<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[CISO Talk by James Azar: CyberHub Podcast]]></title><description><![CDATA[Today’s top cybersecurity news and the latest from Practicing CISO James Azar, tune in to hear how practitioners read, view and work after hearing the latest headlines and how these stories help keep practitioners sharp and ready. ]]></description><link>https://www.cyberhubpodcast.com/s/cyberhub-podcast</link><image><url>https://substackcdn.com/image/fetch/$s_!r32m!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4fb3476-5e78-42fb-a02d-ffcc85932554_1280x1280.png</url><title>CISO Talk by James Azar: CyberHub Podcast</title><link>https://www.cyberhubpodcast.com/s/cyberhub-podcast</link></image><generator>Substack</generator><lastBuildDate>Wed, 13 May 2026 16:55:45 GMT</lastBuildDate><atom:link href="https://www.cyberhubpodcast.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[James Azar]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[jamesazar@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[jamesazar@substack.com]]></itunes:email><itunes:name><![CDATA[James Azar]]></itunes:name></itunes:owner><itunes:author><![CDATA[James Azar]]></itunes:author><googleplay:owner><![CDATA[jamesazar@substack.com]]></googleplay:owner><googleplay:email><![CDATA[jamesazar@substack.com]]></googleplay:email><googleplay:author><![CDATA[James Azar]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[May Patch Tuesday: Microsoft Patches 137 Flaws With No Active Zero-Days, Nitrogen Ransomware Hits Foxconn, Mini Shai-Hulud Compromises 170+ TanStack Mistral UiPath Packages ]]></title><description><![CDATA[Patch Tuesday: 137 Microsoft Fixes | Foxconn Hit by Nitrogen Ransomware | Shai-Hulud Worm Hits 170+ Packages | Instructor Pays Ransom, Congress Investigates | AI Layoffs Hit Cloudflare]]></description><link>https://www.cyberhubpodcast.com/p/may-patch-tuesday-microsoft-patches</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/may-patch-tuesday-microsoft-patches</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Wed, 13 May 2026 13:30:29 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/197441346/fadf2ff6fe25f9e47fe6963f135e08bc.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<h1>&#9749; <strong>Good Morning Security Gang,</strong></h1><p>Today&#8217;s episode felt like the cybersecurity equivalent of getting hit by a freight train moving at AI speed.</p><p>Patch Tuesday dropped like a bomb across the industry. At the same time, ShinyHunters forced Instructor into paying ransom during finals week chaos, Foxconn got hit by the Nitrogen ransomware gang, the Shai-Hulud supply chain worm bypassed modern provenance protections, and multiple major companies openly admitted AI is replacing jobs in cybersecurity and engineering.</p><div class="callout-block" data-callout="true"><p><strong>&#128073; The theme today is uncomfortable but unavoidable:<br>Every layer of modern enterprise operations is under simultaneous pressure, technical, operational, workforce, and strategic.</strong></p></div><p>Double espresso in hand, let&#8217;s dive in.</p><h1>&#129517; <strong>Executive Summary</strong></h1><p>Today&#8217;s threat landscape highlights the convergence of accelerated exploitation, supply chain compromise, operational disruption, and workforce transformation driven by AI. Organizations are no longer facing isolated cyber incidents, they are confronting simultaneous attacks across infrastructure, software supply chains, identity systems, manufacturing operations, and governance frameworks.</p><p>At the same time, the industry itself is being reshaped by AI adoption, with companies reducing workforce headcount while relying more heavily on automation and AI-driven tooling. The result is a cybersecurity environment where the pace of threats is increasing while the operational models defending against them are fundamentally changing in real time.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NOVE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4936282e-00d1-4085-92d0-645158e6327a_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NOVE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4936282e-00d1-4085-92d0-645158e6327a_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!NOVE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4936282e-00d1-4085-92d0-645158e6327a_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!NOVE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4936282e-00d1-4085-92d0-645158e6327a_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!NOVE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4936282e-00d1-4085-92d0-645158e6327a_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NOVE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4936282e-00d1-4085-92d0-645158e6327a_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4936282e-00d1-4085-92d0-645158e6327a_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1493129,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/197441346?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4936282e-00d1-4085-92d0-645158e6327a_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NOVE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4936282e-00d1-4085-92d0-645158e6327a_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!NOVE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4936282e-00d1-4085-92d0-645158e6327a_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!NOVE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4936282e-00d1-4085-92d0-645158e6327a_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!NOVE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4936282e-00d1-4085-92d0-645158e6327a_1280x720.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>&#128240; <strong>Top Stories &amp; Deep Dive Analysis</strong></h1><h2>&#127891; <strong>Instructor Pays ShinyHunters &#8211; Congress Launches Investigation</strong></h2><p>Instructor, the company behind Canvas LMS, reportedly paid an undisclosed ransom to ShinyHunters after the group breached the platform twice within a two-week span.</p><p>The first breach involved the theft of data tied to approximately 9,000 institutions. The second attack escalated into mass portal defacements during finals week, disrupting access for millions of students and placing enormous operational pressure on universities already struggling to recover.</p><p>The situation has now moved beyond cybersecurity and into regulatory territory. House Homeland Security Committee Chairman Andrew Garbarino formally demanded a briefing from Instructor, citing serious concerns over the company&#8217;s remediation efforts and overall incident response posture.</p><p>The broader issue here is that paying ransom does not restore trust. Instructor claims the stolen data was returned and deleted, but neither Congress nor the cybersecurity community views attacker promises as a valid control mechanism. The fallout here will likely shape future regulatory expectations around SaaS breach handling and higher education cyber resilience.</p><h2>&#127981; <strong>Foxconn Hit by Nitrogen Ransomware &#8211; OT and Supply Chain Collide</strong></h2><p>Foxconn confirmed a ransomware attack impacting portions of its North American factory network, with the Nitrogen ransomware group claiming responsibility and alleging theft of eight terabytes of sensitive data.</p><p>According to reports, systems inside Foxconn facilities failed, Wi-Fi services collapsed, and employees were forced to continue operations manually using pen and paper while production disruptions unfolded.</p><p>The potential implications here are enormous. Foxconn is not just another manufacturer, it is one of the world&#8217;s most critical electronics supply chain hubs, supporting companies like Apple, Microsoft, Google, and Cisco.</p><p>This is a textbook example of OT and IT convergence risk. Modern manufacturing environments depend heavily on interconnected systems, meaning ransomware no longer just impacts data, it impacts production continuity, operational safety, intellectual property, and downstream customer ecosystems simultaneously.</p><h2>&#129516; <strong>Shai-Hulud Supply Chain Worm Evolves &#8211; Provenance Protections Bypassed</strong></h2><p>The Shai-Hulud supply chain campaign escalated dramatically this week, spreading malicious packages across npm and PyPI ecosystems through over 170 compromised packages and more than 400 malicious versions.</p><p>What makes this attack particularly significant is that the malicious packages shipped with valid provenance attestations and legitimate Sigstore signatures, bypassing modern supply chain integrity protections many organizations have spent years implementing.</p><blockquote><p><em>"The Shai-Hulud supply chain worm shipped with valid SLSA Build Level 3 attestations and legitimate Sigstore signatures&#8212;defeating the supply chain integrity controls the community has been investing in for over two years. If any developer ran npm install against @tanstack or Mistral AI packages on May 11, treat that CI/CD environment as fully compromised. Rotate every secret immediately." James Azar</em></p></blockquote><p>Attackers exploited weaknesses in GitHub Actions workflows, cache poisoning vulnerabilities, and OIDC token extraction from runner memory to distribute the malware rapidly across ecosystems connected to TanStack, Mistral AI, UiPath, and others.</p><p>This marks a major turning point in supply chain security. The industry&#8217;s trust assumptions around signed packages and provenance validation have now been challenged directly. Organizations can no longer assume that cryptographic trust alone guarantees software integrity.</p><h1>&#129657; <strong>Patch Tuesday &#8211; The Industry&#8217;s Monthly Stress Test</strong></h1><p>This month&#8217;s Patch Tuesday was enormous, spanning Microsoft, Apple, Adobe, SAP, Fortinet, and Ivanti. And while Microsoft finally broke its 22-month streak of actively exploited zero-days, the operational burden remains staggering.</p><h3>&#129695; <strong>Microsoft &#8211; 137 CVEs Patched</strong></h3><p>Microsoft released fixes for 137 vulnerabilities, including 17 critical flaws. The highest-priority issues involve:</p><ul><li><p>Windows DNS Client Remote Code Execution</p></li><li><p>Netlogon RCE impacting authentication infrastructure</p></li><li><p>Explorer Preview Pane RCE requiring no double-click interaction</p></li></ul><p><strong>CVE-2026-41096 - </strong>Windows DNS Client RCE</p><p><strong>CVE-2026-41089 - </strong>NetLogon RCE (unauthenticated/low-priv &#8594; auth stack)</p><p>The risk here centers around authentication infrastructure and name resolution services, core systems attackers routinely target for rapid lateral movement. Domain controllers and DNS services should remain top patching priorities across enterprise environments.</p><h3>&#127822; <strong>Apple &#8211; Over 60 iOS &amp; 80 macOS Vulnerabilities</strong></h3><p>Apple patched more than 60 vulnerabilities in iOS and over 80 in macOS Tahoe, including:</p><ul><li><p>WebKit flaws</p></li><li><p>Sandbox escapes</p></li><li><p>Privilege escalation vulnerabilities</p></li><li><p>Gatekeeper bypasses</p></li></ul><p>WebKit continues to represent a major attack surface because nearly every application leveraging embedded browser functionality inherits the risk. This reinforces how browsers and mobile ecosystems remain foundational exposure points in modern enterprise environments.</p><p><strong>iOS/iPadOS 26.5</strong> | 60+ CVEs including 20 WebKit flaws <strong>macOS Tahoe 26.5</strong> | ~80 vulnerabilities including root privilege escalation, sandbox escape, Gatekeeper bypass <strong>Legacy:</strong> Sequoia 15.7.7 and Sonoma 14.8.7 also updated</p><h3>&#127912; <strong>Adobe &#8211; 52 Vulnerabilities Across Critical Products</strong></h3><p>Adobe addressed 52 vulnerabilities across ten products, including highly severe flaws in Adobe Connect and Adobe Commerce.</p><ul><li><p><strong>CVE-2026-34659:</strong> Adobe Connect RCE (CVSS 9.6)</p></li><li><p><strong>CVE-2026-34660:</strong> Adobe Connect privilege escalation (CVSS 9.3)</p></li></ul><p>The concern here is speed. Adobe vulnerabilities tend to be weaponized quickly once public disclosures occur, particularly within collaboration and commerce platforms that frequently sit internet-facing inside enterprise environments.</p><h3>&#127970; <strong>SAP &#8211; Authentication Bypass and ERP Exposure</strong></h3><p>SAP patched two critical vulnerabilities affecting SAP Commerce Cloud and S/4HANA environments, including an authentication bypass capable of leading directly to server-side code execution.</p><ul><li><p><strong>CVE-2026-34260:</strong> SQL injection in S/4HANA (missing input validation, exfiltrate financial/procurement data)</p></li><li><p><strong>CVE-2026-34263:</strong> Authentication bypass in SAP Commerce Cloud (improper Spring security config, no credentials required, arbitrary server-side code execution)</p></li></ul><p>ERP environments continue to attract ransomware groups because they provide direct access to financial systems, procurement workflows, and sensitive operational data. Organizations with internet-exposed SAP infrastructure should already be treating these patches as emergency-level priorities.</p><h3>&#128737;&#65039; <strong>Fortinet &#8211; Public PoC Already Circulating</strong></h3><p>Fortinet disclosed critical unauthenticated RCE vulnerabilities affecting FortiSandbox and FortiAuthenticator, with proof-of-concept exploit code already publicly circulating.</p><ul><li><p><strong>CVE-2026-39808, CVE-2026-39813:</strong> Unauthenticated RCE in FortiSandbox</p></li><li><p><strong>CVE-2026-44277:</strong> FortiAuthenticator vulnerability</p></li></ul><p><strong>URGENCY ESCALATOR:</strong> Public PoC for CVE-2026-39808 is <strong>already circulating.</strong></p><p>This matters because compromising a malware analysis platform or MFA infrastructure directly undermines trust in downstream defensive operations. Once again, attackers are targeting the systems defenders rely on most.</p><h3>&#128293; <strong>Ivanti &#8211; Still the Gift That Keeps Giving</strong></h3><p>Ivanti released seven new CVEs affecting Endpoint Manager and other products, including SQL injection vulnerabilities capable of enabling remote code execution.</p><p><strong>Flag immediately:</strong> CVE-2026-42212 &#8212; SQL injection to RCE in EPM</p><p>At this point, Ivanti vulnerabilities have become almost synonymous with persistent exploitation campaigns. What stood out, however, was Ivanti acknowledging that AI-assisted red team tooling identified vulnerabilities traditional security scanning methods missed entirely.</p><p>That&#8217;s a signal the rest of the industry should pay attention to carefully.</p><h2>&#127976; <strong>BWH Hotels Breach &#8211; Six Months of Guest Reservation Access</strong></h2><p>BWH Hotels, parent company of Best Western, disclosed that attackers maintained persistent access to a reservation application for approximately six months.</p><p>The exposed information included:</p><ul><li><p>Names</p></li><li><p>Email addresses</p></li><li><p>Home addresses</p></li><li><p>Reservation details</p></li><li><p>Travel dates</p></li><li><p>Special accommodation requests</p></li></ul><p>While payment data was reportedly unaffected, this type of information creates extremely rich social engineering datasets. Attackers can now craft phishing and fraud campaigns referencing real travel patterns and personal requests, dramatically increasing credibility and targeting effectiveness.</p><h2>&#127974; <strong>Community Bank Self-Reports AI Data Exposure to the SEC</strong></h2><p>Community Bank disclosed to the SEC that an employee used an unauthorized AI chatbot tool that exposed customer data including names, dates of birth, and Social Security numbers.</p><p>This may become one of the first major examples of &#8220;shadow AI&#8221; evolving into a formal regulatory disclosure event.</p><p>The key issue here is governance. Employees are already integrating AI tools into workflows faster than organizations can create policies or controls to manage them. Without strong DLP enforcement and AI governance frameworks, this type of incident will become increasingly common.</p><h2>&#129302; <strong>Cloudflare and Arctic Wolf Layoffs &#8211; AI Reshapes Cybersecurity Jobs</strong></h2><p>Cloudflare cut approximately 1,100 employees while Arctic Wolf reduced staffing by 250 positions, both explicitly citing increased AI adoption and operational automation.</p><p>This represents a major strategic shift inside the cybersecurity industry itself. AI is no longer just augmenting operations, it&#8217;s actively reshaping workforce models.</p><p>However, there&#8217;s still an important caveat. AI systems today still struggle with drift, hallucinations, context accuracy, and nuanced operational decision-making. Human expertise remains essential, especially in incident response, architecture, governance, and strategic security leadership.</p><p>The organizations that succeed in this transition will likely be the ones combining AI acceleration with skilled human oversight, not replacing one with the other entirely.</p><h1>&#127919; <strong>Key Takeaway</strong></h1><p>&#128073; <strong>Cybersecurity is no longer facing isolated incidents, it&#8217;s facing simultaneous pressure across infrastructure, software, workforce, and operational trust models.</strong></p><h1>&#128736;&#65039; <strong>Action Items for Security Leaders</strong></h1><ul><li><p>&#128272; Audit all Canvas-linked identity providers and enforce credential resets</p></li><li><p>&#127981; Review OT segmentation and production continuity plans in manufacturing environments</p></li><li><p>&#129516; Pin package versions and audit GitHub Actions workflows for supply chain exposure</p></li><li><p>&#129657; Prioritize DNS, Netlogon, SAP Commerce, and Fortinet patches immediately</p></li><li><p>&#127822; Push Apple MDM updates across all managed endpoints</p></li><li><p>&#128737;&#65039; Isolate Fortinet and Ivanti management interfaces from internet exposure</p></li><li><p>&#127976; Increase monitoring for social engineering tied to hospitality reservation data</p></li><li><p>&#127974; Deploy DLP controls specifically targeting AI chatbot interactions</p></li><li><p>&#129302; Begin workforce planning around AI orchestration and security oversight skills</p></li><li><p>&#128269; Reevaluate assumptions around signed packages and software provenance validation</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/may-patch-tuesday-microsoft-patches/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/may-patch-tuesday-microsoft-patches/comments"><span>Leave a comment</span></a></p><h1>&#129504; <strong>James Azar&#8217;s CISOs Take</strong></h1><p>What stood out to me today is that every layer of the stack got hit simultaneously. Manufacturing operations, education systems, developer ecosystems, identity infrastructure, and even workforce models are all under pressure at the same time. The Foxconn attack shows how ransomware now impacts global production continuity, while the Shai-Hulud campaign demonstrates that even modern supply chain integrity controls are no longer enough on their own.</p><p>The second takeaway is that AI is rapidly changing both sides of cybersecurity. Attackers are leveraging automation and AI-assisted tooling to accelerate operations, while defenders and vendors are restructuring teams around AI adoption. But we&#8217;re still early in this transition. AI today is powerful, but it still requires strong human oversight to avoid hallucinations, operational drift, and strategic mistakes. The organizations that balance automation with experienced human judgment are going to be the ones best positioned moving forward.</p><p>&#128293; <strong>Stay Cyber Safe.</strong></p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/may-patch-tuesday-microsoft-patches?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/may-patch-tuesday-microsoft-patches?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/may-patch-tuesday-microsoft-patches?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[Google Detects First AI-Generated Zero-Day Exploit, New Dirty Frag Linux Vulnerability Gives Root on Every Major Distro, UK Water Company Had Hackers Lurking in Systems for Years ]]></title><description><![CDATA[Google AI Writes First Zero-Day Exploit, DirtyFrag Roots All Linux, UK Water Utility Hacked for 2 Years, Private Sector Launches Critical Infrastructure Alliance, Texas Sues Netflix for Surveillance]]></description><link>https://www.cyberhubpodcast.com/p/google-detects-first-ai-generated</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/google-detects-first-ai-generated</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Tue, 12 May 2026 13:31:03 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/197296050/945acb8ad575d4fdddd1b373b237a53e.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<h1>&#9749; <strong>Good Morning Security Gang,</strong></h1><p>Today&#8217;s show wasn&#8217;t just busy, it was one of those episodes where you can actually see the future of cybersecurity unfolding in real time.</p><p>We&#8217;ve got AI autonomously building a real-world exploit, a new Linux privilege escalation flaw already seeing signs of active exploitation, a backdoored security plugin sitting inside CI/CD pipelines, a compromised official software distribution site, and a UK water utility that let attackers sit inside their network for nearly two years unnoticed.</p><p>&#128073; The theme today is simple and brutal:<br><strong>The speed of attackers is now exceeding the operational maturity of most defenders.</strong></p><p>Double espresso in hand, let&#8217;s get into it.</p><h1>&#129517; <strong>Executive Summary</strong></h1><p>Today&#8217;s threat landscape reflects a dangerous acceleration in AI-assisted offensive operations, supply chain compromise, and critical infrastructure exposure. We are now seeing AI move from supporting attackers to independently discovering and weaponizing vulnerabilities, collapsing the traditional timelines defenders once relied on.</p><p>At the same time, supply chain attacks continue targeting trusted security tooling and software repositories, while operational failures in monitoring and visibility leave critical infrastructure environments dangerously exposed. The result is a cybersecurity environment where trust assumptions, detection gaps, and slow operational response are becoming the attacker&#8217;s biggest advantage.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!eUZ2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F092269b5-8287-4c35-a1ae-39e158d36d2d_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!eUZ2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F092269b5-8287-4c35-a1ae-39e158d36d2d_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!eUZ2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F092269b5-8287-4c35-a1ae-39e158d36d2d_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!eUZ2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F092269b5-8287-4c35-a1ae-39e158d36d2d_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!eUZ2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F092269b5-8287-4c35-a1ae-39e158d36d2d_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!eUZ2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F092269b5-8287-4c35-a1ae-39e158d36d2d_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/092269b5-8287-4c35-a1ae-39e158d36d2d_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:203553,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/197296050?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F092269b5-8287-4c35-a1ae-39e158d36d2d_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!eUZ2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F092269b5-8287-4c35-a1ae-39e158d36d2d_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!eUZ2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F092269b5-8287-4c35-a1ae-39e158d36d2d_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!eUZ2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F092269b5-8287-4c35-a1ae-39e158d36d2d_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!eUZ2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F092269b5-8287-4c35-a1ae-39e158d36d2d_1280x720.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>&#128240; <strong>Top Stories &amp; Deep Dive Analysis</strong></h1><h2>&#129302; <strong>Google&#8217;s Big Sleep AI Creates a Real Zero-Day Exploit</strong></h2><p>This story is a watershed moment for cybersecurity.</p><p>Google&#8217;s Project Zero &#8220;Big Sleep&#8221; AI system independently discovered a memory safety vulnerability and generated a functional exploit capable of real-world use&#8212;all without human-written exploit guidance. Google responsibly disclosed the issue before public release, but the implications are massive.</p><p>For years, defenders assumed there would always be a gap between vulnerability disclosure and widespread weaponization. That assumption is now gone. AI can compress the timeline from disclosure to exploit development down to near-zero.</p><p>This fundamentally changes vulnerability management. Security teams can no longer operate under the assumption that they have days or weeks to patch critical flaws. From this point forward, organizations must behave as if every disclosed CVE already has a working exploit available on day one.</p><h2>&#128039; <strong>DirtyFrag &#8211; Linux Privilege Escalation Joins the &#8220;Dirty&#8221; Family</strong></h2><p>A new Linux kernel privilege escalation vulnerability dubbed &#8220;DirtyFrag&#8221; has emerged, with signs of active exploitation already underway before broad patch adoption.</p><p>Like DirtyPipe and DirtyCow before it, DirtyFrag exploits low-level kernel memory handling flaws, allowing an unprivileged user to escalate directly to root access. This is particularly dangerous because attackers only need a small foothold, a phishing payload, compromised account, or web shell&#8212;to leverage the vulnerability and gain full control.</p><p>Linux remains the backbone of cloud infrastructure, Kubernetes environments, and critical systems globally. That means exploitation here doesn&#8217;t just impact endpoints, it impacts entire production environments.</p><p>The biggest lesson is one we keep repeating: local privilege escalation flaws become devastating when combined with even minor initial access.</p><h2>&#128274; <strong>Checkmarx Jenkins Plugin Backdoored &#8211; Security Tools Become the Attack Path</strong></h2><p>The irony here is almost painful.</p><p>A malicious actor compromised the Checkmarx Jenkins AST plugin, a tool organizations specifically use to detect vulnerabilities inside CI/CD pipelines. The attacker inserted malicious code into the plugin itself, creating a foothold inside build environments trusted to secure production code.</p><p>This is one of the highest-leverage attacks possible in modern software development. Compromising a security tool means inheriting the trust organizations automatically extend to that platform.</p><p>The risk extends far beyond the plugin. Build secrets, signing keys, source code, and deployment artifacts may all have been exposed. Any organization using the compromised plugin should assume its CI/CD pipeline integrity has been questioned until proven otherwise.</p><h2>&#128187; <strong>JDownloader Official Site Hacked &#8211; Trusted Downloads Become Malware</strong></h2><p>The official JDownloader website was compromised, with attackers replacing legitimate installers with trojanized versions containing a Python-based remote access Trojan.</p><p>Users who downloaded or updated the software during the compromise window unknowingly installed malware capable of:</p><ul><li><p>Credential harvesting</p></li><li><p>Keylogging</p></li><li><p>Remote shell access</p></li><li><p>Persistent backdoor installation</p></li></ul><p>This attack highlights a growing trend where attackers no longer rely on third-party mirrors or fake sites, they compromise the official distribution source directly.</p><p>That creates a dangerous reality: security awareness guidance telling users to &#8220;only download from the official source&#8221; is no longer sufficient by itself.</p><h2>&#127891; <strong>Canvas API Exploit Confirmed &#8211; 9,000 School Portals Defaced</strong></h2><p>Instructor confirmed that attackers exploited a vulnerability in the Canvas LMS portal customization API, allowing them to bypass authentication controls and deface portals across approximately 9,000 schools and universities.</p><p>This attack was not just about vandalism. It was a coordinated dual-track operation:</p><ul><li><p>One track focused on stealing roughly 275 million records</p></li><li><p>The second targeted operational disruption through portal defacement and authentication failures</p></li></ul><p>The operational impact was enormous. Universities canceled finals, students lost access to systems, and proctoring platforms went offline during the busiest period of the academic year.</p><p>This is a prime example of attackers maximizing leverage by combining data theft with operational chaos.</p><h2>&#128167; <strong>UK Water Utility Breach &#8211; Attackers Sat Undetected for Two Years</strong></h2><p>South Staffordshire Water, serving 1.6 million people in the UK, was fined after attackers remained undetected inside its environment for nearly two years.</p><p>Initial access came through a phishing email in 2020. Attackers later exploited the well-known Zerologon vulnerability, left unpatched on critical domain controllers&#8212;to move laterally through the environment.</p><p>The most alarming detail? The organization&#8217;s SOC was reportedly monitoring only 5% of the environment.</p><blockquote><p><em>&#8220;If your SOC can only see five percent of your environment, attackers already know where to hide.&#8221;</em></p></blockquote><p>This story perfectly captures the danger of incomplete visibility. Organizations often believe they are protected because they have monitoring in place, but partial coverage creates blind spots attackers can exploit indefinitely.</p><p>And once again, water infrastructure emerges as a recurring target globally.</p><h2>&#127981; <strong>Private Sector Critical Infrastructure Alliance Forms</strong></h2><p>JP Morgan, AT&amp;T, MasterCard, and Berkshire Hathaway Energy formally launched the Alliance for Critical Infrastructure, designed to fill coordination gaps left by staffing reductions and restructuring within CISA.</p><p>The alliance focuses on:</p><ul><li><p>Cross-sector dependency mapping</p></li><li><p>Poly-crisis response planning</p></li><li><p>Threat intelligence coordination</p></li><li><p>Policy collaboration</p></li></ul><p>This is a significant moment because it reflects the private sector recognizing that critical infrastructure resilience can no longer rely solely on government coordination. Organizations are increasingly being forced to self-organize around shared cyber risk.</p><h2>&#129706; <strong>SailPoint GitHub Repository Breach &#8211; Identity Platforms Become Targets</strong></h2><p>SailPoint disclosed a breach affecting one of its GitHub repositories, potentially exposing source code and integration secrets tied to enterprise identity governance deployments.</p><p>This matters because identity platforms sit at the center of enterprise trust. Understanding how privilege assignment, API integrations, and role management operate gives attackers a roadmap for targeting downstream customer environments.</p><p>This reinforces a broader trend: attackers increasingly target the vendors responsible for trust and security enforcement, because compromising them provides leverage across thousands of organizations simultaneously.</p><h2>&#128250; <strong>Texas Sues Netflix &#8211; Privacy and Data Collection Under Fire</strong></h2><p>Texas Attorney General Ken Paxton filed suit against Netflix, alleging the company collected and monetized massive amounts of behavioral data without proper user consent.</p><p>According to the complaint, Netflix collected up to five petabytes of user behavior data daily while allegedly sharing information with advertisers and data brokers.</p><p>What makes this particularly important is the regulatory signal. States are increasingly stepping in where federal privacy legislation has stalled, creating a patchwork enforcement environment organizations must navigate carefully.</p><p>Privacy is no longer just a compliance issue, it&#8217;s becoming a direct cybersecurity and reputational risk factor.</p><h1>&#127919; <strong>Key Takeaway</strong></h1><p>&#128073; <strong>AI acceleration, supply chain compromise, and visibility gaps are redefining modern cyber risk faster than most organizations can adapt.</strong></p><h1>&#128736;&#65039; <strong>Action Items for Security Leaders</strong></h1><ul><li><p>&#128272; Treat newly disclosed vulnerabilities as immediately exploitable</p></li><li><p>&#128039; Patch Linux systems vulnerable to DirtyFrag and monitor privilege escalation activity</p></li><li><p>&#128274; Audit Jenkins plugins and rotate all CI/CD secrets tied to compromised environments</p></li><li><p>&#128187; Validate software hashes and monitor official distribution channels for tampering</p></li><li><p>&#127891; Review Canvas API access logs and confirm emergency patches are applied</p></li><li><p>&#128167; Expand SOC visibility and logging coverage across critical infrastructure environments</p></li><li><p>&#127981; Participate in cross-sector resilience and threat intelligence initiatives</p></li><li><p>&#129706; Rotate SailPoint integration tokens and audit API activity</p></li><li><p>&#128250; Review organizational privacy policies against actual data collection practices</p></li><li><p>&#128269; Design detection strategies assuming AI-assisted attackers are already operational</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/google-detects-first-ai-generated/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/google-detects-first-ai-generated/comments"><span>Leave a comment</span></a></p><h1>&#129504; <strong>James Azar&#8217;s CISOs Take</strong></h1><p>What stood out to me today is that the future we&#8217;ve been discussing theoretically is now operational reality. AI isn&#8217;t just helping attackers write phishing emails anymore, it&#8217;s autonomously discovering and weaponizing vulnerabilities. That fundamentally changes the game because it removes the human bottleneck from exploit development. Security teams that still operate on old vulnerability management timelines are going to struggle badly in this new environment.</p><p>The second takeaway is visibility. The UK water utility breach is a perfect example of how incomplete monitoring creates false confidence. A SOC monitoring five percent of the environment is not protection, it&#8217;s theater. Organizations need to stop assuming partial visibility is good enough. Because attackers only need one blind spot, and today&#8217;s threat actors are patient enough to sit inside those gaps for years.</p><p>&#128293; <strong>Stay Cyber Safe.</strong></p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/google-detects-first-ai-generated?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/google-detects-first-ai-generated?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/google-detects-first-ai-generated?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[Ivanti Patches EPMM Zero-Day Exploited in Targeted Attacks, Dragos Reveals Hackers Used Claude AI to Target OT Assets, Poland Reports ICS Breaches at Five Water Treatment ]]></title><description><![CDATA[Claude AI Weaponized to Breach Mexican Water Utility SCADA Systems, Poland Discloses Five Water Treatment Plants Suffered Simultaneous ICS Breaches, Ivanti EPMM Zero-Day Actively Exploited]]></description><link>https://www.cyberhubpodcast.com/p/ivanti-patches-epmm-zero-day-exploited</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/ivanti-patches-epmm-zero-day-exploited</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Mon, 11 May 2026 13:31:30 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/197139756/eee895db57d65953de5e66ca47d0b3cd.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<h1>&#9749; <strong>Good Morning Security Gang,</strong></h1><p>Today&#8217;s show is one of those episodes where every story connects into a much bigger picture AI-assisted attacks, operational technology under siege, SaaS collapse during finals week, and insider threats proving once again that trust can be weaponized.</p><p>And if there&#8217;s one message from today&#8217;s show, it&#8217;s this:<br>&#128073; <strong>The barriers to executing sophisticated cyber operations are collapsing.</strong></p><p>Double espresso in hand, let&#8217;s get into it.</p><h1>&#129517; <strong>Executive Summary</strong></h1><p>Today&#8217;s threat landscape reflects the convergence of AI-assisted offensive operations, ICS targeting, SaaS operational failures, and relentless supply chain compromise. Attackers are leveraging frontier AI models not just for phishing, but for operational planning, lateral movement, and infrastructure targeting.</p><p>Meanwhile, critical infrastructure systems, especially water utilities are seeing increased attention from adversaries, while organizations continue struggling with identity management, vendor trust, and operational resilience. The environment is evolving from isolated attacks into interconnected campaigns where IT, OT, AI, and human behavior all overlap.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kU7w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf3bd464-44c2-4fbf-a835-9e029f2a9a50_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kU7w!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf3bd464-44c2-4fbf-a835-9e029f2a9a50_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!kU7w!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf3bd464-44c2-4fbf-a835-9e029f2a9a50_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!kU7w!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf3bd464-44c2-4fbf-a835-9e029f2a9a50_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!kU7w!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf3bd464-44c2-4fbf-a835-9e029f2a9a50_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kU7w!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf3bd464-44c2-4fbf-a835-9e029f2a9a50_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/df3bd464-44c2-4fbf-a835-9e029f2a9a50_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:198719,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/197139756?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf3bd464-44c2-4fbf-a835-9e029f2a9a50_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!kU7w!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf3bd464-44c2-4fbf-a835-9e029f2a9a50_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!kU7w!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf3bd464-44c2-4fbf-a835-9e029f2a9a50_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!kU7w!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf3bd464-44c2-4fbf-a835-9e029f2a9a50_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!kU7w!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf3bd464-44c2-4fbf-a835-9e029f2a9a50_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>&#128240; <strong>Top Stories &amp; Deep Dive Analysis</strong></h1><h2>&#129302; <strong>Claude AI Used to Penetrate a Water Utility ICS Environment</strong></h2><p>This may be one of the most important cybersecurity stories of the year.</p><p>A threat actor used Anthropic&#8217;s Claude AI as an operational planning assistant to compromise a Mexican water utility&#8217;s ICS environment. Claude was reportedly leveraged to map network architecture, craft phishing lures for plant operators, and assist in building lateral movement strategies that ultimately enabled access to SCADA systems controlling water operations.</p><p>This changes the AI conversation dramatically. We&#8217;ve spent years discussing prompt injection and AI abuse defensively, but now we are seeing frontier AI models becoming force multipliers for attackers, significantly lowering the skill barrier for sophisticated operations.</p><p>The real concern isn&#8217;t just this incident, it&#8217;s what comes next. AI-assisted offensive capability means smaller threat groups can now execute operations previously reserved for highly advanced actors. For defenders, this means OT tabletop exercises and threat models must now assume adversaries are AI-augmented by default.</p><div class="callout-block" data-callout="true"><p><em>"A threat actor leveraged Claude AI to map the target's network architecture, craft phishing lures tailored to plant operators, and developed the lateral movement playbook that gave them access to SCADA controls. The skill gap between a nation-state actor and a capable but less experienced threat group is narrowing dramatically. When Claude can fill in those gaps, you introduce a risk where defenders now need to model adversarial use of frontier AI as an attacker force multiplier against their OT and IT systems." James Azar</em></p></div><h2>&#128167; <strong>Poland Water Facilities Breached &#8211; ICS Intrusions Escalate</strong></h2><p>Poland&#8217;s ABW National Security Agency disclosed that five water treatment facilities experienced simultaneous ICS intrusions, with attackers gaining direct access to SCADA systems controlling water quality and distribution operations.</p><p>No contamination occurred, but the operational access itself is deeply concerning. When paired with the Mexico incident, this highlights a clear and growing pattern: water infrastructure is becoming a high-priority target globally.