction rather than financial gain. Targeting energy and utility organizations in Venezuela, this malware operates at a low level to erase data, remove recovery mechanisms, and corrupt systems beyond repair. Unlike ransomware, there is no negotiation or recovery path. The intent is to permanently disrupt operations, potentially impacting power generation and distribution. This aligns with broader geopolitical tensions and demonstrates that cyber operations are increasingly being used as tools of strategic disruption, not just crime.</p><h2>&#129504; <strong>Gentleman Ransomware &amp; SystemBC &#8211; The Signals Before the Storm</strong></h2><p>The use of SystemBC malware by ransomware groups provides a valuable insight into how attacks unfold. SystemBC establishes proxy tunnels and encrypted communication channels, allowing attackers to maintain persistent access while preparing for later stages of the attack. This phase often includes reconnaissance, credential harvesting, and lateral movement. By the time ransomware is deployed, the attacker has already mapped the environment and established control. This underscores the importance of detecting early indicators, as the real opportunity to stop ransomware is before encryption begins, not after.</p><h2>&#127981; <strong>Akira Ransomware &#8211; Supply Chain Risk Amplified</strong></h2><p>Akira&#8217;s continued targeting of manufacturing and engineering firms highlights the growing importance of supply chain risk. Many of these organizations serve as suppliers to larger enterprises, including those in aerospace and defense. A breach at this level can expose sensitive data, disrupt production, and create cascading effects across industries. This is no longer about a single organization being compromised, it&#8217;s about entire ecosystems being impacted through interconnected dependencies.</p><h2>&#9878;&#65039; <strong>Insider Threat &#8211; When Trust Becomes the Vulnerability</strong></h2><p>The case of a ransomware negotiator pleading guilty to collaborating with attackers is a stark reminder that insider risk extends beyond employees. Third-party vendors, consultants, and incident response providers often have deep access to sensitive information. In this case, that trust was exploited to provide attackers with negotiation strategies and victim data. This highlights the need for strict controls, monitoring, and segmentation even within trusted relationships, as insider threat is often a function of access, not intent.</p><h2>&#128110; <strong>Scattered Spider &#8211; Social Engineering at Scale</strong></h2><p>The guilty plea of a Scattered Spider member reinforces the effectiveness of social engineering-driven attacks. This group leveraged phishing, SIM swapping, and identity manipulation to gain access to major platforms and financial assets. Their success demonstrates that even advanced organizations remain vulnerable to human-layer attacks, which often bypass technical controls entirely. While law enforcement actions are a positive development, the techniques used by these groups continue to evolve and proliferate.</p><h2>Priority Actions</h2><p>Priority Action</p><p>&#128308; FridayPatch Cisco SD-WAN CVE-2026-20133</p><p>&#128308; CriticalPatch MOVEit WAF/Kemp LoadMaster</p><p>&#128308; CriticalUpgrade Spinnaker</p><p>&#128992; HighAudit ALL OAuth grants in Workspace/M365</p><p>&#128992; HighMicrosegment Lantronix/Silex OT gateways</p><p>&#128993; MediumBlock SystemBC C2 at egress</p><h2>CISO&#8217;s Take</h2><p>Control planes are the target this week: SD-WAN managers, WAF admin APIs, Spinnaker pods, OAuth tokens, all one unauthenticated bug or over-scoped consent away from compromise. The Vercel breach is the clearest example of AI supply chain risk we&#8217;ve seen: a third-party AI tool&#8217;s compromised employee led to OAuth pivot into Vercel&#8217;s environment. An AI tool with unrestricted OAuth scope is indistinguishable from an insider.</p><p>The other thread: destructive intent and insider accountability. Lotus burning Venezuelan energy infrastructure shows wipers don&#8217;t ransom&#8212;they take generation offline. Akira hitting defense supply chain parts manufacturers creates exposure beyond single victims. And courtrooms are catching up: a ransomware negotiator selling victim data to BlackCat, Scattered Spider&#8217;s Tyler B owning up to $8M in sim swaps. If you do three things today: patch CVE-2026-20133 before Friday, audit your OAuth grants, and stress test your offline backups.</p><p>Stay Cyber Safe </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/cisco-sd-wan-kev-federal-deadline?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/cisco-sd-wan-kev-federal-deadline?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Defender 0-Days Exploited, Anthropic MCP RCE Flaw, Lazarus Drains $290M From KelpDAO]]></title><description><![CDATA[Domain Controllers in Reboot Loops, Marimo RCE Chains into NKN Blockchain Backdoor, Shiny Hunters Lists Amman Resorts with 48-Hour Countdown, Blue Sky DDoS Outage, and 2.45 Million FTP Servers No TLS]]></description><link>https://www.cyberhubpodcast.com/p/defender-0-days-exploited-anthropic</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/defender-0-days-exploited-anthropic</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Tue, 21 Apr 2026 13:31:17 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/194860233/a6d39c4512d39617c21b1d8cf37391da.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<h1><strong>Good Morning Security Gang,</strong></h1><p>Today&#8217;s show is one of those rare moments where multiple fault lines in cybersecurity crack at the same time. We&#8217;re not looking at isolated incidents  we&#8217;re seeing systemic stress across endpoint security, AI tooling, patch management, and financial ecosystems. The common thread is clear: the controls we trust most are now being actively exploited.</p><p>Today&#8217;s episode highlights a convergence of risks across enterprise environments. Attackers are no longer focused on bypassing defenses&#8212;they are repurposing trusted systems as attack vectors. From Defender zero-days disabling detection capabilities, to AI frameworks introducing remote code execution risks by design, to crypto theft reaching industrial scale, the modern threat landscape is defined by speed, scale, and trust exploitation.</p><p>Organizations must shift from a prevention-first mindset to one centered on resilience, validation, and layered defense, particularly across identity, AI, and developer ecosystems.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!b-EH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937879b5-78c5-4d0a-851e-6b801aded5e7_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!b-EH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937879b5-78c5-4d0a-851e-6b801aded5e7_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!b-EH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937879b5-78c5-4d0a-851e-6b801aded5e7_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!b-EH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937879b5-78c5-4d0a-851e-6b801aded5e7_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!b-EH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937879b5-78c5-4d0a-851e-6b801aded5e7_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!b-EH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937879b5-78c5-4d0a-851e-6b801aded5e7_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/937879b5-78c5-4d0a-851e-6b801aded5e7_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:210322,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/194860233?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937879b5-78c5-4d0a-851e-6b801aded5e7_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!b-EH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937879b5-78c5-4d0a-851e-6b801aded5e7_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!b-EH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937879b5-78c5-4d0a-851e-6b801aded5e7_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!b-EH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937879b5-78c5-4d0a-851e-6b801aded5e7_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!b-EH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937879b5-78c5-4d0a-851e-6b801aded5e7_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>Microsoft Defender Zero-Days &#8211; Security Tools as Attack Vectors</strong></h2><p>Microsoft issued emergency patches for three actively exploited zero-days in Defender for Endpoint. These vulnerabilities allowed attackers to tamper with detection mechanisms, effectively disabling security visibility.</p><p>This marks a critical shift. Endpoint Detection and Response (EDR) is no longer just a defensive layer, it has become part of the attack surface. If attackers can neutralize your detection stack, they gain time, persistence, and operational freedom.</p><p>The implication is significant: organizations relying on a single EDR solution are operating with a single point of failure.</p><blockquote><p><em>&#8220;Attackers aren&#8217;t bypassing your defenses&#8212;they&#8217;re turning them into theirs.&#8221; James Azar and continues "That's why you need two endpoint products, not just one. It's a sad truth, but you've got to layer them. They might be able to silence Defender, but they can't silence SentinelOne or CrowdStrike. Attackers are no longer just evading endpoint security, they're actively weaponizing it."</em></p></blockquote><h2><strong>Domain Controller Patch Failure &#8211; Operational Risk from Remediation</strong></h2><p>Simultaneously, Microsoft&#8217;s April patch cycle introduced instability in domain controllers, triggering reboot loops and widespread authentication failures.</p><p>This resulted in cascading operational disruptions, including login failures, VDI outages, and identity system degradation.</p><p>This is the paradox of modern security operations: patching is essential, but poorly validated patches can introduce systemic risk. Identity infrastructure must be treated as mission-critical systems requiring controlled deployment pipelines.</p><h2><strong>AI Supply Chain Exploitation &#8211; Marimo and Hugging Face</strong></h2><p>The Marimo RCE vulnerability, exploited within hours of disclosure, demonstrates how quickly attackers are operationalizing weaknesses in AI tooling.</p><p>Attack chains now include trusted platforms like Hugging Face, combined with decentralized command-and-control infrastructure, making mitigation more complex.</p><p>This signals a new reality: AI development environments are now enterprise attack surfaces, often deployed without the rigor applied to traditional infrastructure.</p><h2><strong>Anthropic MCP Vulnerability &#8211; Systemic AI Risk</strong></h2><p>A critical design flaw in Anthropic&#8217;s Model Context Protocol (MCP) introduces remote code execution risk across a wide ecosystem of AI development tools.</p><p>The scale of exposure millions of downloads and hundreds of thousands of instances&#8212;combined with the vendor&#8217;s stance that the behavior is &#8220;by design,&#8221; raises serious concerns about security maturity in AI frameworks.</p><p>This is not a bug. It is an architectural risk.</p><h2><strong>Lazarus Group Crypto Heist &#8211; Industrialized Financial Attacks</strong></h2><p>North Korea&#8217;s Lazarus Group executed a $290 million exploit against KelpDAO, leveraging weaknesses in cross-chain bridge architecture.</p><p>This follows a repeatable playbook: compromise infrastructure, manipulate trust assumptions, and extract value at scale.</p><p>Layer Zero is attributing the attack to North Korea&#8217;s Lazarus Group, specifically the TraderTraitor cluster.</p><p>The attack chain:</p><ol><li><p>Compromised the downstream RPC endpoint that DVN relied on</p></li><li><p>Used DDoS to force failover to the poisoned endpoint</p></li><li><p>Spoofed cross-chain messages through KelpDAO&#8217;s single verifier setup</p></li></ol><p>KelpDAO is disputing the narrative, arguing the single verifier configuration was Layer Zero&#8217;s own default rather than an unusual choice.</p><p>This correlates with Bybit&#8217;s $1.5 billion heist playbook and the broader DPRK revenue engine we&#8217;ve been tracking. <strong>April 2026 is now the worst month for crypto hacks since February 2025</strong>, with over $606 million lost in 18 days.</p><p>The volume of crypto theft in April alone underscores a critical trend financial cybercrime is now operating at nation-state scale and efficiency.</p><h2><strong>Salesforce Campaign &#8211; ShinyHunters Expands Targeting</strong></h2><p>ShinyHunters continues its campaign targeting Salesforce environments, now focusing on high-value organizations like Aman Resorts.</p><p>The Aman Resorts story is short but sharp, and the clock is ticking. Ransomware.live and Hookfish report Shiny Hunters added the ultra-luxury hospitality brand Amman Resorts to its leak portal on April 19th, claiming 500,000 Salesforce records of PII with an April 21st deadline to pay or see the data posted publicly.</p><p>This listing is the latest in Shiny Hunters&#8217; active Salesforce-centric campaign that has also touched 7-Eleven, Pitney Bowes, Canada Life Assurance Company, and Marcus &amp; Millichap in the last two weeks.</p><p>Rather than exploiting platform vulnerabilities, attackers are abusing integrations, OAuth scopes, and API access.</p><p>This reflects a broader shift toward identity and integration layer exploitation, where traditional perimeter defenses offer little protection.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><h2><strong>BlueSky DDoS &#8211; Availability as a Primary Target</strong></h2><p>A multi-day DDoS attack against BlueSky disrupted core platform functionality, reinforcing that availability remains a critical component of security.</p><p>As organizations adopt decentralized architectures, mitigating volumetric and application-layer attacks becomes increasingly complex.</p><h2><strong>Internet Exposure &#8211; FTP as a Persistent Weakness</strong></h2><p>Despite years of awareness, over 2.4 million internet-facing FTP servers still operate without encryption. This is not a sophisticated threat, it is a failure of basic security hygiene at global scale.</p><p>Cleartext protocols continue to provide attackers with effortless access to credentials and sensitive data.</p><h1><strong>Key Action Items</strong></h1><ul><li><p>Deploy layered endpoint security controls to mitigate EDR tampering risks</p></li><li><p>Implement staged patching and validation for identity infrastructure</p></li><li><p>Secure AI and data science environments with enterprise-grade controls</p></li><li><p>Audit and restrict AI agent frameworks and MCP integrations</p></li><li><p>Enforce multi-verifier models in blockchain and DeFi architectures</p></li><li><p>Review SaaS integrations, OAuth scopes, and API access patterns</p></li><li><p>Strengthen DDoS response strategies with pre-defined mitigation plans</p></li><li><p>Eliminate cleartext protocols and enforce encryption across all services</p></li><li><p>Monitor for credential theft and privilege escalation indicators</p></li><li><p>Continuously validate trust assumptions across all systems</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/defender-0-days-exploited-anthropic/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/defender-0-days-exploited-anthropic/comments"><span>Leave a comment</span></a></p><div class="pullquote"><p>"The pattern on today's show is brutal and consistent: your endpoint product is being weaponized against you, your patch pipeline is breaking the infrastructure it's supposed to protect, your AI tool chain from notebook servers to the MCP standard itself is a fresh RCE buffet, nation-state crews are draining DeFi bridges for a quarter billion at a time, Shiny Hunters is turning Salesforce connected apps into a breach factory, volumetric DDoS can still take major social platforms offline for days, and millions of unencrypted FTP servers still leak credentials across the public internet." James Azar</p></div><h1><strong>James Azar&#8217;s CISOs Take</strong></h1><p>What we&#8217;re seeing today is not a series of independent failures, it&#8217;s a systemic shift in how cyber risk manifests. Endpoint protection, AI tooling, patching processes, and financial systems are all being tested simultaneously. This isn&#8217;t coincidence. It&#8217;s the result of attackers identifying where trust has been overextended and exploiting it at scale.</p><p>The path forward requires a fundamental change in approach. Security can no longer rely on static controls or assumptions of safety. Every system must be treated as potentially compromised, every integration as a risk vector, and every layer as something that must be continuously validated. Organizations that embrace this mindset will adapt. Those that don&#8217;t will continue reacting to incidents rather than preventing impact.</p><p>Stay Cyber Safe</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/defender-0-days-exploited-anthropic?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/defender-0-days-exploited-anthropic?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/defender-0-days-exploited-anthropic?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[ZionSiphon ICS Malware Targets Water Plants, Vercel Breached, NHS Still Suffering from Ransomware Attack]]></title><description><![CDATA[Baby Azar Sleep Deprivation Edition&#8212;Finance Chiefs Warn AI Could Destabilize Banking, Crypto Exchange Blames Western Intelligence for $13.7M Hack, Apache ActiveMQ Actively Exploited, Fortinet Sandbox]]></description><link>https://www.cyberhubpodcast.com/p/zionsiphon-ics-malware-targets-water</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/zionsiphon-ics-malware-targets-water</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Mon, 20 Apr 2026 13:31:06 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/194755570/41405b449fb7b275cb64ad24f12c26a9.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<h1><strong>Good Morning Security Gang,</strong></h1><p>Today&#8217;s show is one of those where you can clearly see the convergence of everything we&#8217;ve been talking about AI risk, supply chain compromise, critical infrastructure targeting, and long-tail operational damage.</p><p>And if there&#8217;s one theme that cuts across every single story today, it&#8217;s this: attackers are abusing trust faster than defenders can validate it.</p><p>Double espresso in hand, let&#8217;s get into it. Coffee Cup Cheers</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><div class="pullquote"><p>"A career in cyber will help you understand what it's like to only function on three or four hours of sleep. If you've ever been through an incident, you know the marathon you're going through in the hours and days post-event until you get the all-clear signal. Your career kind of prepares you for parenting, so don't hold back, go make yourself some little ones, join the party, it's a blast!" James Azar on new parenting</p></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lfA5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18390d02-87ba-426d-8979-034d0fe66457_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lfA5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18390d02-87ba-426d-8979-034d0fe66457_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!lfA5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18390d02-87ba-426d-8979-034d0fe66457_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!lfA5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18390d02-87ba-426d-8979-034d0fe66457_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!lfA5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18390d02-87ba-426d-8979-034d0fe66457_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lfA5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18390d02-87ba-426d-8979-034d0fe66457_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/18390d02-87ba-426d-8979-034d0fe66457_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2038879,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/194755570?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18390d02-87ba-426d-8979-034d0fe66457_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!lfA5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18390d02-87ba-426d-8979-034d0fe66457_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!lfA5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18390d02-87ba-426d-8979-034d0fe66457_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!lfA5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18390d02-87ba-426d-8979-034d0fe66457_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!lfA5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18390d02-87ba-426d-8979-034d0fe66457_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>AI Threat to Global Banking: Speed vs. Control</strong></h2><p>We kick things off with financial leaders warning that advanced AI models could destabilize parts of the global banking system. This isn&#8217;t about hallucinations or bad outputs, it&#8217;s about <strong>scale and speed</strong>.</p><p>AI is enabling fraud, automating attacks, and accelerating decision-making faster than human oversight can keep up. And in banking, where regulation slows everything down, that gap becomes dangerous.</p><p>The real risk here is systemic fraud happening faster than institutions can detect or respond, potentially leading to financial instability.</p><p>This is where AI shifts from a tool to a threat multiplier.</p><h2><strong>Vercel Breach: Developer Infrastructure Under Fire</strong></h2><p>Next, Vercel confirmed a breach involving unauthorized access to internal systems, with attackers claiming access to source code, tokens, and internal dashboards.</p><p>This is a direct hit on <strong>developer infrastructure and CI/CD environments</strong>.</p><blockquote><p><em>&#8220;Attackers don&#8217;t need to break trust, they just need to use it better than we protect it.&#8221;</em></p></blockquote><p>And that matters because these systems aren&#8217;t just internal, they&#8217;re gateways into production environments and customer data. The risk here isn&#8217;t just what was accessed, it&#8217;s what can be accessed next through stolen tokens and deployment pipelines.</p><p>This is supply chain risk in real time.</p><h2><strong>Crypto Exchange Hack: Blame vs. Reality</strong></h2><p>A crypto exchange suffered a $13.7 million hack and blamed Western intelligence agencies. Regardless of attribution, the reality is simple, the funds are gone.</p><p>This highlights a recurring issue in crypto incidents: geopolitics often clouds transparency. But users don&#8217;t care about attribution, they care about access to their funds.</p><p>The risk is erosion of trust in platforms where accountability becomes secondary to narrative.</p><h2><strong>NHS Ransomware Fallout: Two Years Later, Still Broken</strong></h2><p>The NHS story is one of the most important today&#8212;and the most overlooked.</p><p>Nearly two years after a ransomware attack, healthcare services in London are still dealing with the fallout thousands of delayed procedures, disrupted diagnostics, and ongoing operational issues.</p><blockquote><p><em>&#8220;Cyber incidents don&#8217;t end when systems come back online&#8212;they end when operations fully recover.&#8221; James Azar</em></p></blockquote><p>This is the long tail of cyber incidents. Ransomware isn&#8217;t just a data problem, it&#8217;s a multi-year operational crisis. And healthcare, more than any other sector, feels that impact directly in patient care.</p><h2><strong>ZionSiphon Malware Targets Water Infrastructure</strong></h2><p>This is one of the most concerning stories of the day. ZionSiphon malware is targeting water treatment and desalination systems, specifically looking for processes related to chlorine handling and water purification.</p><p>It even includes references to poisoning water supplies. This isn&#8217;t theoretical.</p><p>This is <strong>early-stage OT malware with real-world consequences</strong>.</p><p>Even if incomplete, it&#8217;s enough to cause damage&#8212;and that&#8217;s what makes it dangerous. We&#8217;ve seen this before. Oldsmar, Florida. One analyst prevented disaster. This is that same playbook evolving.</p><h2><strong>Apache ActiveMQ Exploited: Old Bugs, New Campaigns</strong></h2><p>ActiveMQ vulnerabilities are now being actively exploited, often chained with default credentials and older bugs. This is a recurring theme:</p><p>Old vulnerabilities + weak configurations = new attacks. Middleware like ActiveMQ sits deep in application environments, making it a perfect foothold for attackers.</p><p>Quiet. Persistent. Dangerous.</p><h2><strong>Fortinet Sandbox Flaw: Security Tools Become Attack Vectors</strong></h2><p>A critical Fortinet Sandbox vulnerability allows unauthenticated command execution as root with public exploit code already available. This is a reminder that security tools themselves are part of the attack surface.</p><p>If compromised, they become trusted footholds for attackers. The irony is real and so is the risk.</p><h2><strong>Apple Alert Phishing: When Real Becomes the Threat</strong></h2><p>Attackers are abusing legitimate Apple account notifications to deliver phishing messages. These emails pass all authentication checks, SPF, DKIM, DMARC, because they&#8217;re actually sent by Apple.</p><p>This is next-level phishing. No fake domains. No obvious red flags. Just trusted communication turned into an attack vector.</p><h2><strong>Good Guys Prevail: DDoS Crackdown and North Korea Sentencing</strong></h2><p>On the positive side, law enforcement disrupted a DDoS-for-hire network, seizing domains and warning over 75,000 users. Additionally, two individuals were sentenced for supporting North Korea&#8217;s fake IT worker scheme.</p><p>These are wins&#8212;but they&#8217;re temporary. Cybercrime ecosystems adapt quickly. Disruption creates friction, not elimination.</p><h2><strong>DraftKings Credential Stuffing Case: Old Tactics Still Work</strong></h2><p>Finally, the DraftKings case reminds us that credential stuffing is still highly effective. Attackers used reused credentials from other breaches to access 60,000 accounts and monetize them.</p><p>No zero-days. No advanced techniques. Just reused passwords.</p><p>Sometimes the biggest risks are still the simplest.</p><h2><strong>Action Items for Security Leaders</strong></h2><ul><li><p>Introduce human approval gates for high-risk AI-driven financial workflows</p></li><li><p>Treat CI/CD and developer platforms as production-grade assets</p></li><li><p>Enforce rapid token rotation and eliminate static credentials</p></li><li><p>Demand transparency and proof-of-reserve in crypto platforms post-incident</p></li><li><p>Build healthcare recovery plans around clinical workflows, not just IT systems</p></li><li><p>Baseline OT behavior and monitor for unauthorized process changes</p></li><li><p>Remove default credentials and patch middleware like ActiveMQ immediately</p></li><li><p>Patch and audit security appliances as high-priority infrastructure</p></li><li><p>Train users to verify alerts directly from official apps&#8212;not email links</p></li><li><p>Strengthen defenses against credential stuffing and automated abuse</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/zionsiphon-ics-malware-targets-water/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/zionsiphon-ics-malware-targets-water/comments"><span>Leave a comment</span></a></p><div class="pullquote"><p>"The pattern here is clear. Trust is getting abused everywhere&#8212;in banks, clouds, hospitals, industrial systems, software appliances, brand alerts, and user accounts. Attackers keep winning when defenders assume a system is safe because it's familiar. It isn't. Our work is to verify the trust, reduce the blast radius, and be faster at seeing misuse than the attacker is at scaling it."</p></div><h2><strong>James Azar&#8217;s CISOs Take</strong></h2><p>What stood out to me today is how interconnected everything has become. AI, cloud, OT systems, and user behavior are no longer separate domains&#8212;they&#8217;re all part of the same attack surface. When attackers exploit trust in one area, it cascades into others. That&#8217;s why we&#8217;re seeing incidents that start in one place and end somewhere completely different.</p><p>The second takeaway is the importance of resilience. Too many organizations still think in terms of prevention, but today&#8217;s stories especially NHS and water infrastructure show that recovery and continuity are just as critical. We need to design systems not just to stop attacks, but to survive them. Because in today&#8217;s environment, survival is the real measure of security.</p><p><strong>Stay Cyber Safe.</strong></p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/zionsiphon-ics-malware-targets-water?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/zionsiphon-ics-malware-targets-water?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/zionsiphon-ics-malware-targets-water?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[This Week in Cybersecurity #48]]></title><description><![CDATA[Below the Surface: Quiet Campaigns, Trusted Systems, and the Week Cyber Became Societal. Your weekend catch-up on the most critical cybersecurity stories of the week, curated by James Azar and the Cyb]]></description><link>https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-48</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-48</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Fri, 17 Apr 2026 15:02:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!UaQO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaafb4e2-be99-4a85-9ae4-a493d3d485fe_1920x1080.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Good Morning, Security Gang!</h2><p>We&#8217;re back and yes, the Azar family grew by one beautiful baby boy this week. Sleep is rare. Coffee is mandatory. And James is back in the saddle with the double espresso running and the full Security Gang energy you&#8217;ve come to expect.</p><p>If this week&#8217;s stories have a common thread, it&#8217;s this: the most dangerous cyber threats aren&#8217;t the loudest ones. Sweden was nearly hit by a Russian attack on its heating infrastructure, and that attack <em>failed</em>, but the intent was unmistakable. Ukrainian hospitals and government agencies are being targeted with malware specifically designed to disrupt societal stability. Twelve thousand systems in the Middle East were scanned in an Iranian-style reconnaissance campaign. </p><p>And Patch Tuesday arrived with what may be the second-largest Microsoft patch cycle ever 167 vulnerabilities, including an exploited SharePoint zero-day arriving the same week as critical patches from Fortinet, SAP, Adobe, Ivanti, and eight major industrial vendors.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UaQO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaafb4e2-be99-4a85-9ae4-a493d3d485fe_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UaQO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaafb4e2-be99-4a85-9ae4-a493d3d485fe_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!UaQO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaafb4e2-be99-4a85-9ae4-a493d3d485fe_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!UaQO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaafb4e2-be99-4a85-9ae4-a493d3d485fe_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!UaQO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaafb4e2-be99-4a85-9ae4-a493d3d485fe_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UaQO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaafb4e2-be99-4a85-9ae4-a493d3d485fe_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/caafb4e2-be99-4a85-9ae4-a493d3d485fe_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3080204,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/194369704?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaafb4e2-be99-4a85-9ae4-a493d3d485fe_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!UaQO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaafb4e2-be99-4a85-9ae4-a493d3d485fe_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!UaQO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaafb4e2-be99-4a85-9ae4-a493d3d485fe_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!UaQO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaafb4e2-be99-4a85-9ae4-a493d3d485fe_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!UaQO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaafb4e2-be99-4a85-9ae4-a493d3d485fe_1920x1080.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Meanwhile, the week&#8217;s breach stories reinforced a pattern we&#8217;ve been tracking for months: attackers exploiting trust rather than force. Booking.com, Rockstar Games via Snowflake, McGraw-Hill via a Salesforce misconfiguration, a Kraken insider threat, and supply chain compromises in GitHub, Jira, and npm all shared the same fingerprint legitimate access, trusted platforms, and no alarm bells until it was too late.</p><p>James opened one of this week&#8217;s shows with a reflection on Yom HaShoah Holocaust Remembrance Day and the quiet, slow erosion that precedes catastrophe. It was a reminder that whether in society or in cybersecurity, the warnings come long before the breaking point. The question is whether we&#8217;re paying attention.</p><blockquote><p><em>&#8220;Attackers keep winning by abusing things we already trust &#8212; SaaS pages, support workflows, app authorization, collaboration platforms, and even our own security appliances, ERP systems, and VPN clients. The defensive move is not magic. It is knowing which trusted systems have the highest blast radius and hardening those first. That is how you reduce risk.&#8221;</em></p></blockquote><p>Let&#8217;s get into it.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><h2>&#127760; Geopolitical Cyber Warfare</h2><p><strong>Sweden Attributes Heating Plant Attack to Russian-Linked Group</strong></p><p>Swedish officials attributed a cyberattack on a district heating plant to a pro-Russian group with ties to Russian intelligence. The attack failed operationally but that&#8217;s not the lead. The intent is. This fits a sustained European pattern of targeting civilian infrastructure not to destroy it, but to create instability and psychological pressure on populations. Heating. Power. Water. These aren&#8217;t military targets they&#8217;re societal pressure points. Gray-zone warfare doesn&#8217;t need to succeed to succeed. The attempt alone achieves its goal.</p><blockquote><p><em>&#8220;If we treated our power plants the way pilots treat an airplane, we would likely have less of these events on the engineering side. As security practitioners, we ought to be planning for the day after. That day after is network obfuscation. That day after is inline data encryption even within your air-gapped networks.&#8221;</em></p></blockquote><p><strong>AgingFly Malware Targets Ukrainian Government and Hospitals</strong></p><p>A new malware strain AgingFly is actively targeting Ukrainian government organizations and healthcare systems. This is not opportunistic cybercrime. It is deliberate targeting of the institutions that sustain public life. Hospitals and government agencies are being hit because disrupting them destabilizes society without requiring kinetic escalation. Cyber resilience in healthcare and public sector environments is no longer an IT goal, it is a national security imperative.</p><p><strong>12,000 Systems Scanned in Iranian-Style Reconnaissance Campaign</strong></p><p>More than 12,000 systems in the Middle East have been scanned in a campaign mirroring Iranian reconnaissance tactics. Scanning is not the attack, it&#8217;s the preparation for one. This is patient, methodical threat actor behavior: map the environment, identify weaknesses, and return with precision. This aligns directly with prior reporting on Iranian pre-positioning across U.S. industrial and critical infrastructure. Today&#8217;s scan is tomorrow&#8217;s disruption.</p><p><strong>4,000 U.S. Industrial Devices Remain Exposed to Iranian Targeting</strong></p><p>Nearly 4,000 U.S. industrial devices remain directly internet-exposed and vulnerable to Iranian-linked activity. These are operational technology systems, they control physical processes. Leaving them exposed is not a misconfiguration. It is an open invitation in a high-risk neighborhood. The question is no longer whether someone will walk through that door, it&#8217;s when.</p><p><strong>Iranian Cyber Threats Target U.S. Energy Infrastructure</strong></p><p>CISA and NERC continue to issue warnings around Iranian-linked activity targeting U.S. critical infrastructure, with particular focus on energy systems. The current activity remains focused on reconnaissance and persistence rather than immediate disruption. But in the Iranian threat model, today&#8217;s foothold is tomorrow&#8217;s leverage. OT environments with any internet exposure should treat this as an active threat, not a theoretical one.</p><h2>&#128165; Stryker Fallout: Cyber Becomes a Business Event</h2><p><strong>Stryker Confirms Material Q1 Earnings Impact from Iran-Linked Attack</strong></p><p>Stryker confirmed this week that the March 11 Iran-linked attack had a material impact on Q1 earnings. The Handala group gained access to Microsoft Intune, wiped more than 200,000 devices, and disrupted the company&#8217;s ordering and supply chain systems. Operations have since been restored &#8212; but the damage was real, measurable, and reported to investors.</p><p>This is the clearest example in recent memory of cyber leaving the SOC and landing on a hospital floor, and then in an earnings release. Medical staff adapted under constrained equipment conditions. Hospitals extended the use of existing devices. And a publicly traded company disclosed financial harm directly attributable to a nation-state-linked cyber operation. For CISOs still struggling to quantify cyber risk in business terms, this is the case study.</p><h2>&#128275; Data Breaches &amp; Exposures</h2><p><strong>Booking.com Breach: Identity and Access, Not Infrastructure</strong></p><p>Booking.com confirmed a breach affecting user data, likely tied to compromised credentials or third-party access workflows rather than a direct infrastructure intrusion. This is the modern breach pattern: no forced entry, just trusted access used incorrectly. Travel and hospitality platforms hold high-value identity data that fuels downstream fraud, social engineering, and impersonation at scale. For users, this is a direct reminder that passwords alone are insufficient MFA is non-negotiable on any platform holding financial or travel data.</p><p><strong>Rockstar Games: Snowflake Environment Accessed via Third-Party Credentials</strong></p><p>ShinyHunters claims access to Rockstar Games data stored in a Snowflake cloud environment via a compromised third-party analytics platform. The attack pattern is textbook: stolen credentials, legitimate API access, no alerts triggered. Once inside a cloud environment via valid credentials, attackers move at the speed of the platform itself. Cloud security monitoring must go beyond perimeter controls to include behavioral anomaly detection for API access patterns across every integrated third-party service.</p><p><strong>McGraw-Hill Salesforce Misconfiguration: ShinyHunters Claims 45 Million Records</strong></p><p>McGraw-Hill is the latest victim in ShinyHunters&#8217; ongoing Salesforce campaign. The attackers reportedly exploited a misconfigured Salesforce-hosted web page not the core enterprise tenant, and are claiming 45 million records and threatening to leak if not paid. McGraw-Hill stated that core systems, customer databases, and student platforms were not accessed. But the blast radius of SaaS misconfigurations regularly extends far beyond what organizations initially assume. Every externally reachable SaaS-hosted page requires explicit access control validation, not just the main platform tenant.</p><p><strong>Kraken Insider Threat: Support Employees Enable Extortion Attempt</strong></p><p>Kraken disclosed that a cybercrime group attempted to extort the exchange using videos allegedly showing internal systems. At the root: two support employees accessed limited customer data improperly. Client funds were not at risk. But the incident demonstrates a consistent pattern, when externally hardened environments are difficult to breach, attackers pivot to the human layer. Support functions with access to customer data are high-value social engineering targets, particularly where wage disparities create vulnerability to outside influence. Just-in-time access and session recording for support teams are essential controls.</p><p><strong>CPU-Z Trojanized Downloads: Supply Chain at Distribution Level</strong></p><p>Attackers compromised the CPUID website to distribute trojanized versions of CPU-Z and HWMonitor. This is supply chain compromise at the final distribution point trusted tools from a recognized domain, delivering malware to users who never suspected anything was wrong. Most users will not verify cryptographic signatures before installing a familiar utility. That&#8217;s the gap attackers are exploiting. Enforce signature verification as a baseline requirement before any software installation in enterprise environments.</p><p><strong>RCI Hospitality IDOR Vulnerability Exposes Contractor Data</strong></p><p>RCI Hospitality disclosed an insecure direct object reference vulnerability in their web application that exposed contractor data without triggering traditional security alerts. IDORs are unglamorous but brutally effective the application hands attackers the data without any exploitation of authentication systems. Object-level authorization testing must be part of every application security release gate, particularly for portals handling workforce and contractor records.</p><h2>&#128373;&#65039; Nation-State Activity &amp; Advanced Threats</h2><p><strong>North Korea&#8217;s $280 Million Crypto Theft: Corporate-Grade Operations</strong></p><p>The post-mortem on the Drift crypto theft reveals an operation that reads less like a hack and more like a business. North Korea orchestrated a $280 million theft using fake companies, sustained relationship-building, social engineering, and physical presence at industry conferences. This was not remote exploitation, it was long-game infiltration. Fake identities. Real relationships. Trust built over months before a payload was ever deployed. If your security model doesn&#8217;t account for adversaries who operate at this level of patience and organizational sophistication, it is not accounting for the actual threat.</p><p><strong>North Korea&#8217;s APT37: Facebook-Based Social Engineering Campaign</strong></p><p>APT37 is running an active social engineering campaign using fake Facebook personas to build relationships with targets before deploying malware payloads. This is patience over speed, psychology over technology. Attackers establish trust across weeks or months before any technical action is taken. This is where most defenses still fall short, because they are built to detect technical indicators, not human behavioral manipulation. Employee awareness of relationship-building social engineering is a required defensive layer.</p><h2>&#128737;&#65039; Vulnerabilities &amp; Patch Tuesday</h2><p><strong>Microsoft Patch Tuesday: SharePoint Zero-Day + 167 Fixes &#8212; Second Largest Ever</strong></p><p>Microsoft addressed 167 vulnerabilities this month, the second largest Patch Tuesday by CVE count on record including an actively exploited SharePoint zero-day (CVE-2026-29231) that was publicly known before patches were released. Collaboration and content platforms continue to draw the most adversarial attention. Internet-facing systems like SharePoint must have a dedicated fast-lane patch process, they cannot wait in the same queue as routine workstation updates.</p><p><strong>Fortinet: CVE-2026-27813 Across Multiple Products</strong></p><p>Fortinet released a broad patch set with clear prioritization around CVE-2026-27813, affecting FortiAnalyzer, FortiManager, FortiOS, FortiProxy, FortiPAM, and FortiSwitch Manager. The perimeter and management plane continue to be primary targets. Every security appliance should be treated as production infrastructure and patched according to attack surface priority, not product popularity.</p><p><strong>SAP: 19 Security Notes Including Critical CVSS 9.9 SQL Injection</strong></p><p>SAP released 19 new security notes covering more than a dozen products, including CVE-2026-27681, a CVSS 9.9 SQL injection vulnerability in Business Planning and Consolidation and Business Warehouse that could lead to arbitrary code execution. ERP and core business systems must be treated as crown jewel infrastructure. Attackers who land in SAP don&#8217;t just steal data they learn how the business operates. Prioritize SAP remediation based on process criticality and direct business exposure.</p><p><strong>Adobe: 55 Vulnerabilities Including Critical ColdFusion Flaw</strong></p><p>Adobe patched 55 vulnerabilities across 11 products, with a critical ColdFusion vulnerability representing the highest real-world exploitation risk. ColdFusion has a consistent history of showing up in attack chains precisely because it sits in the internet-facing application layer. If ColdFusion is still running in your environment, place it behind additional network controls and treat it as a high-risk exception requiring active monitoring.</p><p><strong>Ivanti: RCE and Authentication Bypass Return</strong></p><p>Ivanti surfaced again this week with two new vulnerabilities &#8212; a remote code execution flaw and an authentication bypass. Platforms that broker access and manage systems sit in the critical flow of enterprise trust. Ivanti&#8217;s recurring presence in the threat landscape is not a coincidence it reflects consistent adversarial interest in control-plane compromise. Patch immediately and validate that no previous exploitation paths remain active.</p><p><strong>CISA Flags Windows Task Host Privilege Escalation Under Active Exploitation</strong></p><p>CISA flagged a Windows Task Host vulnerability as actively exploited, allowing attackers to escalate to SYSTEM-level access. Privilege escalation is where initial access becomes full control. Once an attacker reaches SYSTEM on a shared or high-value system, the scope of compromise expands rapidly. This vulnerability warrants immediate remediation prioritization.</p><p><strong>NGINX UI Zero-Day: Management Interface Compromise</strong></p><p>Active exploitation of a critical NGINX UI zero-day continues. Exposed administrative interfaces remain one of the most consistently effective attack vectors &#8212; not because they&#8217;re sophisticated, but because convenience keeps winning over security. Management panels left accessible to the internet are an open invitation. Remove or restrict all exposed administrative interfaces immediately.</p><p><strong>ICS Patch Tuesday: Eight Major Industrial Vendors</strong></p><p>Siemens, Schneider Electric, Rockwell, and five additional industrial vendors released advisories in this month&#8217;s ICS Patch Tuesday. OT environments accumulate risk over time long-lived systems, infrequent patching, and operational continuity constraints combine to create compounding vulnerability. Establish dedicated OT vulnerability management processes that account for the unique operational constraints of industrial environments.</p><p><strong>Synology SSL VPN Client: Remote Access Vulnerabilities</strong></p><p>Synology released updates for SSL VPN client vulnerabilities. Vendor guidance specifies upgrading to version 1.4.5-0684 or newer and calls for active monitoring of configuration changes and unusual traffic behavior. VPN configuration changes should be monitored with the same urgency as failed login attempts remote access is where trust and network access intersect most dangerously.</p><p><strong>Juniper and Chrome Continue Steady Patch Cycles</strong></p><p>Juniper patched dozens of Junos OS vulnerabilities, and Chrome released version 147 with 60 fixes including two critical. Neither is a single dramatic event both reflect the ongoing maintenance reality of foundational infrastructure. Browsers and network devices are prime targets precisely because they are ubiquitous and trusted. Keep them current automatically.</p><h2>&#129302; AI, Supply Chain &amp; Developer Threats</h2><p><strong>Cloud Security Alliance Releases Mythos AI Threat White Paper</strong></p><p>The Cloud Security Alliance, led by Gadi Evron, published a white paper on Anthropic&#8217;s Mythos AI model and its implications for the cybersecurity threat landscape reviewed by over 100 CISOs. The core concern: AI tools like Mythos dramatically accelerate both vulnerability discovery and exploit development, compressing the timeline between disclosure and weaponization in ways the industry has not yet calibrated for. This is required reading for security leadership. Download it at cyberhubpodcast.com.</p><p><strong>OpenAI Caught in Axios npm Supply Chain Compromise</strong></p><p>OpenAI was caught in the blast radius of the Axios npm package supply chain compromise. This confirms a pattern: supply chain attacks don&#8217;t stop at developers they propagate through enterprise apps, AI platforms, and into production systems. Once trust is compromised at the package level, everything downstream inherits that risk. Software composition analysis is foundational security hygiene, not an advanced practice.</p><p><strong>Glassworm Evolves: Zig-Based Dropper Targets Developer IDEs</strong></p><p>Glassworm returned with a new variant using a Zig-based dropper to target developer environments and IDE ecosystems. Attackers are moving upstream into the development lifecycle because controlling the developer environment means influencing what gets built. Supply chain compromise at the IDE layer is persistent, quiet, and extraordinarily difficult to detect after the fact. Lock down developer environments with signed plugins, approved extension lists, and access controls.</p><p><strong>PHP Composer Flaws Enable Arbitrary Command Execution</strong></p><p>New vulnerabilities in PHP Composer enable arbitrary command execution within software build workflows. This is the same threat surface the Team PCP group exploited in expanding across developer toolchains. Pin Composer and all build chain tooling to approved internal baselines rather than allowing developer environments to drift toward the latest available version.</p><p><strong>GitHub and Jira Notification Abuse for Malware Delivery</strong></p><p>Attackers are abusing GitHub and Jira notification systems to deliver malicious links inside expected, trusted workflow communications. Users don&#8217;t question notifications from platforms they rely on daily and attackers have learned to exploit exactly that behavioral pattern. Extend phishing inspection to collaboration platform notifications, not just email. Security teams often overlook these channels entirely.</p><h2>&#9878;&#65039; Policy, Regulation &amp; Industry</h2><p><strong>FCC Cybertrust Mark: IoXT Alliance Named New Lead Administrator</strong></p><p>The FCC Cybertrust Mark program, a consumer-facing security certification for connected devices has a new lead administrator after UL withdrew. The non-profit IoXT Alliance takes over, putting the program back on track. Given the persistent exploitation of routers, IoT devices, and unmanaged endpoints, any policy initiative that raises the baseline security floor for connected devices has real-world defensive value. This program matters.</p><p><strong>FCC Grants Netgear Exemption in Router Certification Rules</strong></p><p>The FCC granted Netgear an exemption related to router certification requirements and foreign-owned testing labs. This sits at the intersection of cybersecurity, geopolitics, and supply chain policy. Hardware certification decisions directly influence how secure or insecure network infrastructure becomes at the consumer and enterprise level alike. Policy decisions are now security decisions.</p><p><strong>Privacy Research: Tracking Persists After User Opt-Outs</strong></p><p>New research indicates major technology companies can continue tracking users even after opt-out mechanisms are activated. The security implication is not just privacy: if controls don&#8217;t behave as documented, then compliance assumptions break down. Defenders cannot rely solely on vendor claims. Validate privacy and tracking controls independently including within your own environment.