</p><p>The attacks reportedly blended traditional IT compromise techniques with OT targeting methods, further reinforcing that the line between IT and operational environments has effectively disappeared. Organizations running industrial systems should view this as a wake-up call, visibility at the IT/OT boundary is no longer optional.</p><h2>&#128293; <strong>Ivanti EPMM Zero-Day &#8211; Exploitation Continues</strong></h2><p>Yes, it&#8217;s Ivanti again.</p><p>CISA added another Ivanti EPMM vulnerability to the KEV catalog after confirming active exploitation in the wild. The flaw allows attackers to compromise mobile device management infrastructure, potentially granting access to managed devices and creating a direct lateral movement pathway into enterprise environments.</p><p>At this point, Ivanti vulnerabilities have become a recurring operational problem for security teams. The risk isn&#8217;t just the vulnerability itself, it&#8217;s the role EPMM plays in managing identities, devices, certificates, and trust relationships across organizations.</p><p>If your EPMM platform is compromised, attackers may effectively inherit enterprise mobility control.</p><h2>&#127891; <strong>Canvas Fallout Deepens &#8211; Universities Forced to Reschedule Finals</strong></h2><p>The Canvas breach is evolving from a data exposure incident into a full operational crisis for universities worldwide.</p><p>Multiple institutions are now cancelling or rescheduling final exams due to authentication instability, unavailable student portals, broken assignment systems, and offline proctoring services.</p><p>This demonstrates a critical reality many organizations underestimate: the operational impact of a SaaS breach often exceeds the original data theft itself.</p><p>ShinyHunters appears to understand this perfectly. The timing during finals week dramatically increases institutional pressure, likely improving the attackers&#8217; leverage during extortion negotiations.</p><h2>&#127760; <strong>cPanel &amp; WHM Vulnerabilities &#8211; Hosting Ecosystems at Risk</strong></h2><p>Three newly disclosed vulnerabilities in cPanel and WHM include privilege escalation, arbitrary file read, and cross-site scripting issues capable of enabling administrator account compromise.</p><p>Because cPanel manages DNS, email, SSL certificates, and websites for millions of hosting environments, exploitation could allow attackers to pivot across entire hosting ecosystems.</p><p>This reinforces an ongoing pattern: attackers increasingly target management platforms rather than endpoints, because compromising the control layer gives access to everything downstream.</p><h2>&#129516; <strong>Fake OpenAI Repository on Hugging Face Distributes Malware</strong></h2><p>A malicious repository impersonating OpenAI on Hugging Face silently distributed infostealer malware to AI developers downloading what appeared to be legitimate model files.</p><p>The malware harvested:</p><ul><li><p>API keys</p></li><li><p>Browser credentials</p></li><li><p>System information</p></li></ul><p>Hugging Face is quickly becoming the AI equivalent of npm or PyPI, a massive open ecosystem increasingly targeted by supply chain attackers.</p><p>This is another example of AI infrastructure inheriting the same trust and dependency risks we&#8217;ve already seen devastate software supply chains.</p><h2>&#127918; <strong>NVIDIA GeForce Breach &#8211; Gaming Credentials Become Enterprise Risk</strong></h2><p>NVIDIA confirmed a GeForce platform breach involving usernames, email addresses, and hashed credentials.</p><p>This matters because gaming account credentials are frequently reused across enterprise environments, VPN portals, and SaaS platforms. Threat actors know this and routinely test compromised gaming credentials against corporate services.</p><p>The lesson remains painfully consistent: credential reuse turns consumer breaches into enterprise incidents.</p><h2>&#128717;&#65039; <strong>Zara Owner Inditex Breach &#8211; Retail Data Fuels Phishing</strong></h2><p>Inditex, the parent company of Zara, disclosed a breach impacting approximately 197,000 customers, exposing names, shipping addresses, contact information, and purchase histories.</p><p>This type of data is gold for attackers because it enables highly personalized phishing and fraud campaigns referencing real purchases and legitimate order history.</p><p>Retail breaches are no longer just about stolen payment cards, they are now about social engineering at scale using behavioral and transactional data.</p><h2>&#127761; <strong>Dark Web Marketplace Shut Down &#8211; Crime Networks Continue to Adapt</strong></h2><p>Law enforcement dismantled the &#8220;Crime Network&#8221; dark web marketplace and arrested its administrator. The platform facilitated credential sales, initial access brokerage, and cybercrime-as-a-service operations.</p><p>However, history tells us these takedowns rarely end operations permanently. These groups rebrand, migrate infrastructure, and return quickly.</p><p>This highlights how cybercrime has evolved into a resilient underground economy, not isolated criminal activity.</p><h2>&#129489;&#8205;&#128187; <strong>Former Contractor Convicted for Wiping Federal Databases</strong></h2><p>A former government contractor was convicted after deliberately wiping dozens of federal databases in retaliation over a contract dispute.</p><p>The contractor retained privileged access after the engagement ended and used that access to systematically destroy records, some permanently.</p><p>This is one of the clearest examples of why offboarding and privileged access management matter. The insider threat isn&#8217;t hypothetical&#8212;it&#8217;s operational and extremely damaging when controls fail.</p><h1>&#127919; <strong>Key Takeaway</strong></h1><p>&#128073; <strong>AI-assisted attacks, OT targeting, and trust abuse are converging into a single operational threat model.</strong></p><div class="pullquote"><p>"A single thread ties them all together: the infrastructure we depend on most is being attacked from every angle simultaneously, and AI has entered the adversary toolkit in ways that aren't theoretical anymore. The Claude-assisted water utility intrusion and the five Polish plant SCADA breaches tell the same story in two languages, water sector OT is a soft target, adversaries know it, and they're trying to take advantage of it." James Azar</p></div><h1>&#128736;&#65039; <strong>Action Items for Security Leaders</strong></h1><ul><li><p>&#128272; Review OT and ICS segmentation immediately, especially in water infrastructure</p></li><li><p>&#129302; Incorporate AI-assisted adversary scenarios into tabletop exercises</p></li><li><p>&#128293; Patch Ivanti EPMM systems and isolate management interfaces from direct internet access</p></li><li><p>&#127891; Build out-of-band operational continuity plans for SaaS outages</p></li><li><p>&#127760; Patch cPanel/WHM systems and review admin access logs</p></li><li><p>&#129516; Verify AI model repositories using cryptographic checksums and signed sources</p></li><li><p>&#127918; Reset passwords for users impacted by the NVIDIA GeForce breach</p></li><li><p>&#128717;&#65039; Increase awareness training around personalized phishing campaigns</p></li><li><p>&#127761; Monitor dark web intelligence feeds for organizational exposure</p></li><li><p>&#129489;&#8205;&#128187; Audit privileged access lifecycle management and contractor offboarding processes</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/ivanti-patches-epmm-zero-day-exploited/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/ivanti-patches-epmm-zero-day-exploited/comments"><span>Leave a comment</span></a></p><h1>&#129504; <strong>James Azar&#8217;s CISOs Take</strong></h1><p>What stood out to me today is how AI has officially crossed the line from experimental risk into operational reality. The Claude-assisted intrusion into a water utility is the moment many of us feared was coming. Not because AI itself is malicious, but because it dramatically accelerates attacker capability. We&#8217;re no longer dealing with isolated hackers, we&#8217;re dealing with attackers amplified by machine-speed intelligence.</p><p>The second takeaway is the fragility of our operational dependencies. Whether it&#8217;s Canvas collapsing during finals week or OT systems being probed globally, we are seeing how deeply interconnected everything has become. Security leaders need to think beyond prevention and focus on resilience, continuity, and visibility. Because in today&#8217;s environment, disruption is not a possibility, it&#8217;s an expectation.</p><p>&#128293; <strong>Stay Cyber Safe.</strong></p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/ivanti-patches-epmm-zero-day-exploited?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/ivanti-patches-epmm-zero-day-exploited?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/ivanti-patches-epmm-zero-day-exploited?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[This Week in Cybersecurity #51]]></title><description><![CDATA[Orchestration Over Exploitation: When Attackers Stop Breaking Systems and Start Running Them. Your weekend catch-up on the most critical cybersecurity stories of the week, curated by James Azar]]></description><link>https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-51</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-51</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Fri, 08 May 2026 15:01:25 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Pscl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fe39e9d-6197-4bd7-8b53-a84bd9651d37_1920x1080.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3><strong>Good Morning, Security Gang!</strong></h3><p>Double espresso poured. The baby is asleep. And this week&#8217;s threat landscape is anything but quiet.</p><div class="pullquote"><p>James opened the week with a line that captures everything that followed: <em>&#8220;Today&#8217;s through line is ecosystem trust under assault on every axis, all happening simultaneously.&#8221;</em> </p></div><p>He was right. An AI training library millions depend on became a credential-stealing worm. A security vendor had its source code accessed. A trusted incident responder was the attacker in two documented cases. A nine-year-old Linux root escalation hit the CISA KEV catalog. Forty-four thousand cPanel servers were locked by ransomware. China ran multi-continent espionage. And an AI-powered phishing platform turned MFA into security theater.</p><p>By week&#8217;s end, the picture had sharpened further. A Palo Alto PAN-OS zero-day with no patch available granted root access to network defenders&#8217; crown jewels. The Canvas platform was drained of 280 million records not through a vulnerability, but through legitimate API abuse. CISA launched a new initiative telling critical infrastructure operators to prepare to run completely isolated from vendors and cloud providers. MuddyWater ran a false flag ransomware operation designed not to encrypt data, but to manipulate the incident responders sent to stop it. And the DOJ sentencing of a ransomware negotiator revealed that Conti, Akira, Royal, and other seemingly independent groups are effectively one coordinated enterprise operating under multiple brands.</p><p>This week&#8217;s four episodes converge on a single, uncomfortable conclusion: attackers have graduated from exploitation to orchestration. They are not just breaking into systems. They are operating them using legitimate tools, trusted credentials, authorized APIs, and valid code-signing certificates to achieve outcomes that leave defenders looking at clean logs while the damage compounds.</p><p>Coffee cup cheers. Let&#8217;s get into it.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Pscl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fe39e9d-6197-4bd7-8b53-a84bd9651d37_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Pscl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fe39e9d-6197-4bd7-8b53-a84bd9651d37_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!Pscl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fe39e9d-6197-4bd7-8b53-a84bd9651d37_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!Pscl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fe39e9d-6197-4bd7-8b53-a84bd9651d37_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!Pscl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fe39e9d-6197-4bd7-8b53-a84bd9651d37_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Pscl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fe39e9d-6197-4bd7-8b53-a84bd9651d37_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1fe39e9d-6197-4bd7-8b53-a84bd9651d37_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1086815,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/196830159?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fe39e9d-6197-4bd7-8b53-a84bd9651d37_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Pscl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fe39e9d-6197-4bd7-8b53-a84bd9651d37_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!Pscl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fe39e9d-6197-4bd7-8b53-a84bd9651d37_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!Pscl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fe39e9d-6197-4bd7-8b53-a84bd9651d37_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!Pscl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fe39e9d-6197-4bd7-8b53-a84bd9651d37_1920x1080.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>&#127760; Geopolitical &amp; Nation-State Threats</strong></h3><p><strong>China&#8217;s ShadowPad Campaign: Multi-Continent Espionage Across Government and Defense</strong></p><p>A China-aligned threat group conducted a widespread espionage campaign targeting government and defense sectors across Asia and into Europe. The attackers exploited known vulnerabilities in Microsoft Exchange and IIS, deployed web shells for long-term persistence, and used ShadowPad malware as their primary intelligence collection tool. The campaign combined technical infrastructure compromise with targeted phishing of civil society groups building both system access and human intelligence simultaneously. This dual approach is a hallmark of mature nation-state operations: technical access provides the data, human targeting provides the context.</p><p><strong>North Korea&#8217;s BirdCall Android Backdoor: Mobile Espionage Toolkit</strong></p><p>North Korea&#8217;s ScarCruft group embedded a new Android variant of BirdCall malware into a compromised gaming platform targeting ethnic Koreans in China. This is not basic spyware it is a full surveillance toolkit collecting contacts, messages, call logs, media files, audio recordings, and screenshots that capture private keys and sensitive data. The targeting specificity reflects a broader shift toward cross-platform espionage, where mobile and desktop compromise are combined to build a complete intelligence profile on high-value individuals connected to sensitive geopolitical regions.</p><p><strong>Iran&#8217;s MuddyWater: Ransomware as a Deception Operation</strong></p><p>Iran-linked MuddyWater conducted a false flag operation using ransomware as a decoy to mask the actual objective: credential theft and data exfiltration. The attack chain began with Microsoft Teams contact impersonating IT support, used screen sharing to capture credentials and manipulate MFA approvals in real time, and deployed ransomware not to encrypt data but to misdirect incident responders. By the time defenders were focused on ransomware recovery, the real operation had already concluded. This is a fundamental evolution in adversary tradecraft attackers are now manipulating defenders, not just systems.</p><p><strong>Iranian Psychological Operations Target U.S. Military Personnel</strong></p><p>Iran-linked actors sent threatening messages via WhatsApp to U.S. military personnel and published personal data of service members online. No system compromise required. This is information warfare designed to intimidate, destabilize, and consume defensive attention. Cyber conflict has fully expanded to include psychological pressure campaigns against individuals as an explicit operational component.</p><p><strong>APT Zero-Click Credential Theft: Windows Credentials Without User Interaction</strong></p><p>APT activity is now enabling credential harvesting from Windows systems without any user interaction leveraging system-level weaknesses to extract sensitive data silently. No phishing. No malware execution. No user error. This represents the evolution of identity attacks from deceiving users to bypassing them entirely, with lateral movement following invisibly across the network.</p><p><strong>AI Governance: Pre-Release Government Testing for Advanced Models</strong></p><p>Google, Microsoft, and XAI agreed to provide government agencies pre-release access to advanced AI models for evaluation of potential risks before public deployment &#8212; including assessment of offensive cyber capabilities, disinformation potential, and CBRN applications. AI is now formally treated as a strategic technology with national security implications requiring oversight at the highest government levels. Board-level questions about AI risk posture are no longer emerging, they are arriving now.</p><h3><strong>&#128165; Ransomware &amp; Destructive Operations</strong></h3><p><strong>cPanel Zero-Day: 44,000 Servers Locked in Large-Scale Ransomware Outbreak</strong></p><p>A critical cPanel vulnerability actively exploited since February before public disclosure is now fueling industrial-scale ransomware propagation. Attackers deployed the &#8220;Sorry&#8221; ransomware variant, encrypting systems with ChaCha20 and protecting keys via embedded RSA. More than 44,000 compromised IPs have been identified, with the vulnerability now added to CISA&#8217;s KEV catalog. Because cPanel functions as a centralized control layer for hosting environments, a single compromise cascades across websites, databases, and email systems. This is not targeted ransomware it is ransomware propagating through shared infrastructure, with hosting providers and MSPs functioning as force multipliers.</p><p><strong>VECT Ransomware: Encryption Designed to Destroy, Not Recover</strong></p><p>Checkpoint Research confirmed that VECT ransomware&#8217;s encryption process discards critical data by design, making recovery impossible even after payment. This transforms the attack from extortion into destruction. Organizations hit by VECT have no recovery path regardless of compliance. Prevention and offline backup integrity are the only viable defenses and backups must be validated independently, not assumed to be intact.</p><p><strong>Everest Ransomware Targets Liberty Mutual and Fiserv</strong></p><p>The Everest ransomware group published over 100GB of data allegedly from Liberty Mutual, including customer records, policy data, and financial details. Fiserv a major financial technology provider processing payments for thousands of financial institutions was also claimed as a victim. Both incidents appear linked to third-party vendor access rather than direct enterprise compromise. Financial sector targeting is intensifying, with attackers maximizing leverage by striking at infrastructure that multiple institutions depend on simultaneously.</p><p><strong>DOJ Sentencing Reveals Ransomware as One Enterprise</strong></p><p>A ransomware negotiator was sentenced to over eight years in prison, with the proceedings revealing that groups operating as Conti, Akira, Royal, and others are effectively one coordinated enterprise with shared leadership, shared resources, and a multi-brand structure designed to evade attribution and continue operations after takedowns. Ransomware is not a collection of independent criminal groups. It is a mature business ecosystem with deliberate organizational design. Threat modeling must account for this consolidation.</p><p><strong>Venomous Helper Campaign: RMM Tools as Ransomware Staging</strong></p><p>A phishing campaign dubbed &#8220;Venomous Helper&#8221; compromised over 80 organizations by deploying legitimate RMM tools SimpleHelp and ScreenConnect that are trusted and frequently allowlisted by EDR platforms. This is not the final stage of an attack. It is the setup phase, typically followed by ransomware deployment within 72 hours. Detection requires behavioral monitoring of RMM tool activity, not just signature-based alerting on known malicious binaries.</p><h3><strong>&#128275; Data Breaches &amp; Exposures</strong></h3><p><strong>Canvas Platform: 280 Million Records Exfiltrated via Legitimate API Abuse</strong></p><p>ShinyHunters claimed to have exfiltrated 280 million records from Instructure&#8217;s Canvas learning management platform affecting over 40% of North American universities without exploiting any vulnerability. The breach was executed entirely through legitimate API features used in unauthorized ways. Student records, academic communications, mental health disclosures, and institutional data were exposed. This is the second Canvas breach in eight months. API abuse as a primary exfiltration technique requires API behavioral monitoring and anomaly detection vulnerability management alone is insufficient protection.</p><p><strong>Cushman &amp; Wakefield: Vishing Attack Opens Salesforce Environment</strong></p><p>Cushman &amp; Wakefield confirmed a breach caused by a vishing attack, where an employee was socially engineered into granting access. ShinyHunters claims hundreds of thousands of Salesforce records with a ransom deadline attached. This is part of the broader ShinyHunters Salesforce campaign that has now touched multiple major enterprises. Identity is the perimeter and social engineering remains the most reliable path through it.</p><p><strong>Trellix Source Code Breach: Defenders Become Targets</strong></p><p>Trellix confirmed unauthorized access to portions of its source code repository. No customer data was impacted directly. But source code exposure allows attackers to analyze detection logic, identify blind spots, and develop evasion techniques tailored specifically to the platform. Security vendors are among the highest-value targets in the ecosystem compromising them provides adversarial intelligence about defensive capabilities at scale.</p><p><strong>MediaWorks: 8.5TB Extortion Without Encryption</strong></p><p>The WorldLeaks group published 8.5TB of data stolen from a Hungarian media company financial records, contracts, and internal communications using pure data theft and exposure for extortion. No encryption, no decryption keys, no recovery path through payment compliance. Backup strategies are irrelevant in pure exfiltration extortion. Data protection, classification, and access minimization are the only mitigating controls.</p><p><strong>NVIDIA Partner Breach: Supply Chain Compromise Continues</strong></p><p>NVIDIA confirmed a breach affecting a partner organization, with ShinyHunters claiming involvement. The recurring pattern: attackers target ecosystem vendors to gain indirect access to larger organizations, exploiting the trust relationships that make supply chains functional. Every partner with privileged access to your environment is a potential entry point.</p><h3><strong>&#129302; AI &amp; Developer Supply Chain</strong></h3><p><strong>Bleeding Llama: 300,000 Ollama AI Servers Exposed to Memory Exfiltration</strong></p><p>The &#8220;Bleeding Llama&#8221; vulnerability in Ollama deployments allows attackers to exfiltrate sensitive data from server memory using just three unauthenticated API calls. A specially crafted model file triggers a buffer overflow, dumping memory contents that can include API keys, authentication tokens, session data, internal conversations, PII, and proprietary code. Approximately 300,000 exposed Ollama servers were identified on the public internet, many operating without authentication or access controls. This is not merely a vulnerability &#8212; it is a systemic failure in how AI infrastructure is being deployed. Organizations are standing up AI environments with the same security rigor applied to personal laptops, creating open memory exfiltration surfaces at enterprise scale.</p><p><strong>PyTorch Lightning Supply Chain Worm: AI Ecosystem Autonomous Compromise</strong></p><p>A compromised version of the PyTorch Lightning library introduced autonomous worm capability that steals credentials, identifies accessible repositories, injects malicious code into additional packages, and republishes infected versions &#8212; propagating across both npm and PyPI ecosystems without human intervention. The targeting of AI training libraries is particularly dangerous because these environments hold sensitive data, proprietary models, and infrastructure credentials simultaneously.</p><p><strong>Daemon Tools Supply Chain: Trojanized Installer with Valid Code-Signing</strong></p><p>The Daemon Tools official installer was trojanized and distributed with valid code-signing certificates, deploying an infostealer and backdoor across multiple sectors globally. Even a signed binary from a trusted vendor cannot be assumed safe when the vendor&#8217;s distribution channel is compromised. Any endpoint running the affected installer should be treated as potentially compromised regardless of what endpoint protection tools report.</p><p><strong>BlueKit Phishing-as-a-Service: AI-Powered MFA Bypass at Industrial Scale</strong></p><p>BlueKit, a new phishing-as-a-service platform, incorporates AI-powered voice cloning, adversary-in-the-middle templates, and automated campaign generation supporting multiple AI models for convincing content creation. Real-time MFA token interception is a core feature. This is the industrialization of advanced phishing &#8212; capabilities previously requiring nation-state resources are now accessible to low-skill operators, dramatically expanding the scale and effectiveness of MFA bypass attacks across the entire threat ecosystem.</p><p><strong>Facebook Phishing via Google AppSheet: Trusted Infrastructure Abuse</strong></p><p>Attackers hijacked over 30,000 Facebook accounts using Google AppSheet infrastructure to send phishing emails that pass spam filtering entirely because they originate from Google&#8217;s trusted domain. This continues the pattern of attackers operating inside trusted platforms rather than spoofing them. Domain reputation-based filtering is no longer a reliable detection mechanism when the attacker is sending from legitimate infrastructure.</p><p><strong>AWS SES Abuse: Phishing from Inside Amazon&#8217;s Infrastructure</strong></p><p>Attackers harvesting exposed AWS IAM keys are using Amazon&#8217;s Simple Email Service to send phishing emails that pass SPF, DKIM, and DMARC checks because they are genuinely sent from Amazon infrastructure. Phishing pages are hosted on AWS as well, creating an end-to-end attack chain within a single trusted cloud provider. Any exposed IAM key becomes a phishing platform, turning the victim&#8217;s own environment into an attack vector against their customers and partners.</p><h3><strong>&#128737;&#65039; Vulnerabilities &amp; Critical Infrastructure</strong></h3><blockquote><p><em>&#8220;Speed is the attacker&#8217;s advantage, trust is their entry point.&#8221;</em></p></blockquote><p><strong>Palo Alto PAN-OS Zero-Day: Root Access with No Patch Available</strong></p><p>A critical zero-day in Palo Alto&#8217;s PAN-OS allows unauthenticated remote attackers to execute arbitrary code with root privileges through the authentication portal. Over 5,800 exposed devices are confirmed, with active exploitation underway and no patch available. Firewalls are the crown jewel of network defense compromise here means visibility into and control over all traffic, credentials, and segmentation policies. Mitigation requires immediate action: restrict authentication portal access, disable unnecessary services, and implement behavioral monitoring for anomalous activity. Waiting for a patch is not an operational posture.</p><p><strong>CISA CI Fortify: Prepare to Operate Without Vendors or Cloud</strong></p><p>CISA launched the CI Fortify initiative, explicitly urging critical infrastructure operators to prepare for scenarios requiring completely isolated operation without vendor support, cloud provider availability, or external network connectivity for extended periods. This is a direct response to observed adversary pre-positioning within OT environments and a formal acknowledgment that geopolitical conflict scenarios could eliminate access to vendor support simultaneously with an attack. Organizations must validate manual operations, air-gapped capabilities, and independent recovery processes. Most disaster recovery plans assume vendor availability. CI Fortify says that assumption is no longer safe.</p><p><strong>MOVEit Automation CVSS 9.8: Authentication Bypass Returns</strong></p><p>A critical authentication bypass in MOVEit Automation allows full administrative control without credentials in the same ecosystem mass-exploited by Cl0p in 2023. The prior MOVEit campaign achieved widespread exploitation within 24 hours of disclosure. This is not a situation for staged deployment timelines. Patch immediately, audit access logs for unauthorized activity, and rotate all credentials associated with the platform.</p><p><strong>DigiCert Breach and Microsoft Defender Failure: Both Sides of Trust Break</strong></p><p>DigiCert&#8217;s support portal was compromised via a weaponized screensaver, leading to fraudulent code-signing certificates used to sign the Zong Stealer malware. DigiCert revoked 60 certificates. Microsoft Defender then mistakenly flagged legitimate DigiCert root certificates as malicious and removed them from systems causing some organizations to face OS reinstalls to restore trust chain functionality. Both the certificate authority and the endpoint protection system failed simultaneously. Code signing and certificate-based trust can no longer be assumed as standalone reliable controls.</p><p><strong>Apache HTTP/2 RCE: 30% of the Web at Risk</strong></p><p>A critical double-free memory corruption vulnerability in Apache HTTP Server enables remote code execution via crafted HTTP/2 requests. Apache powers approximately 30% of the internet, with HTTP/2 enabled by default. Successful exploitation grants access to application code, credentials, API keys, and TLS private keys. Upgrade Apache HTTP Server to patched versions immediately across all internet-facing deployments.</p><p><strong>Linux &#8220;Copy Fail&#8221; Root Bug: Nine-Year Vulnerability Now Weaponized</strong></p><p>A nine-year-old Linux kernel vulnerability has been weaponized following public proof-of-concept release, enabling local privilege escalation to root across Ubuntu, RHEL, SUSE, and Amazon Linux by manipulating page cache behavior. In documented incidents, attackers chained this with Jenkins access to escalate from low-privileged service accounts to root. Old vulnerabilities become critical the moment reliable exploit code becomes publicly accessible dormant risk becomes immediate operational threat.</p><p><strong>Pack2TheRoot: PackageKit Privilege Escalation Confirmed Exploitable</strong></p><p>A Linux privilege escalation flaw present since 2014 has been confirmed exploitable across major distributions, now added to CISA&#8217;s KEV catalog. Any low-privileged malware on a Linux system can immediately escalate to root through PackageKit. Apply kernel updates and verify patched versions are active across all Linux endpoints.</p><p><strong>Microsoft Edge Password Storage: Cleartext Credentials in Memory</strong></p><p>Microsoft confirmed that Edge loads all saved passwords into memory in cleartext at browser startup and maintains them for the entire session. While labeled &#8220;by design,&#8221; this behavior allows attackers with elevated access to extract all stored credentials instantly. Deploy enterprise password managers and limit browser-based credential storage across all endpoints.</p><p><strong>Oracle: Monthly Patch Cycles Replace Quarterly Model</strong></p><p>Oracle announced a shift from quarterly patch releases to monthly updates for critical vulnerabilities, driven by the compression of exploitation timelines from days to minutes. Organizations must adapt patch management processes to handle monthly Oracle updates without operational disruption. This is part of a broader industry shift toward continuous vulnerability management as a required operational function.</p><p><strong>Cyber-Enabled Cargo Theft: FBI Warning on Physical Supply Chain Impact</strong></p><p>The FBI warned of a surge in cyber-enabled cargo theft exceeding $725 million in 2025, with attackers compromising logistics platforms, altering shipment records, and impersonating legitimate carriers to redirect physical shipments. Cybersecurity is now directly tied to physical supply chain risk. Secure logistics platforms and enforce MFA across all supply chain management systems.</p><h3><strong>&#128272; Insider Threats &amp; Human-Layer Attacks</strong></h3><p><strong>Security Professionals Sentenced for Ransomware Attacks Against Their Own Clients</strong></p><p>Two cybersecurity professionals were sentenced for conducting ransomware attacks against organizations their firms were hired to protect. One operated as an incident responder the professional called in during an organization&#8217;s worst crisis while conducting the attacks himself. This is not theoretical insider risk. It is documented operational reality. Zero-trust principles must extend to privileged insiders including security vendors, IR firms, and all third parties with elevated access. Monitoring and segmentation for these relationships is not paranoia it is hygiene.</p><p><strong>AiTM Phishing: 35,000 Users Compromised Across 13,000 Organizations</strong></p><p>Microsoft disclosed a massive adversary-in-the-middle phishing campaign targeting over 35,000 users across 13,000 organizations. Proxy-based interception captured credentials and session tokens in real time, bypassing MFA entirely. Victims were routed through a convincing fake document review workflow. Once session tokens were captured, attackers accessed accounts without triggering additional authentication. MFA is no longer sufficient protection against AiTM attacks. Phishing-resistant authentication FIDO2 and passkeys is the required migration path.</p><p><strong>Vishing and Social Engineering: Multiple Major Breach Pathways</strong></p><p>Vishing attacks contributed to the Cushman &amp; Wakefield breach. Social engineering via Microsoft Teams enabled MuddyWater&#8217;s false flag operation. The North Korea ScarCruft campaign used long-term relationship building on gaming platforms. Three distinct incidents this week demonstrate that human-layer exploitation remains the most reliable and underdefended pathway into hardened technical environments.</p><h3><strong>&#9878;&#65039; Law Enforcement, Policy &amp; Industry</strong></h3><p><strong>FTC Permanently Bans Kochava: Privacy Enforcement Accelerates</strong></p><p>The FTC permanently banned data broker Kochava from selling precise location data without explicit consent. This marks a significant escalation in privacy enforcement and signals increasing regulatory scrutiny of data collection and monetization practices across all industries. Privacy compliance must be treated as a core security function, not a separate legal obligation.</p><p><strong>Cyber Insurance: Coalition Becomes Global Market Leader</strong></p><p>Allianz transferred its cyber insurance portfolio to Coalition, making it the largest commercial cyber insurer globally. Coalition&#8217;s model integrates real-time threat monitoring with underwriting, enabling dynamic risk pricing based on current security posture rather than historical claims data alone. Organizations should expect cybersecurity controls particularly identity hygiene and MFA implementation to increasingly influence insurance costs and coverage availability.</p><p><strong>Global Cybercrime Crackdown: 276 Arrests, $700M Seized</strong></p><p>An international operation resulted in 276 arrests and seizure of over $700 million tied to cryptocurrency scam networks. Coordinated law enforcement across jurisdictions is demonstrating meaningful disruption capability though the scale of what remains operational underscores that these networks are both highly profitable and highly resilient.</p><p><strong>Black Axe Network: Ten Arrests in Organized Cybercrime Operation</strong></p><p>European authorities arrested ten members of the Black Axe cybercrime network responsible for large-scale financial fraud, romance scams, and money laundering. These networks operate with structured organizational roles and rebuild quickly after disruption. International coordination is the only operationally effective response to enterprises of this scale.</p><h3><strong>&#9989; This Week&#8217;s Priority Action List</strong></h3><p><strong>Immediate (Do This Now)</strong></p><ul><li><p>Restrict access to Palo Alto PAN-OS authentication portals and implement behavioral monitoring &#8212; no patch is available, mitigation is the only current option</p></li><li><p>Patch MOVEit Automation immediately &#8212; CVSS 9.8, same ecosystem as the 2023 mass exploitation event, 24-hour exploitation window expected</p></li><li><p>Patch cPanel and WHM and audit all logs for exploitation activity predating the advisory</p></li><li><p>Apply Linux kernel updates to address the nine-year root escalation vulnerability &#8212; now in CISA KEV catalog, exploit code is public</p></li><li><p>Patch all Ollama deployments and restrict public internet access &#8212; 300,000 exposed servers, unauthenticated memory exfiltration with three API calls</p></li><li><p>Upgrade Apache HTTP Server to patched versions across all internet-facing deployments</p></li><li><p>Validate DigiCert certificate trust stores and confirm Defender signature accuracy following the false-positive incident</p></li><li><p>Patch all CISA KEV-listed vulnerabilities including cPanel, Linux PackageKit, and SimpleHelp</p></li></ul><p><strong>Short-Term (This Month)</strong></p><ul><li><p>Audit all AI infrastructure deployments &#8212; authentication requirements, network segmentation, and access logging must be validated as baseline controls</p></li><li><p>Rotate all credentials and tokens associated with PyTorch Lightning, npm, and PyPI environments</p></li><li><p>Audit all installations of Daemon Tools and hunt for indicators of compromise regardless of EDR clean status</p></li><li><p>Implement authentication proxies for all AI infrastructure and restrict unauthenticated API access to any model serving platform</p></li><li><p>Audit all RMM tool deployments SimpleHelp, ScreenConnect and investigate any unauthorized installations</p></li><li><p>Conduct API behavioral monitoring review for Canvas and other high-volume SaaS platforms abuse of legitimate API features is the active attack pattern</p></li><li><p>Rotate all exposed AWS IAM keys and audit SES usage for anomalous sending patterns</p></li><li><p>Deploy enterprise password managers and eliminate browser-based credential storage across all endpoints</p></li></ul><p><strong>Strategic (This Quarter)</strong></p><ul><li><p>Update patch management processes to accommodate monthly Oracle cycles and continuous vulnerability management</p></li><li><p>Conduct OT segmentation audits and validate air-gapped operation capability, CISA CI Fortify is a direct warning, not a theoretical exercise</p></li><li><p>Update incident response playbooks to include deception tactics, false flag scenarios, and insider threat from IR vendors</p></li><li><p>Prepare board-level AI security briefings addressing governance, regulatory trajectory, and enterprise AI risk posture</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-51?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-51?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><h3><strong>&#127897;&#65039; James Azar&#8217;s CISO&#8217;s Take</strong></h3><p>When I look across this week&#8217;s stories, the shift I keep coming back to is that attackers have stopped exploiting systems and started orchestrating them. The MuddyWater false flag operation didn&#8217;t break into anything it manipulated the incident responders sent to stop it. The Canvas breach didn&#8217;t exploit a vulnerability it used authorized API functionality. The Daemon Tools attack distributed malware through a valid code-signed installer from the vendor&#8217;s own distribution channel. The AWS SES phishing passed every authentication check because it was genuinely sent from Amazon&#8217;s infrastructure. When attackers can achieve their objectives using legitimate tools, legitimate credentials, and legitimate workflows, traditional security controls designed to detect the abnormal become functionally blind. That is the environment we are operating in, and it demands a security model built around continuous validation of trust assumptions rather than detection of known-bad patterns.</p><p>The second takeaway is that the defensive response must match the adversary&#8217;s organizational sophistication. The DOJ sentencing revealed that major ransomware groups are one consolidated enterprise. MuddyWater&#8217;s false flag demonstrates nation-state-level operational planning. North Korea&#8217;s six-month social engineering campaigns show patience and discipline. AI-powered phishing-as-a-service is industrializing what was previously nation-state capability and selling it to anyone. Against that level of organizational maturity, the organizations that will remain resilient are those that have built security into operations not bolted it on afterward. That means zero-trust for every trusted relationship including your own security vendors, continuous validation of every automated workflow, and incident response playbooks that account for the possibility that the attacker is also reading your response plan.