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-48/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-48/comments"><span>Leave a comment</span></a></p><h2>&#9989; This Week&#8217;s Priority Action List</h2><p><strong>Immediate (Do This Now)</strong></p><ul><li><p>Patch Microsoft SharePoint CVE-2026-29231 immediately &#8212; publicly known before patches released, active exploitation likely</p></li><li><p>Patch SAP CVE-2026-27681 (CVSS 9.9) &#8212; arbitrary code execution in ERP core infrastructure</p></li><li><p>Patch Fortinet CVE-2026-27813 across FortiOS, FortiManager, FortiAnalyzer, FortiProxy, FortiPAM, FortiSwitch Manager</p></li><li><p>Patch Ivanti RCE and authentication bypass vulnerabilities &#8212; control plane compromise risk</p></li><li><p>Patch Windows Task Host privilege escalation &#8212; CISA confirmed active exploitation, SYSTEM access at stake</p></li><li><p>Remove or restrict all exposed NGINX UI management interfaces &#8212; active zero-day exploitation underway</p></li><li><p>Patch Synology SSL VPN client to 1.4.5-0684 or newer and monitor for configuration anomalies</p></li></ul><p><strong>Short-Term (This Month)</strong></p><ul><li><p>Audit every externally reachable SaaS-hosted page and Salesforce integration &#8212; McGraw-Hill is not an isolated incident</p></li><li><p>Implement just-in-time access and session recording for all support functions touching customer data</p></li><li><p>Enforce cryptographic signature verification for all software downloads in enterprise environments</p></li><li><p>Add object-level authorization testing to application security release gates</p></li><li><p>Eliminate direct internet exposure for all OT, industrial, and ICS systems 4,000 U.S. devices remain exposed</p></li><li><p>Deploy behavioral anomaly detection for cloud API access across all third-party SaaS integrations</p></li><li><p>Review and pin PHP Composer and developer build tooling to approved internal baselines</p></li><li><p>Extend phishing inspection to GitHub, Jira, and all collaboration platform notification channels</p></li></ul><p><strong>Strategic (This Quarter)</strong></p><ul><li><p>Establish dedicated OT vulnerability management processes separate from IT patch cycles</p></li><li><p>Download and review the Cloud Security Alliance Mythos white paper &#8212; calibrate your AI threat timeline assumptions</p></li><li><p>Build dedicated fast-lane patch processes for internet-facing collaboration platforms separate from workstation cycles</p></li><li><p>Treat SAP and ERP systems as crown jewel infrastructure with process-criticality-based patching priority</p></li><li><p>Implement network obfuscation and inline data encryption for critical infrastructure environments</p></li></ul><h2>&#127897;&#65039; James Azar&#8217;s CISO&#8217;s Take</h2><p>When I look across this week&#8217;s stories, the most important thing I see is how much risk sits below the surface &#8212; quiet, patient, and methodical. Sweden&#8217;s heating plant, Ukrainian hospitals, Iranian reconnaissance across 12,000 systems, a SharePoint zero-day already known to attackers before patches dropped. These are not loud, chaotic events. They are deliberate campaigns against the systems that keep society functioning. And that&#8217;s exactly what makes them dangerous &#8212; they accumulate unnoticed until the disruption is unavoidable. Stryker hitting a quarterly earnings report is the clearest signal yet that cyber risk is no longer an IT budget line. It is a business event, a financial event, and a human event.</p><p>The second takeaway is about the pace of change. The Cloud Security Alliance&#8217;s Mythos white paper, Jason Clinton and Kevin Mandia&#8217;s commentary, and this Patch Tuesday&#8217;s record-setting CVE count all point to the same reality: AI is compressing vulnerability discovery and exploit development into timelines defenders have never had to operate against before. The answer isn&#8217;t panic &#8212; it&#8217;s prioritization. Know which trusted systems carry the highest blast radius. Harden those first. Build resilience into how you operate, not just how you prevent. Because at the scale and speed this threat environment is moving, perfection isn&#8217;t achievable but preparedness is.</p><h2>&#128203; Week in Summary</h2><p>This was a week that reminded practitioners of something easy to lose sight of under the volume of daily threat intelligence: cybersecurity is not about protecting dashboards. It&#8217;s about protecting the systems that keep hospitals running, supply chains moving, heating plants operating, and governments functioning. Sweden, Ukraine, and Stryker all told the same story from different angles when cyber operations are targeted not at data but at operational continuity, the consequences extend far beyond the perimeter and into people&#8217;s lives.</p><p>Technically, the week was defined by volume and trust exploitation at scale. The second-largest Patch Tuesday ever. Critical patches from SAP, Fortinet, Adobe, Ivanti, and eight industrial vendors simultaneously. And breach after breach &#8212; Booking.com, Rockstar, McGraw-Hill, Kraken &#8212; sharing the same fingerprint: no forced entry, just trusted access misused, misconfigured, or manipulated through the human layer. The defensive posture this demands is not more tools or more rules. It is continuous validation of every trust assumption in your environment, prioritized by blast radius, executed with the speed the threat environment now requires.</p><p>Stay informed. Stay prepared. <strong>Stay Cyber Safe.</strong> &#128272;</p><div><hr></div><p><em>&#169; CyberHub Podcast | Subscribe on Substack | Watch on YouTube | Follow on LinkedIn</em></p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-48?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-48?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-48?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[AgingFly Malware Hits Ukraine Hospitals, NGINX UI 0-Day Exploited, Sweden Blames Russia for Hack]]></title><description><![CDATA[Pro-Russian Group Attacked Swedish Heating Plant, Iranian-Style Scanning Hits 12,000 Middle East Systems, CISA Flags Windows Task Host Flaw, Ivanti Back in Patch Queue Again]]></description><link>https://www.cyberhubpodcast.com/p/agingfly-malware-hits-ukraine-hospitals</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/agingfly-malware-hits-ukraine-hospitals</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Thu, 16 Apr 2026 03:31:07 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/194368522/58fd2c845d77466e1f0c7518a1a08cc5.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<h1><strong>Good Morning Security Gang,</strong></h1><p>Today&#8217;s episode is one of those that reminds us cybersecurity isn&#8217;t just about alerts and dashboards, it&#8217;s about heating plants, hospitals, industrial systems, and the very infrastructure that keeps society running.</p><p>What we&#8217;re seeing today is not loud ransomware headlines, it&#8217;s something far more dangerous: low-visibility, high-impact activity targeting the systems people rarely think about but depend on every day.</p><blockquote><p><em>&#8220;You&#8217;re not waiting to be attacked, you&#8217;re already on someone&#8217;s scan list.&#8221;</em></p></blockquote><p>Coffee cup cheers, let&#8217;s dive in.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!tc9h!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3507811b-1b65-465d-862f-c28b5de23a4f_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tc9h!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3507811b-1b65-465d-862f-c28b5de23a4f_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!tc9h!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3507811b-1b65-465d-862f-c28b5de23a4f_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!tc9h!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3507811b-1b65-465d-862f-c28b5de23a4f_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!tc9h!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3507811b-1b65-465d-862f-c28b5de23a4f_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tc9h!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3507811b-1b65-465d-862f-c28b5de23a4f_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3507811b-1b65-465d-862f-c28b5de23a4f_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:329486,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/194368522?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3507811b-1b65-465d-862f-c28b5de23a4f_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!tc9h!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3507811b-1b65-465d-862f-c28b5de23a4f_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!tc9h!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3507811b-1b65-465d-862f-c28b5de23a4f_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!tc9h!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3507811b-1b65-465d-862f-c28b5de23a4f_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!tc9h!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3507811b-1b65-465d-862f-c28b5de23a4f_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>Sweden Blames Russia for Energy Infrastructure Attack</strong></h2><p>We begin in Sweden, where officials have attributed a cyberattack on a heating plant to a pro-Russian group linked to intelligence services.</p><p>The attack itself failed, but that&#8217;s not the story. The story is intent.</p><p>This fits a broader European pattern: probing civilian infrastructure heating, power, utilities not necessarily to destroy, but to create instability and psychological pressure.</p><p>These aren&#8217;t battlefield operations. These are <strong>societal pressure campaigns</strong>.</p><p>The risk is clear: disruption of everyday life systems without triggering full-scale conflict. And that&#8217;s exactly the kind of gray-zone warfare we&#8217;re seeing more of.</p><h2><strong>AgingFly Malware Targets Ukrainian Government and Hospitals</strong></h2><p>Next, we move to Ukraine, where a new malware strain&#8212;AgingFly&#8212;is actively targeting government organizations and healthcare systems.</p><p>This is not opportunistic cybercrime. This is deliberate targeting of public service continuity.</p><p>Hospitals and government agencies are being hit because they represent stability. Disrupt them, and you disrupt society. This is cyber warfare in its purest form, pressure without kinetic escalation.</p><p>The takeaway here is that resilience in healthcare and public sector systems is no longer optional, it&#8217;s strategic.</p><h2><strong>12,000 Systems Scanned in Iranian-Style Recon Campaign</strong></h2><p>In the Middle East, more than 12,000 systems have been scanned in what mirrors Iranian reconnaissance tactics.</p><p>And this number matters. Because scanning is the beginning not the end.</p><p>This is patient threat actor behavior: map the environment, identify weaknesses, and come back later with precision. This aligns with everything we&#8217;ve been saying about pre-positioning. Attackers aren&#8217;t rushing, they&#8217;re preparing.</p><p>The risk is that today&#8217;s scan becomes tomorrow&#8217;s disruption.</p><div class="pullquote"><p>"If we treated our power plants the way pilots treat an airplane, we would likely have less of these events on the engineering side. But that's just it, it doesn't have the same due care. It should, but it doesn't. As security practitioners, we ought to be planning for the day after. That day after is network obfuscation. That day after is inline data encryption even within your air-gapped networks." James Azar</p></div><h2><strong>CISA Flags Windows Task Host Flaw Under Active Exploitation</strong></h2><p>CISA has flagged a Windows Task Host vulnerability as actively exploited, allowing attackers to escalate privileges to SYSTEM.</p><p>This is a classic move. Initial access is just step one. Privilege escalation is where the real control begins.</p><p>Once attackers reach SYSTEM-level access, they own the box, and often the network. This is a reminder that even &#8220;local&#8221; vulnerabilities matter, especially in shared or high-value environments.</p><h2><strong>NGINX UI Zero-Day Under Active Exploitation</strong></h2><p>We also have active exploitation of a critical NGINX UI vulnerability.</p><p>And this one is painfully familiar. Management interfaces exposed to the internet. Admin panels left accessible. These are some of the easiest entry points for attackers, and they keep working.</p><p>Why? Because convenience keeps winning over security.</p><p>The risk is full server compromise through exposed administrative tooling.</p><h2><strong>Ivanti Vulnerabilities Continue to Surface</strong></h2><p>Ivanti is back again with two new vulnerabilities, including an RCE and an authentication bypass. At this point, this isn&#8217;t surprising, it&#8217;s expected.</p><p>Platforms that broker access and manage systems sit directly in the flow of trust. That makes them prime targets. And attackers know it.</p><p>The risk is control of the control plane, visibility, automation, and access all in one place.</p><h2><strong>ICS Patch Tuesday: Industrial Giants Face Ongoing Risk</strong></h2><p>Eight major industrial vendors, including Siemens, Schneider Electric, and Rockwell, released new advisories in ICS Patch Tuesday.</p><p>This highlights a persistent issue: OT environments are long-lived, hard to patch, and often ignored. Unlike IT systems, these environments accumulate risk over time.</p><blockquote><p><em>&#8220;If it runs the physical world, attackers are already looking at it.&#8221;</em></p></blockquote><p>And when vulnerabilities are finally exploited, the impact isn&#8217;t just data&#8212;it&#8217;s physical operations.</p><h2><strong>Privacy Research: Tracking Persists Despite Opt-Outs</strong></h2><p>New research suggests that major tech companies can still track users even after opt-out mechanisms are used. This isn&#8217;t just a privacy issue, it&#8217;s a trust issue.</p><p>If controls don&#8217;t behave as expected, then assumptions about compliance and protection break down. For defenders, this means we can&#8217;t just trust vendor claims, we have to validate them.</p><h2><strong>FCC Grants Netgear Exemption in Router Certification Rules</strong></h2><p>Finally, the FCC granted Netgear an exemption related to router certification rules tied to foreign-owned test labs. This may seem administrative, but it&#8217;s not.</p><p>It sits at the intersection of cybersecurity, geopolitics, and supply chain. Policy decisions now directly impact how secure or insecure, our infrastructure becomes.</p><h2><strong>Action Items for Security Leaders</strong></h2><ul><li><p>Eliminate internet exposure for OT and industrial control systems</p></li><li><p>Implement network obfuscation and segmentation for critical infrastructure</p></li><li><p>Isolate healthcare and government systems from public-facing networks</p></li><li><p>Prioritize patching of privilege escalation vulnerabilities on key systems</p></li><li><p>Remove or restrict access to exposed management interfaces</p></li><li><p>Segment ITSM and administrative platforms from broader environments</p></li><li><p>Establish dedicated OT vulnerability management processes</p></li><li><p>Validate privacy and tracking controls independently of vendor claims</p></li><li><p>Monitor large-scale scanning activity as early indicators of future attacks</p></li><li><p>Plan for resilience&#8212;not just prevention&#8212;in critical infrastructure environments</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/agingfly-malware-hits-ukraine-hospitals/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/agingfly-malware-hits-ukraine-hospitals/comments"><span>Leave a comment</span></a></p><h2><strong>James Azar&#8217;s CISOs Take</strong></h2><p>What stands out to me today is how much of the risk we face sits below the surface. These aren&#8217;t flashy ransomware attacks or headline-grabbing breaches. These are quiet, methodical campaigns targeting the systems that keep society functioning. And that&#8217;s what makes them dangerous, because they often go unnoticed until it&#8217;s too late.</p><p>The second takeaway is that we have to stop thinking about cybersecurity as purely digital. When attacks impact heating plants, hospitals, and industrial systems, the consequences are physical, human, and immediate. Our job as practitioners isn&#8217;t just to prevent compromise, it&#8217;s to ensure continuity. Because in today&#8217;s world, cyber resilience is societal resilience.</p><p><strong>Stay Cyber Safe.</strong></p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/agingfly-malware-hits-ukraine-hospitals?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/agingfly-malware-hits-ukraine-hospitals?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/agingfly-malware-hits-ukraine-hospitals?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[Patch Tuesday: 167 Microsoft Fixes, SharePoint 0-Day, Kraken Extorted, Mythos AI Threat Warning]]></title><description><![CDATA[Second Largest Microsoft Patch Tuesday Ever, McGraw-Hill Salesforce Breach Exposes 45M Records, RCI Hospitality IDOR Bug, Adobe Patches 55 Vulnerabilities, Fortinet Broad Patch Set, SAP Critical SQL]]></description><link>https://www.cyberhubpodcast.com/p/patch-tuesday-167-microsoft-fixes</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/patch-tuesday-167-microsoft-fixes</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Wed, 15 Apr 2026 13:30:48 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/194257586/ca15cb3e39d4e132f98d39710f2f28b9.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<h1><strong>Good Morning Security Gang,</strong></h1><p>It&#8217;s Patch Tuesday, and today&#8217;s episode is exactly what you&#8217;d expect when everything hits at once breaches, insider threats, SaaS exposure, and one of the largest patch cycles we&#8217;ve seen in a while.</p><p>If there&#8217;s one thing that stood out today, it&#8217;s this: attackers are no longer trying to break your defenses, they&#8217;re exploiting the systems you already trust to operate your business.</p><p>Double espresso in hand&#8212;let&#8217;s break it all down.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><div class="pullquote"><p>"Jason Clinton and Kevin Mandia both said something very smart: the next two to three years for practitioners are going to be a punching bag day after day, month after month, as more AI tools like Mythos increase the scale of finding vulnerabilities. And then AI helps build exploits for those vulnerabilities at scale we've never seen before. That scale is going to be the challenge." James Azar</p></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Jow5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46d17234-0670-46f2-844f-2c4e2d852cee_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Jow5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46d17234-0670-46f2-844f-2c4e2d852cee_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!Jow5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46d17234-0670-46f2-844f-2c4e2d852cee_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!Jow5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46d17234-0670-46f2-844f-2c4e2d852cee_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!Jow5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46d17234-0670-46f2-844f-2c4e2d852cee_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Jow5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46d17234-0670-46f2-844f-2c4e2d852cee_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/46d17234-0670-46f2-844f-2c4e2d852cee_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1296703,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/194257586?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46d17234-0670-46f2-844f-2c4e2d852cee_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Jow5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46d17234-0670-46f2-844f-2c4e2d852cee_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!Jow5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46d17234-0670-46f2-844f-2c4e2d852cee_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!Jow5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46d17234-0670-46f2-844f-2c4e2d852cee_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!Jow5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46d17234-0670-46f2-844f-2c4e2d852cee_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>McGraw-Hill Salesforce Breach: Shiny Hunters Claims 45 Million Records</h2><p>We start with McGraw-Hill because it fits a pattern we&#8217;ve been talking about for weeks: attackers are not always breaching the company you think they are. Reports say the attackers exploited a Salesforce misconfiguration and accessed data from a web page hosted on the Salesforce platform.</p><p>While the company emphasized that its Salesforce accounts, customer databases, courseware, and internal systems were not accessed, McGraw-Hill also said the exposed information did not include social security numbers, financial account information, or student platform data. But Shiny Hunters is claiming they hold 45 million Salesforce records and they&#8217;re threatening to leak the data if they don&#8217;t get paid.</p><p>This correlates directly with how the Shiny Hunters Salesforce campaign has played across other victims. That blast radius often starts in a shared SaaS layer, not the victim&#8217;s core environment.</p><p>The risk is trusted SaaS pages and integrations exposing sensitive business data without a full enterprise compromise. Inventory every externally reachable SaaS-hosted page and validate access control on each one&#8212;not just the main platform tenant.</p><h2>RCI Hospitality IDOR Vulnerability Exposes Contractor Data</h2><p>Anyone here go to nightclubs? I haven&#8217;t in ages. I don&#8217;t even go to the nightclub parties during hacker summer camp in Vegas. I don&#8217;t like the club scene call me old, but I never really liked it to begin with.</p><p>RCI Hospitality is the second example of how small web app flaws can create very real business exposure. Reports say the company disclosed in an SEC filing that an IDOR vulnerability in their RCI Internet Services exposed contractor data.</p><p>This matters because IDORs are not glamorous, but they are brutally effective when no one is watching object-level authorization closely. This correlates with recent customer and employee data incidents in retail and hospitality. Attackers do not always need malware or ransomware if the application will simply hand them the data.</p><p>Direct object reference flaws exposing business records to unauthorized parties without tripping traditional alarms is a key risk and blind spot. Add authorization testing for object-level access into your application security release gate, especially for portals that handle workforce and contractor records.</p><h2>Kraken Insider Threat: Cybercrime Group Extortion Attempt</h2><p>My friends over at Kraken are in the news, and this one is a useful reminder that not every crypto incident starts with a smart contract bug or wallet exploit. <strong>This one is insider.</strong></p><p>Kraken disclosed that a cybercrime group tried to extort the exchange by threatening to release videos showing internal systems hosting client data. Kraken&#8217;s CSO said the incident involved two instances of improper access to limited customer data by support employees. Importantly, Kraken said client funds were not at risk and described the case as an insider threat issue.</p><p>This lines up with the theme we keep coming back to: when sensitive environments are heavily instrumented and externally hardened, attackers often pivot to support, process, and people. People will sell you out, especially in a globalized workforce where wage disparities become targets for social engineering through LinkedIn and other platforms.</p><p>Insider-enabled exposure of customer information becoming extortion leverage even when core financial systems stay intact carries significant risk. Apply just-in-time access and strong session recordings on support functions that can touch customer data.</p><h2>Microsoft Patch Tuesday: SharePoint Zero-Day + 167 Fixes Second Largest Ever</h2><p>Patch Tuesday is the other major lead today. Microsoft fixed an exploited SharePoint zero-day plus 167 other vulnerabilities. Security Week is calling it the second largest Microsoft Patch Tuesday ever based on CVE count alone. That should tell you the tempo is not slowing down.</p><p>Jason Clinton (CISO for Anthropic) and Kevin Mandia (the legend, founder of Mandiant, now with a new startup) both said something very smart I&#8217;ve heard them say over the last six months: the next two to three years for practitioners are going to be a punching bag day after day, month after month, as more AI tools like Mythos just increase the scale of finding vulnerabilities. And then AI helps build exploits for those vulnerabilities at scale we&#8217;ve never seen before.</p><p>We&#8217;ve been saying for months that identity, collaboration, and management platforms are drawing the most heat. SharePoint living on that list is no surprise at all.</p><p>The SharePoint Zero-Day (CVE-2026-29231) was publicly disclosed before patches were released. Exposed collaboration and content systems becoming initial access or privilege escalation footholds before organizations can catch up is a significant risk.</p><p>Maintain a separate fast lane for patching internet-facing collaboration platforms so they don&#8217;t wait on the same cycle as ordinary workstation updates.</p><h2>Adobe Patches 55 Vulnerabilities&#8212;ColdFusion Critical</h2><p>Adobe is patching 55 vulnerabilities across their stack. No zero-day headline, but the patch covers 11 products with a critical ColdFusion vulnerability being most likely to get hit in real-world attacks.</p><p>That tracks with ColdFusion&#8217;s history, it keeps showing up because it sits in exactly the kind of internet-facing application layer that attackers absolutely love.</p><p>Legacy application platforms serving as remote code execution paths in otherwise modern environments is the risk. If you still run ColdFusion, put it behind additional network controls and treat it as a high-risk exception, not just another application server.</p><h2>Fortinet Broad Patch Set: CVE-2026-27813 Across Multiple Products</h2><p>The Fortinet security vendor patch set is broad, but there&#8217;s clear prioritization. Defenders should patch CVE-2026-27813 across FortiAnalyzer, FortiManager, FortiOS, FortiProxy, FortiPAM, and FortiSwitch Manager.</p><p>That matches the Fortinet drumbeat we&#8217;ve been covering across multiple weeks. The perimeter and management plane are still where the blood is in the water.</p><p>Compromise of security appliances and management products giving attackers visibility and leverage at the control layer is a significant risk. Treat every security appliance as production infrastructure patch by attack surface, not by product popularity.</p><h2>SAP Releases 19 Security Notes Critical SQL Injection CVE-2026-27681</h2><p>SAP deserves airtime because the company released 19 new security notes covering more than a dozen products, including a critical ABAP vulnerability.</p><p>We&#8217;ve talked many times about how ERP and core business platforms are too often patched like back-office software when they should be treated like crown jewel infrastructure. If an attacker lands in SAP, they are not just stealing data&#8212;they are learning how your business runs.</p><p>Exploitation of enterprise business logic platforms leading to financial, operational, and identity impact all at once is the risk. Prioritize SAP remediation based on process criticality and direct business exposure, not just CVSS.</p><p>The biggest one is CVE-2026-27681, a CVSS score of 9.9. It&#8217;s an SQL injection bug in Business Planning and Consolidation and Business Warehouse that could lead to arbitrary code execution. That&#8217;s the one you want to pay the most attention to.</p><h2>Synology SSL VPN Client Flaws&#8212;Remote Access Risk</h2><p>If Synology is your thing, Synology&#8217;s SSL VPN client flaws are another reminder that remote access remains one of the easiest ways to turn a user problem into a network problem.</p><p>Vendor guidance pushes customers to upgrade to version 1.4.5-0684 or newer and specifically calls out the need to monitor for unauthorized configuration changes and odd traffic behavior.</p><p>The correlation is easy to draw: from VPN credential theft to device code phishing to fake support flows, attackers keep going where trust and remote access meet.</p><p>Monitor VPN configuration changes with the same urgency you monitor failed logins and brute force attempts.</p><h2>PHP Composer Flaws Enable Arbitrary Command Execution</h2><p>PHP Composer is another developer ecosystem story that matters more than it may sound. The Hacker News reports that new Composer flaws can enable arbitrary command execution and patches are available.</p><p>We&#8217;ve already seen Team PCP move from open source compromise into cloud and build environments. Tooling vulnerabilities inside the dependency chain are exactly how that kind of compromise keeps scaling.</p><p>Compromise of software build or dependency management workflows leading to code or credential theft is the risk. Pin Composer and other build chain tooling to approved internal baselines rather than letting developer environments drift.</p><blockquote><p><em>"Attackers keep winning by abusing things we already trust, SaaS pages, support workflows, app authorization, collaboration platforms, and even our own security appliances, ERP systems, and VPN clients. The defensive move is not magic. It is knowing which trusted systems have the highest blast radius and hardening those first. That is how you reduce risk." James Azar</em></p></blockquote><h2>Cloud Security Alliance Releases Mythos AI Threat White Paper</h2><p>Before we get into the FCC story, let&#8217;s talk about what Gadi Evron and the team at Cloud Security Alliance put together in a matter of days. I&#8217;m part of the group, unfortunately, newborn in the house, very busy with work stuff and catching up, so I wasn&#8217;t able to participate. But Gadi brought in all the heavy hitters around cyber to talk about Anthropic&#8217;s Mythos, the AI model that the industry&#8217;s panicking about because of its ability to supercharge cyber attacks.</p><p>Cloud Security Alliance and Gadi started the conversation with John Yeoh and some really great people. They put together a phenomenal white paper. If you haven&#8217;t seen it, you should go download it right now I&#8217;ll put the link at cyberhubpodcast.com.</p><p>This is significant. It&#8217;s how we should be looking at Mythos, how teams should be looking at it from a staffing perspective, from a patching perspective, and so much more. It was reviewed by over 100 CISOs. I would have desperately wanted to be part of anything Gadi puts his hands on because it&#8217;s gold. But personal life took precedent, I don&#8217;t regret it. Gadi doesn&#8217;t need me to be brilliant. A hundred CISOs don&#8217;t need James Azar to be brilliant because they&#8217;re all brilliant in their own way, fantastic contributors helping us understand how fast AI is evolving and how fast it evolves our ability to prepare.</p><h2>FCC Cybertrust Mark Gets New Administrato IoXT Alliance</h2><p>The FCC Cybertrust mark is worth watching because it signals government still wants a consumer-facing baseline for connected device security. According to reports, the FCC&#8217;s selection of a new lead administrator for the Cybertrust mark puts the program on a path to success, tied directly to both consumer protection and national security.</p><p>Before, it was with UL under the Biden administration. UL pulled out after they went under investigation by the Trump administration for some of their practices. Everyone thought it was going to die, but the FCC picked the non-profit IoXT Alliance to be the new lead.</p><p>This matters because we keep covering router, IoT, and unmanaged device exploitation. Just the other day we talked about how the FBI was asking people to restart their SOHO routers. Anything that raises the floor on connected device security helps. Glad to see this program back up and running.</p><h2><strong>Action Items for Security Leaders</strong></h2><ul><li><p>Inventory and secure all externally accessible SaaS components and integrations</p></li><li><p>Implement object-level authorization testing in application development pipelines</p></li><li><p>Enforce just-in-time access and session monitoring for support teams</p></li><li><p>Prioritize patching for internet-facing collaboration platforms like SharePoint</p></li><li><p>Treat ERP and business systems like SAP as crown jewel infrastructure</p></li><li><p>Harden security appliances and management platforms as critical assets</p></li><li><p>Monitor VPN configurations and remote access systems for anomalies</p></li><li><p>Lock down developer pipelines with strict dependency and execution controls</p></li><li><p>Prepare for AI-driven threat acceleration with faster patch and response cycles</p></li><li><p>Support baseline security improvements for IoT and unmanaged devices</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/patch-tuesday-167-microsoft-fixes/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/patch-tuesday-167-microsoft-fixes/comments"><span>Leave a comment</span></a></p><h2><strong>James Azar&#8217;s CISOs Take</strong></h2><p>What stood out to me today is how interconnected risk has become. Every story&#8212;from McGraw-Hill to Kraken to SharePoint, points to the same reality: our environments are no longer isolated systems. They&#8217;re ecosystems. And attackers are exploiting the connections between them, not just the components themselves.</p><p>The second takeaway is the pace of change. Between AI accelerating vulnerability discovery and the sheer volume of patches we&#8217;re seeing, defenders are under more pressure than ever. This isn&#8217;t about working harder it&#8217;s about working smarter. Prioritizing based on blast radius, focusing on trusted systems, and building resilience into how we operate. Because at this scale, perfection isn&#8217;t possible but preparedness is.</p><p><strong>Stay Cyber Safe.</strong></p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/patch-tuesday-167-microsoft-fixes?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/patch-tuesday-167-microsoft-fixes?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/patch-tuesday-167-microsoft-fixes?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[OpenAI Hit by North Korea Axios Hack, Booking.com Breach, CPUID Serves Trojanized Downloads]]></title><description><![CDATA[Yom HaShoah Reflection on Humanity, Rockstar Games Cloud Breach via Shiny Hunters, Iran Cyber Threats Target US Infrastructure, Grafana Zero-Click AI Vulnerability, FBI Disrupts Russian Router Vector]]></description><link>https://www.cyberhubpodcast.com/p/openai-hit-by-north-korea-axios-hack</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/openai-hit-by-north-korea-axios-hack</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Tue, 14 Apr 2026 13:31:16 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/194144650/437b3528f1e9ab9f6b35706b6f1efe58.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<h1><strong>Good Morning Security Gang,</strong></h1><p>Today&#8217;s episode was packed but also personal. Before diving into the news, I took a moment to reflect on something bigger than cybersecurity, how history teaches us that dehumanization, not technology, is often the root cause of collapse.</p><p><strong>Today in Israel is Yom HaShoah Holocaust Remembrance Day</strong>, a day where we remember the six million Jewish men, women, and children who were murdered, not for anything they did, but simply for being Jewish. Every year we ask the same question: how did the world let that happen? How did humanity reach a point where over ninety million people died in World War Two and that was acceptable?</p><p>The truth is it didn&#8217;t start with the war. The war was just the ending. It started with something much quieter: <strong>dehumanization</strong>. It started when people stopped seeing others as humans, when language changed, when division became acceptable, when disagreements turned into hatred rather than simple disagreements.</p><p>If we&#8217;re being honest, we&#8217;re seeing pieces of that again today in our society. We see it in how quickly people label each other based on an opinion&#8212;right versus left, us versus them. We see it in rising anti-Semitism. We see it in global conflicts. We see it in how easily people justify excluding others from dignity on each and every single side.</p><p>History did not collapse overnight in 1938. It eroded slowly until people stopped questioning what was happening and just accepted it. Once that line is crossed, everything else becomes possible.</p><p>This show isn&#8217;t about politics&#8212;it&#8217;s not. This isn&#8217;t about ideology. It&#8217;s about a simple truth: if we allow ourselves to dehumanize people we disagree with, we&#8217;re walking down a path we&#8217;ve already seen before. History has shown us exactly where that path leads.</p><p>Today is not just about remembering the six million. It&#8217;s about remembering the warnings. I pray we recognize it in time. I pray we choose to see each other as humans first, even in our fiercest disagreements. I pray we don&#8217;t repeat the mistakes of our past.</p><p>Because whether it&#8217;s society or cybersecurity, it always starts with people.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!u6eC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1427a038-0156-4925-a975-a7a2614b5155_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!u6eC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1427a038-0156-4925-a975-a7a2614b5155_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!u6eC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1427a038-0156-4925-a975-a7a2614b5155_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!u6eC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1427a038-0156-4925-a975-a7a2614b5155_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!u6eC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1427a038-0156-4925-a975-a7a2614b5155_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!u6eC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1427a038-0156-4925-a975-a7a2614b5155_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1427a038-0156-4925-a975-a7a2614b5155_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1535452,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/194144650?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1427a038-0156-4925-a975-a7a2614b5155_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!u6eC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1427a038-0156-4925-a975-a7a2614b5155_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!u6eC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1427a038-0156-4925-a975-a7a2614b5155_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!u6eC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1427a038-0156-4925-a975-a7a2614b5155_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!u6eC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1427a038-0156-4925-a975-a7a2614b5155_1280x720.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Now, bringing it back to why you&#8217;re here, today&#8217;s stories reinforce one thing: attackers are no longer forcing their way in. They&#8217;re leveraging trust, identity, and platforms we rely on every single day.</p><p>Coffee cup cheers, let&#8217;s get into it.</p><h2><strong>Booking.com Breach: Identity and Access, Not Infrastructure</strong></h2><p>We start with Booking.com confirming a breach impacting user data, likely tied to compromised internal systems or third-party access rather than a direct infrastructure hack.</p><p>And that right there is the shift.</p><p>Attackers aren&#8217;t breaking systems&#8212;they&#8217;re accessing them through people, credentials, and support workflows.</p><p>This aligns with a broader trend across hospitality and travel platforms where attackers target high-volume identity ecosystems. If you can access the people managing the system, you don&#8217;t need to break the system itself.</p><p>The real risk here isn&#8217;t just data exposure&#8212;it&#8217;s downstream fraud. Travel data is incredibly valuable for social engineering, impersonation, and financial scams.</p><p>For users, this is a wake-up call: passwords alone are dead. MFA isn&#8217;t optional anymore.</p><h2><strong>Rockstar Breach: Cloud is the New Battleground</strong></h2><p>Next, we looked at Rockstar Games, where the ShinyHunters group claims access to data stored in a Snowflake environment via a third-party analytics platform.</p><p>This is a textbook cloud attack.</p><p>Compromise credentials &#8594; access cloud environment &#8594; operate as a legitimate user.</p><p>No alarms. No noise. Just quiet data access. This is what modern attacks look like credential-driven, API-based, and fast.</p><p>And the risk here is massive: once attackers are inside your cloud environment, they don&#8217;t need to escalate, they already have what they need.</p><h2><strong>Iranian Cyber Threats Target U.S. Infrastructure</strong></h2><p>We&#8217;re continuing to see warnings from CISA and NERC around Iranian-linked cyber activity targeting U.S. critical infrastructure, especially energy systems.</p><p>And here&#8217;s the key insight, this isn&#8217;t about immediate destruction.</p><p>This is about positioning.</p><p>Reconnaissance. Footholds. Preparation.</p><p>Nearly 4,000 exposed industrial devices from prior reporting fit directly into this narrative. Attackers are mapping the terrain now for potential future disruption. If your OT environment is exposed, you&#8217;re not a target, you&#8217;re an opportunity.</p><h2><strong>OpenAI Caught in Axios Supply Chain Attack</strong></h2><p>OpenAI showed up again, this time as part of the Axios npm supply chain compromise. This confirms something we&#8217;ve been talking about repeatedly: supply chain attacks don&#8217;t stop at developers.</p><p>They propagate.</p><p>From open source &#8594; to enterprise apps &#8594; to AI platforms &#8594; to production systems.</p><p>Once trust is compromised at the package level, everything downstream inherits that risk. This is why software supply chain security is no longer optional&#8212;it&#8217;s foundational.</p><h2><strong>NGINX and Grafana Vulnerabilities: Quiet but Dangerous</strong></h2><p>On the vulnerability front, NGINX updates addressed multiple issues in one of the most widely deployed web servers globally. These aren&#8217;t flashy zero-days but that&#8217;s what makes them dangerous.</p><p>Widespread infrastructure means even moderate vulnerabilities can have internet-scale impact.</p><p>Meanwhile, Grafana introduced a different kind of risk a zero-click AI-related vulnerability capable of leaking sensitive data without user interaction. No phishing. No execution. Just system interaction.</p><p>This is the next wave of risk&#8212;logic flaws in AI-driven features.</p><h2><strong>GitHub and Jira Abuse: Trusted Channels Turned Attack Vectors</strong></h2><p>Attackers are now abusing GitHub and Jira notification systems to deliver malicious links.</p><p>Why?</p><p>Because these are trusted platforms.</p><p>Notifications are expected. Users don&#8217;t question them. This is classic attacker behavior move into workflows where defenses are weakest. The risk here is silent delivery of phishing and malware through channels security teams often overlook.</p><h2><strong>CPU-Z Trojanized Downloads: Supply Chain Strikes Again</strong></h2><p>Attackers compromised the CPUID website to distribute trojanized versions of CPU-Z and HWMonitor. This is supply chain compromise at the distribution level.</p><p>Even trusted tools become weapons when the delivery channel is compromised. And most users won&#8217;t verify signatures&#8212;they&#8217;ll just download and install.</p><p>That&#8217;s the problem.</p><h2><strong>North Korea&#8217;s APT37 Social Engineering Campaign</strong></h2><p>APT37 is back, using Facebook-based social engineering to target victims with fake personas and relationship-building tactics. This is not smash-and-grab hacking.</p><p>This is patience. Persistence. Psychology. The attackers are building trust before deploying payloads.</p><p>This is where cybersecurity meets human behavior and where most defenses still fall short.</p><h2><strong>FBI Disrupts Russian Router Campaign</strong></h2><p>Finally, some good news&#8212;the FBI disrupted a Russian-linked campaign targeting routers and DNS infrastructure.</p><p>This type of attack is particularly dangerous because controlling the network layer gives attackers visibility and persistence. And here&#8217;s a practical takeaway sometimes the fix is simple.</p><p>Restart your router. You&#8217;d be surprised how often that breaks attacker persistence.</p><h2><strong>Action Items for Security Leaders</strong></h2><ul><li><p>Enforce MFA across all user-facing platforms, especially high-volume services</p></li><li><p>Monitor cloud environments for anomalous API behavior and credential misuse</p></li><li><p>Eliminate internet exposure of OT and critical infrastructure systems</p></li><li><p>Implement software composition analysis for supply chain visibility</p></li><li><p>Patch foundational infrastructure like NGINX as a standard operational practice</p></li><li><p>Restrict sensitive data exposure in AI-driven features and validate outputs</p></li><li><p>Inspect links and payloads from collaboration tools like GitHub and Jira</p></li><li><p>Verify software integrity using cryptographic signatures before installation</p></li><li><p>Train employees on social engineering risks across social media platforms</p></li><li><p>Regularly reset and update network infrastructure, including routers</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/openai-hit-by-north-korea-axios-hack/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/openai-hit-by-north-korea-axios-hack/comments"><span>Leave a comment</span></a></p><h2><strong>James Azar&#8217;s CISOs Take</strong></h2><p>What stood out to me today is how consistently attackers are targeting trust as their primary entry point. Whether it&#8217;s Booking.com, Rockstar, or supply chain compromises, the pattern is the same identity and access are the new perimeter. If you&#8217;re still thinking about security in terms of firewalls and endpoints alone, you&#8217;re missing where the real battle is happening.</p><p>The second takeaway is that cybersecurity is no longer just technical, it&#8217;s human. Social engineering, workflow abuse, and trust exploitation are now at the center of most attacks. That means our defenses need to evolve beyond tools and into behavior, awareness, and continuous validation. Trust can no longer be assumed, it has to be earned, monitored, and verified every single time.</p><p><strong>Stay Cyber Safe.</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Stryker Warns of Earnings Hit From Iran Attack, Adobe Reader 0-Day Patched, 4K US ICS Devices Exposed ]]></title><description><![CDATA[Baby Azar #3 Is Here! James Returns from Paternity Leave, North Korea's $280M Crypto Theft Playbook Revealed, Microsoft Finds Android Wallet Flaw, GlassWorm Evolves to Zig-Based IDE Compromise]]></description><link>https://www.cyberhubpodcast.com/p/stryker-warns-of-earnings-hit-from</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/stryker-warns-of-earnings-hit-from</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Mon, 13 Apr 2026 13:31:20 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/194029574/b8bae069bf984ed24990bb0d5bf0b45e.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<h1><strong>Good Morning Security Gang,</strong></h1><p>Back in the saddle after a short break, and yes, the Azar family growing by one (sleep optional, coffee mandatory), we&#8217;re back to business.</p><p><strong>The Azar gang did grow by one!</strong> A beautiful, amazing, great little boy who's just phenomenal with his older brother now. The family feels a bit bigger. Sleep is rarer. But I'll take it because there's nothing more gratifying than fatherhood&#8212;really, there isn't. Mom's doing great! </p><p>Thank you to the amazing team at Northside Hospital for a job well done keeping mom and baby safe. What a joy it is to be in the room to see a new life come into it. Quite a bundle of joy!</p><p>And today&#8217;s show? It&#8217;s a reminder that cybersecurity doesn&#8217;t live in dashboards, it lives in hospitals, factories, payroll systems, and people&#8217;s lives.</p><p>We&#8217;re not talking about theoretical risk anymore. We&#8217;re talking about real-world operational impact, financial damage, and human consequences.</p><p>Let&#8217;s get into it. Coffee Cup Cheers, </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ANrn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4777670-80a6-4146-a9fb-6379893e3e75_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ANrn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4777670-80a6-4146-a9fb-6379893e3e75_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!ANrn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4777670-80a6-4146-a9fb-6379893e3e75_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!ANrn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4777670-80a6-4146-a9fb-6379893e3e75_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!ANrn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4777670-80a6-4146-a9fb-6379893e3e75_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ANrn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4777670-80a6-4146-a9fb-6379893e3e75_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e4777670-80a6-4146-a9fb-6379893e3e75_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:157106,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/194029574?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4777670-80a6-4146-a9fb-6379893e3e75_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ANrn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4777670-80a6-4146-a9fb-6379893e3e75_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!ANrn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4777670-80a6-4146-a9fb-6379893e3e75_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!ANrn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4777670-80a6-4146-a9fb-6379893e3e75_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!ANrn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4777670-80a6-4146-a9fb-6379893e3e75_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>Stryker Attack: When Cyber Hits the Earnings Report</strong></h2><p>We kick things off with Stryker confirming that the Iran-linked March 11 attack had a material impact on Q1 earnings. This wasn&#8217;t just a disruption&#8212;it was a full-blown business event.</p><p>The attackers, tied to the Handala group, inserted a malicious file into Microsoft Intune, wiping over 200,000 devices and disrupting ordering systems. While operations have now been restored, the real story here is what happened in between.</p><p>This wasn&#8217;t just IT downtime. This impacted hospital supply chains. Medical staff had to adapt, extend usage of equipment, and operate under constrained conditions.</p><p>This is what happens when cyber leaves the SOC and lands on a hospital floor.</p><p>And if you&#8217;re a CISO and you&#8217;re still struggling to quantify cyber risk in dollars this is your example.</p><h2><strong>North Korea&#8217;s $280M Crypto Theft: Corporate-Grade Cybercrime</strong></h2><p>Next, we dig into the Drift crypto theft post-mortem, and it reads less like a hack and more like a business operation.</p><p>North Korea orchestrated a $280 million theft using fake companies, social engineering, and even physical presence at industry conferences. Let that sink in&#8212;this wasn&#8217;t just keyboard warriors. This was relationship-building, long-game infiltration.</p><p>This is the evolution of cybercrime into full-scale enterprise operations.</p><p>They&#8217;re not exploiting systems, they&#8217;re exploiting trust, process, and human behavior.</p><p>If your security model doesn&#8217;t account for that level of persistence, you&#8217;re already behind.</p><h2><strong>4,000 U.S. Industrial Devices Exposed to Iranian Targeting</strong></h2><p>Now let&#8217;s talk about something that should make every critical infrastructure operator pause <strong>nearly 4,000 U.S. industrial devices remain exposed online</strong>, vulnerable to Iranian-linked activity.</p><p>This isn&#8217;t about immediate destruction. This is reconnaissance. Foothold building. Positioning.</p><p>And here&#8217;s the dangerous part, these are operational technology environments. We&#8217;re talking about systems that control physical processes.