</p><p><strong>Stay Cyber Safe.</strong> &#128272;</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-51/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-51/comments"><span>Leave a comment</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Critical PAN-OS Zero-Day CVE-2026-0300 Exploited to Hack Palo Alto Firewalls, Iran's MuddyWater Runs False Flag Chaos Ransomware Attack, Oracle Shifts to Monthly Critical Security Patch ]]></title><description><![CDATA[PAN-OS Zero-Day Gives Root on Firewalls, CISA: Prepare to Operate Without Vendors. Oracle Goes Monthly, MuddyWater False Flag Ransomware, Allianz Makes Coalition World's Largest Cyber Insurer]]></description><link>https://www.cyberhubpodcast.com/p/critical-pan-os-zero-day-cve-2026</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/critical-pan-os-zero-day-cve-2026</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Thu, 07 May 2026 13:31:21 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/196736614/c80030c52af1de4d5ee8581018f60e04.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<h1>&#9749; <strong>Good Morning Security Gang,</strong></h1><p>Today&#8217;s episode is one of those that forces you to zoom out and realize, this is no longer just cybersecurity, this is national security, operational resilience, and business survival all wrapped into one.</p><p>We&#8217;ve got a firewall zero-day with no patch, a massive education sector breach impacting hundreds of millions, a nation-state false flag operation, and even AI now being evaluated for offensive cyber capabilities before release.</p><div class="callout-block" data-callout="true"><p>&#128073; The theme today: Everything we depend on vendors, infrastructure, APIs, even trust itself is being challenged.</p></div><p>Double espresso ready, let&#8217;s go.</p><h1>&#129517; <strong>Executive Summary</strong></h1><p>Today&#8217;s threat landscape highlights a convergence of unpatched critical vulnerabilities, API-driven data exfiltration, supply chain compromise, and nation-state deception tactics. Attackers are no longer just exploiting software flaws&#8212;they&#8217;re leveraging legitimate system capabilities, abusing trust relationships, and introducing misdirection into incident response.</p><p>At the same time, regulators and governments are stepping in, from data privacy enforcement to AI governance, while the cyber insurance market evolves to reflect real-time risk. The environment is shifting from reactive defense to strategic resilience, where organizations must assume disruption and design for continuity.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Jsru!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad6dbe06-dc24-4eb7-a1f8-d84035e90392_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Jsru!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad6dbe06-dc24-4eb7-a1f8-d84035e90392_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!Jsru!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad6dbe06-dc24-4eb7-a1f8-d84035e90392_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!Jsru!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad6dbe06-dc24-4eb7-a1f8-d84035e90392_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!Jsru!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad6dbe06-dc24-4eb7-a1f8-d84035e90392_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Jsru!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad6dbe06-dc24-4eb7-a1f8-d84035e90392_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ad6dbe06-dc24-4eb7-a1f8-d84035e90392_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:204359,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/196736614?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad6dbe06-dc24-4eb7-a1f8-d84035e90392_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Jsru!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad6dbe06-dc24-4eb7-a1f8-d84035e90392_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!Jsru!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad6dbe06-dc24-4eb7-a1f8-d84035e90392_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!Jsru!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad6dbe06-dc24-4eb7-a1f8-d84035e90392_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!Jsru!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad6dbe06-dc24-4eb7-a1f8-d84035e90392_1280x720.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>&#128240; <strong>Top Stories &amp; Deep Dive Analysis</strong></h1><h2>&#128293; <strong>Palo Alto PAN-OS Zero-Day &#8211; Root Access Without a Patch</strong></h2><p>A critical zero-day vulnerability in Palo Alto&#8217;s PAN-OS allows unauthenticated remote attackers to execute arbitrary code with root privileges via the authentication portal. With over 5,800 exposed devices and active exploitation confirmed, this is a high-severity issue with no immediate patch available.</p><p>Firewalls are the crown jewel of network defense. Compromise here means visibility and control over everything behind it&#8212;traffic flows, credentials, and segmentation policies. The fact that attackers are actively targeting perimeter devices reinforces a long-standing truth: if you own the edge, you own the network.</p><p>Mitigation now requires immediate action, restricting access, disabling unnecessary services, and monitoring for anomalous behavior because waiting for a patch is not an option.</p><h2>&#127981; <strong>CISA CI Fortify &#8211; Prepare to Operate Without Vendors</strong></h2><p>CISA launched the CI Fortify initiative, urging critical infrastructure operators to prepare for scenarios where they must operate completely isolated from vendors, cloud providers, and external networks for extended periods.</p><p>This is a major shift in thinking. Most disaster recovery plans assume vendor availability, but CISA is explicitly warning that in a geopolitical conflict, those assumptions may fail.</p><p>The implication is profound: organizations must validate manual operations, air-gapped capabilities, and independent recovery processes. This is not theoretical, it&#8217;s a direct response to observed adversary positioning within OT environments.</p><h2>&#128260; <strong>Oracle Moves to Monthly Patching &#8211; The End of Quarterly Cycles</strong></h2><p>Oracle announced a shift from quarterly patch cycles to monthly updates for critical vulnerabilities, driven by the shrinking window between disclosure and exploitation.</p><p>With exploit timelines now measured in minutes rather than days, traditional patching models are no longer sufficient. Organizations must adapt their processes to handle more frequent updates without disrupting operations.</p><p>This is part of a broader industry trend toward continuous vulnerability management, where patching becomes an ongoing process rather than a scheduled event.</p><h2>&#129516; <strong>Daemon Tools Supply Chain Attack &#8211; Signed Software, Malicious Payload</strong></h2><p>The makers of Daemon Tools confirmed a supply chain attack where their official installer was trojanized and distributed with valid code-signing certificates. The malicious version deployed an information stealer and backdoor across multiple sectors globally.</p><p>This attack underscores the danger of trusted software distribution channels being compromised. Even signed binaries cannot be assumed safe if the vendor itself is breached.</p><p>Organizations must treat any affected installations as compromised and conduct thorough investigations, even if endpoint protection tools show no alerts.</p><h2>&#127891; <strong>Canvas Breach &#8211; 280 Million Records via Legitimate APIs</strong></h2><p>ShinyHunters claimed to have exfiltrated 280 million records from Instructure&#8217;s Canvas platform, impacting over 40% of North American universities. The attackers did not exploit a vulnerability, instead, they abused legitimate API features to extract data.</p><p>This is a critical shift. The breach was executed using authorized functionality, making it harder to detect and prevent.</p><p>The exposed data includes student records, communications, and institutional details, creating immediate risk for phishing campaigns and regulatory fallout. This highlights the need for API monitoring and anomaly detection, not just vulnerability management.</p><h2>&#9878;&#65039; <strong>FTC Bans Data Broker &#8211; Privacy Enforcement Accelerates</strong></h2><p>The FTC permanently banned data broker Kochava from selling precise location data without explicit consent, marking a significant step in privacy enforcement.</p><p>This decision reflects growing concern over how sensitive data is collected, shared, and monetized. It also signals increased regulatory scrutiny across industries, particularly those handling consumer data.</p><p>Organizations must now consider privacy compliance as a core component of cybersecurity, not just a legal requirement.</p><h2>&#127917; <strong>MuddyWater False Flag Campaign &#8211; Ransomware as a Distraction</strong></h2><p>Iran-linked MuddyWater conducted a sophisticated false flag operation, using ransomware as a decoy to mask credential theft and data exfiltration activities.</p><p>The attackers initiated contact through Microsoft Teams, posing as IT support, and used screen sharing to capture credentials and manipulate MFA approvals in real time. The ransomware component was never intended to encrypt data, it was used to mislead responders.</p><p>This represents a new level of sophistication where attackers manipulate both systems and defenders, delaying response and increasing impact.</p><h2>&#128737;&#65039; <strong>Cyber Insurance Shift &#8211; Coalition Becomes Market Leader</strong></h2><p>Allianz transferred its cyber insurance portfolio to Coalition, making it the largest commercial cyber insurer globally. Coalition&#8217;s model integrates real-time threat monitoring with insurance coverage, enabling dynamic risk pricing.</p><p>This reflects a broader shift toward technology-driven underwriting, where insurers actively monitor risk rather than relying solely on historical data.</p><p>For organizations, this means cybersecurity posture will increasingly influence insurance costs and coverage availability.</p><h2>&#129302; <strong>AI Governance &#8211; Government Testing Before Release</strong></h2><p>Google, Microsoft, and XAI agreed to provide pre-release access to advanced AI models for government testing, allowing evaluation of potential risks before public deployment.</p><p>This includes assessing capabilities related to offensive cyber operations, disinformation, and even CBRN threats.</p><p>This marks a turning point where AI is being treated as a strategic technology with national security implications, requiring oversight and governance at the highest levels.</p><h1>&#127919; <strong>Key Takeaway</strong></h1><div class="callout-block" data-callout="true"><p>&#128073; <strong>Cybersecurity is no longer just about defense, it&#8217;s about resilience in a world where trust, infrastructure, and even assumptions are under attack.</strong></p></div><h1>&#128736;&#65039; <strong>Action Items for Security Leaders</strong></h1><ul><li><p>&#128293; Restrict access to PAN-OS authentication portals and monitor for exploitation attempts</p></li><li><p>&#127981; Conduct OT segmentation audits and validate air-gap capabilities</p></li><li><p>&#128260; Update patch management processes for monthly and continuous cycles</p></li><li><p>&#129516; Audit all installations of Daemon Tools and hunt for indicators of compromise</p></li><li><p>&#127891; Monitor API usage for abnormal data access patterns in SaaS platforms</p></li><li><p>&#9878;&#65039; Align data handling practices with evolving privacy regulations</p></li><li><p>&#127917; Update incident response playbooks to account for deception tactics</p></li><li><p>&#128737;&#65039; Review cyber insurance policies and align them with current risk posture</p></li><li><p>&#129302; Prepare for AI governance requirements and risk assessments</p></li><li><p>&#128269; Continuously validate trust across all systems and integrations</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/critical-pan-os-zero-day-cve-2026/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/critical-pan-os-zero-day-cve-2026/comments"><span>Leave a comment</span></a></p><h1>&#129504; <strong>James Azar&#8217;s CISOs Take</strong></h1><p>What stood out to me today is how attackers are no longer limited by technical barriers. The Canvas breach shows they can use legitimate APIs, the MuddyWater campaign shows they can manipulate defenders, and the PAN-OS zero-day shows they can go straight for the heart of our defenses. This is a shift from exploitation to orchestration&#8212;attackers are orchestrating outcomes rather than just executing attacks.</p><p>The second takeaway is that resilience is becoming the defining factor in cybersecurity. With CISA pushing for isolated operations and Oracle accelerating patch cycles, it&#8217;s clear that the environment is changing faster than ever. Organizations that can adapt&#8212;operationally, technically, and strategically&#8212;will be the ones that survive. Those that can&#8217;t will struggle to keep up.</p><p>&#128293; <strong>Stay Cyber Safe.</strong></p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/critical-pan-os-zero-day-cve-2026?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/critical-pan-os-zero-day-cve-2026?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/critical-pan-os-zero-day-cve-2026?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[Bleeding Llama Exposes 300K AI Servers, AiTM Campaign, North Korea BirdCall Android, Fiserv Ransomware]]></title><description><![CDATA[Bleeding Llama Exposes 300K AI Servers | AiTM Campaign Hits 35K Users | North Korea BirdCall Android Backdoor | Fiserv Ransomware | Conti = Akira = Royal Confirmed]]></description><link>https://www.cyberhubpodcast.com/p/bleeding-llama-exposes-300k-ai-servers</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/bleeding-llama-exposes-300k-ai-servers</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Thu, 07 May 2026 03:29:47 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/196616309/1fd6427a8cf87e1cc6cf7bf75e2d0998.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<h1>&#9749; <strong>Good Morning Security Gang,</strong></h1><p>Today&#8217;s episode is one of those that hits every nerve in cybersecurity, AI exposure, identity attacks, ransomware evolution, and nation-state activity all in one show.</p><p>And here&#8217;s the uncomfortable truth driving today&#8217;s conversation:<br>&#128073; We are deploying technology faster than we are securing it&#8212;and attackers are capitalizing on that gap.</p><p>Double espresso, well, decaf this time, let&#8217;s get into it.</p><h1>&#129517; <strong>Executive Summary</strong></h1><p>Today&#8217;s landscape is defined by <strong>three major fault lines</strong>:</p><ol><li><p><strong>AI infrastructure exposure at scale</strong></p></li><li><p><strong>Identity and MFA bypass becoming trivial</strong></p></li><li><p><strong>Ransomware groups evolving into structured enterprises</strong></p></li></ol><p>Attackers are exploiting memory-level flaws in AI systems, leveraging adversary-in-the-middle (AiTM) phishing to bypass MFA, and operating ransomware operations under multiple brands to evade detection and enforcement. Meanwhile, supply chain compromises and targeted nation-state campaigns continue to expand the attack surface beyond traditional enterprise boundaries.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!EWkF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dc8d354-9ed9-4ae9-8a75-8b9d57bdbfee_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!EWkF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dc8d354-9ed9-4ae9-8a75-8b9d57bdbfee_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!EWkF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dc8d354-9ed9-4ae9-8a75-8b9d57bdbfee_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!EWkF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dc8d354-9ed9-4ae9-8a75-8b9d57bdbfee_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!EWkF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dc8d354-9ed9-4ae9-8a75-8b9d57bdbfee_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!EWkF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dc8d354-9ed9-4ae9-8a75-8b9d57bdbfee_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2dc8d354-9ed9-4ae9-8a75-8b9d57bdbfee_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:184751,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/196616309?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dc8d354-9ed9-4ae9-8a75-8b9d57bdbfee_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!EWkF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dc8d354-9ed9-4ae9-8a75-8b9d57bdbfee_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!EWkF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dc8d354-9ed9-4ae9-8a75-8b9d57bdbfee_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!EWkF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dc8d354-9ed9-4ae9-8a75-8b9d57bdbfee_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!EWkF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dc8d354-9ed9-4ae9-8a75-8b9d57bdbfee_1280x720.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>&#128240; <strong>Top Stories &amp; Deep Dive Analysis</strong></h1><h2>&#129302; <strong>Bleeding Llama &#8211; 300,000 AI Servers Exposed to Data Theft</strong></h2><p>The &#8220;Bleeding Llama&#8221; vulnerability is one of the most significant AI security issues we&#8217;ve seen to date. Affecting Ollama deployments, this flaw allows attackers to exfiltrate sensitive data from memory using just three unauthenticated API calls.</p><p>Here&#8217;s how it works: an attacker uploads a specially crafted model file that triggers a buffer overflow, allowing them to dump memory contents. That memory can include API keys, authentication tokens, prompts, internal conversations, PII, and even proprietary code.</p><p>Researchers identified approximately 300,000 exposed Ollama servers on the public internet, many without authentication or proper access controls.</p><p>This is not just a vulnerability, it&#8217;s a systemic failure in how AI infrastructure is being deployed. Organizations are spinning up AI environments with zero security controls, effectively creating open data leaks waiting to happen.</p><h2>&#128241; <strong>North Korea&#8217;s BirdCall Android Backdoor &#8211; Mobile Espionage Expands</strong></h2><p>North Korea&#8217;s ScarCruft group has escalated its operations by embedding a new Android variant of the BirdCall malware into a compromised gaming platform targeting ethnic Koreans in China.</p><p>This backdoor is not basic spyware, it&#8217;s a full surveillance toolkit capable of collecting contacts, messages, call logs, media files, and even recording audio. It also captures screenshots, including private keys and sensitive data.</p><p>What makes this campaign particularly concerning is its <strong>targeted nature</strong>, focusing on individuals connected to sensitive geopolitical regions. This reflects a broader shift toward <strong>cross-platform espionage</strong>, where attackers combine mobile and desktop compromise to build a complete intelligence picture.</p><h2>&#127970; <strong>Cushman &amp; Wakefield Breach &#8211; Vishing Meets SaaS Compromise</strong></h2><p>Cushman &amp; Wakefield confirmed a breach caused by a vishing attack, where attackers socially engineered an employee into granting access. ShinyHunters claims to have stolen hundreds of thousands of Salesforce records, with a ransom deadline looming.</p><p>This attack is part of a broader campaign targeting Salesforce environments through human manipulation rather than technical exploitation. Once attackers gain access, they can export massive datasets, including customer information and internal records.</p><p>The lesson here is clear: identity is the new perimeter, and social engineering is the easiest way through it.</p><h2>&#128179; <strong>Fiserv Targeted by Everest Ransomware &#8211; Financial Sector in Focus</strong></h2><p>Everest ransomware has claimed Fiserv, a major financial technology provider, as its latest victim. While details remain limited, the potential impact is significant given Fiserv&#8217;s role in processing payments and supporting thousands of financial institutions.</p><p>This follows a pattern of <strong>targeted attacks against the financial sector</strong>, where attackers aim to maximize leverage and disruption. Even without confirmed data exposure, organizations relying on Fiserv should be actively monitoring for anomalies.</p><p>This is not just a breach, it&#8217;s part of a <strong>broader campaign against financial infrastructure</strong>.</p><h2>&#127919; <strong>AiTM Phishing Campaign &#8211; 35,000 Users Compromised</strong></h2><p>Microsoft disclosed a massive adversary-in-the-middle phishing campaign targeting over <strong>35,000 users across 13,000 organizations</strong>. The attackers used proxy-based interception to capture credentials and session tokens in real time, bypassing MFA entirely.</p><p>Victims were lured through a fake document review process, with the attack chain designed to look legitimate at every step. Once credentials were captured, attackers could access accounts without triggering additional authentication challenges.</p><p>This is the new normal: <strong>MFA is no longer enough on its own</strong>, especially against AiTM attacks that exploit session-based authentication.</p><h2>&#9878;&#65039; <strong>DOJ Sentencing &#8211; Ransomware Gangs Are One Organization</strong></h2><p>In a major legal development, a ransomware negotiator was sentenced to over eight years in prison, revealing that groups like Conti, Akira, Royal, and others are effectively <strong>one coordinated enterprise operating under multiple brands</strong>.</p><p>This structure allows attackers to:</p><ul><li><p>Avoid attribution</p></li><li><p>Continue operations after takedowns</p></li><li><p>Maximize revenue through specialization</p></li></ul><p>This confirms what many suspected: ransomware is no longer a collection of independent groups&#8212;it&#8217;s a <strong>business ecosystem with shared leadership and resources</strong>.</p><h2>&#129695; <strong>APT Credential Theft &#8211; Zero-Click Windows Compromise</strong></h2><p>APT activity is now enabling attackers to steal Windows credentials <strong>without any user interaction</strong>, leveraging system-level weaknesses to extract sensitive data.</p><p>This represents a significant escalation, as it removes the need for phishing or malware execution. Attackers can operate silently, harvesting credentials and moving laterally without detection.</p><p>This is the evolution of identity attacks from tricking users to bypassing them entirely.</p><h2>&#127918; <strong>NVIDIA Partner Breach &#8211; Supply Chain Risk Continues</strong></h2><p>NVIDIA confirmed a breach affecting one of its partners, with ShinyHunters again claiming involvement. While details are limited, this highlights the ongoing risk of supply chain compromise, where attackers target vendors to gain indirect access to larger organizations.</p><p>This is a recurring pattern: attackers don&#8217;t always go after the biggest target&#8212;they go after the weakest link in the ecosystem.</p><h1>&#127919; <strong>Key Takeaway</strong></h1><p>&#128073; <strong>AI exposure, identity compromise, and ransomware consolidation are converging into a single, complex threat landscape.</strong></p><h1>&#128736;&#65039; <strong>Action Items for Security Leaders</strong></h1><ul><li><p>&#128272; Patch Ollama immediately and restrict public access to AI deployments</p></li><li><p>&#129302; Implement authentication proxies for all AI infrastructure</p></li><li><p>&#128241; Enforce MDM policies and restrict sideloaded apps on mobile devices</p></li><li><p>&#129513; Deploy phishing-resistant MFA (FIDO2) and monitor session tokens</p></li><li><p>&#127970; Strengthen identity verification for help desk and admin access</p></li><li><p>&#128179; Monitor financial integrations and APIs for anomalous activity</p></li><li><p>&#9878;&#65039; Update threat models to account for multi-brand ransomware groups</p></li><li><p>&#129695; Enhance detection for credential theft and lateral movement</p></li><li><p>&#127918; Conduct vendor risk assessments across all supply chain partners</p></li><li><p>&#128269; Continuously audit exposed services and internet-facing assets</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/bleeding-llama-exposes-300k-ai-servers/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/bleeding-llama-exposes-300k-ai-servers/comments"><span>Leave a comment</span></a></p><h1>&#129504; <strong>James Azar&#8217;s CISOs Take</strong></h1><p>What stood out to me today is how quickly AI has become a critical attack surface. We&#8217;re deploying these systems everywhere&#8212;often without authentication, without monitoring, and without understanding the risks. Bleeding Llama is a perfect example of how a single flaw can expose everything in memory. That&#8217;s not a vulnerability&#8212;that&#8217;s a systemic failure in how we approach new technology.</p><p>The second takeaway is the convergence of identity and attacker efficiency. AiTM phishing, zero-click credential theft, and ransomware consolidation all point to one thing&#8212;attackers are getting faster, smarter, and more organized. If we don&#8217;t evolve our defenses to match that speed and sophistication, we&#8217;re going to keep playing catch-up. And in this game, being behind is not an option.</p><p>&#128293; <strong>Stay Cyber Safe.</strong></p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/bleeding-llama-exposes-300k-ai-servers?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/bleeding-llama-exposes-300k-ai-servers?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/bleeding-llama-exposes-300k-ai-servers?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[MOVEit Automation Authentication Bypass Allows Full Admin Takeover, DigiCert Support Portal Hacked via Screensaver File, Ransomware Publishes 108 GB of Alleged Liberty Mutual Insurance Policyholder ]]></title><description><![CDATA[Cinco de Mayo Edition | MOVEit CVSS 9.8 Auth Bypass | DigiCert Certs Revoked After Screensaver Attack | Liberty Mutual Leaked | Edge Passwords in Clear Text | Apache HTTP/2 RCE]]></description><link>https://www.cyberhubpodcast.com/p/moveit-automation-authentication</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/moveit-automation-authentication</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Tue, 05 May 2026 13:31:23 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/196532310/28824d5ca136dea5ce334f0f899ff76b.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<h1>&#9749; <strong>Good Morning Security Gang,</strong></h1><p>It&#8217;s Cinco de Mayo, May 5th, 2026, and today&#8217;s episode is one of those that makes you pause and rethink everything you trust in your environment.</p><p>We&#8217;re talking about MOVEit again, but this time it&#8217;s worse. We&#8217;ve got certificate trust breaking down, AWS being weaponized for phishing, Apache RCE, ransomware precursor campaigns, and even Microsoft defending cleartext password behavior.</p><p>&#128073; The theme today is simple: the very systems we rely on for security are now being turned against us.</p><p>Double espresso in hand, let&#8217;s get into it.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!YQXp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12de3c93-a9d3-4d1d-bc03-e4d743e55b41_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!YQXp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12de3c93-a9d3-4d1d-bc03-e4d743e55b41_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!YQXp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12de3c93-a9d3-4d1d-bc03-e4d743e55b41_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!YQXp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12de3c93-a9d3-4d1d-bc03-e4d743e55b41_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!YQXp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12de3c93-a9d3-4d1d-bc03-e4d743e55b41_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!YQXp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12de3c93-a9d3-4d1d-bc03-e4d743e55b41_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/12de3c93-a9d3-4d1d-bc03-e4d743e55b41_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:186023,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/196532310?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12de3c93-a9d3-4d1d-bc03-e4d743e55b41_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!YQXp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12de3c93-a9d3-4d1d-bc03-e4d743e55b41_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!YQXp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12de3c93-a9d3-4d1d-bc03-e4d743e55b41_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!YQXp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12de3c93-a9d3-4d1d-bc03-e4d743e55b41_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!YQXp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12de3c93-a9d3-4d1d-bc03-e4d743e55b41_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>&#129517; <strong>Executive Summary</strong></h1><p>Today&#8217;s stories highlight a breakdown in core trust mechanisms authentication systems, certificate authorities, cloud infrastructure, and endpoint security assumptions. Attackers are increasingly abusing legitimate platforms and trusted workflows to bypass controls, while defenders are struggling with the unintended consequences of those same trust models.</p><p>We&#8217;re also seeing continued evolution in ransomware precursor activity, supply chain exposure, and data extortion campaigns, all happening alongside a surge in cyber-enabled financial crime. The environment is no longer about perimeter defense, it&#8217;s about validating trust continuously across every layer of the stack.</p><h1>&#128240; <strong>Top Stories &amp; Deep Dive Analysis</strong></h1><h2>&#128275; <strong>MOVEit Automation Auth Bypass &#8211; D&#233;j&#224; Vu with Higher Stakes</strong></h2><p>A critical CVSS 9.8 authentication bypass vulnerability in MOVEit Automation allows attackers to take full administrative control without credentials. This is the same ecosystem that was mass exploited by Cl0p in 2023, and while there&#8217;s no confirmed widespread exploitation yet, history tells us exactly what&#8217;s coming.</p><p>The vulnerability enables attackers to bypass authentication entirely and chain access into sensitive workflows like payroll, financial transfers, and regulated data exchanges. Given how quickly MOVEit was exploited in the past, within 24 hours this is not a &#8220;wait and see&#8221; situation.</p><p>This is a <strong>fire drill-level vulnerability</strong>. If you&#8217;re running MOVEit Automation, you should already be patching, auditing logs, and rotating credentials. Because once exploitation starts, it won&#8217;t be gradual, it&#8217;ll be immediate and widespread.</p><h2>&#128271; <strong>DigiCert Breach &amp; Microsoft Defender Failure &#8211; Trust Chain Breakdown</strong></h2><p>DigiCert&#8217;s support portal was breached via a weaponized screensaver file, leading to the issuance of fraudulent code-signing certificates used to sign malware like Zong Stealer. DigiCert revoked 60 certificates, but the situation escalated when Microsoft Defender mistakenly flagged legitimate DigiCert root certificates as malicious and removed them from systems.</p><p>This created a global trust issue where systems could no longer validate legitimate software, forcing some organizations into drastic recovery actions like OS reinstalls.</p><p>This is a rare but critical moment where both sides of the trust model failed:</p><ul><li><p>The certificate authority was compromised</p></li><li><p>The endpoint protection system overcorrected</p></li></ul><p>The takeaway is uncomfortable: code signing and certificate trust can no longer be assumed as reliable controls in isolation.</p><h2>&#127974; <strong>Everest Ransomware &amp; Liberty Mutual &#8211; Financial Sector Pressure Campaign</strong></h2><p>The Everest ransomware group published over 100GB of data allegedly tied to Liberty Mutual, including customer information, policy data, and financial details. The breach appears linked to a third-party vendor, reinforcing the ongoing challenge of supply chain exposure.</p><p>What&#8217;s notable is the timing this comes alongside similar claims targeting financial institutions, suggesting a coordinated campaign focused on the financial sector.</p><p>Even without full confirmation of attack vectors, the pattern is clear: attackers are targeting ecosystems, not just organizations, using supply chain access to amplify impact.</p><h2>&#9729;&#65039; <strong>AWS SES Abuse &#8211; Phishing from Inside Trusted Infrastructure</strong></h2><p>Attackers are harvesting exposed AWS IAM keys and using Amazon&#8217;s Simple Email Service (SES) to send phishing emails that pass SPF, DKIM, and DMARC checks.</p><p>Because the emails originate from Amazon infrastructure, they inherit trusted reputation and bypass traditional email filtering. The phishing pages are also hosted on AWS, creating an end-to-end attack chain within a trusted cloud provider.</p><p>This is one of the clearest examples of legitimate infrastructure abuse, where attackers don&#8217;t spoof&#8212;they operate inside the system.</p><p>The real issue here is credential hygiene. Any exposed IAM key becomes a phishing platform, turning your own environment into a threat vector.</p><h2>&#127760; <strong>Apache HTTP/2 RCE &#8211; Internet-Scale Exposure</strong></h2><p>A critical double-free memory corruption vulnerability in Apache HTTP Server enables remote code execution via crafted HTTP/2 requests.</p><p>With Apache powering roughly 30% of the web and HTTP/2 enabled by default, this vulnerability creates massive exposure across internet-facing systems.</p><p>Successful exploitation grants attackers access to application code, credentials, API keys, and even TLS private keys effectively compromising the entire application stack.</p><p>This is a reminder that core internet infrastructure vulnerabilities still represent some of the highest-impact risks in cybersecurity.</p><h2>&#129504; <strong>Venomous Helper Campaign &#8211; Ransomware Precursor in Action</strong></h2><p>A phishing campaign dubbed &#8220;Venomous Helper&#8221; has compromised over 80 organizations by deploying legitimate RMM tools like SimpleHelp and ScreenConnect.</p><p>Because these tools are trusted by EDR platforms, attackers can establish persistence and operate undetected. This is not the final stage of an attack&#8212;it&#8217;s the setup phase, often followed by ransomware deployment within 72 hours.</p><p>This highlights a critical challenge: security tools themselves can become attack vectors when abused, especially when trust-based exclusions are in place.</p><h2>&#128273; <strong>Microsoft Edge Password Storage &#8211; &#8220;By Design&#8221; Risk</strong></h2><p>Microsoft confirmed that Edge loads all saved passwords into memory in cleartext at browser startup and keeps them there for the duration of the session.</p><p>While labeled as &#8220;by design,&#8221; this behavior creates significant risk, especially in shared or compromised environments where attackers with elevated access can extract all stored credentials instantly.</p><p>This is a stark reminder that not all design decisions prioritize security, and organizations must compensate with additional controls like password managers and endpoint protection.</p><h2>&#128240; <strong>MediaWorks Breach &#8211; Data Extortion Without Encryption</strong></h2><p>The WorldLeaks group published 8.5TB of data stolen from a Hungarian media company, focusing on financial records, contracts, and internal communications.</p><p>Unlike traditional ransomware, this group operates without encryption, relying purely on data theft and exposure for extortion.</p><p>This model eliminates the need for decryption keys and shifts the focus entirely to data protection and reputational risk, making backups irrelevant in these scenarios.</p><h2>&#128667; <strong>Cyber-Enabled Cargo Theft &#8211; Digital Meets Physical Crime</strong></h2><p>The FBI warned of a surge in cyber-enabled cargo theft, with attackers compromising logistics platforms and impersonating legitimate carriers to redirect shipments.</p><p>This represents a growing trend where cyber attacks directly impact physical supply chains, enabling theft at scale without traditional interception methods.</p><p>The implication is clear: cybersecurity is now directly tied to operational and physical risk.</p><h2>&#128241; <strong>Facebook Phishing Campaign &#8211; Google Infrastructure Abuse</strong></h2><p>A phishing campaign targeting Facebook users leveraged Google AppSheet infrastructure to send legitimate-looking emails that bypass spam filters.</p><p>This reinforces a growing pattern where attackers use trusted platforms like Google, Microsoft, and AWS to deliver malicious content, rendering traditional domain-based filtering ineffective.</p><p>Organizations must now focus on content and behavior analysis rather than sender reputation alone.</p><h2>&#127942; <strong>Global Cybercrime Crackdown &#8211; $700M Seized</strong></h2><p>In a positive development, an international operation led to the arrest of 276 individuals and the seizure of over $700 million tied to cryptocurrency scam networks.</p><p>This operation disrupted large-scale fraud operations and prevented significant financial losses, demonstrating the impact of coordinated law enforcement efforts.</p><p>While encouraging, it also highlights the scale of the problem, these operations exist because they are highly profitable and resilient.</p><h1>&#127919; <strong>Key Takeaway</strong></h1><p>&#128073; <strong>Trust is being exploited at every layer, identity, infrastructure, and even security controls themselves.</strong></p><h1>&#128736;&#65039; <strong>Action Items for Security Leaders</strong></h1><ul><li><p>&#128272; Patch MOVEit Automation immediately and audit for unauthorized access</p></li><li><p>&#128271; Validate certificate trust stores and update Defender signatures</p></li><li><p>&#9729;&#65039; Rotate AWS IAM keys and audit SES usage for anomalies</p></li><li><p>&#127760; Upgrade Apache HTTP Server to patched versions</p></li><li><p>&#129504; Audit RMM tools across endpoints and remove unauthorized installations</p></li><li><p>&#128273; Deploy enterprise password managers and limit browser credential storage</p></li><li><p>&#128240; Strengthen data protection controls to mitigate extortion risk</p></li><li><p>&#128667; Secure logistics platforms and enforce MFA across supply chain systems</p></li><li><p>&#128233; Enhance email security with content-based detection capabilities</p></li><li><p>&#127942; Monitor fraud and financial crime indicators across organizational ecosystems</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/moveit-automation-authentication/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/moveit-automation-authentication/comments"><span>Leave a comment</span></a></p><h1>&#129504; <strong>James Azar&#8217;s CISOs Take</strong></h1><p>What stood out to me today is how attackers are no longer trying to break trust&#8212;they&#8217;re leveraging it. Whether it&#8217;s AWS SES for phishing, DigiCert certificates for malware signing, or RMM tools for persistence, the common thread is that attackers are operating within systems we inherently trust. That fundamentally changes how we defend, because traditional controls are built around detecting the abnormal&#8212;not the expected.</p><p>The second takeaway is that we need to rethink our security architecture around validation, not assumption. Every system, every integration, every credential needs to be continuously verified. Because in today&#8217;s environment, the question isn&#8217;t whether something is trusted&#8212;it&#8217;s whether that trust has already been compromised.</p><p>&#128293; <strong>Stay Cyber Safe.</strong></p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/moveit-automation-authentication?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/moveit-automation-authentication?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/moveit-automation-authentication?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[Critical cPanel Zero-Day Mass-Exploited in Sorry Ransomware Attacks, Linux Copy Fail Gives Root on Every Major Distro Since 2017 With a 732-Byte Script, Trellix Confirms Source Code Repository Breach ]]></title><description><![CDATA[May the Fourth Be With You! | cPanel 0-Day Fuels Mass Ransomware | 9-Year Linux Root Bug in KEV | PyTorch Lightning Worm | Trellix Source Code Stolen | BlueKit AI Phishing Platform]]></description><link>https://www.cyberhubpodcast.com/p/critical-cpanel-zero-day-mass-exploited</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/critical-cpanel-zero-day-mass-exploited</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Mon, 04 May 2026 13:30:27 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/196372947/2cc36fd618679ea8fc2ba332c2203ba6.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<h1>&#9749; <strong>Good Morning Security Gang,</strong></h1><p>Today&#8217;s episode is absolutely loaded.