</p><p>The exposure of OT-adjacent devices is essentially leaving the front door open in a high-risk neighborhood and hoping no one walks in.</p><p>Spoiler alert: someone will.</p><h2><strong>Microsoft Finds Android Crypto Wallet Flaw</strong></h2><p>Microsoft uncovered a vulnerability that could have exposed millions of Android crypto wallet users, allowing malicious apps to steal sensitive wallet data.</p><p>And here&#8217;s the kicker no need to break blockchain security.</p><p>Just compromise the endpoint.</p><p>We keep saying it on the show: the endpoint is still the weakest link.</p><p>You can have the most secure system in the world, but if the device accessing it is compromised, game over.</p><h2><strong>Payroll Diversion Attacks Hit Canadian Employees</strong></h2><p>We&#8217;re also seeing a rise in payroll diversion attacks, targeting Canadian employees by manipulating direct deposit workflows.</p><p>This is cybercrime at its most efficient no ransomware, no noise, just quietly redirecting money.</p><p>And it works because payroll systems are trusted, routine, and rarely questioned.</p><p>This is where identity, HR systems, and financial controls intersect&#8212;and where attackers are increasingly focusing.</p><h2><strong>Glassworm Expands Supply Chain Attacks into Developer Environments</strong></h2><p>Glassworm is back, and it&#8217;s evolving&#8212;this time using a Zig-based dropper to target developer environments and IDE ecosystems.</p><p>This is a continuation of a trend we&#8217;ve been tracking: attackers moving upstream into the development lifecycle.</p><p>Why? Because if you control the developer environment, you control what gets built. This is supply chain compromise at scale.</p><h2><strong>Adobe Reader Zero-Day Exploited for Months</strong></h2><p>Adobe patched a Reader zero-day that had been exploited in the wild for months.</p><p>Let me repeat that months.</p><p>Document-based attacks continue to work because we trust them. PDFs are still one of the easiest delivery mechanisms for malware. And despite all the awareness, users still click.</p><p>This isn&#8217;t a tooling problem. It&#8217;s a trust problem.</p><h2><strong>Marimo RCE Under Active Exploitation</strong></h2><p>A critical pre-authentication RCE flaw in Marimo is now under active exploitation. This hits a growing category developer and data science tools exposed to the internet.</p><p>Convenience is killing security here. If your experimental tools are internet-facing without proper controls, you&#8217;re essentially inviting attackers in.</p><h2><strong>Juniper and Chrome Patch Cycles Highlight Ongoing Risk</strong></h2><p>Juniper patched dozens of Junos OS vulnerabilities, reinforcing the ongoing risk in network infrastructure. At the same time, Chrome released version 147 with 60 vulnerability fixes, including two critical ones.</p><p>Browsers and network devices remain prime targets because they sit at the intersection of trust and exposure. They&#8217;re not flashy but they&#8217;re foundational.</p><h2><strong>Action Items for Security Leaders</strong></h2><ul><li><p>Quantify cyber risk in business terms&#8212;tie incidents to revenue and operations</p></li><li><p>Eliminate direct internet exposure for OT and industrial systems</p></li><li><p>Enforce strict endpoint security for high-value assets like crypto wallets</p></li><li><p>Implement multi-layer verification for payroll and financial workflows</p></li><li><p>Lock down developer environments with signed plugins and access controls</p></li><li><p>Patch aggressively&#8212;especially for document readers and edge systems</p></li><li><p>Move experimental and developer tools behind authentication layers</p></li><li><p>Treat supply chain security as a top-tier priority, not a secondary concern</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/stryker-warns-of-earnings-hit-from/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/stryker-warns-of-earnings-hit-from/comments"><span>Leave a comment</span></a></p><h2><strong>James Azar&#8217;s CISOs Take</strong></h2><p>What stood out to me today is how cyber incidents are no longer contained within the boundaries of technology. The Stryker story is the clearest example this wasn&#8217;t just a breach, it was a disruption to healthcare delivery and a hit to financial performance. That&#8217;s the reality we&#8217;re operating in now. Cybersecurity is no longer a support function. It&#8217;s a business function.</p><p>The second takeaway is that attackers are consistently targeting trust. Whether it&#8217;s payroll systems, developer tools, mobile devices, or industrial infrastructure, the common thread is exploitation of what organizations assume is safe. We need to rethink that assumption. Security today isn&#8217;t about protecting everything, it&#8217;s about validating everything, continuously.</p><p>Stay Cyber Safe</p>]]></content:encoded></item><item><title><![CDATA[The Space Between Joy and Grief]]></title><description><![CDATA[On Life, Loss, Community, and the Moments That Shape Us]]></description><link>https://www.cyberhubpodcast.com/p/the-space-between-joy-and-grief</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/the-space-between-joy-and-grief</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Sun, 12 Apr 2026 13:03:16 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!oA1L!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cab15e8-d3a8-4a36-8d2f-618d57bf1512_1080x1080.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Today, I am writing from the heart. A rare inside look to me and something I am putting myself out there. </p><p>Some say that at the very beginning of life, chaos reigned and then order was brought into it.</p><p>I&#8217;ve always appreciated both.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!oA1L!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cab15e8-d3a8-4a36-8d2f-618d57bf1512_1080x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!oA1L!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cab15e8-d3a8-4a36-8d2f-618d57bf1512_1080x1080.png 424w, https://substackcdn.com/image/fetch/$s_!oA1L!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cab15e8-d3a8-4a36-8d2f-618d57bf1512_1080x1080.png 848w, https://substackcdn.com/image/fetch/$s_!oA1L!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cab15e8-d3a8-4a36-8d2f-618d57bf1512_1080x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!oA1L!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cab15e8-d3a8-4a36-8d2f-618d57bf1512_1080x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!oA1L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cab15e8-d3a8-4a36-8d2f-618d57bf1512_1080x1080.png" width="1080" height="1080" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2cab15e8-d3a8-4a36-8d2f-618d57bf1512_1080x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1080,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:883352,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/193920346?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cab15e8-d3a8-4a36-8d2f-618d57bf1512_1080x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!oA1L!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cab15e8-d3a8-4a36-8d2f-618d57bf1512_1080x1080.png 424w, https://substackcdn.com/image/fetch/$s_!oA1L!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cab15e8-d3a8-4a36-8d2f-618d57bf1512_1080x1080.png 848w, https://substackcdn.com/image/fetch/$s_!oA1L!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cab15e8-d3a8-4a36-8d2f-618d57bf1512_1080x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!oA1L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cab15e8-d3a8-4a36-8d2f-618d57bf1512_1080x1080.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">AI Generated Image. </figcaption></figure></div><p>I enjoy the chaos as much as the next guy. There&#8217;s something real about it unfiltered, unscripted, unpredictable. But I also value routine. The structure. The balance. The daily rhythm of keeping the ship afloat.</p><p>Most of the time, life gives us the courtesy of operating somewhere in between the two. We plan. We prepare. We anticipate what&#8217;s coming next and convince ourselves that with enough structure, we can manage whatever comes our way.</p><p>And then life reminds you who&#8217;s really in charge.</p><p>As the saying goes: you make plans, and God laughs.</p><p>That&#8217;s been the last three weeks of my life.</p><p>There are seasons in life where everything feels like it should be simple. Moments we expect to experience in isolation pure joy, uninterrupted celebration, gratitude without weight.</p><p>And then life shows up differently.</p><p>It doesn&#8217;t separate emotions neatly. It doesn&#8217;t wait for the &#8220;right time.&#8221; It doesn&#8217;t give you space to process one chapter before the next begins.</p><p>Sometimes, it all comes at once.</p><p>And then life reminds us that it doesn&#8217;t work that way.</p><p>It doesn&#8217;t separate emotions neatly. It doesn&#8217;t wait for the &#8220;right time.&#8221; It doesn&#8217;t give us space to process one chapter before the next begins.</p><p>Sometimes, it all comes at once.</p><p>The last few weeks have been one of those seasons for me. Not defined by a single event, but by the collision of many, each carrying its own emotional gravity. The kind of stretch where life compresses time and forces you to hold opposing truths in the same breath.</p><p>As many of you know, my wife and I recently welcomed our second child together my third. A moment that should feel familiar, and yet, somehow, feels entirely new.</p><p>Because the truth is, there&#8217;s no such thing as becoming a &#8220;pro&#8221; at parenting.</p><p>Every child rewrites the experience. Every child brings a new perspective, a new rhythm, a new lesson. You don&#8217;t rely on experience as much as you think you relearn, you adapt, you grow. And in many ways, you&#8217;re reminded just how little control you actually have.</p><p>That realization, on its own, is humbling.</p><p>But life wasn&#8217;t done teaching lessons.</p><p>A few weeks ago, on a Saturday morning, I received a call that changed everything in an instant. One of my direct reports Jed Mercadante had passed away.</p><p>Just like that.</p><p>No warning. No time to prepare. No gradual realization.</p><p>I had spoken to him that same morning.</p><p>And then he was gone.</p><p>Jed wasn&#8217;t just a colleague. He was the kind of person you immediately connect with the kind that makes work feel less like work and more like shared purpose. Over the last five months, we built a strong partnership. There was trust, alignment, and a natural rhythm to how we worked together.</p><p>But more than that, he was someone who made people feel comfortable. Someone who built a team not just with skill, but with intention. The kind of leader whose impact is reflected in the people around him.</p><p>His passing left a silence that&#8217;s hard to describe. Not loud, not chaotic, but heavy. The kind that lingers. The kind that doesn&#8217;t resolve quickly.</p><p>And yet, life didn&#8217;t pause.</p><p>That same week, we celebrated my wife&#8217;s birthday. We prepared for the birth of our son. We entered Passover, a time rooted in reflection, renewal, and the enduring belief that even in darkness, there is light.</p><p>But this time, those moments weren&#8217;t experienced in isolation.</p><p>They were layered.</p><p>Joy existed but it shared space with grief.</p><p>Celebration was present but it carried weight.</p><p>And that&#8217;s where life becomes real.</p><p>Because the question isn&#8217;t how to separate those emotions, it&#8217;s how to carry them together.</p><p>There is no perfect way to grieve.</p><p>There is no universal timeline, no checklist, no defined process that applies to everyone. Grief is deeply personal. Some people need silence. Others need to talk. Some lean into routine, while others step away from it.</p><p>And all of it is okay.</p><p>What matters is that we allow space for ourselves and for others to experience loss in our own way.</p><p>In moments like these, what stands out most is not just the loss, but the response around it.</p><p>The community.</p><p>The people who show up, not because they have the right words, but because they understand that presence matters more than anything else. The messages, the calls, the quiet check-ins. The teammates who step in without being asked. The friends who don&#8217;t try to fix anything, they just stand beside you.</p><p>That&#8217;s where the strength is.</p><p>Not in avoiding hardship, but in how we carry each other through it.</p><p>There&#8217;s something powerful about realizing that even in the most difficult moments, you are not alone. That the weight you&#8217;re carrying is shared, even if just a little, by the people around you.</p><p>And in that shared space, something meaningful happens.</p><p>We begin to understand the true value of connection.</p><p>We begin to appreciate presence over perfection.</p><p>We begin to recognize that showing up, for others and for ourselves&#8212;is often the most important thing we can do.</p><p>This Passover felt different.</p><p>The story of moving from darkness to light wasn&#8217;t just symbolic&#8212;it felt immediate. Because sometimes darkness isn&#8217;t a distant concept or a historical reference.</p><p>Sometimes it&#8217;s right here, in your life, uninvited and unexpected.</p><p>And the light?</p><p>The light is in the moments we choose to hold onto. In the people we surround ourselves with. In the new life we welcome, even as we say goodbye to someone who mattered.</p><p>Over the past weeks, I found myself standing in that exact space.</p><p>Holding grief in one hand, and joy in the other.</p><p>The loss of someone who made an impact on my life.</p><p>And the arrival of a new life that changes everything.</p><p>That&#8217;s the circle of life, not as a concept, but as a lived experience.</p><p>It&#8217;s not clean. It&#8217;s not orderly. It doesn&#8217;t follow a script.</p><p>But it is real.</p><p>So if there&#8217;s one thing I&#8217;d share not as a professional, but simply as a person it&#8217;s this:</p><p>Be present.</p><p>For your family.<br>For your friends.<br>For your colleagues.<br>For yourself.</p><p>Say the things that matter now, not later.<br>Show appreciation when it counts, not when it&#8217;s convenient.<br>Make the call. Send the message. Take the time.</p><p>Because life doesn&#8217;t wait for the perfect moment.</p><p>It all comes together whether we&#8217;re ready or not.</p><p>And in those moments, what matters most isn&#8217;t what we planned.</p><p>It&#8217;s who we have.<br>It&#8217;s how we show up.<br>It&#8217;s the light we choose to hold onto and the light we choose to be for others.</p><p>Hold onto that.</p><p>Even when it stands right next to the dark.</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/the-space-between-joy-and-grief?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/the-space-between-joy-and-grief?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/the-space-between-joy-and-grief?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[Stepping Away to Step Into What Matters]]></title><description><![CDATA[Family, faith, and the quiet power of being present during a season of growth]]></description><link>https://www.cyberhubpodcast.com/p/stepping-away-to-step-into-what-matters</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/stepping-away-to-step-into-what-matters</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Sun, 05 Apr 2026 21:24:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!h7zt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6a6fd4f-f47f-4f2b-84b6-f52f08c2f67e_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Hey There, Security Gang, </p><p>There&#8217;s a moment in life where everything pauses not because the world slows down, but because you choose to.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">CISO Talk by James Azar is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>For me, that moment is this week.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!h7zt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6a6fd4f-f47f-4f2b-84b6-f52f08c2f67e_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!h7zt!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6a6fd4f-f47f-4f2b-84b6-f52f08c2f67e_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!h7zt!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6a6fd4f-f47f-4f2b-84b6-f52f08c2f67e_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!h7zt!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6a6fd4f-f47f-4f2b-84b6-f52f08c2f67e_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!h7zt!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6a6fd4f-f47f-4f2b-84b6-f52f08c2f67e_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!h7zt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6a6fd4f-f47f-4f2b-84b6-f52f08c2f67e_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e6a6fd4f-f47f-4f2b-84b6-f52f08c2f67e_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1780856,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/193290473?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6a6fd4f-f47f-4f2b-84b6-f52f08c2f67e_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!h7zt!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6a6fd4f-f47f-4f2b-84b6-f52f08c2f67e_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!h7zt!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6a6fd4f-f47f-4f2b-84b6-f52f08c2f67e_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!h7zt!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6a6fd4f-f47f-4f2b-84b6-f52f08c2f67e_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!h7zt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6a6fd4f-f47f-4f2b-84b6-f52f08c2f67e_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">AI Generated Image! I wouldn&#8217;t dream of taking a new born to the lake this early! </figcaption></figure></div><p>On Friday, the Azar clan grows by one. And with that, I&#8217;m doing something that doesn&#8217;t always come naturally in our line of work, I&#8217;m stepping away. No alerts, no dashboards, no late-night calls. Just time. Real time. The kind you don&#8217;t get back.</p><p>I&#8217;ll be spending this week with my wife and our two sons, soaking in the chaos, the laughter, the sleepless nights, and all the little moments that make up something much bigger. Because as much as we talk about building resilience, driving outcomes, and staying ahead of the next threat, none of that means much if we forget what we&#8217;re actually protecting.</p><p>And right now, for me, that&#8217;s family.</p><p>There&#8217;s something poetic about this happening during Passover.</p><p>Passover isn&#8217;t just about tradition, it&#8217;s about reflection, freedom, and renewal. It&#8217;s about remembering where we came from and being intentional about where we&#8217;re going. Around the Seder table, we tell stories of perseverance, of hardship, of faith. But we also celebrate growth, continuity, and the responsibility to pass something meaningful to the next generation.</p><p>That hits differently when you&#8217;re holding your newborn.</p><p>It puts things into perspective in a way no board meeting or quarterly review ever could. The noise fades. The urgency recalibrates. And you realize that sometimes, the most important move isn&#8217;t pushing harder, it&#8217;s stepping back.</p><p>We spend so much of our lives optimizing for efficiency, productivity, and impact. But life isn&#8217;t a system you harden. It&#8217;s something you experience.</p><p>And these moments, the birth of a child, the expansion of a family, the quiet time at home they&#8217;re not interruptions to the mission. They are the mission.</p><p>So this week, I&#8217;m unplugging. Not because the work isn&#8217;t important, but because this is more important.</p><p>To my colleagues, peers, and the broader security community; we all preach balance, but rarely practice it. Consider this your reminder. Take the time. Be present. The threats will still be there when you get back.</p><p>But your kids won&#8217;t be this little again.</p><p>Chag Pesach Sameach to those celebrating. Happy Easter and take time this holiday to hug your family a little tighter this week.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fcGB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5dcfa592-6cd3-41ba-b4b9-911234f5cfad_1080x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fcGB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5dcfa592-6cd3-41ba-b4b9-911234f5cfad_1080x1080.png 424w, https://substackcdn.com/image/fetch/$s_!fcGB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5dcfa592-6cd3-41ba-b4b9-911234f5cfad_1080x1080.png 848w, https://substackcdn.com/image/fetch/$s_!fcGB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5dcfa592-6cd3-41ba-b4b9-911234f5cfad_1080x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!fcGB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5dcfa592-6cd3-41ba-b4b9-911234f5cfad_1080x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fcGB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5dcfa592-6cd3-41ba-b4b9-911234f5cfad_1080x1080.png" width="1080" height="1080" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5dcfa592-6cd3-41ba-b4b9-911234f5cfad_1080x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1080,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:612676,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/193290473?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5dcfa592-6cd3-41ba-b4b9-911234f5cfad_1080x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!fcGB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5dcfa592-6cd3-41ba-b4b9-911234f5cfad_1080x1080.png 424w, https://substackcdn.com/image/fetch/$s_!fcGB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5dcfa592-6cd3-41ba-b4b9-911234f5cfad_1080x1080.png 848w, https://substackcdn.com/image/fetch/$s_!fcGB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5dcfa592-6cd3-41ba-b4b9-911234f5cfad_1080x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!fcGB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5dcfa592-6cd3-41ba-b4b9-911234f5cfad_1080x1080.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I&#8217;ll see you all on the other side, recharged, refocused, and with a new perspective that only life can give.</p><p>See you Monday April 13th, 2026 back on your favorite platforms. </p><p>Stay Cyber Safe, </p><p>James </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">CISO Talk by James Azar is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Cisco Source Code Stolen via Trivy Attack, Axios npm Compromised, Stryker Restores Manufacturing]]></title><description><![CDATA[Q2 Kickoff Episode&#8212;Stolen Credentials Fueling Industrial-Scale Attacks, Team PCP Pivots from Open Source to AWS Environments, Anthropic Accidentally Leaks Claude Code Source, Google Quantum Research]]></description><link>https://www.cyberhubpodcast.com/p/cisco-source-code-stolen-via-trivy</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/cisco-source-code-stolen-via-trivy</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Wed, 01 Apr 2026 13:30:56 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/192808689/a37c4da36f95f430cfb7c959e1ffc8f3.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p><strong>Good Morning Security Gang,</strong></p><p>As I said on the show, if you&#8217;re not thinking in quarters, you&#8217;re not thinking like the business. Cybersecurity doesn&#8217;t operate in a vacuum. Revenue, projections, and economic signals all shape what we can defend and how fast we can respond.</p><p>Today&#8217;s episode wasn&#8217;t just packed&#8212;it was a clear signal of where the threat landscape is going. Identity is the front door. Supply chain is the hallway. Cloud is the vault. And attackers? They&#8217;re not hacking anymore, they&#8217;re logging in.</p><p>Let&#8217;s get into it.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wHv0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F854e0c0c-04a8-4bca-86ff-6f0b884d07ce_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wHv0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F854e0c0c-04a8-4bca-86ff-6f0b884d07ce_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!wHv0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F854e0c0c-04a8-4bca-86ff-6f0b884d07ce_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!wHv0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F854e0c0c-04a8-4bca-86ff-6f0b884d07ce_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!wHv0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F854e0c0c-04a8-4bca-86ff-6f0b884d07ce_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wHv0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F854e0c0c-04a8-4bca-86ff-6f0b884d07ce_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/854e0c0c-04a8-4bca-86ff-6f0b884d07ce_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1367087,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/192808689?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F854e0c0c-04a8-4bca-86ff-6f0b884d07ce_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!wHv0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F854e0c0c-04a8-4bca-86ff-6f0b884d07ce_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!wHv0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F854e0c0c-04a8-4bca-86ff-6f0b884d07ce_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!wHv0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F854e0c0c-04a8-4bca-86ff-6f0b884d07ce_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!wHv0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F854e0c0c-04a8-4bca-86ff-6f0b884d07ce_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="pullquote"><p>"As cybersecurity professionals, if we're not in tune with how our businesses operate, then we have no business being in it at all. None. When a new quarter starts and ends, there's projections, adjustments, realities, and all of those change our plans. If they don't make revenue, you don't get paid. Real simple." James Azar</p></div><h2><strong>Stolen Credentials Fueling the Entire Threat Economy</strong></h2><p>I started the show with what I&#8217;d call the backbone of today&#8217;s cyber threat landscape&#8212;identity compromise. We&#8217;re seeing an industrial-scale economy around stolen credentials, where infostealer logs are being packaged, sold, and operationalized across ransomware groups and even nation-state actors.