</p><p>We&#8217;re talking active ransomware outbreaks, supply chain worms hitting AI libraries, a nine-year-old Linux root flaw now weaponized, security vendor source code stolen, and even insiders turning into attackers.</p><p>&#128073; If there&#8217;s one theme today: every layer of trust&#8212;code, infrastructure, people&#8212;is under active assault.</p><p>Double espresso in hand, let&#8217;s get into it.</p><h1>&#129517; <strong>Executive Summary</strong></h1><p>Today&#8217;s landscape reflects a convergence of exploit velocity, supply chain compromise, insider threat, and AI-powered attack scaling. Attackers are exploiting vulnerabilities before disclosure, weaponizing developer ecosystems, and abusing legitimate platforms to bypass defenses.</p><p>We&#8217;re also seeing a dangerous shift where legacy vulnerabilities, insider access, and AI-enhanced tools combine, creating compounding risk across enterprise and critical infrastructure environments. The result is a threat environment where speed, scale, and trust exploitation define success for attackers.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3MjL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8b68773-e9f1-45b4-a5ab-731d89fce72f_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3MjL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8b68773-e9f1-45b4-a5ab-731d89fce72f_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!3MjL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8b68773-e9f1-45b4-a5ab-731d89fce72f_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!3MjL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8b68773-e9f1-45b4-a5ab-731d89fce72f_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!3MjL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8b68773-e9f1-45b4-a5ab-731d89fce72f_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3MjL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8b68773-e9f1-45b4-a5ab-731d89fce72f_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d8b68773-e9f1-45b4-a5ab-731d89fce72f_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:239052,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/196372947?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8b68773-e9f1-45b4-a5ab-731d89fce72f_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3MjL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8b68773-e9f1-45b4-a5ab-731d89fce72f_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!3MjL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8b68773-e9f1-45b4-a5ab-731d89fce72f_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!3MjL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8b68773-e9f1-45b4-a5ab-731d89fce72f_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!3MjL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8b68773-e9f1-45b4-a5ab-731d89fce72f_1280x720.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>&#128240; <strong>Top Stories &amp; Deep Dive Analysis</strong></h1><div class="pullquote"><p>"Today's through line is ecosystem trust under assault on every axis, all happening simultaneously. The AI training library millions depend on became a credential-stealing worm. The security vendor whose product you run to detect threats has its source code accessed. The incident responder you trusted during your worst day was in at least two documented cases, the attacker. Layer on CISA adding a 9-year-old Linux root escalation to KEV, a mass ransomware wave locking up 44,000 cPanel servers, China running multi-continent espionage while targeting journalists, and an AI-powered phishing platform that turns MFA into security theater. The message is perfectly clear." James Azar</p></div><h2>&#128293; <strong>cPanel Zero-Day &#8211; Ransomware Outbreak at Internet Scale</strong></h2><p>A critical cPanel vulnerability, actively exploited since February before disclosure, is now fueling a large-scale ransomware outbreak. Attackers are deploying the &#8220;Sorry&#8221; ransomware variant, encrypting systems and appending a .sorry extension, with encryption powered by ChaCha20 and protected via embedded RSA keys.</p><p>Over <strong>44,000 compromised IPs</strong> have already been identified, with the vulnerability now added to CISA&#8217;s KEV catalog. Because cPanel serves as a centralized control layer for hosting environments, a single compromise can cascade across websites, databases, and email systems.</p><p>This is not just exploitation it&#8217;s industrial-scale ransomware propagation through shared infrastructure, where hosting providers and MSPs become force multipliers for attackers.</p><h2>&#128039; <strong>Linux &#8220;Copy Fail&#8221; Root Bug &#8211; A 9-Year Vulnerability Goes Live</strong></h2><p>A nine-year-old Linux kernel vulnerability has now been weaponized following public proof-of-concept release, allowing local privilege escalation to root across major distributions including Ubuntu, RHEL, SUSE, and Amazon Linux.</p><p>The exploit works by manipulating page cache behavior, enabling attackers to overwrite controlled memory and escalate privileges. In real-world incidents, attackers chained this flaw with Jenkins access to pivot from low-privileged service accounts directly to root.</p><blockquote><p><em>&#8220;Speed is the attacker&#8217;s advantage, trust is their entry point.&#8221; James Azar</em></p></blockquote><p>This is a classic but dangerous pattern: old vulnerabilities become critical the moment exploit code becomes reliable and accessible, turning dormant risk into immediate operational threat.</p><h2>&#129516; <strong>PyTorch Lightning Supply Chain Worm &#8211; AI Ecosystem Under Attack</strong></h2><p>A compromised version of the PyTorch Lightning library introduced a worm-like capability that steals credentials and propagates itself across both npm and PyPI ecosystems.</p><p>Once installed, the malware:</p><ul><li><p>Exfiltrates developer credentials and cloud tokens</p></li><li><p>Identifies accessible repositories</p></li><li><p>Injects malicious code into other packages</p></li><li><p>Republishes infected versions automatically</p></li></ul><p>This represents a new level of supply chain attack autonomous propagation across ecosystems, where one compromised environment can rapidly infect thousands of downstream projects.</p><p>The fact that this targets AI training libraries makes it even more critical, as these environments often hold sensitive data, models, and infrastructure credentials.</p><h2>&#128737;&#65039; <strong>Trellix Source Code Breach &#8211; Defenders Become Targets</strong></h2><p>Trellix confirmed unauthorized access to portions of its source code repository. While no customer data was impacted, the exposure of product code introduces significant downstream risk.</p><p>Attackers can now analyze detection logic, identify weaknesses, and develop evasion techniques tailored to the platform. This highlights a growing trend: security vendors themselves are high-value targets, as compromising them provides insight into defensive capabilities at scale.</p><p>Even without immediate exploitation, the long-term impact can be significant, as attackers refine their techniques based on stolen intelligence.</p><h2>&#127759; <strong>China&#8217;s ShadowPad Campaign &#8211; Multi-Continent Espionage</strong></h2><p>A China-aligned threat group conducted a widespread espionage campaign targeting government and defense sectors across Asia and extending into Europe.</p><p>The attackers exploited known vulnerabilities in Microsoft Exchange and IIS, deployed web shells for persistence, and used ShadowPad malware for long-term access.</p><p>This campaign demonstrates a dual approach:</p><ul><li><p><strong>Technical exploitation of infrastructure</strong></p></li><li><p><strong>Targeted phishing of civil society groups</strong></p></li></ul><p>This combination allows for both system compromise and human intelligence gathering, reinforcing the complexity of nation-state operations.</p><h2>&#127891; <strong>Canvas Breach &#8211; Sensitive Student Data Exposed Again</strong></h2><p>Instructure, the company behind Canvas, disclosed its second breach in eight months, exposing student data including private messages, accommodation requests, and mental health disclosures.</p><p>This is particularly concerning due to the sensitivity of the data and the regulatory implications. The breach also highlights a recurring issue: attackers returning to previously compromised organizations, exploiting gaps left after initial remediation efforts.</p><p>This creates both legal and reputational risk for institutions and raises concerns about persistent vulnerabilities in educational platforms.</p><h2>&#129302; <strong>BlueKit Phishing-as-a-Service &#8211; AI Supercharges Fraud</strong></h2><p>BlueKit, a new phishing-as-a-service platform, is introducing AI-powered capabilities including voice cloning, adversary-in-the-middle templates, and automated campaign generation.</p><p>The platform supports multiple AI models to create highly convincing phishing content and bypass MFA through real-time token interception.</p><p>This represents the industrialization of phishing, where advanced capabilities are now accessible to low-skill operators, dramatically increasing the scale and effectiveness of attacks.</p><h2>&#129489;&#8205;&#128188; <strong>Insider Threat &#8211; Security Professionals Turned Ransomware Operators</strong></h2><p>Two cybersecurity professionals were sentenced for conducting ransomware attacks against clients their firms were hired to protect.</p><blockquote><p><em>"The irony and danger cannot be overstated. Goldberg himself worked as an incident responder, the professional called in during your worst day was conducting the attacks. Zero trust of privileged insiders, including your own security vendors and your IR firms, is no longer paranoia. It's now hygiene." James Azar</em></p></blockquote><p>This case highlights the reality that insider threat is not theoretical&#8212;it&#8217;s operational. Individuals with deep knowledge of defensive systems can become highly effective attackers, bypassing controls and exploiting trust.</p><p>It reinforces the need for zero trust principles even within security teams and incident response ecosystems.</p><h2>&#128667; <strong>Cargo Theft Surge &#8211; Cyber Meets Physical Supply Chain</strong></h2><p>The FBI warned of a surge in cyber-enabled cargo theft, with losses exceeding $725 million in 2025. Attackers are compromising logistics platforms, altering shipment records, and impersonating legitimate carriers.</p><p>This is a clear example of cyber attacks translating into physical-world impact, where digital compromise leads directly to theft of goods.</p><p>It underscores the expansion of the attack surface into operational and supply chain systems, where traditional cybersecurity controls may not be sufficient.</p><h2>&#128241; <strong>Facebook Phishing Campaign &#8211; Trusted Platforms Abused</strong></h2><p>A phishing campaign hijacked over 30,000 Facebook accounts using Google AppSheet infrastructure to send legitimate-looking emails.</p><p>Because the emails originated from trusted domains, they bypassed traditional spam filters and relied on user interaction to capture credentials.</p><p>This is part of a broader trend of legitimate service abuse, where attackers use trusted platforms as delivery mechanisms, undermining traditional security controls based on reputation.</p><h1>&#128736;&#65039; <strong>Action Items for Security Leaders</strong></h1><ul><li><p>&#128272; Patch cPanel systems immediately and restrict management access</p></li><li><p>&#128039; Apply Linux kernel updates and verify patched versions are active</p></li><li><p>&#129516; Rotate all credentials exposed through AI and package ecosystems</p></li><li><p>&#128640; Audit CI/CD pipelines for unauthorized package modifications</p></li><li><p>&#128737;&#65039; Monitor security vendor advisories for potential downstream risks</p></li><li><p>&#127759; Conduct threat hunting for ShadowPad and web shell activity</p></li><li><p>&#127891; Strengthen data protection controls for sensitive user information</p></li><li><p>&#129302; Implement phishing-resistant MFA and advanced email filtering</p></li><li><p>&#129489;&#8205;&#128188; Enforce zero trust and monitoring for privileged insiders</p></li><li><p>&#128667; Secure logistics and supply chain systems against account compromise</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/critical-cpanel-zero-day-mass-exploited/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/critical-cpanel-zero-day-mass-exploited/comments"><span>Leave a comment</span></a></p><h1>&#129504; <strong>James Azar&#8217;s CISOs Take</strong></h1><p>What stood out to me today is how attackers are chaining together multiple layers of trust. A supply chain compromise leads to credential theft, which leads to infrastructure access, which leads to ransomware deployment. At the same time, insider threats and AI-powered phishing are exploiting the human side of the equation. This isn&#8217;t just about one vulnerability&#8212;it&#8217;s about how everything connects.</p><p>The second takeaway is that we need to rethink how we define security. It&#8217;s no longer enough to secure systems in isolation. We have to secure ecosystems&#8212;developers, vendors, infrastructure, and users all at once. Because attackers are already thinking that way, and if we don&#8217;t, we&#8217;re always going to be reacting instead of leading.</p><p>&#128293; <strong>Stay Cyber Safe.</strong></p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/critical-cpanel-zero-day-mass-exploited?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/critical-cpanel-zero-day-mass-exploited?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/critical-cpanel-zero-day-mass-exploited?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[This Week in Cybersecurity #50]]></title><description><![CDATA[Machine Speed, Human Targets: Supply Chain Compromise, AI Risk, and a Week Where Every Layer Moved Faster Than Defenders Could Follow, Your weekend catch-up on the most critical cybersecurity stories]]></description><link>https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-50</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-50</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Fri, 01 May 2026 20:14:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!PuuN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73b7be0b-5771-427d-8a52-8541845d6613_1920x1080.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3><strong>Good Morning, Security Gang!</strong></h3><p>Double espresso poured. Baby sleeping. Let&#8217;s talk about the week that was.</p><p>If there is a single sentence that captures this week&#8217;s threat landscape, James Azar said it best: attackers are exploiting before defenders even know there is a problem. This week, that was not a rhetorical device it was literal. The cPanel authentication bypass was being actively exploited in the wild before the advisory was published. The SAP npm supply chain attack exfiltrated credentials the moment a CI/CD pipeline pulled a dependency no user interaction, no alert, no window to respond. GitHub&#8217;s RCE was triggered with a single push command from an authenticated user. And LiteLLM was weaponized 36 hours after its SQL injection vulnerability was publicly disclosed.</p><p>This week&#8217;s four episodes also covered the continuing ShinyHunters SaaS campaign now adding Medtronic and Vimeo to its growing list of victims North Korea&#8217;s six-month social engineering campaign against Web3 executives that culminated in a major crypto theft, VECT ransomware that renders data permanently unrecoverable even after payment, and 600-plus industrial control systems exposed via unauthenticated VNC access in energy, water, and government environments.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PuuN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73b7be0b-5771-427d-8a52-8541845d6613_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PuuN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73b7be0b-5771-427d-8a52-8541845d6613_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!PuuN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73b7be0b-5771-427d-8a52-8541845d6613_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!PuuN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73b7be0b-5771-427d-8a52-8541845d6613_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!PuuN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73b7be0b-5771-427d-8a52-8541845d6613_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PuuN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73b7be0b-5771-427d-8a52-8541845d6613_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/73b7be0b-5771-427d-8a52-8541845d6613_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2730931,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/196159415?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73b7be0b-5771-427d-8a52-8541845d6613_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!PuuN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73b7be0b-5771-427d-8a52-8541845d6613_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!PuuN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73b7be0b-5771-427d-8a52-8541845d6613_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!PuuN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73b7be0b-5771-427d-8a52-8541845d6613_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!PuuN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73b7be0b-5771-427d-8a52-8541845d6613_1920x1080.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The geopolitical dimension ran hot as well. Iranian psychological operations targeted U.S. military personnel on WhatsApp. Congress opened investigations into companies using Chinese-developed AI models. The White House convened a senior AI security summit. U.S. Cyber Command warned that foreign adversaries are actively preparing to target the 2026 midterm elections. And a pre-Stuxnet malware strain was uncovered, rewriting the timeline of cyber warfare by at least five years.</p><p>The theme connecting all four episodes: the attack surface is no longer just technical. It is the intersection of identity, automation, AI tooling, human behavior, and geopolitical intent all operating simultaneously, all at machine speed.</p><p>Let&#8217;s get into it.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><h3><strong>&#127760; Geopolitical &amp; Nation-State Threats</strong></h3><p><strong>North Korea: Six-Month Social Engineering Campaign Culminates in Major Crypto Theft</strong></p><p>A North Korea-linked group conducted a six-month campaign targeting Web3 executives, building genuine relationships over time before deploying payloads against wallets, admin panels, and private keys. Unlike traditional phishing, these operations establish trust across weeks or months before any technical action is taken. The campaign culminated in a significant crypto theft demonstrating that the most effective attacks against hardened technical environments often require no technical sophistication at all, just patience and psychology. Humans remain one of the most critical and vulnerable attack surfaces in the stack.</p><p><strong>Iranian Psychological Operations Target U.S. Military Personnel</strong></p><p>An Iran-linked group sent threatening messages via WhatsApp to U.S. military personnel and published personal data of service members online. This is information warfare designed to intimidate and destabilize no system compromise required. Cyber conflict is no longer just about technical disruption. It encompasses psychological pressure, narrative manipulation, and human targeting. Security programs must account for people, not just systems.</p><p><strong>Silk Typhoon: Chinese Cyber Operative Extradited</strong></p><p>A suspected Chinese cyber operative linked to Silk Typhoon, the group behind mass exploitation of Microsoft Exchange vulnerabilities was extradited to the United States. This is a rare but significant development in holding state-aligned actors accountable. While individual extraditions rarely deter nation-state programs, they signal increasing international willingness to pursue legal action against cyber operators who previously operated with impunity.</p><p><strong>Congress Investigates Companies Using Chinese-Developed AI Models</strong></p><p>U.S. lawmakers opened formal investigations into organizations using AI models developed in China, citing data exposure, censorship risk, and intellectual property concerns. AI vendor selection is no longer purely a technical or commercial decision. It is a geopolitical and national security decision. Organizations should evaluate AI supply chains not just for performance and cost, but for data sovereignty and vendor geopolitical alignment.</p><p><strong>Election Security Warning: 2026 Midterms in the Crosshairs</strong></p><p>The head of U.S. Cyber Command and the NSA formally warned that foreign adversaries are actively preparing to target the 2026 midterm elections. Concerns were also raised about reduced federal coordination with state and local election security programs. This fragmentation at exactly the moment adversary preparation is intensifying creates measurable gaps in election infrastructure protection. This is not a hypothetical risk. It is a known and anticipated threat requiring proactive preparation now.</p><p><strong>White House Convenes Senior AI Security Summit</strong></p><p>Senior White House officials convened a cybersecurity summit with leading AI and technology executives to address security risks associated with advanced AI systems ahead of major upcoming releases including Anthropic&#8217;s Mythos. The White House itself is operating at the AI security policy level not delegating to CISA or DHS. Organizations should expect board-level questions about AI risk management, regulatory requirements, and enterprise AI security posture to accelerate significantly in the coming months.</p><p><strong>Pre-Stuxnet Malware Discovered: Cyber Warfare Timeline Rewritten</strong></p><p>SentinelLabs uncovered a malware strain predating Stuxnet by at least five years, targeting engineering and simulation platforms used in nuclear research operational as early as 2005. This discovery rewrites the accepted timeline of nation-state cyber warfare. Sophisticated sabotage capabilities existed and were deployed against critical infrastructure nearly two decades ago. The implication for practitioners: the adversary advantage in offensive cyber development is older and deeper than previously understood.</p><h3><strong>&#127973; Healthcare &amp; SaaS Supply Chain Breaches</strong></h3><p><em>&#8220;Cyber risk isn&#8217;t just technical anymore &#8212; it&#8217;s financial, human, and regulatory all at once.&#8221;</em></p><p><strong>Medtronic Breach: ShinyHunters Claims 9 Million Records</strong></p><p>Medtronic confirmed unauthorized access to corporate IT systems following ShinyHunters claims of over 9 million records and terabytes of internal data. The breach pattern aligns with the broader ShinyHunters campaign: phishing into an identity provider, pivoting into SaaS platforms, and extracting data at scale. Even if medical devices and patient systems were unaffected, exposure of corporate workflows and PII creates downstream risk for targeted phishing against healthcare providers and field engineers &#8212; expanding the blast radius well beyond the initial compromise.</p><p><strong>Vimeo Breach: Third-Party Analytics Vendor Compromised</strong></p><p>Vimeo confirmed a breach stemming from a compromise of its third-party analytics vendor, Anodot, exposing customer emails, video metadata, and technical information. ShinyHunters set a public ransom deadline, threatening data release if demands were not met. This continues the SaaS-through-third-party attack pattern we have been tracking across multiple victims. Metadata and email exposure from platforms like Vimeo enable highly targeted phishing against content creators and enterprise users who trust the platform&#8217;s communications.</p><p><strong>ADT Breach: Phishing &#8594; Okta &#8594; Salesforce Chain Confirmed</strong></p><p>ADT disclosed a breach where attackers leveraged phishing against Okta to gain entry and pivot into Salesforce, with a potential 10 million record leak. This is now a firmly established and repeating attack chain: phishing targets the identity provider, which becomes the pivot into SaaS platforms, which become the source of large-scale data extraction. SaaS ecosystems are only as secure as the identity layer protecting them and attackers have learned this better than most defenders.</p><p><strong>Checkmarx Breach Escalates: Source Code Hits Dark Web</strong></p><p>Data from Checkmarx&#8217;s previously disclosed GitHub repository compromise has now been published on the dark web, removing any containment possibility. Attackers originally injected credential-stealing code into GitHub Actions workflows, meaning any environment that interacted with those pipelines may have leaked tokens or credentials. Response has now shifted from containment to damage control and credential rotation at scale. If your organization uses Checkmarx tooling, assume exposure and rotate everything.</p><h3><strong>&#129302; AI &amp; Developer Supply Chain</strong></h3><p><strong>SAP npm Supply Chain Attack: CI/CD Pipelines Exfiltrating Credentials at Machine Speed</strong></p><p>Four official SAP npm packages were compromised in an attack dubbed &#8220;Mini Shehulud,&#8221; embedding a malicious pre-install script that executed automatically the moment a CI/CD pipeline pulled the package. The payload silently exfiltrated GitHub tokens, npm credentials, cloud provider secrets across AWS, Azure, and GCP, and Kubernetes configurations pushing stolen data into attacker-controlled repositories. No user interaction. No alert window. One infected dependency cascading across thousands of environments within minutes. This is supply chain compromise operating at machine speed.</p><p><strong>GitHub RCE: One Push Command Compromises the Instance</strong></p><p>A critical command injection vulnerability in GitHub&#8217;s git push pipeline allows authenticated users with push access to execute remote code on the instance with a single command. <strong><a href="http://github.com/">GitHub.com</a></strong> deployed a rapid fix, but self-hosted and enterprise GitHub environments remain at risk until patched. CI/CD pipelines are designed for automation and speed, and that same efficiency becomes a catastrophic liability when a single authenticated action can achieve full system compromise.</p><p><strong>LiteLLM SQL Injection: Exploited 36 Hours After Disclosure</strong></p><p>Attackers began exploiting a pre-authentication SQL injection vulnerability in LiteLLM, the AI gateway platform connecting multiple AI providers just 36 hours after public disclosure. LiteLLM stores API keys and cloud credentials as a core function of its operation, making it a high-value extraction target. AI orchestration layers are being deployed without the security rigor applied to traditional infrastructure, and attackers have identified this gap. The exploitation timeline of 36 hours is the signal. There is no longer any grace period between disclosure and active weaponization for high-value targets.</p><p><strong>Gemini CLI RCE: AI Pipeline Becomes Remote Execution Layer</strong></p><p>A critical vulnerability in Google&#8217;s Gemini CLI allows remote code execution in CI environments by abusing trusted workspace configurations and environment variables. In headless or automated environments, the CLI implicitly trusts local configuration files, allowing attackers to embed malicious settings in repositories that execute upon pipeline invocation. AI tooling is now functioning as a remote execution attack surface within automated workflows that frequently lack human oversight.</p><p><strong>73 Malicious VS Code Extensions: Sleeper Model in Developer Ecosystems</strong></p><p>Researchers identified 73 fake extensions in the Open VSX marketplace linked to the Glass Worm operation. The attack model is particularly sophisticated: extensions initially appeared benign, building trust over time before later updates introduced malicious payloads typosquatting popular tools, using delayed activation, and delivering secondary payloads through GitHub-hosted components. A single compromised extension exposes source code, credentials, and SSH keys from every developer workstation running it.</p><p><strong>PyPI Package Hijack: Elementary-Data Supply Chain Compromise</strong></p><p>The &#8220;elementary-data&#8221; package &#8212; 1.1 million monthly downloads was hijacked with attackers publishing a malicious version exfiltrating credentials, environment variables, and crypto wallets. The attack used GitHub Actions script injection to forge legitimate commits and distribute compromised builds simultaneously through the CI/CD pipeline. Attackers are targeting package registries and CI/CD pipelines simultaneously to maximize propagation velocity.</p><p><strong>Cursor AI RCE: Cloning a Repository Compromises the Developer</strong></p><p>A critical vulnerability in the Cursor AI development tool allows attackers to achieve remote code execution simply by convincing a developer to clone a malicious repository. Pre-commit hooks execute automatically during routine operations no additional user action required. Developer workstations are high-value targets not just because of what they contain, but because of where they connect. Compromised developer environments provide direct pathways into production systems, source code repositories, and cloud credentials.</p><p><strong>npm and PyPI Worm: Cross-Ecosystem Autonomous Propagation Continues</strong></p><p>The self-propagating worm we have been tracking continues expanding across both npm and PyPI ecosystems, harvesting developer credentials, using stolen tokens to publish malicious packages, and propagating automatically. One compromised developer machine can infect multiple ecosystems within hours. Containment requires revocation of all tokens across both platforms not just the packages themselves.</p><h3><strong>&#128275; Vulnerabilities &amp; Infrastructure Exploitation</strong></h3><p><strong>cPanel Authentication Bypass: Exploited Before Disclosure</strong></p><p>A critical authentication bypass in cPanel and WHM was being actively exploited in the wild before the official advisory and patch were released. Because cPanel functions as a multi-tenant hosting control plane, a single compromised instance grants attackers access to websites, databases, email servers, and administrative controls across multiple customers simultaneously. Hosting providers globally responded by blocking access ports at the network level while racing to deploy fixes. Pre-disclosure exploitation with no defender warning window is now a regular occurrence not an exceptional one.</p><p><strong>OT Exposure: 600+ ICS Panels Accessible Without Authentication</strong></p><p>Forescout identified over 600 industrial control system and operational technology panels exposed via unauthenticated VNC access, with nearly 60,000 VNC servers globally lacking authentication. These systems span energy, water, manufacturing, and government environments. Attackers do not need advanced exploits they need access. And these systems are handing it over without any credential requirement. Basic security hygiene failures in OT environments create nation-state-level risk.</p><p><strong>CISA KEV Additions: SimpleHelp, Samsung MagicINFO, D-Link Routers</strong></p><p>CISA added multiple actively exploited vulnerabilities to the KEV catalog this week. SimpleHelp is particularly notable as a remote support tool, a compromised technician account does not just impact one system. It cascades across every client environment that tool manages, turning a single foothold into multi-tenant compromise at scale.</p><p><strong>Firestarter Backdoor: Persists on Federal Cisco ASA After Firmware Updates</strong></p><p>A Linux-based backdoor called Firestarter was discovered on a federal Cisco ASA firewall, persisting through firmware updates by intercepting termination signals and relaunching itself. Standard patching does nothing to remove it. The only effective remediation is full power down, device reimaging, and rotation of all credentials tied to the device. Edge infrastructure is now a long-term persistence layer not just an entry point. Patching alone is no longer sufficient for compromised edge devices.</p><p><strong>Pack2TheRoot: 12-Year Linux Privilege Escalation Flaw</strong></p><p>A privilege escalation vulnerability present in Linux since 2014 has been confirmed exploitable across major distributions. Any low-privileged malware landing on a Linux endpoint can exploit PackageKit to immediately escalate to root. This is not a zero-day, it is worse. It is a decade-old design flaw that persisted unnoticed, providing a reliable escalation path for any attacker who achieves initial access to a Linux system.</p><p><strong>Windows Zero-Click Vulnerability: Patch Regression Creates New Attack Path</strong></p><p>CVE-2026-32202 stems from an incomplete patch to a previous Windows vulnerability, enabling zero-click exploitation via malicious LNK files. Attackers can trigger NTLM authentication or bypass security prompts simply by having the file present, no user interaction required. Patch regression risk, where incomplete fixes open new attack paths is increasingly common and demands validation testing of remediation effectiveness, not just deployment confirmation.</p><p><strong>Chrome and Firefox: Critical Memory Safety Patches</strong></p><p>Both Chrome and Firefox released critical patches addressing memory safety issues and use-after-free vulnerabilities enabling remote code execution. Browsers remain one of the most consistently targeted attack surfaces. These updates are not optional hygiene, they are active defense. Enforce automatic updates across all enterprise endpoints without exception.</p><p><strong>Itron Breach: Utility Supply Chain Risk</strong></p><p>Itron disclosed unauthorized access to corporate IT systems, with no customer environments impacted. Itron operates in the utility and grid-edge ecosystem. Even a corporate-level breach at a critical infrastructure vendor raises legitimate concerns about downstream supply chain risk and insider knowledge that could inform future targeting.</p><p><strong>Apple App Store: 26 Fake Crypto Wallet Apps</strong></p><p>Kaspersky identified 26 malicious crypto wallet apps on Apple&#8217;s App Store impersonating Coinbase, MetaMask, and other major platforms. These apps harvested recovery phrases and used OCR to extract sensitive data from screenshots. App store trust is no longer a reliable security boundary, particularly for financial applications. MDM policies restricting unverified app installation are an essential enterprise control.</p><h3><strong>&#128176; Financial Cybercrime &amp; Fraud</strong></h3><p><strong>$2.1 Billion Social Media Scam Surge: FTC Report</strong></p><p>Americans lost over $2.1 billion to social media-driven scams in 2025 an eightfold increase since 2020 with investment scams accounting for more than half the total. Cyber risk is no longer confined to enterprise systems. Social platforms are the primary entry point for fraud at consumer scale, and that fraud is funded by the same criminal ecosystems targeting enterprises. Awareness and education are as critical as technical controls for organizations whose employees and customers are exposed to these platforms.</p><p><strong>Robinhood Phishing Abuse: Legitimate Infrastructure Weaponized</strong></p><p>Attackers created Robinhood accounts using email address variations exploiting Gmail&#8217;s dot normalization to trigger legitimate login notifications from Robinhood&#8217;s own infrastructure. These emails passed SPF, DKIM, and DMARC checks because they were genuinely sent by Robinhood. This marks a shift from email spoofing to platform abuse: turning trusted communication infrastructure itself into the phishing vector. Traditional email authentication defenses are completely bypassed. Detection relies on application-layer validation and user awareness.</p><p><strong>Cyber Insurance Data: Misconfigured MFA Drives 26% of Total Losses</strong></p><p>Cyber insurance data reveals that misconfigured MFA accounts for nearly 26% of total cyber losses, the single largest contributing factor. Ransomware represents a smaller portion of incidents but drives the majority of financial damage. This is a powerful data point for board-level conversations: basic security controls, when improperly implemented, produce outsized financial consequences. MFA is not a checkbox, it is a precision control that fails expensively when misconfigured.</p><p><strong>VECT Ransomware: Encryption Designed for Destruction, Not Recovery</strong></p><p>Checkpoint Research analysis confirmed that VECT ransomware&#8217;s encryption process is fundamentally flawed by design discarding critical data during encryption and making recovery impossible even after ransom payment. This transforms ransomware into a wiper event disguised as extortion. Organizations impacted by VECT cannot recover data regardless of compliance with demands. Prevention and offline backup integrity are the only viable defenses.</p><p><strong>DraftKings: 60,000 Accounts via Credential Stuffing</strong></p><p>The DraftKings credential stuffing case, 60,000 accounts compromised through reused passwords, continues to remind practitioners that the oldest attacks remain effective because the oldest defenses remain absent. No zero-days. No advanced techniques. Phishing-resistant authentication and credential monitoring are still the most impactful controls organizations can deploy per dollar invested.</p><p><strong>Black Axe Arrests: Organized Cybercrime Disrupted</strong></p><p>European authorities arrested ten members of the Black Axe cybercrime network responsible for large-scale financial fraud, romance scams, and money laundering. These networks operate like structured businesses with defined roles and global reach, and they rebuild quickly after disruption. The broader signal is that cybercrime has reached full industrial maturity, requiring coordinated international responses rather than isolated enforcement actions.</p><h3><strong>&#9878;&#65039; Policy, Regulation &amp; Industry</strong></h3><p><strong>AI Regulation Advances: Bipartisan Legislation on Chatbot Safety</strong></p><p>New bipartisan legislation targets AI chatbot regulation with focus on fraud prevention, parental controls, and transparency requirements. For organizations deploying AI systems, this signals incoming compliance requirements, data transparency obligations, and enhanced fraud detection responsibilities. Begin mapping AI data flows and regulatory exposure now, before requirements become mandates.</p><blockquote><p><em>&#8220;JD Vance, whether you like him or not as vice president, is Ivy League educated, a very smart individual, a younger VP with time in Silicon Valley working with some of the big players in the venture capital space. The West Wing is leading the charge here, they&#8217;re not waiting for the cyber czar or CISA or DHS or even the Pentagon. The White House itself is operating at this level on AI security. We ought to prepare ourselves for board-level questions of what may happen here.&#8221;</em></p></blockquote><p><strong>Cyber Insurance Data Drives Board Alignment</strong></p><p>The insurance data showing MFA misconfiguration driving 26% of total losses provides a rare opportunity: a quantified, dollar-denominated risk metric that boards understand and respond to more effectively than technical risk descriptions. Use this data actively in executive and board conversations to justify investment in identity security controls.</p><p><strong>Singapore Infrastructure Incident: Third-Party Contractor Access</strong></p><p>A cybersecurity incident affecting a contractor involved in Singapore&#8217;s MRT rail and water infrastructure highlights third-party access risk in critical systems. Even when core systems are not directly compromised, contractor access creates pathways that require strict monitoring and access controls as rigorous as those applied to internal staff.</p><p><strong>Iran Threat Model Shift: From Destruction to Influence Operations</strong></p><p>Industry analysts are reframing Iran&#8217;s cyber posture as shifting from large-scale infrastructure attacks toward targeted breaches amplified through information operations. The new model: breach a target, publicize it, and amplify impact through media narrative. Perception and narrative are now as strategically valuable as technical disruption. Incident response plans must account for reputational and information warfare scenarios, not just technical recovery.</p><h3><strong>&#9989; This Week&#8217;s Priority Action List</strong></h3><p><strong>Immediate (Do This Now)</strong></p><ul><li><p>Audit and rotate all credentials and tokens exposed through SAP npm packages &#8212; AWS, Azure, GCP, Kubernetes configs, GitHub tokens, npm credentials</p></li><li><p>Patch cPanel and WHM immediately and review access logs for exploitation indicators predating the advisory</p></li><li><p>Patch GitHub Enterprise and restrict push access permissions &#8212; single authenticated push achieves RCE</p></li><li><p>Upgrade and secure LiteLLM deployments and rotate all exposed API keys &#8212; exploited 36 hours post-disclosure</p></li><li><p>Patch Chrome and Firefox across all enterprise endpoints &#8212; enforce automatic updates, no exceptions</p></li><li><p>Remove unauthenticated VNC access from all OT and ICS environments immediately 600+ exposed panels confirmed</p></li><li><p>Reimage and hard-reset any Cisco ASA devices with suspected Firestarter persistence patching alone does not remove this backdoor</p></li><li><p>Patch all CISA KEV-listed vulnerabilities including SimpleHelp, Samsung MagicINFO, and D-Link flaws</p></li></ul><p><strong>Short-Term (This Month)</strong></p><ul><li><p>Rotate all npm and PyPI developer tokens across all environments, worm continues propagating</p></li><li><p>Restrict developer environments to approved extensions and package sources with enforced allowlists</p></li><li><p>Pin and cryptographically verify all dependencies in npm, PyPI, and other package ecosystems</p></li><li><p>Audit all AI tooling in CI/CD pipelines and restrict implicit environment trust in Gemini CLI and similar tools</p></li><li><p>Audit Checkmarx pipeline interactions and rotate all credentials that may have been exposed</p></li><li><p>Patch Linux systems for Pack2TheRoot privilege escalation across all distributions</p></li><li><p>Apply Windows CVE-2026-32202 patch and validate remediation effectiveness &#8212; patch regression confirmed</p></li><li><p>Implement MDM policies restricting unverified mobile app installation</p></li></ul><p><strong>Strategic (This Quarter)</strong></p><ul><li><p>Treat all ransomware scenarios as potential wiper events &#8212; validate backup integrity and offline recovery capability independently of vendor assurance</p></li><li><p>Prepare board-level AI security briefings, White House summit signals accelerating regulatory attention</p></li><li><p>Begin mapping AI data flows and vendor geopolitical risk exposure for compliance readiness</p></li><li><p>Implement phishing-resistant MFA across all executive and high-value accounts insurance data shows misconfiguration is the single largest loss driver</p></li><li><p>Use cyber insurance loss data to frame identity security investment in financial terms for executive and board audiences</p></li><li><p>Train personnel on social engineering and psychological cyber tactics, North Korean six-month relationship campaigns are the model</p></li><li><p>Develop incident response playbooks specifically for reputational and information warfare scenario</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-50/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-50/comments"><span>Leave a comment</span></a></p><h3><strong>&#127897;&#65039; James Azar&#8217;s CISO&#8217;s Take</strong></h3><p>When I look across this week&#8217;s four episodes, the story that ties everything together is tempo. Attackers are not waiting for defenders to catch up &#8212; and in several cases this week, they were already inside before the advisory was published, before the patch was available, before the organization knew there was anything to defend against. The cPanel bypass, the SAP npm attack, the LiteLLM exploitation window of 36 hours: these are not exceptional cases. They are the new baseline. Security teams that measure their response cycle in days are now fundamentally misaligned with the threat environment they are operating in. Real-time visibility, automated response, and pre-built playbooks are no longer aspirational &#8212; they are operational requirements.</p><p>The second takeaway is that the attack surface has expanded to include everything we have automated, integrated, and trusted without continuous validation. AI pipelines. Developer tooling. SaaS identity chains. Remote support platforms. Third-party analytics vendors. Election infrastructure. The organizations that will remain resilient are the ones that treat every automated trust relationship as a potential attack vector &#8212; not because they assume compromise, but because they verify continuously rather than assuming safety. That mindset shift, from perimeter defense to continuous validation across every trusted system, is the defining security challenge of this moment.</p><p><strong>Stay Cyber Safe.</strong> &#128272;</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-50?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-50?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-50?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[Iran-Linked Handala Sends Threatening WhatsApp Messages to US Troops in Bahrain, TeamPCP's Mini Shai-Hulud Compromises SAP npm Packages, NSA Chief Warns Foreign Adversaries Likely to Target Midterm ]]></title><description><![CDATA[SAP npm Supply Chain Attack | cPanel Auth Bypass Exploited | 670 ICS Panels Wide Open | Cursor AI Critical RCE | Handala Threatens US Troops in Bahrain | NSA Chief Warns on Midterms]]></description><link>https://www.cyberhubpodcast.com/p/iran-linked-handala-sends-threatening</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/iran-linked-handala-sends-threatening</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Thu, 30 Apr 2026 13:31:08 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/195954587/9aa0cf91d63f0ba721fdd5403b956cde.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<h1>&#9749; <strong>Good Morning Security Gang,</strong></h1><p>Today&#8217;s episode is one of those where you can feel the pressure building across every layer of cybersecurity from supply chain attacks to critical infrastructure exposure to geopolitical cyber threats.</p><blockquote><p>If there&#8217;s one theme across everything we covered today, it&#8217;s this:<br>&#128073; Attackers are moving faster than our ability to detect, respond, and even patch.</p></blockquote><p>Double espresso in hand, let&#8217;s get into it.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xbS6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6169a1b2-0183-4559-a87f-a4ef8bbaaf3b_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xbS6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6169a1b2-0183-4559-a87f-a4ef8bbaaf3b_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!xbS6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6169a1b2-0183-4559-a87f-a4ef8bbaaf3b_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!xbS6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6169a1b2-0183-4559-a87f-a4ef8bbaaf3b_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!xbS6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6169a1b2-0183-4559-a87f-a4ef8bbaaf3b_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xbS6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6169a1b2-0183-4559-a87f-a4ef8bbaaf3b_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6169a1b2-0183-4559-a87f-a4ef8bbaaf3b_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:177386,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/195954587?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6169a1b2-0183-4559-a87f-a4ef8bbaaf3b_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!xbS6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6169a1b2-0183-4559-a87f-a4ef8bbaaf3b_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!xbS6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6169a1b2-0183-4559-a87f-a4ef8bbaaf3b_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!xbS6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6169a1b2-0183-4559-a87f-a4ef8bbaaf3b_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!xbS6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6169a1b2-0183-4559-a87f-a4ef8bbaaf3b_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>&#129517; <strong>Executive Summary</strong></h1><p>Today&#8217;s show highlights a dangerous acceleration in supply chain compromise, infrastructure exploitation, and nation-state cyber activity. We&#8217;re seeing attackers weaponize CI/CD pipelines, exploit authentication systems before patches are even deployed, and target both critical infrastructure and democratic institutions.</p><p>At the same time, AI tooling and geopolitical tensions are converging, creating a landscape where technical risk, human targeting, and policy decisions are colliding in real time. The takeaway is clear: security teams must operate at attacker speed or risk falling behind.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><h1>&#128240; <strong>Top Stories &amp; Deep Dive Analysis</strong></h1><h2>&#129516; <strong>SAP npm Supply Chain Attack &#8211; CI/CD Pipelines Compromised in Real Time</strong></h2><p>Four official SAP npm packages were compromised in a supply chain attack dubbed &#8220;Mini Shehulud,&#8221; where attackers embedded a malicious pre-install script that executed automatically when pulled into CI/CD pipelines. The payload silently exfiltrated GitHub tokens, npm credentials, cloud provider secrets (AWS, Azure, GCP), and Kubernetes configurations.</p><p>What makes this attack particularly dangerous is its automation. The moment a pipeline pulled the infected package, the compromise was complete no user interaction required. The stolen data was even pushed into attacker-controlled GitHub repositories, signaling a highly organized and repeatable attack model.</p><p>This is supply chain compromise at machine speed. One infected dependency can cascade across thousands of environments within minutes, turning developer pipelines into mass credential exfiltration engines.</p><h2>&#128275; <strong>cPanel Authentication Bypass &#8211; Exploited Before Disclosure</strong></h2><p>A critical authentication bypass vulnerability in cPanel and WHM was actively exploited in the wild before the official advisory and patch were released. Hosting providers globally responded by blocking access ports at the network level while racing to deploy fixes.</p><p>This vulnerability is particularly impactful because of cPanel&#8217;s role as a multi-tenant hosting control plane. A single compromised instance can grant attackers access to websites, databases, email servers, and administrative controls across multiple customers.</p><p>The most concerning aspect here is timing&#8212;attackers were already exploiting the flaw before defenders even knew it existed, reinforcing the growing trend of pre-disclosure exploitation and shrinking response windows.</p><h2>&#127981; <strong>OT Exposure &#8211; Hundreds of Critical Systems Accessible Without Authentication</strong></h2><p>Forescout identified over 600 industrial control system (ICS) and operational technology (OT) panels exposed via unauthenticated VNC access, with nearly 60,000 VNC servers globally lacking proper authentication.</p><p>These systems span energy, water, manufacturing, and government environments, meaning exploitation could have direct physical consequences. Attackers don&#8217;t need advanced exploits here&#8212;just access.</p><p>This is a stark reminder that basic security hygiene failures in OT environments can create nation-state-level risks, especially as these systems remain connected to the internet without proper safeguards.</p><h2>&#127760; <strong>Browser Security Updates &#8211; Critical Vulnerabilities Require Immediate Action</strong></h2><p>Both Chrome and Firefox released patches addressing critical vulnerabilities, including memory safety issues and use-after-free bugs that could allow remote code execution or data disclosure.</p><p>While these updates may seem routine, they are not optional. Browsers remain one of the most exposed attack surfaces in any organization, and delayed patching can provide attackers with an easy foothold into enterprise environments.</p><p>This is a reminder that endpoint hygiene is still one of the most effective defensive measures available.</p><h2>&#129302; <strong>Cursor AI RCE &#8211; Developer Workstations Become Entry Points</strong></h2><p>A critical vulnerability in Cursor AI allows attackers to achieve remote code execution simply by convincing a developer to clone a malicious repository. The exploit leverages pre-commit hooks that execute automatically during routine operations.</p><p>This transforms developer environments into high-value targets. Once compromised, attackers can access source code, API keys, and infrastructure credentials, effectively pivoting into broader enterprise systems.</p><p>The risk here extends beyond the vulnerability itself, it&#8217;s the combination of automation, trust, and developer behavior, which together create a powerful attack vector.</p><h2>&#127464;&#127475; <strong>AI Supply Chain Scrutiny &#8211; Congress Investigates Chinese Model Usage</strong></h2><p>U.S. lawmakers are investigating companies using AI models developed in China, raising concerns about data exposure, censorship, and intellectual property risks.</p><p>This marks a shift where AI is no longer just a technology issue, it&#8217;s a national security concern. Organizations must now consider not just performance and cost, but also geopolitical risk when selecting AI vendors.</p><p>Expect increased regulation and scrutiny in this space as governments seek to control the flow of sensitive data and protect domestic innovation.</p><h2>&#127470;&#127479; <strong>Iranian Psychological Cyber Operations &#8211; Targeting U.S. Personnel</strong></h2><p>An Iran-linked group conducted a psychological operation by sending threatening messages via WhatsApp to U.S. military personnel and publishing personal data of service members.</p><p>While not a direct system compromise, this represents a form of information warfare designed to intimidate and destabilize. These operations blur the line between cyber and psychological tactics, expanding the definition of cyber threats beyond traditional technical attacks.</p><p>This is a reminder that cyber conflict is not just about systems, it&#8217;s about people and perception.</p><h2>&#128110; <strong>Black Axe Arrests &#8211; Disrupting Organized Cybercrime</strong></h2><p>European authorities arrested ten members of the Black Axe cybercrime network, known for large-scale financial fraud, romance scams, and money laundering operations.</p><p>This highlights the industrialization of cybercrime, where organized groups operate like businesses with structured roles and global reach. While arrests are a positive step, these networks are resilient and often quickly rebuild.</p><p>The broader takeaway is that cybercrime is now a mature, global industry, requiring coordinated international responses.</p><h2>&#128499;&#65039; <strong>Election Security Warning &#8211; Midterms in the Crosshairs</strong></h2><p>The head of U.S. Cyber Command and the NSA warned that foreign adversaries are expected to target the 2026 midterm elections. At the same time, concerns were raised about reduced federal support for election security initiatives.</p><p>This creates a potential gap in coordination between federal, state, and local entities responsible for protecting election infrastructure. As adversaries continue to refine their tactics, this fragmentation could increase risk.</p><p>This is not a hypothetical scenario, it&#8217;s a known and anticipated threat, requiring proactive preparation across all levels of government.</p><h1>&#128736;&#65039; <strong>Action Items for Security Leaders</strong></h1><ul><li><p>&#128272; Audit and rotate all credentials exposed through SAP npm packages immediately</p></li><li><p>&#128187; Patch cPanel systems and review logs for unauthorized access attempts</p></li><li><p>&#127981; Remove unauthenticated VNC access from all OT and ICS environments</p></li><li><p>&#127760; Push Chrome and Firefox updates across all endpoints without delay</p></li><li><p>&#129302; Restrict AI development tools and audit repository sources before cloning</p></li><li><p>&#129513; Evaluate AI vendor supply chains for geopolitical and data risk</p></li><li><p>&#129504; Train personnel on social engineering and psychological cyber tactics</p></li><li><p>&#128110; Monitor for financial fraud indicators tied to organized cybercrime groups</p></li><li><p>&#128499;&#65039; Strengthen election security coordination across state and local systems</p></li><li><p>&#128202; Align detection and response capabilities with faster attack timelines</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/iran-linked-handala-sends-threatening/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/iran-linked-handala-sends-threatening/comments"><span>Leave a comment</span></a></p><h1>&#129504; <strong>James Azar&#8217;s CISOs Take</strong></h1><p>What stood out to me today is how quickly attackers are moving. Whether it&#8217;s the SAP supply chain attack or the cPanel vulnerability, the pattern is the same exploitation is happening before organizations even know there&#8217;s a problem. That fundamentally changes how we need to think about defense. It&#8217;s no longer about reacting quickly, it&#8217;s about anticipating where the next attack will happen and closing those gaps before they&#8217;re exploited.</p><p>The second takeaway is the convergence of cyber and geopolitical risk. From AI supply chain concerns to election security warnings, cybersecurity is now deeply tied to national security and global stability. As CISOs, we&#8217;re not just protecting systems anymore, we&#8217;re part of a much larger ecosystem that includes policy, economics, and human behavior. And that means our role is only going to get more complex from here.</p><p>&#128293; <strong>Stay Cyber Safe.</strong></p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/iran-linked-handala-sends-threatening?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/iran-linked-handala-sends-threatening?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/iran-linked-handala-sends-threatening?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[Critical GitHub RCE Vulnerability Allows Full Server Compromise With a Single Git Push, VECT 2.0 Ransomware Revealed as Accidental Data Wiper, ShinyHunters Breach Vimeo]]></title><description><![CDATA[Vimeo confirms ShinyHunters/Anodot breach, GitHub patches CVE-2026-3854 RCE, LiteLLM exploited 36 hours after disclosure, VECT 2.0 wiper masquerades as ransomware, North Korea hunts Web3 execs]]></description><link>https://www.cyberhubpodcast.com/p/critical-github-rce-vulnerability</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/critical-github-rce-vulnerability</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Wed, 29 Apr 2026 13:31:16 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/195825718/de5ebe079e495def4ff4eafb927cc2c5.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p><em>Daily cybersecurity news for security practitioners &#8212; no FUD, just risk, impact, and mitigation. </em></p><h1>&#9749; <strong>Good Morning Security Gang,</strong></h1><p>Today&#8217;s episode is one of those that hits every layer of the stack from SaaS breaches to AI exploitation, from ransomware evolution to geopolitical cyber pressure.</p><p>And if there&#8217;s one theme that ties everything together today, it&#8217;s this:<br>&#128073; Attackers are targeting both the systems that run your environment and the people who have access to them.</p><p>Double espresso in hand, let&#8217;s dive in.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!f4M2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc50b6ba7-beb7-4f2b-9ce5-f0869d6ffa2c_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f4M2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc50b6ba7-beb7-4f2b-9ce5-f0869d6ffa2c_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!f4M2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc50b6ba7-beb7-4f2b-9ce5-f0869d6ffa2c_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!f4M2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc50b6ba7-beb7-4f2b-9ce5-f0869d6ffa2c_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!f4M2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc50b6ba7-beb7-4f2b-9ce5-f0869d6ffa2c_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f4M2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc50b6ba7-beb7-4f2b-9ce5-f0869d6ffa2c_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c50b6ba7-beb7-4f2b-9ce5-f0869d6ffa2c_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:282604,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/195825718?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc50b6ba7-beb7-4f2b-9ce5-f0869d6ffa2c_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f4M2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc50b6ba7-beb7-4f2b-9ce5-f0869d6ffa2c_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!f4M2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc50b6ba7-beb7-4f2b-9ce5-f0869d6ffa2c_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!f4M2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc50b6ba7-beb7-4f2b-9ce5-f0869d6ffa2c_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!f4M2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc50b6ba7-beb7-4f2b-9ce5-f0869d6ffa2c_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>&#129517; <strong>Executive Summary</strong></h1><p>Today&#8217;s episode highlights a convergence of SaaS supply chain breaches, CI/CD vulnerabilities, AI gateway exploitation, and evolving ransomware tactics. At the same time, nation-state actors are doubling down on long-term social engineering campaigns, while governments begin aligning policy and regulation around AI security.</p><p>The risk environment is no longer siloed identity, automation, AI, and human behavior are now interconnected attack surfaces, and attackers are exploiting them simultaneously.</p><h1>&#128240; <strong>Top Stories &amp; Deep Dive Analysis</strong></h1><h2>&#127909; <strong>Vimeo Breach &#8211; Third-Party Risk Continues to Expand</strong></h2><p>Vimeo confirmed a breach stemming from a compromise of its third-party analytics vendor, Anodot, exposing customer data including emails, video metadata, and technical information. ShinyHunters has set a public deadline for ransom payment, threatening to release the data if demands are not met.</p><p>This is part of a broader campaign we&#8217;ve been tracking across multiple organizations, where attackers compromise SaaS ecosystems through third-party integrations rather than direct attacks. The real risk here isn&#8217;t just the exposed data, it&#8217;s the follow-on attacks. Metadata and email exposure enable highly targeted phishing campaigns, especially against content creators and enterprise users relying on Vimeo workflows.</p><h2>&#128187; <strong>GitHub RCE &#8211; One Push to Compromise the System</strong></h2><p>A critical command injection vulnerability in GitHub&#8217;s <code>git push</code> pipeline allows authenticated users with push access to execute remote code on the instance with a single command. While GitHub.com deployed a rapid fix, self-hosted and enterprise environments remain at risk until patched.</p><p>This vulnerability represents a direct threat to the software development lifecycle. CI/CD pipelines are designed for automation and speed, but this same efficiency becomes a liability when exploited. Attackers gaining control of these pipelines can inject malicious code, access secrets, and compromise production environments without needing traditional lateral movement.</p><h2>&#129302; <strong>LiteLLM Exploit &#8211; AI Gateway Becomes Data Exfiltration Tool</strong></h2><p>Attackers began exploiting a pre-authentication SQL injection vulnerability in LiteLLM just 36 hours after disclosure. As a gateway platform connecting multiple AI providers, LiteLLM stores API keys and credentials, making it a high-value target.</p><p>The vulnerability allows attackers to extract sensitive data directly from backend databases, including cloud credentials and API keys. This highlights a growing issue AI orchestration layers are being deployed without the same security rigor as traditional infrastructure, creating new high-risk entry points into enterprise environments.</p><h2>&#128163; <strong>VECT Ransomware &#8211; When Encryption Becomes Destruction</strong></h2><p>Checkpoint Research analyzed VECT ransomware, revealing that its encryption process is fundamentally flawed. Instead of enabling decryption after payment, the malware discards critical data during encryption, effectively making recovery impossible.</p><p>This transforms ransomware into a wiper event disguised as extortion. Organizations impacted by VECT cannot recover data even if they pay, shifting the focus entirely to prevention and resilience. This represents a dangerous evolution where attackers either don&#8217;t care about recovery&#8212;or are unable to provide it.</p><h2>&#129504; <strong>North Korea Campaign &#8211; Six Months of Social Engineering</strong></h2><p>A North Korea-linked group conducted a six-month campaign targeting Web3 executives, using sophisticated social engineering techniques to gain access to wallets, admin panels, and private keys.</p><p>The campaign culminated in a major crypto theft, demonstrating the effectiveness of long-term, relationship-based attacks. Unlike traditional phishing, these operations build trust over time, making them far more difficult to detect and prevent. This reinforces that humans remain one of the most critical and vulnerable attack surfaces.</p><h2>&#128647; <strong>Singapore Infrastructure Incident &#8211; Supply Chain in Critical Systems</strong></h2><p>A cybersecurity incident affecting a contractor involved in Singapore&#8217;s MRT rail and water infrastructure highlights the risk of third-party access to critical systems.</p><p>Even though public-facing data may be available elsewhere, the contractor&#8217;s access to internal systems introduces a potential pathway for attackers into sensitive infrastructure environments. This underscores the importance of tight access control and monitoring for vendors operating within critical sectors.</p><h2>&#127963;&#65039; <strong>White House AI Cyber Huddle &#8211; Policy Meets Technology</strong></h2><p>Senior U.S. officials convened a cybersecurity summit with leading AI and tech executives to address risks associated with advanced AI systems ahead of upcoming releases like Anthropic&#8217;s Mythos.</p><div class="pullquote"><p>"JD Vance, whether you like him or not as vice president, is Ivy League educated, a very smart individual, a younger VP with time in Silicon Valley working with some of the big players in the venture capital space. The West Wing is leading the charge here they're not waiting for the cyber czar or CISA or DHS or even the Pentagon. The White House itself is operating at this level on AI security. We ought to prepare ourselves for board-level questions of what may happen here." James Azar</p></div><p>This signals a shift where AI security is no longer just a technical issue&#8212;it&#8217;s a national priority. Organizations should expect increased scrutiny, regulatory requirements, and board-level discussions around AI risk management in the near future.</p><h2>&#128220; <strong>AI Regulation Advances &#8211; Bipartisan Momentum Builds</strong></h2><p>New bipartisan legislation aims to regulate AI chatbot usage, focusing on fraud prevention, parental controls, and transparency.</p><p>This aligns with broader federal efforts to establish guardrails around AI deployment. For organizations, this means preparing for compliance requirements, data transparency expectations, and enhanced fraud detection responsibilities tied to AI systems.</p><h2>&#128202; <strong>Cyber Insurance Data &#8211; MFA Misconfiguration Leads Losses</strong></h2><p>Cyber insurance data reveals that misconfigured MFA accounts for nearly 26% of total losses, making it the single largest contributor to financial impact. Meanwhile, ransomware represents a smaller portion of incidents but drives the majority of financial damage.</p><blockquote><p>&#8220;Cyber risk isn&#8217;t just technical anymore, it&#8217;s financial, human, and regulatory all at once.&#8221;</p></blockquote><p>This provides a clear, data-driven insight: basic security controls, when misconfigured, can have outsized financial consequences. It also highlights how boards respond more effectively to financial metrics than technical risk descriptions.</p><h1>&#128736;&#65039; <strong>Action Items for Security Leaders</strong></h1><ul><li><p>&#128272; Rotate credentials and tokens tied to SaaS and AI integrations</p></li><li><p>&#128187; Patch GitHub Enterprise and audit push access permissions immediately</p></li><li><p>&#129302; Upgrade and secure LiteLLM deployments; rotate exposed API keys</p></li><li><p>&#128190; Treat ransomware scenarios as potential wiper events; validate backups</p></li><li><p>&#129504; Implement phishing-resistant MFA, especially for executive accounts</p></li><li><p>&#128647; Audit third-party access to critical infrastructure systems</p></li><li><p>&#127963;&#65039; Prepare board-level briefings on AI security and regulatory risk</p></li><li><p>&#128220; Begin mapping AI data flows and compliance requirements</p></li><li><p>&#128202; Use cyber insurance data to justify budget and control investments</p></li><li><p>&#128269; Monitor for abnormal activity in CI/CD and AI pipeline environments</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/critical-github-rce-vulnerability/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/critical-github-rce-vulnerability/comments"><span>Leave a comment</span></a></p><h2>&#129504; <strong>James Azar&#8217;s CISOs Take</strong></h2><p>What stood out to me today is how attackers are blending technical exploitation with human manipulation. The GitHub RCE and LiteLLM vulnerabilities show how easily automation layers can be compromised, while the North Korea campaign highlights how effective patient social engineering can be. When these two come together&#8212;technical access and human trust&#8212;the impact becomes exponential.</p><p>The second takeaway is that cybersecurity is no longer just about defense&#8212;it&#8217;s about alignment. Alignment between security and business, between technology and policy, and between risk and financial impact. The cyber insurance data makes it clear: when we frame risk in dollars, it resonates. And that&#8217;s how we drive real change at the executive level.</p><p>&#128293; <strong>Stay Cyber Safe.</strong></p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/critical-github-rce-vulnerability?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/critical-github-rce-vulnerability?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/critical-github-rce-vulnerability?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[🎙️ Pre-Stuxnet Malware Resurfaces Amid Tensions | Windows Zero-Click Risk Grows | $2.1B Scam Surge 🚨]]></title><description><![CDATA[Zero-Click Windows Exploits, AI Pipeline RCE, and a $21B Scam Economy, Why Trust and Automation Are Breaking Together]]></description><link>https://www.cyberhubpodcast.com/p/pre-stuxnet-malware-resurfaces-amid</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/pre-stuxnet-malware-resurfaces-amid</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Tue, 28 Apr 2026 13:31:55 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/195710023/d03eeff838c47e63f4632333a13bb946.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<h1>&#9749; <strong>Good Morning Security Gang,</strong></h1><p>Today&#8217;s episode is one of those where you step back and realize just how fast everything is evolving and breaking at the same time.</p><p>We&#8217;ve got zero-click Windows exploitation, AI pipeline RCE, supply chain compromise hitting critical developer ecosystems, a massive spike in social engineering fraud, and even a pre-Stuxnet malware discovery rewriting cyber history.</p><p>&#128073; The theme today is simple: automation and trust are being weaponized simultaneously.</p><p>Double espresso ready, let&#8217;s go.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!d_GV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ac6c339-7c9f-485b-a4b0-12cda56ec4a8_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!d_GV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ac6c339-7c9f-485b-a4b0-12cda56ec4a8_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!d_GV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ac6c339-7c9f-485b-a4b0-12cda56ec4a8_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!d_GV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ac6c339-7c9f-485b-a4b0-12cda56ec4a8_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!d_GV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ac6c339-7c9f-485b-a4b0-12cda56ec4a8_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!d_GV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ac6c339-7c9f-485b-a4b0-12cda56ec4a8_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2ac6c339-7c9f-485b-a4b0-12cda56ec4a8_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:253035,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/195710023?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ac6c339-7c9f-485b-a4b0-12cda56ec4a8_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!d_GV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ac6c339-7c9f-485b-a4b0-12cda56ec4a8_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!d_GV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ac6c339-7c9f-485b-a4b0-12cda56ec4a8_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!d_GV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ac6c339-7c9f-485b-a4b0-12cda56ec4a8_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!d_GV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ac6c339-7c9f-485b-a4b0-12cda56ec4a8_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>&#129517; <strong>Executive Summary</strong></h1><p>Today&#8217;s landscape reflects a convergence of identity abuse, developer ecosystem compromise, AI tooling risk, and large-scale financial fraud. Attackers are leveraging legitimate infrastructure, trusted platforms, and automation pipelines to operate at unprecedented speed and scale.</p><p>We&#8217;re also seeing regression in patching effectiveness, with incomplete fixes enabling zero-click exploitation, and a continued shift toward developer environments and AI pipelines as primary attack surfaces. Meanwhile, consumer fraud is reaching record levels, proving that cyber risk is no longer just enterprise, it&#8217;s societal.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><h1>&#128240; <strong>Top Stories &amp; Deep Dive Analysis</strong></h1><h2>&#127973; <strong>Medtronic Breach &#8211; ShinyHunters Expands the SaaS Playbook</strong></h2><p>Medtronic confirmed unauthorized access to corporate IT systems after ShinyHunters claimed over 9 million records and terabytes of internal data. The company executed its incident response plan, and the leak listing has since disappeared typically a signal of ransom negotiations or payment.</p><p>What matters here is the pattern. This aligns with previous breaches targeting SaaS ecosystems phishing identity providers and pivoting into platforms like Salesforce. Even if no medical devices or patient systems were impacted, the exposure of corporate workflows and PII creates a downstream risk for targeted phishing against healthcare providers and field engineers, expanding the blast radius beyond the initial breach.</p><h2>&#128233; <strong>Robinhood Phishing Abuse &#8211; Legitimate Infrastructure Turned Weapon</strong></h2><p>This is one of the most creative attacks we&#8217;ve seen.</p><p>Attackers created Robinhood accounts using email variations (leveraging Gmail&#8217;s dot normalization), triggering legitimate login notifications sent from Robinhood&#8217;s own infrastructure. These emails passed all authentication checks&#8212;SPF, DKIM, DMARC, but included a malicious link embedded within user-controlled fields.</p><p>This marks a shift from spoofing to platform abuse, where attackers weaponize trusted communication channels themselves. The risk is significant because traditional email defenses are bypassed entirely making detection reliant on application-layer validation and user awareness rather than technical controls alone.</p><h2>&#128176; <strong>$2.1 Billion Social Media Scam Surge &#8211; Cybercrime at Scale</strong></h2><p>The FTC reported that Americans lost over $2.1 billion to social media-driven scams in 2025, an eightfold increase since 2020. Investment scams alone accounted for more than half of that total.</p><p>This isn&#8217;t just a statistic, it&#8217;s a signal. Social platforms have become the primary entry point for fraud, with attackers leveraging trust, relationships, and financial pretexts to drive engagement.</p><p>The real takeaway is that cyber risk is no longer confined to enterprise systems. It&#8217;s now deeply embedded in consumer behavior, social interaction, and financial decision-making, making awareness and education just as critical as technical controls.</p><h2>&#128275; <strong>Checkmarx Breach Escalation &#8211; Source Code Hits the Dark Web</strong></h2><p>Checkmarx confirmed that data from its GitHub repositories, compromised during a March supply chain attack, has now been published on the dark web.</p><p>This escalation removes any ambiguity the exposure is now global and permanent. Attackers previously injected credential-stealing code into GitHub Actions workflows, meaning any environment that interacted with those pipelines may have leaked sensitive tokens or credentials.</p><p>This is a critical moment for defenders: once data is public, response shifts from containment to damage control and credential rotation at scale.</p><h2>&#129513; <strong>73 Malicious VS Code Extensions &#8211; Developer Layer Under Attack</strong></h2><p>Researchers identified 73 fake extensions in the Open VSX marketplace linked to the Glass Worm operation. These extensions initially appeared benign, building trust before later updates introduced malicious payloads.</p><p>The attack chain includes:</p><ul><li><p>Typosquatting popular extensions</p></li><li><p>Delayed activation (&#8220;sleeper&#8221; model)</p></li><li><p>Secondary payload delivery via GitHub-hosted components</p></li></ul><p>This is a direct attack on the developer ecosystem. A single compromised extension can expose source code, credentials, and SSH keys, turning a developer workstation into a high-value entry point for attackers.</p><h2>&#129516; <strong>PyPI Package Hijack &#8211; Supply Chain Risk in Data Engineering</strong></h2><p>The widely used &#8220;elementary-data&#8221; package (1.1M monthly downloads) was hijacked, with attackers publishing a malicious version that exfiltrated credentials, environment variables, and crypto wallets.</p><p>The attack leveraged GitHub Actions script injection to gain access, forge legitimate commits, and distribute compromised builds.</p><p>This highlights a growing trend: attackers targeting CI/CD pipelines and package registries simultaneously, enabling rapid propagation across developer environments and production systems.</p><h2>&#129695; <strong>Windows Zero-Click Vulnerability &#8211; Patch Regression Exploited</strong></h2><p>Akamai revealed that a recent Windows vulnerability (CVE-2026-32202) stems from an incomplete patch to a previous flaw, enabling zero-click exploitation via malicious LNK files.</p><p>Attackers can now trigger NTLM authentication or bypass security prompts simply by having the file present&#8212;no user interaction required.</p><p>This is particularly concerning because it demonstrates patch regression risk, where incomplete fixes create new attack paths. It also reinforces that patching alone is not a guarantee of security.</p><h2>&#129302; <strong>Gemini CLI RCE &#8211; AI Pipeline Becomes Attack Vector</strong></h2><p>A critical vulnerability in Google&#8217;s Gemini CLI allows remote code execution in CI environments by abusing trusted workspace configurations and environment variables.</p><p>In headless or automated environments, the CLI implicitly trusts local files and settings, allowing attackers to embed malicious configurations in repositories that execute upon pipeline invocation.</p><p>This turns AI tooling into a remote execution layer within CI/CD pipelines, expanding the attack surface into automated workflows that often lack human oversight.</p><h2>&#127464;&#127475; <strong>Silk Typhoon Extradition &#8211; State Actors Face Consequences</strong></h2><p>A suspected Chinese cyber operative linked to Silk Typhoon was extradited to the U.S., facing charges tied to the mass exploitation of Microsoft Exchange vulnerabilities.</p><p>This marks a rare but significant development in holding state-aligned actors accountable. While it may not deter all activity, it signals increasing willingness to pursue legal action against cyber operators globally.</p><h2>&#129504; <strong>Pre-Stuxnet Malware Discovery &#8211; Cyber Warfare Started Earlier Than We Thought</strong></h2><p>SentinelLabs uncovered a malware strain predating Stuxnet by at least five years, targeting engineering and simulation platforms used in nuclear research.</p><p>This discovery rewrites the timeline of cyber warfare, showing that sophisticated sabotage capabilities existed as early as 2005.</p><p>The implication is profound: cyber operations as strategic tools have been evolving far longer than most organizations have been defending against them.