</p><p>High-privilege cloud credentials are now selling for thousands of dollars, not the pocket change they used to go for. That tells you everything about demand. Attackers don&#8217;t need to break in anymore&#8212;valid credentials give them direct access, and from there, it&#8217;s lateral movement, persistence, and impact.</p><p>This is the shift: malware is optional. Identity is everything.</p><p>The takeaway here is simple but uncomfortable&#8212;most organizations are still defending against break-ins, while attackers are walking in through the front door.</p><h2><strong>Anthropic Source Code Leak: Not a Breach, Still a Problem</strong></h2><p>Next, I covered Anthropic accidentally leaking a massive amount of source code through an npm package. This wasn&#8217;t a breach, it was human error. But let&#8217;s be honest, attackers don&#8217;t care how the door opened.</p><p>Roughly half a million lines of code became reconstructable. No customer data was exposed, but that doesn&#8217;t mean there&#8217;s no risk. Source code exposure gives adversaries a blueprint, how systems work, where weaknesses might exist, and how to reverse engineer faster.</p><p>We&#8217;re seeing a pattern: not every incident is malicious, but every exposure is valuable to attackers.</p><h2><strong>Cisco Breach via Trivy Supply Chain Attack</strong></h2><p>Then we got into the Cisco story&#8212;and this one hits hard. A compromised security tool (Trivy) led to the theft of source code from over 300 repositories, including AI-related projects and customer-linked environments.</p><p>Let that sink in: a security tool became the entry point.</p><p>This is the evolution of supply chain attacks. It&#8217;s no longer about poisoning one package&#8212;it&#8217;s about chaining trust relationships. Open source &#8594; CI/CD &#8594; cloud &#8594; customer environments.</p><p>If your pipeline is compromised, your entire downstream ecosystem is exposed.</p><h2><strong>Axios npm Compromise: 400 Million Downloads at Risk</strong></h2><p>Staying in the supply chain lane, attackers compromised the npm account of a maintainer tied to Axios, a package with roughly 400 million downloads per month.</p><p>They inserted a malicious dependency with a post-install script capable of pulling additional payloads depending on the system. This is where scale becomes terrifying. One compromised dependency doesn&#8217;t just affect one company, it cascades across thousands.</p><p>The developer ecosystem is no longer fragmented. It&#8217;s one giant shared attack surface.</p><blockquote><p><em>&#8220;Cybersecurity isn&#8217;t about stopping attacks. It&#8217;s about making yourself harder to attack than the next guy.&#8221; James Azar</em></p></blockquote><h2><strong>Stryker Wiper Attack: Real-World Operational Impact</strong></h2><p>Switching gears to operational impact, Stryker is recovering from a destructive cyberattack that wiped systems and disrupted manufacturing.</p><p>This is where cybersecurity leaves the server room and hits the real world. Production delays, shipment disruption, and downstream effects on healthcare systems&#8212;this is no longer about data loss.</p><p>It&#8217;s about business continuity. And recovery isn&#8217;t quick. As I pointed out, manufacturing environments take months not days to fully restore.</p><h2><strong>TeamTNT/Team PCP Expands into AWS Environments</strong></h2><p>We also saw an evolution in attacker behavior with Team PCP moving from open-source compromise into AWS environments using stolen credentials.</p><p>This isn&#8217;t random. It&#8217;s strategic chaining: Compromise credentials &#8594; Validate them &#8594; Pivot into cloud &#8594; Expand access.</p><p>This is what modern attacks look like&#8212;multi-stage, identity-driven, and built on trust abuse.</p><h2><strong>Quantum Threat Timeline Just Got Shorter</strong></h2><p>On the research side, Google is now suggesting that breaking elliptic curve cryptography (used in Bitcoin and Ethereum) may require significantly fewer qubits than previously estimated. No, your crypto wallet isn&#8217;t getting cracked tomorrow&#8212;but the timeline is shrinking.</p><p>And that matters. Because &#8220;harvest now, decrypt later&#8221; is very real. Data being stolen today could be decrypted in the future once quantum capabilities mature.</p><h2><strong>CISA Orders Immediate Citrix NetScaler Patching</strong></h2><p>On the defensive front, CISA is urging immediate patching of a critical Citrix NetScaler vulnerability already showing signs of exploitation. We&#8217;ve seen this movie before Citrix edge vulnerabilities become initial access points for ransomware and nation-state actors.</p><p>If it&#8217;s exposed, it&#8217;s already being targeted.</p><h2><strong>$53M Crypto Hack: One Line of Code, Massive Impact</strong></h2><p>Finally, we looked at the Uranium Finance hack, where attackers exploited two smart contract flaws one of them a single-character coding error.</p><p>That mistake enabled attackers to drain nearly 90% of assets across multiple liquidity pools over $53 million. bLet me say that again: one character. In crypto, precision isn&#8217;t optional, it&#8217;s everything.</p><h2><strong>Key Takeaway from Today&#8217;s Show</strong></h2><blockquote><p><em>"The thread today is trust. Trusted identities, trusted packages, trusted pipelines, trusted gateways, trusted cloud accounts. Attackers keep winning by finding the shortest path through systems we already trust way, way too much. Shrink the trust, shorten the credential life, verify the package, isolate the pipeline, and don't assume security software is automatically secure." James Azar</em></p></blockquote><h2><strong>Action Items for Security Leaders</strong></h2><ul><li><p>Prioritize Identity Threat Detection and Response (ITDR)</p></li><li><p>Enforce short-lived credentials and eliminate static secrets</p></li><li><p>Block direct external package pulls; use internal mirrors</p></li><li><p>Add release pipeline checks to prevent source code leakage</p></li><li><p>Segment and isolate CI/CD environments from production and customer data</p></li><li><p>Harden OT and manufacturing environments with network obfuscation</p></li><li><p>Begin inventorying cryptographic dependencies for post-quantum readiness</p></li><li><p>Patch edge infrastructure immediately&#8212;especially Citrix and VPNs</p></li><li><p>Require formal verification and adversarial testing for smart contracts</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/cisco-source-code-stolen-via-trivy/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/cisco-source-code-stolen-via-trivy/comments"><span>Leave a comment</span></a></p><h2><strong>James Azar&#8217;s CISO Take</strong></h2><p>If you&#8217;re still thinking about security in terms of tools, you&#8217;re already behind. Today&#8217;s stories reinforce something I&#8217;ve been saying for a while&#8212;security is no longer about perimeter defense. It&#8217;s about trust management. Identity is your perimeter. Your software supply chain is your exposure. And your cloud is your blast radius.</p><p>We&#8217;re entering a phase where attackers are operating like businesses&#8212;efficient, scalable, and opportunistic. They&#8217;re not wasting time breaking in when they can log in. That means our strategy has to shift from prevention-only to continuous validation. Shorten trust, verify everything, and assume compromise is already in motion.</p><p>Stay Cyber Safe </p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/cisco-source-code-stolen-via-trivy?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/cisco-source-code-stolen-via-trivy?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/cisco-source-code-stolen-via-trivy?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[F5 BIG-IP RCE Exploited in Wild, Fortinet EMS Flaw Attacked, Apple Blocks ClickFix on macOS]]></title><description><![CDATA[Critical F5 Vulnerability Upgraded from DoS to RCE with CVSS 9.3, CISA Flags 24 Fortinet Vulnerabilities as Actively Exploited, Team PCP Compromises Telenyx SDK, and Happy Birthday to Mrs. Azar]]></description><link>https://www.cyberhubpodcast.com/p/f5-big-ip-rce-exploited-in-wild-fortinet</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/f5-big-ip-rce-exploited-in-wild-fortinet</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Tue, 31 Mar 2026 13:31:27 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/192688427/14e8a1ab2f645d9542a02827db01c02d.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<h1>Good Morning Security Gang</h1><p>Today&#8217;s episode brings together actively exploited edge vulnerabilities, supply chain compromises hitting trusted developer ecosystems, evolving social engineering techniques, healthcare exposure risk, and nation-state cyber pressure at scale.</p><p>If there&#8217;s one takeaway from today, it&#8217;s this attackers are not finding new doors. They&#8217;re walking through the ones we still haven&#8217;t closed.</p><p>Coffee cup cheers &#8212; let&#8217;s get into it.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><div class="pullquote"><p>"Happy birthday to the best partner in crime, the best thing that's ever happened to me in my life. You're definitely the best critic of this podcast, bar none. Happy birthday, babe!" James Azar </p></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9JhB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27b2a547-d362-444f-8aa1-2b8563f5e6ec_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9JhB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27b2a547-d362-444f-8aa1-2b8563f5e6ec_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!9JhB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27b2a547-d362-444f-8aa1-2b8563f5e6ec_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!9JhB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27b2a547-d362-444f-8aa1-2b8563f5e6ec_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!9JhB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27b2a547-d362-444f-8aa1-2b8563f5e6ec_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9JhB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27b2a547-d362-444f-8aa1-2b8563f5e6ec_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/27b2a547-d362-444f-8aa1-2b8563f5e6ec_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:432092,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/192688427?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27b2a547-d362-444f-8aa1-2b8563f5e6ec_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!9JhB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27b2a547-d362-444f-8aa1-2b8563f5e6ec_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!9JhB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27b2a547-d362-444f-8aa1-2b8563f5e6ec_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!9JhB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27b2a547-d362-444f-8aa1-2b8563f5e6ec_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!9JhB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27b2a547-d362-444f-8aa1-2b8563f5e6ec_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>F5 BIG-IP Flaw Escalates to Critical RCE Under Active Exploitation</h1><p>We start with a story that should immediately trigger incident response muscle memory. An F5 BIG-IP vulnerability originally disclosed as a denial-of-service issue has now been upgraded to a critical remote code execution flaw with active exploitation in the wild.</p><p>This is exactly how incidents begin, a vulnerability underestimated at first, then weaponized once attackers understand its full potential.</p><p>The flaw impacts BIG-IP APM deployments, which sit directly in the authentication and access layer of enterprise environments. That makes this especially dangerous, because compromising it gives attackers not just access, but control over identity flows.</p><p>The risk here is unauthenticated remote code execution on a perimeter system that brokers access into your entire enterprise. The only real move here is urgency, patch immediately and assume compromise until proven otherwise.</p><h1>Fortinet EMS Vulnerability Exploited as Attackers Target Management Layers</h1><p>Fortinet continues to take hits, with a critical FortiClient EMS vulnerability now actively exploited, alongside a broader pattern of Fortinet flaws being leveraged in ransomware campaigns. There&#8217;s a pattern here that&#8217;s impossible to ignore attackers love management systems.</p><p>Why? Because if you control the system managing endpoints, you control the endpoints themselves. This isn&#8217;t about one vulnerable server. It&#8217;s about what that server touches. The risk is lateral movement and enterprise-wide compromise originating from a trusted management platform.</p><p>Mitigation requires isolating these systems into dedicated administrative enclaves and eliminating unnecessary external exposure. Trust in these systems needs to be significantly reduced.</p><h1>OpenAI Patches ChatGPT and Codex Vulnerabilities</h1><p>OpenAI patched vulnerabilities affecting ChatGPT and Codex, including risks tied to data exfiltration and GitHub token exposure. This is an important moment AI platforms are no longer experimental tools. They are now privileged enterprise systems.</p><p>The concentration of data, automation, and access within AI workflows creates a higher-impact blast radius when things go wrong. The risk is clear: sensitive data leakage and source code exposure through platforms teams increasingly trust without question.</p><p>Organizations must begin treating AI tools with the same rigor as any other high-privilege SaaS platform, enforcing least privilege and controlling integrations tightly.</p><h1>Team PCP Expands Supply Chain Attack via Telnyx SDK</h1><p>The Team PCP campaign continues to evolve, now compromising the Telnyx Python SDK distributed via PyPI. This is not typosquatting or fake packages this is compromise of legitimate, trusted software.</p><p>That&#8217;s what makes this dangerous. Developers are doing exactly what they&#8217;ve been trained to do using official packages and still getting burned. This represents a shift toward deep supply chain compromise within trusted ecosystems, targeting developers directly as an entry point into enterprise environments.</p><p>The risk is credential theft and persistent access embedded in development workflows. Mitigation requires strict version pinning and the use of internal package repositories to control what enters production environments.</p><h1>DeepLoad Malware Advances ClickFix Social Engineering</h1><p>DeepLoad malware is the next evolution of ClickFix-style attacks, combining social engineering with fileless techniques like WMI persistence. This is where things get uncomfortable.</p><p>Attackers don&#8217;t need exploits if they can convince users to execute commands themselves. The user becomes the delivery mechanism. The malware operates without traditional signatures, relying on behavior and persistence techniques that evade standard detection.</p><p>The risk is durable compromise through user-assisted execution. Detection strategies must shift toward behavioral analysis, focusing on script execution and abnormal system activity rather than relying on known malware signatures.</p><h1>CareCloud Incident Highlights Healthcare Aggregation Risk</h1><p>CareCloud disclosed a cybersecurity incident involving its electronic health record platform, with potential exposure of patient data.</p><p>This is a classic example of aggregation risk. Attackers don&#8217;t need to breach individual hospitals when platforms like CareCloud centralize sensitive data across multiple organizations. One compromise can ripple across an entire healthcare ecosystem.</p><p>The risk is widespread exposure of patient data and operational disruption across dependent providers. Healthcare organizations must validate segmentation at the tenant level and understand exactly how data flows between environments.</p><h1>UAE Faces Massive Cyber Pressure Amid Regional Tensions</h1><p>The UAE is reportedly facing between 500,000 to 700,000 cyberattacks per day, driven in part by regional geopolitical tensions. This isn&#8217;t about one attack, it&#8217;s about sustained pressure.</p><p>AI is enabling attackers to scale campaigns faster, cheaper, and more effectively, creating constant noise that can overwhelm defenders. The risk is operational fatigue and missed signals within an overwhelming volume of activity.</p><p>Organizations operating in high-risk regions must prepare for sustained campaigns, not isolated incidents, with pre-staged response and monitoring strategies.</p><h1>Apple Introduces macOS Protection Against ClickFix Attacks</h1><p>Apple has introduced a new feature in macOS Tahoe that warns users when pasting potentially harmful terminal commands, directly targeting ClickFix-style attacks.</p><p>This is a subtle but important shift vendors are now defending against user workflow abuse, not just technical vulnerabilities. It&#8217;s a step in the right direction, but not a complete solution. Users may develop a false sense of security, assuming the OS will catch everything.</p><p>Training remains critical. Any command you don&#8217;t understand is still a threat, regardless of whether the system warns you.</p><h1>Italian Bank Fined &#8364;31.8M for Insider Data Access Failures</h1><p>An Italian bank was fined &#8364;31.8 million after an employee accessed thousands of customer records over a two-year period without detection. No external breach. No zero-day exploit.</p><p>Just insufficient monitoring of legitimate access. This reinforces one of the oldest truths in cybersecurity, insider risk is still one of the hardest problems to solve. The risk is prolonged unauthorized access that appears legitimate.</p><p>Organizations must implement behavioral monitoring and anomaly detection around sensitive data access, especially for privileged users.</p><h1>Russian Carding Group Members Sentenced</h1><p>A Russian military court sentenced 26 members of the Flint24 cybercrime group, including its leader, to prison terms of up to 15 years. This represents continued law enforcement pressure on cybercrime ecosystems.</p><p>But let&#8217;s not kid ourselves these ecosystems are resilient. Arrests disrupt operations temporarily, but successors and infrastructure quickly re-emerge.</p><p>The risk remains unchanged: persistent carding and fraud operations. Defenders must continue monitoring underground markets even after major enforcement actions.</p><blockquote><p><em>"The pattern for today is pretty clear: perimeter systems are still getting burnt, management tools are still too trusted, healthcare platforms keep concentrating blast radiuses, and the AI stack is now firmly inside the enterprise threat model. Patch fast, trust less, watch your packages and pipelines, and remember that the attacker's favorite path is one your team already depends on." James Azar</em></p></blockquote><h1>Key Action Items for Security Teams</h1><ul><li><p>Patch edge and perimeter systems immediately, especially F5 and Fortinet devices</p></li><li><p>Isolate and secure endpoint and infrastructure management platforms</p></li><li><p>Treat AI tools as privileged systems with strict access controls</p></li><li><p>Enforce software supply chain security with version pinning and internal repositories</p></li><li><p>Shift detection toward behavioral analysis for fileless and social engineering attacks</p></li><li><p>Validate data segmentation in healthcare and other aggregated platforms</p></li><li><p>Prepare for sustained cyber pressure in high-risk geopolitical regions</p></li><li><p>Continue user training against social engineering, even with OS-level protections</p></li><li><p>Implement behavioral monitoring for insider access to sensitive data</p></li><li><p>Maintain visibility into underground markets despite law enforcement actions</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/f5-big-ip-rce-exploited-in-wild-fortinet/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/f5-big-ip-rce-exploited-in-wild-fortinet/comments"><span>Leave a comment</span></a></p><h1>James Azar&#8217;s CISOs Take</h1><p>What stands out to me today is how consistently attackers are targeting the same layers, edge systems, management tools, and trusted software pipelines. None of this is new, but the scale and speed at which it&#8217;s happening have changed dramatically. We&#8217;re seeing attackers industrialize what used to be opportunistic, and they&#8217;re doing it by focusing on trust &#8212; trust in software, trust in users, and trust in infrastructure.</p><p>The second takeaway is that prevention alone is no longer enough. Too many of these attacks succeed not because controls don&#8217;t exist, but because they&#8217;re not applied fast enough or monitored effectively. We have to shift toward real-time detection, behavioral visibility, and rapid response. Security today is about reducing the time between compromise and containment because compromise is no longer a question of if, but when.</p><p>Coffee Cup Cheers &#9749;&#65039;</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/f5-big-ip-rce-exploited-in-wild-fortinet?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/f5-big-ip-rce-exploited-in-wild-fortinet?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Handala Hacks FBI Director Patel's Email, EU Commission AWS Breach 350GB, RedLine Dev Extradited]]></title><description><![CDATA[Pro-Iranian Hackers Target Personal Accounts of FBI Director and Israeli Officials, Citrix NetScaler Under Active Exploitation, CISA Flags PTC Windchill Mobilizing German Police]]></description><link>https://www.cyberhubpodcast.com/p/handala-hacks-fbi-director-patels</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/handala-hacks-fbi-director-patels</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Mon, 30 Mar 2026 13:30:23 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/192538330/2193c686d263b6f747feba122fe58ba6.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<h1>Good Morning Security Gang</h1><p>We&#8217;re closing out Q1 with a theme that&#8217;s been building all year: <strong>the collapse of traditional security boundaries.</strong></p><p>Today&#8217;s episode brings together cloud compromise, personal account targeting of senior officials, active exploitation of edge devices, and deep nation-state espionage campaigns.</p><p>If there&#8217;s one thread tying all of this together, it&#8217;s this: attackers are going exactly where trust meets exposure and that&#8217;s where they&#8217;re winning.</p><p>Coffee cup cheers, let&#8217;s get into it.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><div class="pullquote"><p>"We're watching the collapse of traditional boundaries, personal versus corporate, cloud versus on-prem, cyber versus information warfare. Attackers don't care where the weakness is. They care that it exists. And increasingly, that weakness is identity, exposure, and trust." James Azar</p></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!LRzz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0eb07501-e237-49a7-8c9c-eb2bfaa07f73_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!LRzz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0eb07501-e237-49a7-8c9c-eb2bfaa07f73_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!LRzz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0eb07501-e237-49a7-8c9c-eb2bfaa07f73_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!LRzz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0eb07501-e237-49a7-8c9c-eb2bfaa07f73_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!LRzz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0eb07501-e237-49a7-8c9c-eb2bfaa07f73_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!LRzz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0eb07501-e237-49a7-8c9c-eb2bfaa07f73_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0eb07501-e237-49a7-8c9c-eb2bfaa07f73_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:151538,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/192538330?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0eb07501-e237-49a7-8c9c-eb2bfaa07f73_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!LRzz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0eb07501-e237-49a7-8c9c-eb2bfaa07f73_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!LRzz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0eb07501-e237-49a7-8c9c-eb2bfaa07f73_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!LRzz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0eb07501-e237-49a7-8c9c-eb2bfaa07f73_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!LRzz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0eb07501-e237-49a7-8c9c-eb2bfaa07f73_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>European Commission Breach Tied to AWS Identity Compromise</h1><p>We kick things off with the European Commission investigating a breach linked to a compromised AWS account that potentially exposed sensitive data. This is a critical distinction in how modern cloud attacks actually happen. The cloud itself wasn&#8217;t breached the identity inside it was.</p><p>This follows a pattern we&#8217;ve seen repeatedly across incidents like Snowflake and OAuth token abuse. Attackers aren&#8217;t breaking into hardened infrastructure; they&#8217;re simply logging in using stolen credentials or hijacked tokens. That access gives them legitimate entry into sensitive environments without triggering traditional defenses.</p><p>The real risk here is unauthorized access to government systems and data through compromised identities. The mitigation isn&#8217;t flashy, but it&#8217;s essential eliminate long-lived credentials, enforce short-lived tokens, and continuously validate identity access across cloud environments.</p><h1>Iranian Hackers Target FBI Director&#8217;s Personal Email</h1><p>A pro-Iranian group claims to have compromised the personal email of FBI Director Kash Patel, along with several Israeli political and military figures. Whether the data is recent or even meaningful is almost beside the point.</p><p>This is about perception and influence.</p><p>Targeting personal accounts is a strategic move to blur the line between personal and professional exposure. Even limited access can create headlines, shake confidence, and serve as propaganda.