</p><h1>&#128736;&#65039; <strong>Action Items for Security Leaders</strong></h1><ul><li><p>&#128272; Rotate all credentials tied to Checkmarx and compromised CI pipelines</p></li><li><p>&#128233; Audit transactional email templates for user-controlled input injection</p></li><li><p>&#129513; Restrict developer environments to approved extensions and package sources</p></li><li><p>&#129516; Pin and verify all dependencies in npm and PyPI ecosystems</p></li><li><p>&#129695; Apply Windows patches and monitor for abnormal NTLM authentication activity</p></li><li><p>&#129302; Secure AI tooling in CI/CD pipelines and restrict environment trust boundaries</p></li><li><p>&#128176; Implement organization-wide awareness training on social media scams</p></li><li><p>&#128269; Monitor SaaS platforms for phishing-based identity compromise patterns</p></li><li><p>&#128202; Enhance detection for OAuth abuse and API-based data exfiltration</p></li><li><p>&#127757; Incorporate geopolitical cyber activity into risk modeling and response plans</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/pre-stuxnet-malware-resurfaces-amid/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/pre-stuxnet-malware-resurfaces-amid/comments"><span>Leave a comment</span></a></p><h1>&#129504; <strong>James Azar&#8217;s CISOs Take</strong></h1><p>What stood out to me today is how attackers are leveraging trust at every level from email infrastructure to developer tools to AI pipelines. We&#8217;ve spent years building systems to automate and simplify workflows, but in doing so, we&#8217;ve also created pathways that attackers can exploit with minimal friction. The Robinhood case and the Gemini CLI vulnerability are perfect examples of how legitimate systems can be turned into attack vectors.</p><p>The second takeaway is speed. Supply chain attacks, phishing campaigns, and fraud operations are all happening faster than ever before. By the time we detect an issue, attackers have already pivoted, propagated, and monetized. That means our defenses need to evolve not just to prevent compromise, but to detect and respond in near real time. Because in this environment, the organizations that can&#8217;t keep up won&#8217;t just fall behind, they&#8217;ll become targets.</p><p>&#128293; <strong>Stay Cyber Safe.</strong></p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/pre-stuxnet-malware-resurfaces-amid?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/pre-stuxnet-malware-resurfaces-amid?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/pre-stuxnet-malware-resurfaces-amid?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[Cisco IOS XE "Firestarter" Hits KEV, ADT 10M-Record Leak, Gen. Haugh's Iran Escalation Warning, what defenders need to do today.]]></title><description><![CDATA[Federal Backdoors, SaaS Breach Chains, and a 12-Year Linux Flaw&#8212;Why Exposure and Tempo Are Defining Cyber Risk]]></description><link>https://www.cyberhubpodcast.com/p/cisco-ios-xe-firestarter-hits-kev</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/cisco-ios-xe-firestarter-hits-kev</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Mon, 27 Apr 2026 13:31:11 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/195582943/832b9254bd7038f23af58447a7f3342b.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<h1>&#9749; <strong>Good Morning Security Gang,</strong></h1><p>We&#8217;re kicking off the week with a <strong>packed 10-story rundown</strong> that hits everything from federal edge compromises to SaaS breach chains, supply chain worms, and even a 12-year-old Linux root flaw still alive and well.</p><p>If last week was about trust breaking, this week is about <strong>exposure at speed</strong>. Attackers are moving faster, pivoting across ecosystems, and exploiting anything left unpatched, unsegmented, or simply forgotten.</p><p>Double espresso ready; let&#8217;s get into it.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6cmA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa70b7bc0-6fbd-45bb-b8bb-2cc8a182f7a6_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6cmA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa70b7bc0-6fbd-45bb-b8bb-2cc8a182f7a6_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!6cmA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa70b7bc0-6fbd-45bb-b8bb-2cc8a182f7a6_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!6cmA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa70b7bc0-6fbd-45bb-b8bb-2cc8a182f7a6_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!6cmA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa70b7bc0-6fbd-45bb-b8bb-2cc8a182f7a6_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6cmA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa70b7bc0-6fbd-45bb-b8bb-2cc8a182f7a6_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a70b7bc0-6fbd-45bb-b8bb-2cc8a182f7a6_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:243680,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/195582943?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa70b7bc0-6fbd-45bb-b8bb-2cc8a182f7a6_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6cmA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa70b7bc0-6fbd-45bb-b8bb-2cc8a182f7a6_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!6cmA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa70b7bc0-6fbd-45bb-b8bb-2cc8a182f7a6_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!6cmA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa70b7bc0-6fbd-45bb-b8bb-2cc8a182f7a6_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!6cmA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa70b7bc0-6fbd-45bb-b8bb-2cc8a182f7a6_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>&#129517; <strong>Executive Summary</strong></h1><p>Today&#8217;s stories highlight two critical realities:</p><ol><li><p>Exposure is everywhere&#8212;from SaaS identity chains to federal firewalls to developer ecosystems</p></li><li><p>Tempo is accelerating&#8212;attackers are chaining exploits, pivoting faster, and monetizing access almost immediately</p></li></ol><p>We&#8217;re seeing convergence across edge infrastructure compromise, SaaS phishing chains, supply chain propagation, and legacy system exploitation, all amplified by a pace that most organizations struggle to match operationally.</p><h2>&#128737;&#65039; <strong>CISA KEV Additions &#8211; Remote Access Tools Become Enterprise Gateways</strong></h2><p>CISA added multiple actively exploited vulnerabilities to the KEV catalog, including flaws in SimpleHelp, Samsung MagicINFO, and D-Link routers.</p><p>What makes this particularly dangerous is the role these systems play. SimpleHelp, for example, is widely used as a remote support tool. A compromised technician account doesn&#8217;t just impact one system&#8212;it can cascade across every client environment that tool touches.</p><p>This is a recurring pattern: attackers aren&#8217;t targeting endpoints&#8212;they&#8217;re targeting tools that manage endpoints, turning a single foothold into multi-tenant compromise.</p><h2>&#128293; <strong>Firestarter Backdoor &#8211; Federal Cisco ASA Compromise Persists</strong></h2><p>A Linux-based backdoor dubbed <em>Firestarter</em> was discovered on a federal Cisco ASA firewall, persisting even after firmware updates.</p><p>The malware survives by intercepting termination signals and relaunching itself, meaning standard patching or rebooting does nothing to remove it.</p><p>This changes the playbook. Instead of patching, organizations must fully power down, reimage, and rotate all credentials tied to the device.</p><p>The broader implication is serious: edge infrastructure is now a long-term persistence layer for attackers, not just an entry point.</p><h2>&#127968; <strong>ADT Breach &#8211; Phishing to SaaS Chain Hits Again</strong></h2><p>ADT disclosed a breach involving unauthorized access to cloud environments, with attackers leveraging phishing against Okta to gain entry and pivot into Salesforce.</p><p>This is now a well-established attack chain:</p><ul><li><p>Phishing &#8594; Identity provider compromise</p></li><li><p>Pivot &#8594; SaaS platform access</p></li><li><p>Extract &#8594; Customer data at scale</p></li></ul><p>With a 10 million record leak potentially imminent, this case reinforces that SaaS ecosystems are only as secure as the identity layer protecting them.</p><p>And attackers know it.</p><h2>&#129513; <strong>Checkmarx Supply Chain Attack &#8211; CI/CD Integrity at Risk</strong></h2><p>Checkmarx was hit again, with attackers compromising Docker images and VS Code extensions tied to its KICS analysis tool.</p><p>Although exposure lasted less than 90 minutes, that&#8217;s more than enough time in modern pipelines. Any system pulling updates during that window could now be compromised.</p><p>This highlights a key issue: CI/CD pipelines operate at machine speed, but security validation often lags behind, creating a window attackers can exploit repeatedly.</p><h2>&#128039; <strong>Pack2TheRoot &#8211; 12-Year Linux Privilege Escalation Flaw</strong></h2><p>A privilege escalation flaw present since 2014 has been confirmed exploitable across major Linux distributions.</p><p>This vulnerability allows a low-privileged user to escalate to root through PackageKit, meaning any malware landing on a Linux endpoint can immediately gain full control.</p><p>This is not a zero-day, it&#8217;s worse. It&#8217;s a decade-old design flaw that went largely unnoticed, proving that legacy components remain one of the biggest risks in modern environments.</p><h2>&#9889; <strong>Itron Breach &#8211; Utility Supply Chain Risk Expands</strong></h2><p>Itron disclosed unauthorized access to corporate IT systems, though no customer environments were impacted.</p><p>Even so, the implications are significant. Itron operates in the utility and grid-edge ecosystem, meaning any compromise raises concerns about downstream risk to critical infrastructure.</p><p>This reinforces a key shift: attackers are increasingly targeting vendors and suppliers as indirect entry points into high-value environments.</p><h2>&#129516; <strong>NPM &#8594; PyPI Worm &#8211; Cross-Ecosystem Supply Chain Attack</strong></h2><p>The supply chain worm we&#8217;ve been tracking continues to evolve, now spreading across both npm and PyPI ecosystems.</p><p>This worm:</p><ul><li><p>Harvests credentials from developer environments</p></li><li><p>Uses stolen tokens to publish malicious packages</p></li><li><p>Propagates automatically across repositories</p></li></ul><p>This is supply chain compromise at industrial scale. One compromised developer machine can now infect multiple ecosystems within hours, making containment extremely difficult.</p><h2>&#128190; <strong>Vercel Data Leak &#8211; Breach Data Hits Underground Markets</strong></h2><p>Data from the earlier Vercel breach has now surfaced for sale, including access keys, source code, and internal databases.</p><p>Although the listing was removed, the assumption must be that the data is already circulating.</p><p>The attack chain starting with infostealer malware and OAuth token theft&#8212;shows how endpoint compromise can quickly escalate into cloud environment exposure.</p><h2>&#128241; <strong>Apple App Store &#8211; 26 Fake Crypto Wallet Apps Discovered</strong></h2><p>Kaspersky identified 26 malicious crypto wallet apps on Apple&#8217;s App Store, impersonating major platforms like Coinbase and MetaMask.</p><p>These apps harvested recovery phrases and even used OCR to extract sensitive data from screenshots.</p><p>This challenges a long-held assumption: app stores are no longer a reliable trust boundary, especially for financial applications.</p><h2>&#127757; <strong>Iran Threat Model &#8211; From Destruction to Influence</strong></h2><p>Industry leaders are reframing Iran&#8217;s cyber posture, suggesting a shift from large-scale infrastructure attacks to targeted opportunistic breaches amplified through information operations.</p><p>Instead of shutting down power grids, the focus is now:</p><ul><li><p>Breach a target</p></li><li><p>Publicize it</p></li><li><p>Amplify impact through media</p></li></ul><p>This aligns with broader geopolitical trends where perception and narrative are as valuable as technical impact.</p><h1>&#127919; <strong>Key Takeaway</strong></h1><p>&#128073; <strong>Exposure + Speed = Modern Cyber Risk</strong></p><p>Attackers are no longer waiting. They&#8217;re exploiting, pivoting, and monetizing in real time.</p><h1>&#128736;&#65039; <strong>Action Items for Security Leaders</strong></h1><ul><li><p>&#128272; Patch all KEV-listed vulnerabilities immediately</p></li><li><p>&#128293; Reimage and hard reset compromised edge devices (do not rely on patching alone)</p></li><li><p>&#129513; Enforce phishing-resistant MFA across identity providers</p></li><li><p>&#128269; Audit SaaS integrations, especially Okta and Salesforce chains</p></li><li><p>&#128640; Validate CI/CD pipelines and restrict external dependency pulls</p></li><li><p>&#128039; Patch Linux systems and monitor for privilege escalation activity</p></li><li><p>&#129516; Rotate all npm and PyPI tokens and enforce strict credential hygiene</p></li><li><p>&#9889; Conduct vendor risk assessments for critical infrastructure suppliers</p></li><li><p>&#128241; Restrict unverified mobile app installations through MDM policies</p></li><li><p>&#127757; Prepare incident response playbooks for reputational and information warfare scenarios</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/cisco-ios-xe-firestarter-hits-kev/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/cisco-ios-xe-firestarter-hits-kev/comments"><span>Leave a comment</span></a></p><h1>&#129504; <strong>James Azar&#8217;s CISOs Take</strong></h1><p>What stood out to me today is how much of our risk is tied to systems we assume are already secure. Whether it&#8217;s a firewall that survives patching, a SaaS chain built on identity trust, or a Linux component that&#8217;s been around for over a decade, attackers are finding value in what we&#8217;ve stopped questioning. That&#8217;s the real challenge, we&#8217;re defending what we see, while attackers exploit what we&#8217;ve forgotten.</p><p>The second takeaway is tempo. Every story today reflects a faster cycle from compromise to propagation to monetization. Supply chain worms spread in hours. SaaS breaches turn into data leaks within days. If our detection and response don&#8217;t match that speed, we&#8217;re always going to be behind. The future of security isn&#8217;t just about control it&#8217;s about <strong>keeping up</strong>.</p><p>&#128293; <strong>Stay Cyber Safe.</strong></p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/cisco-ios-xe-firestarter-hits-kev?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/cisco-ios-xe-firestarter-hits-kev?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/cisco-ios-xe-firestarter-hits-kev?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[This Week in Cybersecurity #49]]></title><description><![CDATA[Your weekend catch-up on the most critical cybersecurity stories of the week, curated by James Azar and the CyberHub Security Gang.]]></description><link>https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-49</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-49</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Fri, 24 Apr 2026 15:12:37 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!4eCm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7176628-2c84-4c86-a959-e949aeaa00ca_1920x1080.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3><strong>Good Morning, Security Gang!</strong></h3><p>James is settling into new-parent mode &#8212; running on three hours of sleep and double espresso, which, as he puts it, is excellent preparation for a career in cybersecurity incident response. Welcome to the party, baby Azar.</p><div class="pullquote"><p><em>&#8220;A career in cyber will help you understand what it&#8217;s like to only function on three or four hours of sleep. If you&#8217;ve ever been through an incident, you know the marathon you&#8217;re going through in the hours and days post-event until you get the all-clear signal. Your career kind of prepares you for parenting &#8212; so don&#8217;t hold back, go make yourself some little ones, join the party, it&#8217;s a blast!&#8221;</em></p></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4eCm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7176628-2c84-4c86-a959-e949aeaa00ca_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4eCm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7176628-2c84-4c86-a959-e949aeaa00ca_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!4eCm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7176628-2c84-4c86-a959-e949aeaa00ca_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!4eCm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7176628-2c84-4c86-a959-e949aeaa00ca_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!4eCm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7176628-2c84-4c86-a959-e949aeaa00ca_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4eCm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7176628-2c84-4c86-a959-e949aeaa00ca_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f7176628-2c84-4c86-a959-e949aeaa00ca_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2724425,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/195358974?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7176628-2c84-4c86-a959-e949aeaa00ca_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4eCm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7176628-2c84-4c86-a959-e949aeaa00ca_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!4eCm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7176628-2c84-4c86-a959-e949aeaa00ca_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!4eCm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7176628-2c84-4c86-a959-e949aeaa00ca_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!4eCm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7176628-2c84-4c86-a959-e949aeaa00ca_1920x1080.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>This week&#8217;s briefing comes at you from a threat environment that is, frankly, firing on every cylinder simultaneously. Let&#8217;s set the stage:</p><p>France&#8217;s national identity agency confirmed a breach exposing up to 19 million records names, birthdates, addresses, civil status, a foundational identity dataset now in attacker hands. A self-propagating npm worm is autonomously spreading malicious code across developer ecosystems, targeting both npm and PyPI in a single chain. Microsoft issued an emergency out-of-band patch for an <strong><a href="http://asp.net/">ASP.NET</a></strong> Core authentication forgery flaw. Cisco&#8217;s SD-WAN control plane vulnerability landed on CISA&#8217;s KEV list with a hard federal deadline. The Vercel breach confirmed exactly how AI OAuth integrations create insider-equivalent access through third-party tools. And Lotus wiper malware is actively burning Venezuelan energy infrastructure no ransomware, no negotiation, just destruction.</p><p>Meanwhile, April 2026 is on pace to be the worst month for crypto theft since February 2025, with over $606 million lost in 18 days including Lazarus Group&#8217;s $290 million KelpDAO exploit. North Korea is running a financial operation that functions less like a hacking group and more like a nation-state treasury department.</p><p>The through-line across every story this week is trust. Every attack exploited something that was supposed to be safe an authentication cookie, an OAuth grant, a sandboxed AI environment, a national identity database, a ransomware negotiation firm. Once attackers compromise trust at any layer, everything built on top of it inherits the risk.</p><p>Coffee cup cheers. Let&#8217;s get into it.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><h3><strong>&#127760; Geopolitical Cyber Warfare</strong></h3><p><strong>Lotus Wiper Malware Targets Venezuelan Energy Infrastructure</strong></p><p>Lotus wiper malware is actively targeting energy and utility organizations in Venezuela, operating at a low level to erase data, eliminate recovery mechanisms, and render systems unrecoverable. Unlike ransomware, there is no negotiation, no ransom demand, and no recovery path. The intent is permanent operational disruption specifically targeting power generation and distribution infrastructure. This is cyber operations being deployed as a tool of strategic disruption, not financial crime. Wiper attacks don&#8217;t negotiate. They erase.</p><p><strong>ZionSiphon Malware Targets Water Treatment and Desalination Systems</strong></p><p>ZionSiphon malware is targeting water treatment and desalination infrastructure, with code that specifically references chlorine handling processes and water purification systems including references to water supply manipulation. This isn&#8217;t theoretical. Early-stage OT malware with real-world consequence potential is already in the wild. We saw what nearly happened in Oldsmar, Florida, where a single analyst prevented a chlorine dosing attack. This is that playbook evolving. Baseline OT behavior and monitor for any unauthorized process changes immediately.</p><p><strong>Sweden Attributes Heating Plant Attack to Russian-Linked Actors</strong></p><p>Swedish officials confirmed attribution of a cyberattack on a district heating plant to a pro-Russian group connected to Russian intelligence. The attack failed operationally. But intent is the story. Civilian infrastructure heating, power, water is being targeted not to destroy, but to create societal pressure and psychological instability. Gray-zone warfare doesn&#8217;t require success to be effective. The attempt alone achieves its geopolitical objective.</p><p><strong>Iranian Reconnaissance: 12,000 Systems Scanned</strong></p><p>More than 12,000 systems were scanned in a campaign mirroring Iranian reconnaissance patterns. Combined with nearly 4,000 U.S. industrial devices remaining internet-exposed, this represents active pre-positioning at scale. Scanning is preparation, not attack. The attack comes later with precision, against targets already mapped.</p><p><strong>AgingFly Malware Targets Ukrainian Government and Hospitals</strong></p><p>The AgingFly malware strain continues targeting Ukrainian government agencies and healthcare systems a deliberate campaign against the institutions that sustain public life during conflict. Disrupting hospitals and government services doesn&#8217;t require military action. It just requires persistence and the right malware.</p><h3><strong>&#128165; Destructive Attacks &amp; Ransomware</strong></h3><p><strong>NHS Ransomware: Two Years Later, Still Broken</strong></p><p>Nearly two years after a ransomware attack, NHS healthcare services in London are still dealing with operational fallout thousands of delayed procedures, disrupted diagnostics, and persistent system degradation. This is the story the headlines missed when the initial incident faded. Ransomware is not a data problem with a recovery timeline. It is a multi-year operational crisis, and in healthcare, that crisis is measured in patient outcomes. Cyber incidents don&#8217;t end when systems come back online. They end when operations fully recover and in healthcare, that may take years.</p><p><strong>Gentleman Ransomware and SystemBC: Reading the Pre-Attack Signals</strong></p><p>Ransomware groups are deploying SystemBC malware as the pre-attack staging layer establishing proxy tunnels, encrypted C2 channels, and persistent access before ransomware is ever deployed. By the time encryption begins, attackers have already mapped the environment, harvested credentials, and established control. The real opportunity to stop ransomware is at this stage. Detecting SystemBC is detecting the attack before it completes.</p><p><strong>Akira Ransomware Hits Defense Supply Chain Manufacturers</strong></p><p>Akira continues targeting manufacturing and engineering firms that serve as suppliers to larger enterprises in aerospace and defense. A breach at this tier doesn&#8217;t stay contained, it cascades through dependencies, exposing sensitive design data and disrupting production across interconnected supply chains. Supply chain ransomware risk is ecosystem risk, not single-organization risk.</p><p><strong>Insider Threat: Ransomware Negotiator Sold Victim Data to BlackCat</strong></p><p>A ransomware negotiation consultant pleaded guilty to collaborating with attackers providing BlackCat with negotiation strategies and victim data from clients who trusted them with incident response. Third-party vendors, consultants, and incident responders often have deeper access than internal staff during a crisis. That access must be governed like privileged access with monitoring, segmentation, and time-limited grants not trusted on the basis of relationship alone.</p><h3><strong>&#128275; Data Breaches &amp; Identity Exposure</strong></h3><p><strong>France National ID Breach: 19 Million Records</strong></p><p>France&#8217;s national identity agency ANTS confirmed a breach exposing up to 19 million records full names, birthdates, addresses, and civil status. This is not a breach of a loyalty program or a retail database. This is a foundational identity dataset, and its exposure cascades into every system that relies on identity verification for years. The French government has already warned citizens to anticipate smishing and phishing campaigns built from this data. For any organization operating in France or authenticating French users, this is a direct inherited risk. Identity verification confidence across this population has degraded.</p><p><strong>AI Threat to Global Banking: Speed vs. Oversight</strong></p><p>Financial leaders issued warnings this week that advanced AI models could destabilize portions of the global banking system not through dramatic hacks, but through the gap between AI-driven fraud velocity and human oversight capacity. AI is enabling automated fraud, accelerating attack decision-making, and executing at speeds that regulated institutions cannot match with manual review processes. The risk is systemic fraud operating faster than detection and response. Human approval gates for high-risk AI-driven financial transactions are a necessary architectural control.</p><p><strong>Vercel Breach via AI OAuth Integration</strong></p><p>The Vercel breach is the most important AI supply chain case study of the week. Attackers did not breach Vercel directly. They compromised a third-party AI tool Context AI harvested credentials from an employee there, and used the OAuth permissions that tool had been granted to access Vercel&#8217;s internal environment. OAuth grants are often broad, persistent, and uninspected. Once inside, the attacker reached environment variables, API keys, and internal infrastructure operating with legitimate access, triggering no alerts. An AI tool with unrestricted OAuth scope is functionally indistinguishable from an insider.</p><p><strong>McGraw-Hill Salesforce Misconfiguration: ShinyHunters Claims 45 Million Records</strong></p><p>ShinyHunters continues its Salesforce-centric campaign with McGraw-Hill as the latest documented victim, claiming 45 million records from a misconfigured Salesforce-hosted web page rather than the core enterprise tenant. The campaign has also touched 7-Eleven, Pitney Bowes, Canada Life, and Aman Resorts within the same two-week window. SaaS misconfigurations do not confine their blast radius to the page they&#8217;re located on. Audit every externally reachable SaaS integration not just the primary tenant.</p><p><strong>DraftKings Credential Stuffing: 60,000 Accounts, No Zero-Days Required</strong></p><p>The DraftKings credential stuffing case involved 60,000 compromised accounts monetized using nothing more than reused passwords from prior breaches. No zero-days. No advanced techniques. Just the persistent reality that credential reuse remains one of the most effective attack methods in existence. The attack is as old as breach databases. It keeps working because password hygiene still fails at scale.</p><p><strong><a href="http://booking.com/">Booking.com</a> and Rockstar Gaming: Trust-Based Cloud Access</strong></p><p><strong><a href="http://booking.com/">Booking.com</a></strong> confirmed a breach tied to credential or support workflow compromise rather than infrastructure attack. Rockstar Games data was accessed via a compromised Snowflake environment through a third-party analytics platform. Both cases follow the same pattern: no forced entry, legitimate access used maliciously, no immediate detection. Cloud and SaaS security monitoring must include behavioral anomaly detection for API and integration access not just perimeter controls.</p><h3><strong>&#128373;&#65039; Nation-State &amp; Advanced Persistent Threats</strong></h3><p><strong>Lazarus Group: $290 Million KelpDAO Exploit</strong></p><p>North Korea&#8217;s Lazarus Group specifically the TraderTraitor cluster executed a $290 million exploit against KelpDAO through a multi-stage attack chain: compromising the downstream RPC endpoint that a decentralized verifier network relied on, using DDoS to force failover to the poisoned endpoint, then spoofing cross-chain messages through KelpDAO&#8217;s single-verifier configuration. April 2026 is now the worst month for crypto theft since February 2025, with over $606 million lost across 18 days. North Korea&#8217;s crypto operations have crossed from crime into nation-state-scale financial warfare. The Bybit playbook is being refined and repeated.</p><p><strong>APT Using Microsoft Outlook Inboxes for Command-and-Control</strong></p><p>A sophisticated APT group is using Microsoft Outlook inboxes as a covert C2 channel. The malware authenticates via Azure AD, retrieves encrypted commands from designated mail folders, executes them locally, and returns results through the same channel all over legitimate Microsoft infrastructure. Traditional network filtering and reputation-based detection are ineffective because the traffic is indistinguishable from normal Outlook usage. This is living-off-trusted-cloud at its most operationally sophisticated.</p><p><strong>Scattered Spider Guilty Plea: Social Engineering at Scale</strong></p><p>A Scattered Spider member pleaded guilty to attacks that used phishing, SIM swapping, and identity manipulation to breach major platforms and extract millions in financial assets. The techniques worked not because of technical sophistication but because human-layer attacks consistently bypass technical controls. Law enforcement is catching up. The techniques, however, continue to evolve and are being adopted broadly across threat actor communities.</p><p><strong>North Korea&#8217;s $280 Million Drift Theft: Full Post-Mortem</strong></p><p>The Drift crypto theft post-mortem confirms the operation involved fake companies, sustained relationship-building over months, physical conference attendance, and social engineering before any technical exploitation occurred. North Korea is operating cybercrime as a corporate function patient, organized, and designed for maximum yield. Security models that don&#8217;t account for this level of persistence and organizational investment are not modeling the actual threat.</p><h3><strong>&#128737;&#65039; Vulnerabilities &amp; Active Exploitation</strong></h3><p><strong>Microsoft Defender Zero-Days: Security Tools as Attack Vectors</strong></p><p>Microsoft issued emergency patches for three actively exploited zero-days in Defender for Endpoint that allowed attackers to tamper with detection mechanisms effectively disabling security visibility while remaining on the endpoint. EDR is no longer just a defensive layer. It has become part of the attack surface. Organizations operating with a single EDR solution are operating with a single point of failure. Layer endpoint security products. If attackers can silence Defender, they cannot simultaneously silence a second independent product.</p><p><strong>Microsoft <a href="http://asp.net/">ASP.NET</a> Core Emergency Patch: Authentication Cookie Forgery</strong></p><p>Microsoft issued an out-of-band emergency patch for a critical <strong><a href="http://asp.net/">ASP.NET</a></strong> Core vulnerability allowing attackers to forge authentication cookies through improper HMAC validation. No phishing, no token theft just a forged cookie and full authenticated access. For public-facing applications relying on <strong><a href="http://asp.net/">ASP.NET</a></strong> Core, patch immediately and rotate all data protection keys generated by vulnerable versions.</p><p><strong>Microsoft Domain Controller Patch Failure: Cascading Identity Disruption</strong></p><p>Microsoft&#8217;s April patch cycle introduced instability in domain controllers triggering reboot loops and cascading authentication failures across login systems, VDI environments, and identity infrastructure. Identity systems must have controlled deployment pipelines with staged rollout and pre-deployment validation. Patching identity infrastructure with the same urgency and process as workstation endpoints creates systemic operational risk.</p><p><strong>Cisco SD-WAN CVE-2026-20133: CISA KEV, Federal Deadline Active</strong></p><p>CISA added Cisco SD-WAN CVE-2026-20133 to the Known Exploited Vulnerabilities catalog with a rapid federal patch deadline. The vulnerability allows unauthenticated attackers to extract sensitive data from the SD-WAN manager the centralized control plane governing routing, segmentation, and policy enforcement across all branch locations. Compromising this system is not lateral movement. It is centralized network dominance. Patch by the federal deadline, or before it.</p><p><strong>MOVEit WAF and Kemp LoadMaster: Breaking the Shield</strong></p><p>Progress Software patched multiple vulnerabilities in MOVEit WAF and Kemp LoadMaster, including command injection flaws and a WAF bypass allowing crafted requests to evade inspection. These are systems designed to protect enterprise edges and the vulnerabilities turn them into entry points. Given MOVEit&#8217;s history with mass exploitation campaigns, enterprise patching urgency here should match federal agency timelines.</p><p><strong>Spinnaker RCE: Unauthenticated Access to Production Pipelines</strong></p><p>Two unauthenticated remote code execution vulnerabilities in Spinnaker the continuous delivery platform managing cloud deployments allow attackers to execute commands within cloud driver components. Spinnaker has access to deployment logic, credentials, and production infrastructure. Exploitation is not just a breach of infrastructure it is a compromise of software delivery integrity with downstream impact on everything Spinnaker touches.</p><p><strong>Marimo RCE: AI Tooling Exploited Within Hours of Disclosure</strong></p><p>The Marimo remote code execution vulnerability was exploited within hours of disclosure, with attack chains incorporating Hugging Face as a staging platform and decentralized C2 infrastructure. AI development tools are now enterprise attack surfaces operating without the security rigor applied to traditional infrastructure. Isolation, network egress restriction, and patching for AI tooling must match enterprise security standards.</p><p><strong>AI Sandbox Escape: Terrarium Vulnerability Enables Root Access</strong></p><p>A critical vulnerability in Cohere&#8217;s open-source Terrarium project allows sandboxed AI-generated code to escape containment and execute at the host level with root privileges through improper WebAssembly and JavaScript prototype handling. Terrarium is widely deployed to execute AI-generated code safely. This vulnerability eliminates that safety boundary entirely. Any untrusted AI-generated script in a vulnerable Terrarium environment can compromise the host, extract secrets, and move laterally. AI infrastructure is being deployed with pre-2010 security assumptions.</p><p><strong>Fortinet Sandbox: Unauthenticated Root Command Execution</strong></p><p>A critical Fortinet Sandbox vulnerability allows unauthenticated command execution as root, with public exploit code already available. Security appliances with public exploits become trusted footholds with administrative access the moment they are successfully targeted. Patch immediately and treat every security tool as part of the attack surface, not just the defense.</p><p><strong>Apache ActiveMQ: Old Bugs, Active Exploitation</strong></p><p>Apache ActiveMQ vulnerabilities are being actively exploited, often chained with default credentials and legacy flaws. Middleware sitting deep in application environments is a persistent, quiet attack surface. Default credentials must be eliminated across every middleware component in enterprise environments. There is no acceptable reason for default credentials to survive past deployment.</p><p><strong>Anthropic MCP: Architectural RCE Risk Across AI Development Tools</strong></p><p>A critical design flaw in Anthropic&#8217;s Model Context Protocol introduces remote code execution risk across a wide ecosystem of AI development tools with millions of downloads and hundreds of thousands of instances in scope. The vendor&#8217;s position that the behavior is &#8220;by design&#8221; raises serious concerns about security maturity in AI framework development. Audit and restrict all MCP integrations and AI agent frameworks for scope, permissions, and network access.</p><p><strong>ICS Patch Tuesday: OT Exposure Continues</strong></p><p>Siemens, Schneider Electric, Rockwell, and five additional major industrial vendors released advisories. OT environments accumulate vulnerability over time through operational continuity constraints and infrequent patching cycles. Dedicated OT vulnerability management processes separate from IT patch workflows are required to address this accumulating risk.</p><p><strong>Mirai Botnets: End-of-Life D-Link Routers Actively Exploited</strong></p><p>Two Mirai botnet campaigns are actively exploiting command injection vulnerabilities in discontinued D-Link routers. End-of-life devices that are never inventoried, never retired, and never replaced become permanent participants in attacker infrastructure. Asset visibility for all network-connected devices including legacy and end-of-life equipment is a foundational security requirement, not a maturity milestone.</p><p><strong>Oracle: 481 Patches Across 28 Product Families</strong></p><p>Oracle released 481 security patches in one of the largest patch cycles in its history arriving in the same week as Microsoft&#8217;s emergency patches and the broader vendor patch deluge. The risk here is not just vulnerability. It is patch fatigue. When security teams are overwhelmed, prioritization degrades and critical fixes are delayed or missed. Triage ruthlessly by attack surface exposure and business criticality.</p><h3><strong>&#129302; AI, Supply Chain &amp; Developer Threats</strong></h3><div class="pullquote"><p><em>&#8220;The pattern is brutal and consistent: your endpoint product is being weaponized against you, your patch pipeline is breaking the infrastructure it&#8217;s supposed to protect, your AI tool chain from notebook servers to the MCP standard itself is a fresh RCE buffet, nation-state crews are draining DeFi bridges for a quarter billion at a time, Shiny Hunters is turning Salesforce connected apps into a breach factory, volumetric DDoS can still take major social platforms offline for days, and millions of unencrypted FTP servers still leak credentials across the public internet.&#8221;</em></p></div><p><strong>Self-Propagating npm Worm: Autonomous Cross-Ecosystem Spread</strong></p><p>A malicious npm package targeting the widely used &#8220;pg&#8221; database ecosystem includes a self-propagating worm that steals developer tokens and republishes malicious versions autonomously across accessible packages. Once it finds a valid npm token, it enumerates accessible packages, injects malicious code, publishes new versions, and repeats cascading through the ecosystem within hours. The worm also targets PyPI, making this a cross-ecosystem supply chain attack. One compromised developer environment can infect the broader ecosystem before a human analyst has time to respond. Revoke and rotate all npm and PyPI tokens across every developer environment immediately.</p><p><strong>Cisco Talos Q1 2026 Report: Phishing Reclaims Top Spot</strong></p><p>Cisco Talos&#8217; Q1 2026 Incident Response report confirms phishing has re-emerged as the leading initial access vector, accounting for over one-third of incidents. What changed is not the technique it&#8217;s the effectiveness. Adversary-in-the-middle phishing kits and real-time MFA bypass capabilities have fundamentally elevated phishing success rates. User awareness training developed even twelve months ago does not reflect the current threat. Update training programs to explicitly address MFA bypass techniques.</p><p><strong>Glassworm: Zig-Based Dropper Targets Developer IDEs</strong></p><p>Glassworm evolved with a new variant using a Zig-based dropper to target developer environments and IDE ecosystems. Attackers moving into the development lifecycle mean they influence what gets built not just what runs in production. Enforce signed plugin requirements, approved extension lists, and strict access controls across all developer tooling environments.</p><p><strong>BlueSky DDoS: Availability as a Security Dimension</strong></p><p>A multi-day DDoS attack against BlueSky disrupted core platform functionality for an extended period. Availability is a security property and as organizations and users adopt decentralized architectures and alternative platforms, the DDoS threat surface expands. Pre-defined DDoS mitigation plans and tested response procedures must be in place before the attack begins.</p><p><strong>2.4 Million Exposed FTP Servers: Basic Hygiene Still Failing</strong></p><p>Over 2.4 million internet-facing FTP servers continue to operate without encryption providing cleartext credential transmission to any attacker willing to look. This is not a sophisticated threat. It is a global-scale failure of basic security hygiene that has persisted for years. Eliminate cleartext protocols. Enforce encryption across all services. There is no operational justification for unencrypted FTP in 2026.</p><h3><strong>&#9878;&#65039; Law Enforcement &amp; Policy</strong></h3><p><strong>Scattered Spider Guilty Plea: Tyler B Sentenced</strong></p><p>A Scattered Spider member pleaded guilty to charges involving approximately $8 million in SIM-swap-driven fraud and data theft. Law enforcement is demonstrating meaningful enforcement capability against technically sophisticated social engineering actors. The techniques, however, are spreading to broader threat actor communities faster than enforcement can deter them.</p><p><strong>DDoS-for-Hire Network Disrupted: 75,000 Users Warned</strong></p><p>Law enforcement disrupted a DDoS-for-hire infrastructure, seizing domains and issuing warnings to over 75,000 registered users. Disruption creates friction and raises cost for criminal operators. It does not permanently eliminate the capability &#8212; cybercrime ecosystems rebuild on new infrastructure. Continuous monitoring remains essential.</p><p><strong>North Korean IT Worker Sentencing</strong></p><p>Two individuals were sentenced for supporting North Korea&#8217;s fake IT worker scheme the regime-funded operation placing operatives inside global companies as legitimate remote employees. These enforcement actions represent meaningful progress in attributing and prosecuting an operation that has been running for years. The threat, however, continues.</p><p><strong>FCC Cybertrust Mark: IoXT Alliance Named Lead Administrator</strong></p><p>The FCC Cybertrust Mark program for connected device security has a new lead administrator in the IoXT Alliance, putting the consumer IoT security baseline program back on track after UL&#8217;s withdrawal. Any policy framework that raises the minimum security floor for connected devices has direct defensive value given the persistent exploitation of routers and IoT endpoints.</p><h3><strong>&#9989; This Week&#8217;s Priority Action List</strong></h3><p><strong>Immediate (Do This Now)</strong></p><ul><li><p>Patch Cisco SD-WAN CVE-2026-20133 &#8212; CISA KEV with federal deadline, unauthenticated control plane access</p></li><li><p>Patch Microsoft <strong><a href="http://asp.net/">ASP.NET</a></strong> Core authentication cookie forgery &#8212; emergency out-of-band patch, rotate all data protection keys immediately</p></li><li><p>Patch Microsoft Defender for Endpoint zero-days &#8212; EDR tampering enabling silent attacker persistence</p></li><li><p>Revoke and rotate ALL npm and PyPI developer tokens &#8212; self-propagating worm is actively spreading</p></li><li><p>Patch MOVEit WAF and Kemp LoadMaster &#8212; WAF bypass and command injection with public exposure</p></li><li><p>Patch Spinnaker RCE &#8212; unauthenticated access to production deployment pipelines</p></li><li><p>Patch Fortinet Sandbox &#8212; public exploit code available for unauthenticated root execution</p></li><li><p>Patch Marimo and audit all Hugging Face integrations for indicators of compromise</p></li></ul><p><strong>Short-Term (This Month)</strong></p><ul><li><p>Audit ALL OAuth grants across Microsoft 365 and Google Workspace, Vercel breach is the template for AI OAuth pivot attacks</p></li><li><p>Layer endpoint security with a second independent EDR product single EDR creates single point of failure</p></li><li><p>Implement staged deployment pipelines for identity infrastructure patches separate from workstation cycles</p></li><li><p>Enforce just-in-time access and session recording for all third-party incident response and consulting access</p></li><li><p>Implement object-level authorization testing in all application security release gates</p></li><li><p>Enforce cryptographic signature verification before any software installation in enterprise environments</p></li><li><p>Update phishing awareness training to explicitly include MFA bypass and adversary-in-the-middle techniques</p></li><li><p>Replace or isolate all end-of-life D-Link routers and unmanaged network devices</p></li><li><p>Eliminate all cleartext FTP services 2.4 million exposed servers is a collective failure, don&#8217;t be part of it</p></li><li><p>Implement human approval gates for high-risk AI-driven financial transactions</p></li></ul><p><strong>Strategic (This Quarter)</strong></p><ul><li><p>Establish dedicated OT vulnerability management processes independent of IT patch cycles</p></li><li><p>Conduct comprehensive audit and restriction of all MCP integrations and AI agent framework permissions</p></li><li><p>Isolate AI execution environments with network egress restrictions and runtime monitoring</p></li><li><p>Enforce multi-verifier models in all blockchain and DeFi architectures single verifier is a single point of failure</p></li><li><p>Build dedicated fast-lane patch processes for internet-facing infrastructure separate from workstation cadence</p></li><li><p>Plan post-breach identity degradation response for regions with national identity database exposure (France)</p></li><li><p>Stress test offline backup integrity and recovery procedures &#8212; wiper malware eliminates recovery paths</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-49/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-49/comments"><span>Leave a comment</span></a></p><h3><strong>&#127897;&#65039; James Azar&#8217;s CISO&#8217;s Take</strong></h3><p>When I look at this week in its entirety, every story ties back to the same root cause: trust being extended to systems, tools, integrations, and people without continuous validation and attackers exploiting exactly that gap. France&#8217;s national identity database. Authentication cookies. OAuth grants to AI tools. Outlook inboxes used as C2 channels. A ransomware negotiator feeding victim intelligence to BlackCat. These aren&#8217;t exotic attacks. They are the logical consequence of building systems on trust assumptions that were never designed to be verified continuously. And in 2026, that design assumption is the vulnerability. Control planes are the target this week SD-WAN managers, WAF admin APIs, Spinnaker pipelines, OAuth tokens all one unauthenticated bug or over-scoped consent grant away from total compromise.</p><p>The second takeaway is speed. The npm worm demonstrates how quickly compromise propagates when supply chain security is absent. The <strong><a href="http://asp.net/">ASP.NET</a></strong> forgery flaw shows how quickly authentication can be bypassed once a flaw is in the wild. The APT using Outlook for C2 shows how long patient adversaries can persist when detection depends on network indicators instead of behavioral ones. We are operating in an environment where time is the deciding factor, and organizations that cannot detect and respond within the attacker&#8217;s operational window will absorb the full impact. Patch the CVE-2026-20133 today. Audit your OAuth grants this week. Stress test your offline backups before you need them. That is how you reduce the blast radius when not if the next trust assumption fails.</p><p><strong>Stay Cyber Safe.</strong> &#128272;</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-49?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-49?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-49?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><h3></h3>]]></content:encoded></item><item><title><![CDATA[France Titres (ANTS) Breach Exposes Identity Records, Microsoft Ships Out-of-Band ASP.NET Core Emergency Patch, 'CanisterSprawl' npm Worm Hits pgserve, Cohere Terrarium AI Sandbox Cracked Open ]]></title><description><![CDATA[National ID Breach, AI Sandbox Escape, and a Self-Spreading Supply Chain Worm&#8212;When Trust Infrastructure Breaks at Scale]]></description><link>https://www.cyberhubpodcast.com/p/france-titres-ants-breach-exposes</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/france-titres-ants-breach-exposes</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Thu, 23 Apr 2026 13:31:08 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/195190861/c1396cfe8c69322f332ddc70c8219561.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<h1>&#9749; <strong>Good Morning Security Gang,</strong></h1><p>Today&#8217;s episode is absolutely loaded, this is one of those &#8220;everything is breaking at once&#8221; kind of days.</p><p>We&#8217;ve got a national identity breach, an AI sandbox escape, a Microsoft emergency patch, Mirai botnets, a self-propagating npm worm, an APT abusing Outlook for command-and-control, and more.</p><p>If there&#8217;s one theme across every story today, it&#8217;s this:<br>&#128073; The systems we trust to prove identity and enforce boundaries are failing.</p><p>Double espresso in hand&#8212;let&#8217;s get into it.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6Yq6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F989200ff-3241-4372-97f9-8e272dbcf472_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6Yq6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F989200ff-3241-4372-97f9-8e272dbcf472_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!6Yq6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F989200ff-3241-4372-97f9-8e272dbcf472_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!6Yq6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F989200ff-3241-4372-97f9-8e272dbcf472_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!6Yq6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F989200ff-3241-4372-97f9-8e272dbcf472_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6Yq6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F989200ff-3241-4372-97f9-8e272dbcf472_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/989200ff-3241-4372-97f9-8e272dbcf472_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:162880,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/195190861?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F989200ff-3241-4372-97f9-8e272dbcf472_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6Yq6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F989200ff-3241-4372-97f9-8e272dbcf472_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!6Yq6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F989200ff-3241-4372-97f9-8e272dbcf472_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!6Yq6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F989200ff-3241-4372-97f9-8e272dbcf472_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!6Yq6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F989200ff-3241-4372-97f9-8e272dbcf472_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Today&#8217;s threat landscape highlights a systemic breakdown in identity, trust validation, and software supply chains. From a breach exposing millions of national identities in France to AI sandbox failures enabling root access, attackers are exploiting foundational systems that underpin authentication, execution, and trust.</p><p>At the same time, we&#8217;re seeing acceleration in automated propagation (npm worm), credential abuse (ASP.NET flaw), and stealthy persistence (APT via Outlook). Combined with large-scale patch cycles and unpatched legacy infrastructure, the result is a highly volatile environment where one weak trust layer can cascade into widespread compromise.</p><h2>&#127467;&#127479; <strong>France National ID Breach &#8211; 19 Million Records Exposed</strong></h2><p>France&#8217;s national identity agency (ANTS) confirmed a breach impacting up to 19 million individuals, exposing highly sensitive data including full names, birthdates, addresses, and civil status. This isn&#8217;t just another data breach, it&#8217;s a foundational identity dataset leak.</p><p>The real danger lies in downstream impact. With this level of data, attackers can conduct highly targeted phishing, impersonation, tax fraud, healthcare fraud, and even banking account takeovers for years to come. The French government has already warned citizens to expect smishing and phishing campaigns tied directly to this data.</p><p>From a practitioner standpoint, this is a nightmare scenario. Identity is the backbone of authentication systems, and when it&#8217;s compromised at a national level, every organization interacting with those users inherits risk.</p><h2>&#129302; <strong>AI Sandbox Escape &#8211; &#8220;Terium&#8221; Vulnerability Breaks Containment</strong></h2><p>A critical vulnerability in Cohere&#8217;s open-source Terium project allows sandboxed AI-generated code to escape containment and execute at the host level with root privileges.</p><p>This flaw exists in the WebAssembly layer, where improper handling of JavaScript prototypes allows attackers to pivot from a supposedly isolated environment into the underlying Node.js runtime.</p><p>This is significant because Terium is widely used to execute AI-generated code safely. With this vulnerability, there is effectively no sandbox, meaning any untrusted AI-generated script can compromise the host system, extract secrets, and move laterally.</p><p>This reinforces a growing pattern: AI infrastructure is being deployed with pre-2010 security assumptions, and attackers are catching up fast.</p><h2>&#129695; <strong>Microsoft ASP.NET Core Emergency Patch &#8211; Authentication Forgery Risk</strong></h2><p>Microsoft issued an out-of-band patch for a critical ASP.NET Core vulnerability that allows attackers to forge authentication cookies and elevate privileges without valid credentials.</p><p>The flaw lies in improper HMAC validation during cookie handling, effectively allowing attackers to bypass authentication entirely. No phishing, no token theft&#8212;just a forged cookie and access granted.</p><p>This is particularly dangerous for public-facing applications relying on ASP.NET Core, as it directly undermines the integrity of authentication mechanisms.</p><p>The urgency here is clear: patch immediately and rotate all data protection keys generated by vulnerable systems.</p><h2>&#127760; <strong>Mirai Botnets Return &#8211; Exploiting End-of-Life Routers</strong></h2><p>Two separate Mirai botnet campaigns are actively exploiting vulnerabilities in discontinued D-Link routers, which no longer receive security updates.</p><p>Attackers are leveraging command injection flaws to deploy botnet payloads, turning vulnerable devices into part of a distributed attack infrastructure.</p><p>The bigger issue here isn&#8217;t just the botnet, it&#8217;s asset visibility. Organizations often fail to inventory or retire end-of-life devices, leaving them exposed indefinitely.</p><p>These devices don&#8217;t just sit idle they become active participants in attacks.</p><h2>&#129516; <strong>Self-Spreading npm Worm &#8211; Supply Chain Attack Goes Autonomous</strong></h2><p>This is one of the most concerning developments of the day.</p><p>A malicious npm package targeting the widely used &#8220;pg&#8221; ecosystem includes a self-propagating worm that steals developer tokens and republishes itself across other packages.</p><p>Once it finds a valid npm token, it:</p><ul><li><p>Enumerates accessible packages</p></li><li><p>Injects malicious code</p></li><li><p>Publishes new versions</p></li><li><p>Repeats the cycle</p></li></ul><p>This creates a cascading effect where one compromised developer environment can infect the broader ecosystem within hours.</p><p>Even more concerning, the worm also targets PyPI, making it a cross-ecosystem supply chain attack.</p><p>This is the industrialization of software compromise.</p><h2>&#128202; <strong>Cisco Talos IR Report &#8211; Phishing is Back at the Top</strong></h2><p>Cisco Talos&#8217; Q1 2026 report shows phishing has re-emerged as the leading initial access vector, accounting for over one-third of incidents.</p><p>What&#8217;s changed isn&#8217;t phishing itself, it&#8217;s effectiveness. Adversary-in-the-middle kits and MFA bypass techniques have made phishing campaigns far more successful.</p><p>At the same time, exploitation of public-facing applications especially SharePoint continues to drive initial access.</p><p>The takeaway is simple: user awareness training from even a year ago is already outdated.</p><h2>&#128231; <strong>APT Using Outlook for Command-and-Control</strong></h2><p>A sophisticated APT group is using Microsoft Outlook inboxes as a command-and-control channel.</p><p>The malware authenticates via Azure AD, accesses specific mail folders, retrieves encrypted commands from emails, executes them locally, and responds with results.</p><p>This technique leverages trusted Microsoft infrastructure, making detection extremely difficult. Traditional network filtering and reputation-based controls are ineffective because the traffic appears legitimate.</p><p>This is a prime example of living off trusted cloud services for stealthy operations.</p><h2>&#128176; <strong>DeFi Exploit &#8211; Ownership Validation Bypassed</strong></h2><p>A DeFi platform was drained of millions after attackers exploited a flaw that incorrectly validated ownership of vault assets.</p><p>Unlike typical exploits involving private keys or reentrancy bugs, this attack manipulated logic to convince the system that the attacker was the legitimate owner.</p><p>This highlights a critical issue in decentralized finance: trust in smart contract logic is often misplaced, and small validation flaws can lead to massive financial loss.</p><h2>&#129521; <strong>Oracle Patch Drop &#8211; 481 Fixes Overwhelms Teams</strong></h2><p>Oracle released 481 security patches across 28 product families, one of the largest patch cycles in its history.</p><p>This comes on top of Microsoft&#8217;s patch load and emergency fixes, creating a significant operational challenge for security teams.</p><p>The risk here isn&#8217;t just vulnerability it&#8217;s patch fatigue. When teams are overwhelmed, prioritization suffers, and critical fixes can be delayed or missed entirely.</p><h1>&#128736;&#65039; <strong>Action Items for Security Leaders</strong></h1><ul><li><p>&#128272; Rotate credentials and enforce phishing-resistant MFA across all users</p></li><li><p>&#129513; Patch ASP.NET Core immediately and rotate authentication keys</p></li><li><p>&#129302; Isolate AI execution environments and restrict network egress</p></li><li><p>&#129516; Revoke and rotate all npm and PyPI tokens across developer environments</p></li><li><p>&#128683; Block malicious package versions and enforce dependency validation</p></li><li><p>&#127760; Replace or isolate all end-of-life networking equipment</p></li><li><p>&#128231; Monitor Microsoft Graph and Outlook API activity for anomalies</p></li><li><p>&#129504; Update phishing training to include MFA bypass techniques</p></li><li><p>&#128176; Conduct smart contract audits with focus on ownership validation logic</p></li><li><p>&#129521; Prioritize patching for internet-facing and high-risk Oracle systems</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/france-titres-ants-breach-exposes/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/france-titres-ants-breach-exposes/comments"><span>Leave a comment</span></a></p><h1>&#129504; <strong>James Azar&#8217;s CISOs Take</strong></h1><p>What stood out to me today is how every single story ties back to trust. Whether it&#8217;s a national identity database, an AI sandbox, a software package registry, or an authentication cookie, attackers are going after the mechanisms that define who and what is trusted. And once they compromise that, everything built on top of it becomes vulnerable.</p><p>The second takeaway is speed. The npm worm shows how quickly compromise can spread. The ASP.NET flaw shows how quickly attackers can exploit authentication. The APT using Outlook shows how long attackers can persist undetected. We are operating in an environment where time is the deciding factor and organizations that cannot detect and respond quickly will fall behind.</p><p>&#128293; <strong>Stay Cyber Safe.</strong></p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/france-titres-ants-breach-exposes?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/france-titres-ants-breach-exposes?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/france-titres-ants-breach-exposes?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[Cisco SD-WAN KEV Federal Deadline, MOVEit WAF Critical RCE Patches, Vercel Breached Via AI OAuth]]></title><description><![CDATA[Control Plane Attacks, AI OAuth Breaches, and OT Destruction&#8212;Why Everything That Runs Your Environment Is Now the Target]]></description><link>https://www.cyberhubpodcast.com/p/cisco-sd-wan-kev-federal-deadline</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/cisco-sd-wan-kev-federal-deadline</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Wed, 22 Apr 2026 13:31:44 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/194992784/a8f5bbd60b4304682ac1fd31ba52f7f5.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>&#9749; <strong>Good Morning Security Gang, </strong></p><p>Today&#8217;s episode hits differently. This isn&#8217;t just another day of vulnerabilities and breaches, this is a shift in where attackers are focusing. They&#8217;re no longer knocking on the front door&#8230;</p><p>&#128073; They&#8217;re going straight for the control systems that run everything.</p><p>Think SD-WAN controllers. Think CI/CD pipelines. Think OAuth integrations.</p><p>&#128161; If it manages your environment, it&#8217;s now a primary target.</p><p>Double espresso ready, let&#8217;s dive in. Coffee Cup Cheers, </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!w_R7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48e25290-39e5-4070-92b3-5ef6cf5fb630_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!w_R7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48e25290-39e5-4070-92b3-5ef6cf5fb630_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!w_R7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48e25290-39e5-4070-92b3-5ef6cf5fb630_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!w_R7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48e25290-39e5-4070-92b3-5ef6cf5fb630_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!w_R7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48e25290-39e5-4070-92b3-5ef6cf5fb630_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!w_R7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48e25290-39e5-4070-92b3-5ef6cf5fb630_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/48e25290-39e5-4070-92b3-5ef6cf5fb630_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:358229,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/194992784?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48e25290-39e5-4070-92b3-5ef6cf5fb630_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!w_R7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48e25290-39e5-4070-92b3-5ef6cf5fb630_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!w_R7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48e25290-39e5-4070-92b3-5ef6cf5fb630_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!w_R7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48e25290-39e5-4070-92b3-5ef6cf5fb630_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!w_R7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48e25290-39e5-4070-92b3-5ef6cf5fb630_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>&#129517; <strong>Executive Snapshot</strong></h1><p>Today&#8217;s stories all point to one uncomfortable truth:<br>Attackers are scaling access by targeting orchestration layers, not endpoints.</p><ul><li><p>&#127919; Control planes are being exploited</p></li><li><p>&#129302; AI integrations are becoming insider threats</p></li><li><p>&#127981; OT systems remain dangerously exposed</p></li><li><p>&#128163; Destructive malware is back on the table</p></li></ul><p>This isn&#8217;t about isolated incidents anymore, it&#8217;s about systemic exposure across modern architectures.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><p></p><h2>&#127760; <strong>Cisco SD-WAN Vulnerability &#8211; Control of the Network Itself</strong></h2><p>CISA&#8217;s addition of the Cisco SD-WAN vulnerability (CVE-2026-20133) to the KEV catalog with a rapid federal patch deadline highlights just how critical this issue is. This flaw allows unauthenticated attackers to extract sensitive data directly from the SD-WAN manager, which acts as the centralized control plane for enterprise connectivity. In practical terms, this system governs routing, segmentation, and policy enforcement across all branch locations. Once compromised, attackers can gain visibility into network topology, harvest credentials, and potentially manipulate traffic flows. This is not lateral movement, it&#8217;s centralized dominance of the network, making it one of the most dangerous classes of vulnerabilities we see today.</p><h2>&#129521; <strong>MOVEit WAF &amp; Load Balancer Vulnerabilities &#8211; Breaking the Shield</strong></h2><p>Progress Software&#8217;s patching of multiple vulnerabilities in MOVEit WAF and Kemp LoadMaster is particularly concerning because these systems are designed to protect enterprise edges. Among the flaws are command injection vulnerabilities and a WAF bypass that allows crafted requests to slip through inspection mechanisms. The implication is severe: attackers can execute commands or bypass defenses without triggering alerts, effectively turning a protective control into an entry point. Given MOVEit&#8217;s history with mass exploitation campaigns, this reinforces that edge security appliances remain high-value and high-risk targets, especially when they sit between external traffic and internal systems.</p><h2>&#129302; <strong>Vercel Breach via AI OAuth &#8211; Trust Exploited Through Integration</strong></h2><p>The Vercel breach is one of the most important case studies of modern cyber risk. Attackers didn&#8217;t exploit Vercel directly&#8212;they compromised a third-party AI tool (Context AI), harvested credentials, and leveraged OAuth permissions to gain access to Vercel&#8217;s internal environment. Because OAuth grants are often broad and persistent, the attacker effectively operated with legitimate access, reaching environment variables, API keys, and internal systems. This attack demonstrates how AI tools and SaaS integrations blur the line between external and internal access, creating blind spots in security monitoring. It also reinforces that OAuth is no longer just a convenience feature, it is a critical identity boundary that must be governed like privileged access.</p><h2>&#128640; <strong>Spinnaker RCE &#8211; Direct Path to Production Environments</strong></h2><p>The disclosure of two unauthenticated remote code execution vulnerabilities in Spinnaker introduces risk directly into the software delivery pipeline. Spinnaker is widely used to manage continuous delivery across cloud environments, meaning it has access to deployment logic, credentials, and production systems. Exploiting these vulnerabilities allows attackers to execute commands within cloud driver components, potentially exposing secrets, altering deployments, or injecting malicious code into production. This is not just a breach of infrastructure, it&#8217;s a compromise of software integrity and trust in application delivery, which can have downstream effects across customers and users.</p><h2>&#127981; <strong>OT &#8220;Bridge Break&#8221; Vulnerabilities &#8211; The Weak Link Between IT and OT</strong></h2><p>Forescout&#8217;s disclosure of 22 vulnerabilities in serial-to-Ethernet converters highlights a persistent and dangerous issue in industrial environments. These devices act as bridges between operational technology (OT) and traditional IT networks, often enabling remote monitoring and control of physical systems. Because they are frequently exposed to the internet and lack modern security controls, they become ideal entry points for attackers. Exploitation could allow manipulation of sensor data, disruption of industrial processes, or lateral movement into broader networks. This is particularly concerning in sectors like manufacturing, utilities, and healthcare, where these systems underpin critical operations. The reality is that OT environments continue to inherit risk from legacy design assumptions that no longer hold true.</p><h2>&#128163; <strong>Lotus Wiper Malware &#8211; Destruction Over Disruption</strong></h2><p>The Lotus wiper malware represents a different class of threat&#8212;one focused on destruction rather than financial gain. Targeting energy and utility organizations in Venezuela, this malware operates at a low level to erase data, remove recovery mechanisms, and corrupt systems beyond repair. Unlike ransomware, there is no negotiation or recovery path. The intent is to permanently disrupt operations, potentially impacting power generation and distribution. This aligns with broader geopolitical tensions and demonstrates that cyber operations are increasingly being used as tools of strategic disruption, not just crime.</p><h2>&#129504; <strong>Gentleman Ransomware &amp; SystemBC &#8211; The Signals Before the Storm</strong></h2><p>The use of SystemBC malware by ransomware groups provides a valuable insight into how attacks unfold. SystemBC establishes proxy tunnels and encrypted communication channels, allowing attackers to maintain persistent access while preparing for later stages of the attack. This phase often includes reconnaissance, credential harvesting, and lateral movement. By the time ransomware is deployed, the attacker has already mapped the environment and established control. This underscores the importance of detecting early indicators, as the real opportunity to stop ransomware is before encryption begins, not after.</p><h2>&#127981; <strong>Akira Ransomware &#8211; Supply Chain Risk Amplified</strong></h2><p>Akira&#8217;s continued targeting of manufacturing and engineering firms highlights the growing importance of supply chain risk. Many of these organizations serve as suppliers to larger enterprises, including those in aerospace and defense. A breach at this level can expose sensitive data, disrupt production, and create cascading effects across industries. This is no longer about a single organization being compromised, it&#8217;s about entire ecosystems being impacted through interconnected dependencies.</p><h2>&#9878;&#65039; <strong>Insider Threat &#8211; When Trust Becomes the Vulnerability</strong></h2><p>The case of a ransomware negotiator pleading guilty to collaborating with attackers is a stark reminder that insider risk extends beyond employees. Third-party vendors, consultants, and incident response providers often have deep access to sensitive information. In this case, that trust was exploited to provide attackers with negotiation strategies and victim data. This highlights the need for strict controls, monitoring, and segmentation even within trusted relationships, as insider threat is often a function of access, not intent.</p><h2>&#128110; <strong>Scattered Spider &#8211; Social Engineering at Scale</strong></h2><p>The guilty plea of a Scattered Spider member reinforces the effectiveness of social engineering-driven attacks. This group leveraged phishing, SIM swapping, and identity manipulation to gain access to major platforms and financial assets. Their success demonstrates that even advanced organizations remain vulnerable to human-layer attacks, which often bypass technical controls entirely. While law enforcement actions are a positive development, the techniques used by these groups continue to evolve and proliferate.</p><h2>Priority Actions</h2><p>Priority Action</p><p>&#128308; FridayPatch Cisco SD-WAN CVE-2026-20133</p><p>&#128308; CriticalPatch MOVEit WAF/Kemp LoadMaster</p><p>&#128308; CriticalUpgrade Spinnaker</p><p>&#128992; HighAudit ALL OAuth grants in Workspace/M365</p><p>&#128992; HighMicrosegment Lantronix/Silex OT gateways</p><p>&#128993; MediumBlock SystemBC C2 at egress</p><h2>CISO&#8217;s Take</h2><p>Control planes are the target this week: SD-WAN managers, WAF admin APIs, Spinnaker pods, OAuth tokens, all one unauthenticated bug or over-scoped consent away from compromise. The Vercel breach is the clearest example of AI supply chain risk we&#8217;ve seen: a third-party AI tool&#8217;s compromised employee led to OAuth pivot into Vercel&#8217;s environment. An AI tool with unrestricted OAuth scope is indistinguishable from an insider.</p><p>The other thread: destructive intent and insider accountability. Lotus burning Venezuelan energy infrastructure shows wipers don&#8217;t ransom&#8212;they take generation offline. Akira hitting defense supply chain parts manufacturers creates exposure beyond single victims. And courtrooms are catching up: a ransomware negotiator selling victim data to BlackCat, Scattered Spider&#8217;s Tyler B owning up to $8M in sim swaps. If you do three things today: patch CVE-2026-20133 before Friday, audit your OAuth grants, and stress test your offline backups.</p><p>Stay Cyber Safe </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/cisco-sd-wan-kev-federal-deadline?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/cisco-sd-wan-kev-federal-deadline?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Defender 0-Days Exploited, Anthropic MCP RCE Flaw, Lazarus Drains $290M From KelpDAO]]></title><description><![CDATA[Domain Controllers in Reboot Loops, Marimo RCE Chains into NKN Blockchain Backdoor, Shiny Hunters Lists Amman Resorts with 48-Hour Countdown, Blue Sky DDoS Outage, and 2.45 Million FTP Servers No TLS]]></description><link>https://www.cyberhubpodcast.com/p/defender-0-days-exploited-anthropic</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/defender-0-days-exploited-anthropic</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Tue, 21 Apr 2026 13:31:17 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/194860233/a6d39c4512d39617c21b1d8cf37391da.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<h1><strong>Good Morning Security Gang,</strong></h1><p>Today&#8217;s show is one of those rare moments where multiple fault lines in cybersecurity crack at the same time. We&#8217;re not looking at isolated incidents  we&#8217;re seeing systemic stress across endpoint security, AI tooling, patch management, and financial ecosystems. The common thread is clear: the controls we trust most are now being actively exploited.</p><p>Today&#8217;s episode highlights a convergence of risks across enterprise environments. Attackers are no longer focused on bypassing defenses&#8212;they are repurposing trusted systems as attack vectors. From Defender zero-days disabling detection capabilities, to AI frameworks introducing remote code execution risks by design, to crypto theft reaching industrial scale, the modern threat landscape is defined by speed, scale, and trust exploitation.</p><p>Organizations must shift from a prevention-first mindset to one centered on resilience, validation, and layered defense, particularly across identity, AI, and developer ecosystems.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!b-EH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937879b5-78c5-4d0a-851e-6b801aded5e7_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!b-EH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937879b5-78c5-4d0a-851e-6b801aded5e7_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!b-EH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937879b5-78c5-4d0a-851e-6b801aded5e7_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!b-EH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937879b5-78c5-4d0a-851e-6b801aded5e7_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!b-EH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937879b5-78c5-4d0a-851e-6b801aded5e7_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!b-EH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937879b5-78c5-4d0a-851e-6b801aded5e7_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/937879b5-78c5-4d0a-851e-6b801aded5e7_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:210322,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/194860233?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937879b5-78c5-4d0a-851e-6b801aded5e7_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!b-EH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937879b5-78c5-4d0a-851e-6b801aded5e7_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!b-EH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937879b5-78c5-4d0a-851e-6b801aded5e7_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!b-EH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937879b5-78c5-4d0a-851e-6b801aded5e7_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!b-EH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F937879b5-78c5-4d0a-851e-6b801aded5e7_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>Microsoft Defender Zero-Days &#8211; Security Tools as Attack Vectors</strong></h2><p>Microsoft issued emergency patches for three actively exploited zero-days in Defender for Endpoint. These vulnerabilities allowed attackers to tamper with detection mechanisms, effectively disabling security visibility.</p><p>This marks a critical shift. Endpoint Detection and Response (EDR) is no longer just a defensive layer, it has become part of the attack surface. If attackers can neutralize your detection stack, they gain time, persistence, and operational freedom.</p><p>The implication is significant: organizations relying on a single EDR solution are operating with a single point of failure.</p><blockquote><p><em>&#8220;Attackers aren&#8217;t bypassing your defenses&#8212;they&#8217;re turning them into theirs.&#8221; James Azar and continues "That's why you need two endpoint products, not just one. It's a sad truth, but you've got to layer them. They might be able to silence Defender, but they can't silence SentinelOne or CrowdStrike. Attackers are no longer just evading endpoint security, they're actively weaponizing it."</em></p></blockquote><h2><strong>Domain Controller Patch Failure &#8211; Operational Risk from Remediation</strong></h2><p>Simultaneously, Microsoft&#8217;s April patch cycle introduced instability in domain controllers, triggering reboot loops and widespread authentication failures.</p><p>This resulted in cascading operational disruptions, including login failures, VDI outages, and identity system degradation.</p><p>This is the paradox of modern security operations: patching is essential, but poorly validated patches can introduce systemic risk. Identity infrastructure must be treated as mission-critical systems requiring controlled deployment pipelines.</p><h2><strong>AI Supply Chain Exploitation &#8211; Marimo and Hugging Face</strong></h2><p>The Marimo RCE vulnerability, exploited within hours of disclosure, demonstrates how quickly attackers are operationalizing weaknesses in AI tooling.</p><p>Attack chains now include trusted platforms like Hugging Face, combined with decentralized command-and-control infrastructure, making mitigation more complex.</p><p>This signals a new reality: AI development environments are now enterprise attack surfaces, often deployed without the rigor applied to traditional infrastructure.</p><h2><strong>Anthropic MCP Vulnerability &#8211; Systemic AI Risk</strong></h2><p>A critical design flaw in Anthropic&#8217;s Model Context Protocol (MCP) introduces remote code execution risk across a wide ecosystem of AI development tools.</p><p>The scale of exposure millions of downloads and hundreds of thousands of instances&#8212;combined with the vendor&#8217;s stance that the behavior is &#8220;by design,&#8221; raises serious concerns about security maturity in AI frameworks.</p><p>This is not a bug. It is an architectural risk.</p><h2><strong>Lazarus Group Crypto Heist &#8211; Industrialized Financial Attacks</strong></h2><p>North Korea&#8217;s Lazarus Group executed a $290 million exploit against KelpDAO, leveraging weaknesses in cross-chain bridge architecture.</p><p>This follows a repeatable playbook: compromise infrastructure, manipulate trust assumptions, and extract value at scale.</p><p>Layer Zero is attributing the attack to North Korea&#8217;s Lazarus Group, specifically the TraderTraitor cluster.</p><p>The attack chain:</p><ol><li><p>Compromised the downstream RPC endpoint that DVN relied on</p></li><li><p>Used DDoS to force failover to the poisoned endpoint</p></li><li><p>Spoofed cross-chain messages through KelpDAO&#8217;s single verifier setup</p></li></ol><p>KelpDAO is disputing the narrative, arguing the single verifier configuration was Layer Zero&#8217;s own default rather than an unusual choice.</p><p>This correlates with Bybit&#8217;s $1.5 billion heist playbook and the broader DPRK revenue engine we&#8217;ve been tracking. <strong>April 2026 is now the worst month for crypto hacks since February 2025</strong>, with over $606 million lost in 18 days.</p><p>The volume of crypto theft in April alone underscores a critical trend financial cybercrime is now operating at nation-state scale and efficiency.</p><h2><strong>Salesforce Campaign &#8211; ShinyHunters Expands Targeting</strong></h2><p>ShinyHunters continues its campaign targeting Salesforce environments, now focusing on high-value organizations like Aman Resorts.</p><p>The Aman Resorts story is short but sharp, and the clock is ticking. Ransomware.live and Hookfish report Shiny Hunters added the ultra-luxury hospitality brand Amman Resorts to its leak portal on April 19th, claiming 500,000 Salesforce records of PII with an April 21st deadline to pay or see the data posted publicly.</p><p>This listing is the latest in Shiny Hunters&#8217; active Salesforce-centric campaign that has also touched 7-Eleven, Pitney Bowes, Canada Life Assurance Company, and Marcus &amp; Millichap in the last two weeks.</p><p>Rather than exploiting platform vulnerabilities, attackers are abusing integrations, OAuth scopes, and API access.</p><p>This reflects a broader shift toward identity and integration layer exploitation, where traditional perimeter defenses offer little protection.