</p><blockquote><p><em>"Kash Patel is not someone who would have 33,000 emails on a private server that then somehow gets bleached and thrown out to a forest somewhere. Director Patel uses his FBI emails for that. These are what I call 'moral victory posts' we hacked your high-end guy's personal email! Yes, good, congratulations! But their guys are in the hospital with broken legs and in comas." James Azar</em></p></blockquote><p>From a security standpoint, this reinforces the need for executive-level protection beyond corporate controls. High-profile individuals are now part of the attack surface, whether organizations formally account for that or not.</p><h1>Citrix NetScaler Under Active Exploitation</h1><p>Citrix NetScaler vulnerabilities are once again being actively exploited, continuing a long-standing trend of attackers targeting edge infrastructure.</p><p>These systems sit at the front door of enterprise environments, making them ideal entry points. The attack pattern hasn&#8217;t changed &#8212; exposed devices, unpatched systems, and automated scanning at scale.</p><p>What has changed is speed.</p><p>The time between vulnerability disclosure and exploitation has collapsed. Organizations that delay patching or leave management interfaces exposed are essentially leaving the door unlocked.</p><p>The risk is full network compromise through a single exposed edge device, and mitigation requires immediate patching and reducing direct internet exposure wherever possible.</p><h1>Critical PTC Windchill Vulnerability Triggers Real-World Response</h1><p>CISA flagged a critical vulnerability in PTC Windchill severe enough to trigger real-world consequences, including law enforcement mobilization.</p><p>This highlights how cyber risk is no longer theoretical. PLM systems manage sensitive manufacturing and operational data, and a remote code execution flaw in such systems opens the door to significant disruption.</p><p>The real concern here is the intersection of IT and OT environments. When those systems are compromised, the impact extends beyond data into physical operations.</p><p>Organizations must move quickly to patch, and where they cannot, implement compensating controls like virtual patching and network obfuscation to limit exposure.</p><h1>macOS Targeted by New Infinity Stealer Malware</h1><p>A new malware strain known as Infinity Stealer is targeting macOS users through social engineering techniques. Users are tricked into executing commands that ultimately lead to credential theft, browser data extraction, and even crypto wallet compromise.</p><p>This reinforces a reality many organizations have resisted macOS is no longer a safe haven. High-value users such as developers and executives are increasingly targeted, and attackers are adapting accordingly.</p><p>The focus here should be on restricting execution of untrusted code, enforcing application controls, and ensuring visibility into endpoint behavior across macOS environments.</p><h1>China-Linked Telecom Espionage Campaign</h1><p>China-linked actors are continuing their focus on telecom infrastructure, deploying Linux-based backdoors to maintain long-term persistence.</p><p>This is classic espionage quiet, patient, and strategic.</p><p>Telecom providers offer unparalleled visibility into communications and metadata, making them prime targets for intelligence collection. Once embedded, these backdoors allow ongoing surveillance without disruption.</p><p>The real risk is not immediate damage, but prolonged, undetected access. Organizations in this sector must prioritize integrity monitoring, behavioral analytics, and strict segmentation to detect and contain such activity.</p><h1>Russian Disinformation Campaign Targets Latvia</h1><p>Latvia has accused Russia of conducting a disinformation campaign tied to the Ukraine conflict, highlighting the evolution of cyber into the realm of information warfare.</p><p>This is no longer just about systems and networks it&#8217;s about shaping narratives. The objective is to erode trust, influence public perception, and destabilize societies without ever breaching a system.</p><p>Organizations must begin to recognize that cybersecurity now includes defending against manipulation of information, not just protection of infrastructure.</p><h1>OpenAI Launches Bug Bounty for Abuse and Safety</h1><p>OpenAI has launched a bug bounty program focused on abuse and safety risks, signaling a shift in how AI security is being approached.</p><p>Traditional vulnerabilities are only part of the equation. The real challenge lies in misuse, manipulation, and unintended consequences of AI systems.</p><p>This move acknowledges that securing AI requires a broader perspective one that includes human behavior, adversarial inputs, and systemic risks.</p><h1>RedLine Malware Developer Extradited to the U.S.</h1><p>The developer behind RedLine malware has been extradited to the United States and faces significant prison time. While this is a win for law enforcement, it does not eliminate the threat.</p><p>RedLine has already become deeply embedded in the cybercrime ecosystem. Its capabilities credential theft, session hijacking, and enabling downstream attacks will persist regardless of its creator&#8217;s fate.</p><p>The takeaway here is simple. Enforcement matters, but resilience matters more. Organizations must assume these tools will continue to evolve and remain in circulation.</p><h1>Key Action Items for Security Teams</h1><ul><li><p>Eliminate long-lived credentials and enforce short-lived cloud access tokens</p></li><li><p>Implement executive-level personal security protections</p></li><li><p>Patch edge devices immediately and remove public exposure</p></li><li><p>Apply virtual patching where immediate fixes are not possible</p></li><li><p>Enforce endpoint protection across macOS environments</p></li><li><p>Monitor Linux systems for integrity and unauthorized changes</p></li><li><p>Integrate identity threat detection across all access points</p></li><li><p>Strengthen defenses against social engineering and phishing</p></li><li><p>Monitor supply chain and dependency risks across environments</p></li><li><p>Prepare for cyber threats that include information warfare</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/handala-hacks-fbi-director-patels/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/handala-hacks-fbi-director-patels/comments"><span>Leave a comment</span></a></p><h1>James Azar&#8217;s CISOs Take</h1><p>When I look at today&#8217;s stories, what stands out is how completely the lines have blurred. There&#8217;s no longer a clean separation between personal and corporate, between cloud and on-prem, or even between cyber and information warfare. Attackers have adapted faster than most organizations, and they&#8217;re exploiting the gaps created by those outdated distinctions.</p><p>The second realization is that security is no longer about building higher walls &#8212; it&#8217;s about controlling access and validating trust continuously. Identity has become the primary attack surface, and everything else connects to it. If we don&#8217;t shift our focus there, if we don&#8217;t move faster in detection and response, then we&#8217;re simply reacting to breaches instead of preventing impact. </p><p>Stay Cyber Safe </p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/handala-hacks-fbi-director-patels?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/handala-hacks-fbi-director-patels?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/handala-hacks-fbi-director-patels?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[This week in Cybersecurity #47]]></title><description><![CDATA[Invited In, Not Broken In: How Attackers Are Winning Through Trust, Speed, and Your Own Tools, Your weekend catch-up on the most critical cybersecurity stories of the week, curated by James Azar and t]]></description><link>https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-47</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-47</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Fri, 27 Mar 2026 15:19:02 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Ha8k!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd93021e9-17ef-4ac2-adf7-f624855607fb_1920x1080.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3><strong>Good Morning, Security Gang!</strong></h3><p>Pull up a chair and pour the Illy Espresso into a perfect double glass cup, this week&#8217;s briefing is going to earn it.</p><p>If last week was about trust as an attack vector, this week was about the industrialization of that strategy. Attackers are no longer just exploiting trust opportunistically they&#8217;re scaling it. Supply chain attacks now simultaneously target PyPI, Docker Hub, and VS Code extensions. Phishing kits are bypassing MFA in minutes. Initial access timelines have compressed from days to hours sometimes minutes. And AI tooling is being poisoned through the same trusted package repositories your developers are pulling into production pipelines right now.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">CISO Talk by James Azar is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>The Stryker fallout continued, with new details confirming the attack was a hybrid operation combining living-off-the-land techniques with destructive malware payloads affecting not just the company but hospitals and emergency services downstream. The FBI seized Iranian-linked infrastructure tied to the attack and it was back online within days. Meanwhile, Foster City, California, remained paralyzed by a separate cyberattack while 50,000 cybersecurity professionals gathered 35 minutes away at RSA in San Francisco.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ha8k!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd93021e9-17ef-4ac2-adf7-f624855607fb_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ha8k!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd93021e9-17ef-4ac2-adf7-f624855607fb_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!Ha8k!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd93021e9-17ef-4ac2-adf7-f624855607fb_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!Ha8k!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd93021e9-17ef-4ac2-adf7-f624855607fb_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!Ha8k!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd93021e9-17ef-4ac2-adf7-f624855607fb_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ha8k!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd93021e9-17ef-4ac2-adf7-f624855607fb_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d93021e9-17ef-4ac2-adf7-f624855607fb_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3080511,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/192322822?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd93021e9-17ef-4ac2-adf7-f624855607fb_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Ha8k!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd93021e9-17ef-4ac2-adf7-f624855607fb_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!Ha8k!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd93021e9-17ef-4ac2-adf7-f624855607fb_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!Ha8k!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd93021e9-17ef-4ac2-adf7-f624855607fb_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!Ha8k!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd93021e9-17ef-4ac2-adf7-f624855607fb_1920x1080.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>China continued its quiet, patient campaign against military systems in Southeast Asia. North Korean actors pivoted their fake resume attacks to target HR teams in French. HackerOne &#8212; a security platform &#8212; exposed vulnerability reports through an API misconfiguration. And CISA is reportedly being squeezed into a reactive posture by funding constraints, at exactly the wrong moment.</p><p>The theme this week, in James&#8217;s words: attackers aren&#8217;t breaking the systems. They&#8217;re using them exactly as designed just better than we are.</p><p>Let&#8217;s get into it.</p><div class="pullquote"><p><em>&#8220;Every single story today answers one question: How did they get in? The answer isn&#8217;t exotic. It&#8217;s a supplier system, a Zendesk instance, a developer tool, a messaging app, a forgotten device. Attackers aren&#8217;t breaking the systems &#8212; they&#8217;re using them exactly as designed, just better than we are.&#8221; James Azar</em></p></div><h3><strong>&#127760; Geopolitical Cyber Warfare</strong></h3><p><strong>China-Linked Espionage Campaign Breaches Military Systems Across Southeast Asia</strong></p><p>Chinese state-linked threat actors breached military systems across Southeast Asia in a long-term, quiet espionage campaign consistent with China&#8217;s established doctrine: persistent access over loud disruption. The objective isn&#8217;t to break things it&#8217;s to understand them. Response plans, operational readiness, infrastructure dependencies, and communication channels. This correlates directly with prior reporting on Chinese pre-positioning within critical infrastructure in regions aligned with U.S. defense strategy.</p><p>Long-term undetected access to military intelligence and operational planning systems represents one of the most dangerous threat scenarios because the damage accumulates invisibly. Organizations handling sensitive government or defense-adjacent data should treat continuous access validation and environment segmentation as non-negotiable baseline controls.</p><p><strong>FBI Seizes Iranian-Linked Infrastructure &#8212; It Returns Within Days</strong></p><p>The FBI and DOJ seized domains linked to the Handela hacking group, the Iranian-linked actors behind the Stryker attack. The infrastructure was back online within days. This is the operational reality of working against well-resourced, motivated adversaries: takedowns create friction, not elimination. The cost of re-establishing infrastructure for these actors is low. The cost of assuming they&#8217;re gone is high. Defenses must be designed around adversary persistence, not adversary removal.</p><p><strong>Lockheed Martin Targeted by Pro-Iranian Hacktivists</strong></p><p>A pro-Iranian hacktivist group claimed a breach of Lockheed Martin, alleging access to sensitive data including F-35-related information. Lockheed has not confirmed the breach. Claims of this nature typically mix real data with recycled or publicly available information to amplify credibility and psychological impact but even unconfirmed, they warrant monitoring. Organizations should actively track dark web leak sites and threat actor channels for early indicators of claimed exposure.</p><p><strong>FCC Advances Ban on Chinese Routers</strong></p><p>The FCC is moving forward with efforts to ban specific Chinese-manufactured routers from U.S. networks due to national security concerns over potential backdoor access. This reflects a broader and accelerating policy shift toward supply chain security and foreign technology risk reduction. Organizations should establish approved hardware procurement policies and formally assess supply chain risk across their networking infrastructure.</p><h3><strong>&#128165; Stryker Fallout &amp; Destructive Operations</strong></h3><p><strong>Stryker Attack Confirmed as Hybrid Operation: Living-Off-the-Land Plus Malware</strong></p><p>New details on the Stryker attack confirm it was a hybrid operation not purely living-off-the-land as initially characterized. Attackers used legitimate administrative access to establish footholds and then deployed destructive malware payloads to execute the wipe at scale. This is the same playbook used in Ukraine and other geopolitical conflict environments. The operational impact extended beyond Stryker&#8217;s own systems: hospitals and emergency services were affected, with some forced to disconnect as a precautionary measure. Supply chains for medical equipment remain disrupted.</p><p>The lesson is not new but demands repeating: behavioral detection capable of identifying abnormal administrative activity not just known malware signatures is the only reliable defense against this class of attack. Organizations must also design segregated backup environments and recovery capabilities calibrated to actual business continuity SLAs.</p><p><strong>Foster City Paralyzed by Cyberattack During RSA</strong></p><p>Foster City, California, remained operationally paralyzed by a cyberattack this week &#8212; with municipal services disrupted across the board &#8212; while more than 50,000 cybersecurity professionals gathered 35 minutes away at RSA Conference in San Francisco. Local governments are consistently under-resourced for the threat environment they face. Incident response preparedness and resilience planning must be treated as core investments, not afterthoughts, for any organization that provides essential services to the public.</p><h3><strong>&#128275; Data Breaches &amp; Exposures</strong></h3><blockquote><p><em>&#8220;Cybersecurity is no longer just about defending networks. It&#8217;s about protecting operations, identities, and trust itself. Attackers are evolving &#8212; they&#8217;re blending in, they&#8217;re abusing trusted systems, and they&#8217;re aligning with geopolitical objectives. And defenders? We need to think the same way: holistically, strategically, and always one step ahead of our adversaries.&#8221; James Azar</em></p></blockquote><p><strong>HackerOne API Misconfiguration Exposes Vulnerability Reports</strong></p><p>HackerOne disclosed a data exposure incident in which an API access control misconfiguration allowed users to view vulnerability reports they were not authorized to access &#8212; including unpatched vulnerabilities still in remediation. This is a blueprint-level exposure: seeing vulnerabilities before they are fixed provides a direct roadmap into affected organizations. The incident impacted 287 employees and reinforces how security platforms themselves have become high-value targets. Strict API access controls, continuous auditing, and deep visibility into third-party platforms handling sensitive data are essential mitigations.</p><p><strong>AstraZeneca Breach Exposes Source Code and Infrastructure Secrets</strong></p><p>Pharmaceutical giant AstraZeneca disclosed a breach in which attackers accessed approximately three gigabytes of internal data, including source code and infrastructure configuration details. Customer data does not appear to have been impacted. However, source code and infrastructure secrets are among the most dangerous categories of intellectual property exposure providing attackers with detailed knowledge of internal systems and potential further attack paths. Role-based access controls for research environments and alignment to known threat actor TTPs targeting pharmaceutical IP are essential.</p><p><strong>Navia Breach: 2.7 Million Individuals, Months of Undetected Access</strong></p><p>A major breach at Navia compromised data tied to approximately 2.7 million individuals. The attacker dwell time from late December through mid-January before detection is the story here. Extended undetected access is the norm, not the exception, in these aggregation-layer attacks where centralized platforms holding large volumes of user data are targeted. Behavioral fraud detection systems are essential for identifying abnormal account activity and preventing downstream monetization of stolen data.</p><p><strong>Crunchyroll Zendesk Breach: 6.8 Million Email Records</strong></p><p>Crunchyroll is investigating a breach of its Zendesk support environment exposing approximately 6.8 million unique email records, names, email addresses, IP addresses, and support ticket contents. This was not a breach of the core platform. It was a breach of a support system, which in many ways is more valuable to attackers. Support data provides rich operational context enabling precision phishing and convincing social engineering. Third-party SaaS support platforms are an undermonitored attack surface across nearly every enterprise.</p><p><strong>Mazda Breach: Supply Chain Intelligence Gathering</strong></p><p>Mazda disclosed a breach tied to a warehouse operations management system connected to parts procurement in Thailand. Employee and partner data was exposed &#8212; not customer records, but organizational context: relationships, communication paths, and operational workflows. This is exactly the kind of intelligence attackers use to map supply chains and identify where to strike next. Segmentation of partner-connected systems and business process security controls must be treated with the same urgency as core infrastructure.</p><h3><strong>&#128373;&#65039; Nation-State &amp; Insider Threats</strong></h3><p><strong>North Korean Campaign Targets HR Teams with French-Language Fake Resumes</strong></p><p>North Korean threat actors have expanded their fake resume campaign, with new variants now localized in French to target HR teams across European organizations. Once opened, the malicious documents execute malware against the HR workstation. This is a direct evolution of the broader North Korean IT worker infiltration strategy and it demonstrates how HR has become a frontline attack surface. Document sandboxing for all inbound candidate materials and secure handling protocols for HR platforms are essential mitigations.</p><p><strong>AI Technology Smuggling Case: Three Charged with Exporting to China</strong></p><p>Three individuals were charged with attempting to smuggle advanced U.S. AI technology to China. As AI becomes a core strategic national asset, cybersecurity, legal enforcement, and export controls are converging around its protection. Organizations developing or deploying advanced AI systems must implement strict monitoring of sensitive data access and formal export control compliance frameworks.</p><h3><strong>&#128737;&#65039; Vulnerabilities &amp; Active Exploitation</strong></h3><p><strong>Oracle Identity Manager: Emergency RCE Patch</strong></p><p>Oracle issued an emergency patch for a critical remote code execution vulnerability in its Identity Manager platform. Identity systems are the primary attack surface in modern enterprise environments &#8212; compromising them grants control over authentication across the organization. This is the definition of a high-urgency patch. Isolate identity systems, enforce privileged access controls, and treat this with the same urgency as a perimeter firewall zero-day.</p><p><strong>Critical Windchill PLM Vulnerability: CVE-2026-4681</strong></p><p>A critical deserialization remote code execution vulnerability in PTC Windchill FlexPLM is under active threat. PLM systems hold sensitive product design and intellectual property data &#8212; high-value targets for both espionage and competitive intelligence theft. Immediate patching and restriction of external access to PLM environments are required.</p><p><strong>Citrix NetScaler: Session Hijacking via Session Mix-Up Vulnerabilities</strong></p><p>Critical vulnerabilities in Citrix NetScaler introduce session mix-up conditions, effectively breaking trust between users and systems at the edge. NetScaler sits at the intersection of identity and access, making these vulnerabilities particularly dangerous. Immediate patching of all internet-facing Citrix infrastructure is essential.</p><p><strong>Cisco Firewall Zero-Day Exploited by Ransomware Groups</strong></p><p>A Cisco firewall zero-day continues to be actively exploited by ransomware operators. Perimeter compromise provides direct internal network access, backdoor account creation, and long-term persistence. Patch immediately and implement real-time monitoring for abnormal firewall configuration changes.</p><p><strong>QNAP Vulnerabilities Demonstrated Live at Pwn2Own</strong></p><p>Researchers chained multiple QNAP vulnerabilities to achieve root access in a live demonstration. NAS devices are consistently undermonitored and infrequently patched despite sitting inside enterprise networks with access to sensitive stored data. Inventory and patch all network-attached storage devices immediately.</p><p><strong>ConnectWise ScreenConnect: Session Hijacking</strong></p><p>ConnectWise disclosed a ScreenConnect vulnerability enabling session hijacking. Remote access platforms carry administrative-level capabilities when compromised, attackers inherit full system control. Enforce session-level authentication and privileged access monitoring across all remote access tooling.</p><p><strong>TP-Link Router Authentication Bypass</strong></p><p>A critical TP-Link vulnerability allows attackers to bypass authentication entirely and gain full administrative access to affected devices. Router compromise gives attackers foundational network visibility and control. Isolate management interfaces from public exposure and enforce zero-trust access principles including for network infrastructure devices.</p><p><strong>SQL Server Exposure: Old Attack Path Still Working</strong></p><p>Threat actors continue scanning and exploiting publicly exposed Microsoft SQL servers through weak credentials and misconfigured services. This is one of the oldest attack paths in enterprise security &#8212; and it still works because organizations still expose database services to the internet. Disable public exposure and enforce strong authentication across all database services.</p><p><strong>Chrome: Continued High-Severity Patching</strong></p><p>Google released Chrome version 146 with multiple high-severity patches. Browsers remain one of the most consistent initial access vectors, particularly when combined with phishing. Enforce automatic updates and browser security policies across all enterprise endpoints.</p><p><strong>Node.js Vulnerabilities: Dependency Risk in Backend Services</strong></p><p>Node.js released updates addressing vulnerabilities including denial-of-service and application stability flaws. Node is deeply embedded in enterprise application stacks. Automated patching pipelines for all runtime environments are required security has moved to runtime and patch hygiene must follow.</p><p><strong>CISA Adds Wing FTP, Zimbra, and Others to KEV Catalog</strong></p><p>CISA continues flagging actively exploited vulnerabilities across FTP servers, email infrastructure, and enterprise platforms. These additions carry federal patch mandates and should be treated with equivalent urgency by enterprise security teams.</p><h3><strong>&#129302; AI, Supply Chain &amp; Developer Threats</strong></h3><p><strong>AI Supply Chain Attack Targets LiteLLM via PyPI</strong></p><p>A supply chain compromise targeting the LiteLLM Python package distributed malicious code through PyPI the trusted package repository used by AI and ML developers globally. AI tooling is being adopted faster than security teams can vet it, and attackers are exploiting that gap directly. Developers are pulling these packages into production pipelines without validation, unknowingly introducing persistence mechanisms. Strict dependency allow-listing for AI and ML libraries is a required control for any organization deploying AI-driven applications.</p><p><strong>Team PCP Expands to PyPI, Docker Hub, and VS Code Extensions</strong></p><p>The Team PCP threat group has scaled from isolated targeting into a full-spectrum, multi-platform supply chain operation simultaneously attacking PyPI packages, Docker Hub images, and VS Code extensions. This is industrialized developer compromise. The goal is mass downstream enterprise access through development environment infiltration. Runtime scanning across containers and development environments is essential prevention controls are no longer keeping pace with the distribution velocity of these attacks.</p><p><strong>Time to Initial Access Compressed to Hours or Minutes</strong></p><p>New reporting confirms what practitioners have been observing: attackers are now achieving initial access within hours sometimes minutes of targeting an organization. This is driven by AI-assisted phishing, automation, and the maturation of initial access broker marketplaces. Detection windows have collapsed. Real-time identity threat detection and response across all identities human and non-human is the only operationally viable response to this timeline compression.</p><p><strong>Microsoft Device Code Phishing Hits 340 Organizations</strong></p><p>A large-scale phishing campaign is exploiting Microsoft device code authentication flows, impacting more than 340 organizations. Attackers are not breaking authentication &#8212; they are abusing it. Users are tricked into entering legitimate authentication codes, granting attackers valid session access without credential theft. Restrict device code authentication flows where they are not operationally required. This is the future of phishing: exploiting trust rather than bypassing controls.</p><p><strong>Tycoon 2FA Phishing Kit: Responsible for 62% of Blocked Phishing Attempts</strong></p><p>The Tycoon 2FA phishing kit responsible for 62% of phishing attempts blocked by Microsoft in 2025 was disrupted this week, but activity resumed almost immediately. This kit bypasses MFA, not just passwords. MFA alone is no longer sufficient against modern phishing infrastructure. Phishing-resistant authentication passkeys and FIDO2-based mechanisms is now the required standard for any organization that has faced or expects to face targeted credential theft.</p><p><strong>Void Stealer Targets Chrome Credential Storage</strong></p><p>New malware dubbed Void Stealer targets Chrome&#8217;s encryption keys to decrypt stored credentials using debugger techniques. Browser-based credential storage is not a secure vault it is a conveniently organized target. Enforce hardware-backed credential storage and eliminate browser-based password management across enterprise environments.</p><p><strong>Malware Distributed via Open Directories</strong></p><p>Researchers identified attackers using open, publicly accessible directory listings to host and rotate malware payloads &#8212; low-tech, but effective precisely because it exploits overlooked and misconfigured infrastructure. Identify and remediate misconfigurations in internet-facing systems and deploy network-level blocking of known open-directory distribution patterns.</p><p><strong>North Korean Actors Target Developers via VS Code Auto-Run Tasks</strong></p><p>North Korean threat actors are abusing VS Code auto-run task configurations to deploy malware against developer workstations. Developers are a primary attack vector across job postings, malicious packages, and now compromised IDE tooling. Restrict automated execution within development tools and enforce configuration validation across developer environments.</p><p><strong>Russian Hackers Bypass Signal Encryption via Endpoint Compromise</strong></p><p>The FBI warned that Russian hackers are targeting Signal users &#8212; not by breaking encryption, but by compromising the devices running it. Encrypted communications are only as secure as the endpoint managing them. Mobile and desktop endpoint security must receive the same rigor as network perimeter security for anyone handling sensitive communications.</p><h3><strong>&#128176; Financial Cybercrime</strong></h3><p><strong>$24.5 Million DeFi Hack: Uncollateralized Stablecoins Minted Through Infrastructure Weakness</strong></p><p>DeFi platform Resolve suffered approximately $24.5 million in losses after attackers exploited infrastructure weaknesses to mint uncollateralized stablecoins, which were then converted to Ethereum &#8212; crashing the token&#8217;s value in the process. This is a recurring pattern in DeFi: innovation velocity outpacing security validation. Independent smart contract audits and robust key management practices must be required before any financial protocol deployment.</p><p><strong>Russian Initial Access Broker Sentenced to Six-Plus Years</strong></p><p>A Russian initial access broker tied to ransomware operations was sentenced to more than six years in prison. Ransomware is an ecosystem, not a solo operation access brokers establish entry and sell it to ransomware groups for execution. Preventing initial access through strong identity controls, MFA enforcement, and network segmentation is the most effective intervention point in the entire ransomware kill chain.</p><p><strong>Trivy Supply Chain Compromise Hits CI/CD Pipelines</strong></p><p>A breach involving the Trivy vulnerability scanner resulted in attackers distributing an infostealer through GitHub Actions workflows. The target was a security tool used inside CI/CD pipelines which means the very tools organizations rely on for security were the vector. Pipeline integrity checks and third-party tool verification must be implemented across all automated build and deployment workflows.</p><h3><strong>&#9878;&#65039; Law Enforcement, Policy &amp; Regulatory</strong></h3><p><strong>CISA Pushed Toward Reactive Posture by Funding Constraints</strong></p><p>CISA is reportedly being constrained by funding limitations that are reducing its capacity for proactive threat defense and public-private coordination. CISA has served as a central hub for actionable threat intelligence and coordinated response across critical infrastructure sectors. Any degradation in that capability increases systemic national risk at exactly the moment the threat environment is most demanding. This is not theoretical exposure &#8212; it is real, measurable risk at scale.</p><p><strong>LeakBase Admin Arrested in Rare Russian Enforcement Action</strong></p><p>Authorities arrested the alleged administrator of LeakBase, a platform used to buy and sell stolen data &#8212; with the arrest taking place inside Russia, marking a rare enforcement action within that jurisdiction. While arrests disrupt momentum and create some deterrence, they rarely dismantle the broader cybercrime ecosystem. Continuous monitoring of underground markets remains essential.</p><p><strong>Vendor Compliance Integrity: Delve Facing False Claims Allegations</strong></p><p>A report surfaced alleging that compliance startup Delve made misleading claims about its security certifications and processes. Details remain contested, but the broader issue is real: the gap between vendor-claimed security capabilities and actual verified controls is a persistent and dangerous vulnerability in enterprise procurement. Independent audits and verified certification reviews must be part of any vendor onboarding process.</p><p><strong>Libyan Oil Infrastructure Targeted with Long-Running AsyncRAT Campaign</strong></p><p>A Libyan oil refinery was the target of a long-running espionage campaign using AsyncRAT, with attackers maintaining persistent access for months. Energy infrastructure continues to be a geopolitical targeting priority. Organizations operating OT environments must deploy continuous threat hunting and behavioral monitoring across industrial control systems not as an aspirational goal but as a present-day operational requirement.</p><h3><strong>&#9989; This Week&#8217;s Priority Action List</strong></h3><p><strong>Immediate (Do This Now)</strong></p><ul><li><p>Patch Oracle Identity Manager RCE emergency patch &#8212; identity system compromise is total environment compromise</p></li><li><p>Patch Citrix NetScaler, Cisco firewall zero-day, ConnectWise ScreenConnect, Windchill CVE-2026-4681 immediately</p></li><li><p>Enforce multi-approval workflows for all destructive administrative actions &#8212; the Stryker hybrid attack confirms this as a critical control</p></li><li><p>Implement real-time identity threat detection and response across all human and non-human identities</p></li><li><p>Restrict device code authentication flows for Microsoft services where not operationally required</p></li><li><p>Deploy behavioral detection for abnormal administrative patterns &#8212; not just signature-based malware detection</p></li></ul><p><strong>Short-Term (This Month)</strong></p><ul><li><p>Enforce strict dependency allow-listing and runtime scanning for AI/ML packages and developer tools (LiteLLM, Team PCP)</p></li><li><p>Implement pipeline integrity checks and third-party tool verification for all CI/CD workflows</p></li><li><p>Lock down Zendesk and all third-party SaaS support platforms &#8212; enforce strict access controls and monitoring</p></li><li><p>Sandbox all inbound documents in HR workflows &#8212; North Korean malicious resume campaigns are active</p></li><li><p>Eliminate browser-based credential storage; enforce hardware-backed authentication (Void Stealer is active)</p></li><li><p>Inventory and patch all QNAP NAS devices, TP-Link routers, SQL servers exposed to the internet</p></li><li><p>Monitor dark web and threat actor channels for claims related to your organization or key partners</p></li><li><p>Deploy runtime scanning across all container and developer environments (Docker Hub, VS Code, PyPI)</p></li></ul><p><strong>Strategic (This Quarter)</strong></p><ul><li><p>Transition to phishing-resistant authentication (passkeys / FIDO2) &#8212; Tycoon 2FA proves MFA alone is insufficient</p></li><li><p>Assess and formalize supply chain security controls across AI tooling, developer dependencies, and SaaS platforms</p></li><li><p>Conduct continuous threat hunting specifically for Chinese and Iranian APT persistence indicators</p></li><li><p>Harden DeFi and financial smart contract environments with independent audits before deployment</p></li><li><p>Establish approved hardware procurement policies and assess FCC-flagged foreign networking equipment</p></li><li><p>Review CISA KEV catalog compliance and ensure federal patch guidance is matched or exceeded in enterprise environments</p></li><li><p>Design segregated backup and recovery environments with business-SLA-calibrated recovery objectives</p></li></ul><h3><strong>&#127897;&#65039; James Azar&#8217;s CISO&#8217;s Take</strong></h3><p>When I look at this week in its entirety, what stands out most is the industrialization of access. Nation-state actors are quietly embedding in military systems for months. Cybercriminals are simultaneously attacking PyPI, Docker Hub, and VS Code. Initial access timelines have compressed to minutes. Phishing kits are bypassing MFA. And a security platform HackerOne exposed vulnerability blueprints through a misconfigured API. The common thread across all of it is the same: attackers are exploiting trust, misconfiguration, and the speed gap between adoption and security validation. They&#8217;re not forcing their way through the door &#8212; they&#8217;re walking through the ones we left open.</p><p>The second takeaway is that the security model has to evolve to match this reality. Prevention is necessary but no longer sufficient. Detection and response are now the decisive capabilities, and they must operate in real time. Identity is the front line. Supply chain is the battlefield. Speed is the deciding factor. If your detection time is measured in hours, you&#8217;re already behind. The organizations that will remain resilient in this environment are the ones that combine relentless execution on fundamentals with continuous monitoring, adaptive defenses, and the strategic awareness to anticipate where the next trusted door will be opened.</p><h3><strong>&#128203; Week in Summary</strong></h3><p>This week confirmed that the cybersecurity threat landscape has entered a new phase &#8212; not of sophistication for its own sake, but of industrialized trust exploitation at speed. Stryker&#8217;s attack was confirmed as a hybrid operation. Iranian infrastructure returned online days after FBI seizure. Supply chain attacks scaled across every developer platform simultaneously. AI tooling is being poisoned before organizations finish deploying it. And the time between an attacker identifying a target and achieving access has collapsed to hours or minutes in many documented cases.</p><p>The geopolitical dimension remained active on every front. China continued its patient military espionage in Southeast Asia. Iran&#8217;s Handela group proved its resilience. North Korea expanded social engineering operations into new languages and new targets. And CISA &#8212; the backbone of U.S. public-private cyber defense coordination &#8212; is facing resource constraints that reduce its proactive capacity at exactly the wrong moment in history.</p><p>The response, as always, comes back to fundamentals executed with urgency and discipline: identity control, supply chain validation, behavioral detection, segmentation, and patch velocity. These aren&#8217;t aspirational controls. They are the difference between organizations that absorb these attacks and those that become the next case study. Know which one you want to be.</p><p>Stay informed. Stay prepared. <strong>Stay Cyber Safe.</strong> &#128272;</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-47/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-47/comments"><span>Leave a comment</span></a></p><p><em>&#169; CyberHub Podcast | Subscribe on Substack | Watch on YouTube | Follow on LinkedIn</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">CISO Talk by James Azar is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[LeakBase Admin Arrested in 14-Country Takedown, Device Code Phishing Hits 340 Orgs, TP-Link Flaw ]]></title><description><![CDATA[China-Linked Actors Breach Southeast Asian Military Systems, Team PCP Supply Chain Attack Expands to Docker Hub and VS Code, Attackers Achieving Initial Access in Hours, and CISA Forced into Reactive]]></description><link>https://www.cyberhubpodcast.com/p/leakbase-admin-arrested-in-14-country</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/leakbase-admin-arrested-in-14-country</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Thu, 26 Mar 2026 13:31:41 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/192165878/0625f386337829f248612ad0ce7b105f.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<h1>Good Morning Security Gang</h1><p>Today&#8217;s episode is all about one thing: <strong>speed and scale</strong>.</p><p>Attackers are getting in faster than ever, spreading wider than ever, and doing it by exploiting trust whether that&#8217;s identity, software supply chains, or legitimate authentication flows.</p><p>Today&#8217;s show brings together three major themes: nation-state espionage, AI-driven supply chain compromise, and identity-based attacks accelerating initial access. The good news? Not a ton of consumer data breaches. The bad news? Everything else is getting more dangerous.</p><p>Coffee cup cheers &#8212; let&#8217;s get into it.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!N9cA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93980113-7f2b-48e9-9cad-ca95b571dd62_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!N9cA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93980113-7f2b-48e9-9cad-ca95b571dd62_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!N9cA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93980113-7f2b-48e9-9cad-ca95b571dd62_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!N9cA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93980113-7f2b-48e9-9cad-ca95b571dd62_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!N9cA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93980113-7f2b-48e9-9cad-ca95b571dd62_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!N9cA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93980113-7f2b-48e9-9cad-ca95b571dd62_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/93980113-7f2b-48e9-9cad-ca95b571dd62_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:210697,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/192165878?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93980113-7f2b-48e9-9cad-ca95b571dd62_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!N9cA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93980113-7f2b-48e9-9cad-ca95b571dd62_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!N9cA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93980113-7f2b-48e9-9cad-ca95b571dd62_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!N9cA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93980113-7f2b-48e9-9cad-ca95b571dd62_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!N9cA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93980113-7f2b-48e9-9cad-ca95b571dd62_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>China-Linked Espionage Campaign Targets Military Systems</h1><p>We start with a significant report of China-linked threat actors breaching military systems across Southeast Asia. This isn&#8217;t smash-and-grab this is long-term, quiet espionage.</p><p>This aligns perfectly with China&#8217;s doctrine: persistent access over loud disruption. They&#8217;re not there to break things they&#8217;re there to understand them. Response plans, operational readiness, infrastructure dependencies.</p><p>This correlates with previous reporting we&#8217;ve covered on pre-positioning within critical infrastructure, especially in regions aligned with U.S. defense strategy.</p><p>The risk here is massive: long-term undetected access to military intelligence and operational planning systems. From an enterprise lens, the takeaway is clear segment sensitive environments and continuously validate access. If you don&#8217;t, someone else already has.</p><h1>AI Supply Chain Attack Hits LiteLLM</h1><p>The LiteLLM supply chain compromise, and this one is a wake-up call. AI tooling is being adopted faster than security teams can vet it. Attackers know this and are injecting malicious code directly into trusted packages. AI is now the new open-source attack surface.</p><p>Developers are pulling these packages straight into production pipelines, unknowingly introducing persistence mechanisms for attackers. The risk is data exfiltration, model manipulation, and downstream compromise across environments.</p><p>Mitigation? Strict dependency allow-listing for AI/ML libraries &#8212; if you&#8217;re not controlling what goes into your pipeline, you&#8217;re not controlling your environment.</p><h1>Team PCP Expands Multi-Platform Supply Chain Operation</h1><p>Team PCP is back and bigger. What started with isolated targeting has now expanded into a full-scale multi-platform supply chain attack, hitting PyPI, Docker Hub, and VS Code extensions.</p><p>This is no longer opportunistic. This is industrialized. The goal is clear: compromise developers at every layer: code, container, and tooling.</p><p>This represents a shift toward AI-assisted, large-scale supply chain compromise, where attackers automate distribution across ecosystems.</p><p>The risk is mass downstream enterprise compromise originating from developer environments. Mitigation requires runtime scanning across containers and development environments because prevention alone isn&#8217;t keeping up anymore.</p><h1>Attackers Slash Time to Initial Access</h1><p>New reporting shows attackers are now gaining access within hours sometimes minutes of targeting an organization.</p><p>This is being driven by:</p><ul><li><p>AI-assisted phishing</p></li><li><p>Automation</p></li><li><p>Initial access broker marketplaces</p></li></ul><p>We&#8217;ve talked about this before &#8212; the move to malware-free, identity-first attacks. Attackers don&#8217;t need persistence if they can move fast enough.</p><p>The risk is compressed detection windows and rapid breach execution. Mitigation is non-negotiable: real-time identity threat detection and response across all identities, human and non-human. If your detection time is still measured in hours, you&#8217;re already behind.</p><h1>Malware Distribution via Open Directories</h1><p>Researchers uncovered attackers using open directories to host and distribute malware payloads. This is low-tech, but highly effective.</p><p>Why? Because it exploits misconfigured environments and overlooked infrastructure. Attackers rotate payloads quickly and evade detection by using publicly accessible hosting.</p><p>The risk is malware delivery through trusted or ignored infrastructure paths. Mitigation: identify and eliminate misconfigurations, and block known open-directory patterns at the network level.</p><h1>Node.js Vulnerabilities Highlight Dependency Risk</h1><p>Node.js released updates addressing vulnerabilities that could lead to denial of service or unstable application behavior. While not all are critical, Node is deeply embedded in enterprise environments. This reinforces a growing issue dependency risk in modern application stacks.</p><p>The risk is application disruption or exploitation through vulnerable backend services. Mitigation: automated patching pipelines for runtime environments. Security has moved to runtime, if you&#8217;re not there yet, you&#8217;re playing yesterday&#8217;s game.</p><h1>TP-Link Router Flaw Enables Authentication Bypass</h1><p>A critical vulnerability in TP-Link routers allows attackers to bypass authentication and gain administrative access. Routers remain one of the most ignored yet critical attack surfaces, especially in remote and hybrid work environments.</p><p>The risk is full control of network infrastructure devices. Mitigation: isolate management interfaces from public exposure and enforce zero trust principles. </p><p>Yes &#8212; even for your routers.</p><h1>Microsoft Device Code Phishing Hits 340 Organizations</h1><p>A large-scale phishing campaign is exploiting Microsoft device code authentication flows, impacting over 340 organizations. This is clever attackers aren&#8217;t breaking authentication, they&#8217;re abusing it. Users are tricked into entering legitimate codes, granting attackers access.</p><p>The risk is account takeover through legitimate authentication abuse. Mitigation: restrict device code authentication where not operationally required. This is the future of phishing exploiting trust, not bypassing controls.</p><h1>CISA Resource Constraints Raise National Risk</h1><p>CISA is reportedly being pushed into a reactive posture due to funding constraints and operational limitations. This reduces its ability to proactively defend against emerging threats. CISA has been a central hub for public-private cyber defense coordination, and any degradation increases systemic risk.</p><p>The risk is delayed national response to cyber threats impacting critical infrastructure and enterprise environments. This isn&#8217;t theoretical &#8212; this is real exposure at scale.</p><h1>LeakBase Admin Arrested in Global Takedown</h1><p>Authorities arrested the alleged administrator of LeakBase, a platform used to sell stolen data. The arrest took place in Russia, marking a rare instance of enforcement action within that jurisdiction.</p><p>While arrests create temporary disruption and some deterrence, they rarely dismantle the broader cybercrime ecosystem. The risk remains: ongoing industrialized trade of stolen data. Still deterrence matters, and visibility into these operations helps disrupt momentum.</p><h1>Key Action Items for Security Teams</h1><ul><li><p>Segment and continuously validate access to sensitive environments</p></li><li><p>Enforce strict dependency controls for AI and software supply chains</p></li><li><p>Deploy runtime monitoring across developer and container environments</p></li><li><p>Implement real-time identity detection and response</p></li><li><p>Continuously scan for and remediate misconfigurations</p></li><li><p>Automate patching for runtime and backend systems</p></li><li><p>Isolate network infrastructure management interfaces</p></li><li><p>Restrict unnecessary authentication flows (especially device code auth)</p></li><li><p>Reduce reliance on perimeter-based detection &#8212; focus on identity and behavior</p></li><li><p>Monitor supply chain exposure across all development pipelines</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/leakbase-admin-arrested-in-14-country/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/leakbase-admin-arrested-in-14-country/comments"><span>Leave a comment</span></a></p><h1>James Azar&#8217;s CISOs Take</h1><p>What stands out to me today is how attackers are industrializing access. Whether it&#8217;s nation-state actors quietly embedding themselves in military systems or cybercriminals scaling supply chain attacks across developer ecosystems, the game has fundamentally changed. This is no longer about breaking in &#8212; it&#8217;s about being invited in through trust, misconfiguration, and speed.</p><p>The second takeaway is that security teams must evolve from prevention to real-time response. The compression of time to initial access means detection and response are now the most critical capabilities. Identity is the front line, supply chain is the battlefield, and speed is the deciding factor. If we don&#8217;t adapt to that reality, we&#8217;re not defending, we&#8217;re reacting.</p><p>Stay Cyber Safe </p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/leakbase-admin-arrested-in-14-country?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/leakbase-admin-arrested-in-14-country?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/leakbase-admin-arrested-in-14-country?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item></channel></rss>