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><h2><strong>BlueSky DDoS &#8211; Availability as a Primary Target</strong></h2><p>A multi-day DDoS attack against BlueSky disrupted core platform functionality, reinforcing that availability remains a critical component of security.</p><p>As organizations adopt decentralized architectures, mitigating volumetric and application-layer attacks becomes increasingly complex.</p><h2><strong>Internet Exposure &#8211; FTP as a Persistent Weakness</strong></h2><p>Despite years of awareness, over 2.4 million internet-facing FTP servers still operate without encryption. This is not a sophisticated threat, it is a failure of basic security hygiene at global scale.</p><p>Cleartext protocols continue to provide attackers with effortless access to credentials and sensitive data.</p><h1><strong>Key Action Items</strong></h1><ul><li><p>Deploy layered endpoint security controls to mitigate EDR tampering risks</p></li><li><p>Implement staged patching and validation for identity infrastructure</p></li><li><p>Secure AI and data science environments with enterprise-grade controls</p></li><li><p>Audit and restrict AI agent frameworks and MCP integrations</p></li><li><p>Enforce multi-verifier models in blockchain and DeFi architectures</p></li><li><p>Review SaaS integrations, OAuth scopes, and API access patterns</p></li><li><p>Strengthen DDoS response strategies with pre-defined mitigation plans</p></li><li><p>Eliminate cleartext protocols and enforce encryption across all services</p></li><li><p>Monitor for credential theft and privilege escalation indicators</p></li><li><p>Continuously validate trust assumptions across all systems</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/defender-0-days-exploited-anthropic/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/defender-0-days-exploited-anthropic/comments"><span>Leave a comment</span></a></p><div class="pullquote"><p>"The pattern on today's show is brutal and consistent: your endpoint product is being weaponized against you, your patch pipeline is breaking the infrastructure it's supposed to protect, your AI tool chain from notebook servers to the MCP standard itself is a fresh RCE buffet, nation-state crews are draining DeFi bridges for a quarter billion at a time, Shiny Hunters is turning Salesforce connected apps into a breach factory, volumetric DDoS can still take major social platforms offline for days, and millions of unencrypted FTP servers still leak credentials across the public internet." James Azar</p></div><h1><strong>James Azar&#8217;s CISOs Take</strong></h1><p>What we&#8217;re seeing today is not a series of independent failures, it&#8217;s a systemic shift in how cyber risk manifests. Endpoint protection, AI tooling, patching processes, and financial systems are all being tested simultaneously. This isn&#8217;t coincidence. It&#8217;s the result of attackers identifying where trust has been overextended and exploiting it at scale.</p><p>The path forward requires a fundamental change in approach. Security can no longer rely on static controls or assumptions of safety. Every system must be treated as potentially compromised, every integration as a risk vector, and every layer as something that must be continuously validated. Organizations that embrace this mindset will adapt. Those that don&#8217;t will continue reacting to incidents rather than preventing impact.</p><p>Stay Cyber Safe</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/defender-0-days-exploited-anthropic?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/defender-0-days-exploited-anthropic?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/defender-0-days-exploited-anthropic?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[ZionSiphon ICS Malware Targets Water Plants, Vercel Breached, NHS Still Suffering from Ransomware Attack]]></title><description><![CDATA[Baby Azar Sleep Deprivation Edition&#8212;Finance Chiefs Warn AI Could Destabilize Banking, Crypto Exchange Blames Western Intelligence for $13.7M Hack, Apache ActiveMQ Actively Exploited, Fortinet Sandbox]]></description><link>https://www.cyberhubpodcast.com/p/zionsiphon-ics-malware-targets-water</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/zionsiphon-ics-malware-targets-water</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Mon, 20 Apr 2026 13:31:06 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/194755570/41405b449fb7b275cb64ad24f12c26a9.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<h1><strong>Good Morning Security Gang,</strong></h1><p>Today&#8217;s show is one of those where you can clearly see the convergence of everything we&#8217;ve been talking about AI risk, supply chain compromise, critical infrastructure targeting, and long-tail operational damage.</p><p>And if there&#8217;s one theme that cuts across every single story today, it&#8217;s this: attackers are abusing trust faster than defenders can validate it.</p><p>Double espresso in hand, let&#8217;s get into it. Coffee Cup Cheers</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><div class="pullquote"><p>"A career in cyber will help you understand what it's like to only function on three or four hours of sleep. If you've ever been through an incident, you know the marathon you're going through in the hours and days post-event until you get the all-clear signal. Your career kind of prepares you for parenting, so don't hold back, go make yourself some little ones, join the party, it's a blast!" James Azar on new parenting</p></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lfA5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18390d02-87ba-426d-8979-034d0fe66457_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lfA5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18390d02-87ba-426d-8979-034d0fe66457_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!lfA5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18390d02-87ba-426d-8979-034d0fe66457_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!lfA5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18390d02-87ba-426d-8979-034d0fe66457_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!lfA5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18390d02-87ba-426d-8979-034d0fe66457_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lfA5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18390d02-87ba-426d-8979-034d0fe66457_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/18390d02-87ba-426d-8979-034d0fe66457_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2038879,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/194755570?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18390d02-87ba-426d-8979-034d0fe66457_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!lfA5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18390d02-87ba-426d-8979-034d0fe66457_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!lfA5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18390d02-87ba-426d-8979-034d0fe66457_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!lfA5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18390d02-87ba-426d-8979-034d0fe66457_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!lfA5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18390d02-87ba-426d-8979-034d0fe66457_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>AI Threat to Global Banking: Speed vs. Control</strong></h2><p>We kick things off with financial leaders warning that advanced AI models could destabilize parts of the global banking system. This isn&#8217;t about hallucinations or bad outputs, it&#8217;s about <strong>scale and speed</strong>.</p><p>AI is enabling fraud, automating attacks, and accelerating decision-making faster than human oversight can keep up. And in banking, where regulation slows everything down, that gap becomes dangerous.</p><p>The real risk here is systemic fraud happening faster than institutions can detect or respond, potentially leading to financial instability.</p><p>This is where AI shifts from a tool to a threat multiplier.</p><h2><strong>Vercel Breach: Developer Infrastructure Under Fire</strong></h2><p>Next, Vercel confirmed a breach involving unauthorized access to internal systems, with attackers claiming access to source code, tokens, and internal dashboards.</p><p>This is a direct hit on <strong>developer infrastructure and CI/CD environments</strong>.</p><blockquote><p><em>&#8220;Attackers don&#8217;t need to break trust, they just need to use it better than we protect it.&#8221;</em></p></blockquote><p>And that matters because these systems aren&#8217;t just internal, they&#8217;re gateways into production environments and customer data. The risk here isn&#8217;t just what was accessed, it&#8217;s what can be accessed next through stolen tokens and deployment pipelines.</p><p>This is supply chain risk in real time.</p><h2><strong>Crypto Exchange Hack: Blame vs. Reality</strong></h2><p>A crypto exchange suffered a $13.7 million hack and blamed Western intelligence agencies. Regardless of attribution, the reality is simple, the funds are gone.</p><p>This highlights a recurring issue in crypto incidents: geopolitics often clouds transparency. But users don&#8217;t care about attribution, they care about access to their funds.</p><p>The risk is erosion of trust in platforms where accountability becomes secondary to narrative.</p><h2><strong>NHS Ransomware Fallout: Two Years Later, Still Broken</strong></h2><p>The NHS story is one of the most important today&#8212;and the most overlooked.</p><p>Nearly two years after a ransomware attack, healthcare services in London are still dealing with the fallout thousands of delayed procedures, disrupted diagnostics, and ongoing operational issues.</p><blockquote><p><em>&#8220;Cyber incidents don&#8217;t end when systems come back online&#8212;they end when operations fully recover.&#8221; James Azar</em></p></blockquote><p>This is the long tail of cyber incidents. Ransomware isn&#8217;t just a data problem, it&#8217;s a multi-year operational crisis. And healthcare, more than any other sector, feels that impact directly in patient care.</p><h2><strong>ZionSiphon Malware Targets Water Infrastructure</strong></h2><p>This is one of the most concerning stories of the day. ZionSiphon malware is targeting water treatment and desalination systems, specifically looking for processes related to chlorine handling and water purification.</p><p>It even includes references to poisoning water supplies. This isn&#8217;t theoretical.</p><p>This is <strong>early-stage OT malware with real-world consequences</strong>.</p><p>Even if incomplete, it&#8217;s enough to cause damage&#8212;and that&#8217;s what makes it dangerous. We&#8217;ve seen this before. Oldsmar, Florida. One analyst prevented disaster. This is that same playbook evolving.</p><h2><strong>Apache ActiveMQ Exploited: Old Bugs, New Campaigns</strong></h2><p>ActiveMQ vulnerabilities are now being actively exploited, often chained with default credentials and older bugs. This is a recurring theme:</p><p>Old vulnerabilities + weak configurations = new attacks. Middleware like ActiveMQ sits deep in application environments, making it a perfect foothold for attackers.</p><p>Quiet. Persistent. Dangerous.</p><h2><strong>Fortinet Sandbox Flaw: Security Tools Become Attack Vectors</strong></h2><p>A critical Fortinet Sandbox vulnerability allows unauthenticated command execution as root with public exploit code already available. This is a reminder that security tools themselves are part of the attack surface.</p><p>If compromised, they become trusted footholds for attackers. The irony is real and so is the risk.</p><h2><strong>Apple Alert Phishing: When Real Becomes the Threat</strong></h2><p>Attackers are abusing legitimate Apple account notifications to deliver phishing messages. These emails pass all authentication checks, SPF, DKIM, DMARC, because they&#8217;re actually sent by Apple.</p><p>This is next-level phishing. No fake domains. No obvious red flags. Just trusted communication turned into an attack vector.</p><h2><strong>Good Guys Prevail: DDoS Crackdown and North Korea Sentencing</strong></h2><p>On the positive side, law enforcement disrupted a DDoS-for-hire network, seizing domains and warning over 75,000 users. Additionally, two individuals were sentenced for supporting North Korea&#8217;s fake IT worker scheme.</p><p>These are wins&#8212;but they&#8217;re temporary. Cybercrime ecosystems adapt quickly. Disruption creates friction, not elimination.</p><h2><strong>DraftKings Credential Stuffing Case: Old Tactics Still Work</strong></h2><p>Finally, the DraftKings case reminds us that credential stuffing is still highly effective. Attackers used reused credentials from other breaches to access 60,000 accounts and monetize them.</p><p>No zero-days. No advanced techniques. Just reused passwords.</p><p>Sometimes the biggest risks are still the simplest.</p><h2><strong>Action Items for Security Leaders</strong></h2><ul><li><p>Introduce human approval gates for high-risk AI-driven financial workflows</p></li><li><p>Treat CI/CD and developer platforms as production-grade assets</p></li><li><p>Enforce rapid token rotation and eliminate static credentials</p></li><li><p>Demand transparency and proof-of-reserve in crypto platforms post-incident</p></li><li><p>Build healthcare recovery plans around clinical workflows, not just IT systems</p></li><li><p>Baseline OT behavior and monitor for unauthorized process changes</p></li><li><p>Remove default credentials and patch middleware like ActiveMQ immediately</p></li><li><p>Patch and audit security appliances as high-priority infrastructure</p></li><li><p>Train users to verify alerts directly from official apps&#8212;not email links</p></li><li><p>Strengthen defenses against credential stuffing and automated abuse</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/zionsiphon-ics-malware-targets-water/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/zionsiphon-ics-malware-targets-water/comments"><span>Leave a comment</span></a></p><div class="pullquote"><p>"The pattern here is clear. Trust is getting abused everywhere&#8212;in banks, clouds, hospitals, industrial systems, software appliances, brand alerts, and user accounts. Attackers keep winning when defenders assume a system is safe because it's familiar. It isn't. Our work is to verify the trust, reduce the blast radius, and be faster at seeing misuse than the attacker is at scaling it."</p></div><h2><strong>James Azar&#8217;s CISOs Take</strong></h2><p>What stood out to me today is how interconnected everything has become. AI, cloud, OT systems, and user behavior are no longer separate domains&#8212;they&#8217;re all part of the same attack surface. When attackers exploit trust in one area, it cascades into others. That&#8217;s why we&#8217;re seeing incidents that start in one place and end somewhere completely different.</p><p>The second takeaway is the importance of resilience. Too many organizations still think in terms of prevention, but today&#8217;s stories especially NHS and water infrastructure show that recovery and continuity are just as critical. We need to design systems not just to stop attacks, but to survive them. Because in today&#8217;s environment, survival is the real measure of security.</p><p><strong>Stay Cyber Safe.</strong></p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/zionsiphon-ics-malware-targets-water?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/zionsiphon-ics-malware-targets-water?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/zionsiphon-ics-malware-targets-water?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[This Week in Cybersecurity #48]]></title><description><![CDATA[Below the Surface: Quiet Campaigns, Trusted Systems, and the Week Cyber Became Societal. Your weekend catch-up on the most critical cybersecurity stories of the week, curated by James Azar and the Cyb]]></description><link>https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-48</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-48</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Fri, 17 Apr 2026 15:02:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!UaQO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaafb4e2-be99-4a85-9ae4-a493d3d485fe_1920x1080.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Good Morning, Security Gang!</h2><p>We&#8217;re back and yes, the Azar family grew by one beautiful baby boy this week. Sleep is rare. Coffee is mandatory. And James is back in the saddle with the double espresso running and the full Security Gang energy you&#8217;ve come to expect.</p><p>If this week&#8217;s stories have a common thread, it&#8217;s this: the most dangerous cyber threats aren&#8217;t the loudest ones. Sweden was nearly hit by a Russian attack on its heating infrastructure, and that attack <em>failed</em>, but the intent was unmistakable. Ukrainian hospitals and government agencies are being targeted with malware specifically designed to disrupt societal stability. Twelve thousand systems in the Middle East were scanned in an Iranian-style reconnaissance campaign. </p><p>And Patch Tuesday arrived with what may be the second-largest Microsoft patch cycle ever 167 vulnerabilities, including an exploited SharePoint zero-day arriving the same week as critical patches from Fortinet, SAP, Adobe, Ivanti, and eight major industrial vendors.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UaQO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaafb4e2-be99-4a85-9ae4-a493d3d485fe_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UaQO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaafb4e2-be99-4a85-9ae4-a493d3d485fe_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!UaQO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaafb4e2-be99-4a85-9ae4-a493d3d485fe_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!UaQO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaafb4e2-be99-4a85-9ae4-a493d3d485fe_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!UaQO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaafb4e2-be99-4a85-9ae4-a493d3d485fe_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UaQO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaafb4e2-be99-4a85-9ae4-a493d3d485fe_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/caafb4e2-be99-4a85-9ae4-a493d3d485fe_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3080204,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/194369704?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaafb4e2-be99-4a85-9ae4-a493d3d485fe_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!UaQO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaafb4e2-be99-4a85-9ae4-a493d3d485fe_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!UaQO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaafb4e2-be99-4a85-9ae4-a493d3d485fe_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!UaQO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaafb4e2-be99-4a85-9ae4-a493d3d485fe_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!UaQO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaafb4e2-be99-4a85-9ae4-a493d3d485fe_1920x1080.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Meanwhile, the week&#8217;s breach stories reinforced a pattern we&#8217;ve been tracking for months: attackers exploiting trust rather than force. Booking.com, Rockstar Games via Snowflake, McGraw-Hill via a Salesforce misconfiguration, a Kraken insider threat, and supply chain compromises in GitHub, Jira, and npm all shared the same fingerprint legitimate access, trusted platforms, and no alarm bells until it was too late.</p><p>James opened one of this week&#8217;s shows with a reflection on Yom HaShoah Holocaust Remembrance Day and the quiet, slow erosion that precedes catastrophe. It was a reminder that whether in society or in cybersecurity, the warnings come long before the breaking point. The question is whether we&#8217;re paying attention.</p><blockquote><p><em>&#8220;Attackers keep winning by abusing things we already trust &#8212; SaaS pages, support workflows, app authorization, collaboration platforms, and even our own security appliances, ERP systems, and VPN clients. The defensive move is not magic. It is knowing which trusted systems have the highest blast radius and hardening those first. That is how you reduce risk.&#8221;</em></p></blockquote><p>Let&#8217;s get into it.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><h2>&#127760; Geopolitical Cyber Warfare</h2><p><strong>Sweden Attributes Heating Plant Attack to Russian-Linked Group</strong></p><p>Swedish officials attributed a cyberattack on a district heating plant to a pro-Russian group with ties to Russian intelligence. The attack failed operationally but that&#8217;s not the lead. The intent is. This fits a sustained European pattern of targeting civilian infrastructure not to destroy it, but to create instability and psychological pressure on populations. Heating. Power. Water. These aren&#8217;t military targets they&#8217;re societal pressure points. Gray-zone warfare doesn&#8217;t need to succeed to succeed. The attempt alone achieves its goal.</p><blockquote><p><em>&#8220;If we treated our power plants the way pilots treat an airplane, we would likely have less of these events on the engineering side. As security practitioners, we ought to be planning for the day after. That day after is network obfuscation. That day after is inline data encryption even within your air-gapped networks.&#8221;</em></p></blockquote><p><strong>AgingFly Malware Targets Ukrainian Government and Hospitals</strong></p><p>A new malware strain AgingFly is actively targeting Ukrainian government organizations and healthcare systems. This is not opportunistic cybercrime. It is deliberate targeting of the institutions that sustain public life. Hospitals and government agencies are being hit because disrupting them destabilizes society without requiring kinetic escalation. Cyber resilience in healthcare and public sector environments is no longer an IT goal, it is a national security imperative.</p><p><strong>12,000 Systems Scanned in Iranian-Style Reconnaissance Campaign</strong></p><p>More than 12,000 systems in the Middle East have been scanned in a campaign mirroring Iranian reconnaissance tactics. Scanning is not the attack, it&#8217;s the preparation for one. This is patient, methodical threat actor behavior: map the environment, identify weaknesses, and return with precision. This aligns directly with prior reporting on Iranian pre-positioning across U.S. industrial and critical infrastructure. Today&#8217;s scan is tomorrow&#8217;s disruption.</p><p><strong>4,000 U.S. Industrial Devices Remain Exposed to Iranian Targeting</strong></p><p>Nearly 4,000 U.S. industrial devices remain directly internet-exposed and vulnerable to Iranian-linked activity. These are operational technology systems, they control physical processes. Leaving them exposed is not a misconfiguration. It is an open invitation in a high-risk neighborhood. The question is no longer whether someone will walk through that door, it&#8217;s when.</p><p><strong>Iranian Cyber Threats Target U.S. Energy Infrastructure</strong></p><p>CISA and NERC continue to issue warnings around Iranian-linked activity targeting U.S. critical infrastructure, with particular focus on energy systems. The current activity remains focused on reconnaissance and persistence rather than immediate disruption. But in the Iranian threat model, today&#8217;s foothold is tomorrow&#8217;s leverage. OT environments with any internet exposure should treat this as an active threat, not a theoretical one.</p><h2>&#128165; Stryker Fallout: Cyber Becomes a Business Event</h2><p><strong>Stryker Confirms Material Q1 Earnings Impact from Iran-Linked Attack</strong></p><p>Stryker confirmed this week that the March 11 Iran-linked attack had a material impact on Q1 earnings. The Handala group gained access to Microsoft Intune, wiped more than 200,000 devices, and disrupted the company&#8217;s ordering and supply chain systems. Operations have since been restored &#8212; but the damage was real, measurable, and reported to investors.</p><p>This is the clearest example in recent memory of cyber leaving the SOC and landing on a hospital floor, and then in an earnings release. Medical staff adapted under constrained equipment conditions. Hospitals extended the use of existing devices. And a publicly traded company disclosed financial harm directly attributable to a nation-state-linked cyber operation. For CISOs still struggling to quantify cyber risk in business terms, this is the case study.</p><h2>&#128275; Data Breaches &amp; Exposures</h2><p><strong>Booking.com Breach: Identity and Access, Not Infrastructure</strong></p><p>Booking.com confirmed a breach affecting user data, likely tied to compromised credentials or third-party access workflows rather than a direct infrastructure intrusion. This is the modern breach pattern: no forced entry, just trusted access used incorrectly. Travel and hospitality platforms hold high-value identity data that fuels downstream fraud, social engineering, and impersonation at scale. For users, this is a direct reminder that passwords alone are insufficient MFA is non-negotiable on any platform holding financial or travel data.</p><p><strong>Rockstar Games: Snowflake Environment Accessed via Third-Party Credentials</strong></p><p>ShinyHunters claims access to Rockstar Games data stored in a Snowflake cloud environment via a compromised third-party analytics platform. The attack pattern is textbook: stolen credentials, legitimate API access, no alerts triggered. Once inside a cloud environment via valid credentials, attackers move at the speed of the platform itself. Cloud security monitoring must go beyond perimeter controls to include behavioral anomaly detection for API access patterns across every integrated third-party service.</p><p><strong>McGraw-Hill Salesforce Misconfiguration: ShinyHunters Claims 45 Million Records</strong></p><p>McGraw-Hill is the latest victim in ShinyHunters&#8217; ongoing Salesforce campaign. The attackers reportedly exploited a misconfigured Salesforce-hosted web page not the core enterprise tenant, and are claiming 45 million records and threatening to leak if not paid. McGraw-Hill stated that core systems, customer databases, and student platforms were not accessed. But the blast radius of SaaS misconfigurations regularly extends far beyond what organizations initially assume. Every externally reachable SaaS-hosted page requires explicit access control validation, not just the main platform tenant.</p><p><strong>Kraken Insider Threat: Support Employees Enable Extortion Attempt</strong></p><p>Kraken disclosed that a cybercrime group attempted to extort the exchange using videos allegedly showing internal systems. At the root: two support employees accessed limited customer data improperly. Client funds were not at risk. But the incident demonstrates a consistent pattern, when externally hardened environments are difficult to breach, attackers pivot to the human layer. Support functions with access to customer data are high-value social engineering targets, particularly where wage disparities create vulnerability to outside influence. Just-in-time access and session recording for support teams are essential controls.</p><p><strong>CPU-Z Trojanized Downloads: Supply Chain at Distribution Level</strong></p><p>Attackers compromised the CPUID website to distribute trojanized versions of CPU-Z and HWMonitor. This is supply chain compromise at the final distribution point trusted tools from a recognized domain, delivering malware to users who never suspected anything was wrong. Most users will not verify cryptographic signatures before installing a familiar utility. That&#8217;s the gap attackers are exploiting. Enforce signature verification as a baseline requirement before any software installation in enterprise environments.</p><p><strong>RCI Hospitality IDOR Vulnerability Exposes Contractor Data</strong></p><p>RCI Hospitality disclosed an insecure direct object reference vulnerability in their web application that exposed contractor data without triggering traditional security alerts. IDORs are unglamorous but brutally effective the application hands attackers the data without any exploitation of authentication systems. Object-level authorization testing must be part of every application security release gate, particularly for portals handling workforce and contractor records.</p><h2>&#128373;&#65039; Nation-State Activity &amp; Advanced Threats</h2><p><strong>North Korea&#8217;s $280 Million Crypto Theft: Corporate-Grade Operations</strong></p><p>The post-mortem on the Drift crypto theft reveals an operation that reads less like a hack and more like a business. North Korea orchestrated a $280 million theft using fake companies, sustained relationship-building, social engineering, and physical presence at industry conferences. This was not remote exploitation, it was long-game infiltration. Fake identities. Real relationships. Trust built over months before a payload was ever deployed. If your security model doesn&#8217;t account for adversaries who operate at this level of patience and organizational sophistication, it is not accounting for the actual threat.</p><p><strong>North Korea&#8217;s APT37: Facebook-Based Social Engineering Campaign</strong></p><p>APT37 is running an active social engineering campaign using fake Facebook personas to build relationships with targets before deploying malware payloads. This is patience over speed, psychology over technology. Attackers establish trust across weeks or months before any technical action is taken. This is where most defenses still fall short, because they are built to detect technical indicators, not human behavioral manipulation. Employee awareness of relationship-building social engineering is a required defensive layer.</p><h2>&#128737;&#65039; Vulnerabilities &amp; Patch Tuesday</h2><p><strong>Microsoft Patch Tuesday: SharePoint Zero-Day + 167 Fixes &#8212; Second Largest Ever</strong></p><p>Microsoft addressed 167 vulnerabilities this month, the second largest Patch Tuesday by CVE count on record including an actively exploited SharePoint zero-day (CVE-2026-29231) that was publicly known before patches were released. Collaboration and content platforms continue to draw the most adversarial attention. Internet-facing systems like SharePoint must have a dedicated fast-lane patch process, they cannot wait in the same queue as routine workstation updates.</p><p><strong>Fortinet: CVE-2026-27813 Across Multiple Products</strong></p><p>Fortinet released a broad patch set with clear prioritization around CVE-2026-27813, affecting FortiAnalyzer, FortiManager, FortiOS, FortiProxy, FortiPAM, and FortiSwitch Manager. The perimeter and management plane continue to be primary targets. Every security appliance should be treated as production infrastructure and patched according to attack surface priority, not product popularity.</p><p><strong>SAP: 19 Security Notes Including Critical CVSS 9.9 SQL Injection</strong></p><p>SAP released 19 new security notes covering more than a dozen products, including CVE-2026-27681, a CVSS 9.9 SQL injection vulnerability in Business Planning and Consolidation and Business Warehouse that could lead to arbitrary code execution. ERP and core business systems must be treated as crown jewel infrastructure. Attackers who land in SAP don&#8217;t just steal data they learn how the business operates. Prioritize SAP remediation based on process criticality and direct business exposure.</p><p><strong>Adobe: 55 Vulnerabilities Including Critical ColdFusion Flaw</strong></p><p>Adobe patched 55 vulnerabilities across 11 products, with a critical ColdFusion vulnerability representing the highest real-world exploitation risk. ColdFusion has a consistent history of showing up in attack chains precisely because it sits in the internet-facing application layer. If ColdFusion is still running in your environment, place it behind additional network controls and treat it as a high-risk exception requiring active monitoring.</p><p><strong>Ivanti: RCE and Authentication Bypass Return</strong></p><p>Ivanti surfaced again this week with two new vulnerabilities &#8212; a remote code execution flaw and an authentication bypass. Platforms that broker access and manage systems sit in the critical flow of enterprise trust. Ivanti&#8217;s recurring presence in the threat landscape is not a coincidence it reflects consistent adversarial interest in control-plane compromise. Patch immediately and validate that no previous exploitation paths remain active.</p><p><strong>CISA Flags Windows Task Host Privilege Escalation Under Active Exploitation</strong></p><p>CISA flagged a Windows Task Host vulnerability as actively exploited, allowing attackers to escalate to SYSTEM-level access. Privilege escalation is where initial access becomes full control. Once an attacker reaches SYSTEM on a shared or high-value system, the scope of compromise expands rapidly. This vulnerability warrants immediate remediation prioritization.</p><p><strong>NGINX UI Zero-Day: Management Interface Compromise</strong></p><p>Active exploitation of a critical NGINX UI zero-day continues. Exposed administrative interfaces remain one of the most consistently effective attack vectors &#8212; not because they&#8217;re sophisticated, but because convenience keeps winning over security. Management panels left accessible to the internet are an open invitation. Remove or restrict all exposed administrative interfaces immediately.</p><p><strong>ICS Patch Tuesday: Eight Major Industrial Vendors</strong></p><p>Siemens, Schneider Electric, Rockwell, and five additional industrial vendors released advisories in this month&#8217;s ICS Patch Tuesday. OT environments accumulate risk over time long-lived systems, infrequent patching, and operational continuity constraints combine to create compounding vulnerability. Establish dedicated OT vulnerability management processes that account for the unique operational constraints of industrial environments.</p><p><strong>Synology SSL VPN Client: Remote Access Vulnerabilities</strong></p><p>Synology released updates for SSL VPN client vulnerabilities. Vendor guidance specifies upgrading to version 1.4.5-0684 or newer and calls for active monitoring of configuration changes and unusual traffic behavior. VPN configuration changes should be monitored with the same urgency as failed login attempts remote access is where trust and network access intersect most dangerously.</p><p><strong>Juniper and Chrome Continue Steady Patch Cycles</strong></p><p>Juniper patched dozens of Junos OS vulnerabilities, and Chrome released version 147 with 60 fixes including two critical. Neither is a single dramatic event both reflect the ongoing maintenance reality of foundational infrastructure. Browsers and network devices are prime targets precisely because they are ubiquitous and trusted. Keep them current automatically.</p><h2>&#129302; AI, Supply Chain &amp; Developer Threats</h2><p><strong>Cloud Security Alliance Releases Mythos AI Threat White Paper</strong></p><p>The Cloud Security Alliance, led by Gadi Evron, published a white paper on Anthropic&#8217;s Mythos AI model and its implications for the cybersecurity threat landscape reviewed by over 100 CISOs. The core concern: AI tools like Mythos dramatically accelerate both vulnerability discovery and exploit development, compressing the timeline between disclosure and weaponization in ways the industry has not yet calibrated for. This is required reading for security leadership. Download it at cyberhubpodcast.com.</p><p><strong>OpenAI Caught in Axios npm Supply Chain Compromise</strong></p><p>OpenAI was caught in the blast radius of the Axios npm package supply chain compromise. This confirms a pattern: supply chain attacks don&#8217;t stop at developers they propagate through enterprise apps, AI platforms, and into production systems. Once trust is compromised at the package level, everything downstream inherits that risk. Software composition analysis is foundational security hygiene, not an advanced practice.</p><p><strong>Glassworm Evolves: Zig-Based Dropper Targets Developer IDEs</strong></p><p>Glassworm returned with a new variant using a Zig-based dropper to target developer environments and IDE ecosystems. Attackers are moving upstream into the development lifecycle because controlling the developer environment means influencing what gets built. Supply chain compromise at the IDE layer is persistent, quiet, and extraordinarily difficult to detect after the fact. Lock down developer environments with signed plugins, approved extension lists, and access controls.</p><p><strong>PHP Composer Flaws Enable Arbitrary Command Execution</strong></p><p>New vulnerabilities in PHP Composer enable arbitrary command execution within software build workflows. This is the same threat surface the Team PCP group exploited in expanding across developer toolchains. Pin Composer and all build chain tooling to approved internal baselines rather than allowing developer environments to drift toward the latest available version.</p><p><strong>GitHub and Jira Notification Abuse for Malware Delivery</strong></p><p>Attackers are abusing GitHub and Jira notification systems to deliver malicious links inside expected, trusted workflow communications. Users don&#8217;t question notifications from platforms they rely on daily and attackers have learned to exploit exactly that behavioral pattern. Extend phishing inspection to collaboration platform notifications, not just email. Security teams often overlook these channels entirely.</p><h2>&#9878;&#65039; Policy, Regulation &amp; Industry</h2><p><strong>FCC Cybertrust Mark: IoXT Alliance Named New Lead Administrator</strong></p><p>The FCC Cybertrust Mark program, a consumer-facing security certification for connected devices has a new lead administrator after UL withdrew. The non-profit IoXT Alliance takes over, putting the program back on track. Given the persistent exploitation of routers, IoT devices, and unmanaged endpoints, any policy initiative that raises the baseline security floor for connected devices has real-world defensive value. This program matters.</p><p><strong>FCC Grants Netgear Exemption in Router Certification Rules</strong></p><p>The FCC granted Netgear an exemption related to router certification requirements and foreign-owned testing labs. This sits at the intersection of cybersecurity, geopolitics, and supply chain policy. Hardware certification decisions directly influence how secure or insecure network infrastructure becomes at the consumer and enterprise level alike. Policy decisions are now security decisions.</p><p><strong>Privacy Research: Tracking Persists After User Opt-Outs</strong></p><p>New research indicates major technology companies can continue tracking users even after opt-out mechanisms are activated. The security implication is not just privacy: if controls don&#8217;t behave as documented, then compliance assumptions break down. Defenders cannot rely solely on vendor claims. Validate privacy and tracking controls independently including within your own environment.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-48/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-48/comments"><span>Leave a comment</span></a></p><h2>&#9989; This Week&#8217;s Priority Action List</h2><p><strong>Immediate (Do This Now)</strong></p><ul><li><p>Patch Microsoft SharePoint CVE-2026-29231 immediately &#8212; publicly known before patches released, active exploitation likely</p></li><li><p>Patch SAP CVE-2026-27681 (CVSS 9.9) &#8212; arbitrary code execution in ERP core infrastructure</p></li><li><p>Patch Fortinet CVE-2026-27813 across FortiOS, FortiManager, FortiAnalyzer, FortiProxy, FortiPAM, FortiSwitch Manager</p></li><li><p>Patch Ivanti RCE and authentication bypass vulnerabilities &#8212; control plane compromise risk</p></li><li><p>Patch Windows Task Host privilege escalation &#8212; CISA confirmed active exploitation, SYSTEM access at stake</p></li><li><p>Remove or restrict all exposed NGINX UI management interfaces &#8212; active zero-day exploitation underway</p></li><li><p>Patch Synology SSL VPN client to 1.4.5-0684 or newer and monitor for configuration anomalies</p></li></ul><p><strong>Short-Term (This Month)</strong></p><ul><li><p>Audit every externally reachable SaaS-hosted page and Salesforce integration &#8212; McGraw-Hill is not an isolated incident</p></li><li><p>Implement just-in-time access and session recording for all support functions touching customer data</p></li><li><p>Enforce cryptographic signature verification for all software downloads in enterprise environments</p></li><li><p>Add object-level authorization testing to application security release gates</p></li><li><p>Eliminate direct internet exposure for all OT, industrial, and ICS systems 4,000 U.S. devices remain exposed</p></li><li><p>Deploy behavioral anomaly detection for cloud API access across all third-party SaaS integrations</p></li><li><p>Review and pin PHP Composer and developer build tooling to approved internal baselines</p></li><li><p>Extend phishing inspection to GitHub, Jira, and all collaboration platform notification channels</p></li></ul><p><strong>Strategic (This Quarter)</strong></p><ul><li><p>Establish dedicated OT vulnerability management processes separate from IT patch cycles</p></li><li><p>Download and review the Cloud Security Alliance Mythos white paper &#8212; calibrate your AI threat timeline assumptions</p></li><li><p>Build dedicated fast-lane patch processes for internet-facing collaboration platforms separate from workstation cycles</p></li><li><p>Treat SAP and ERP systems as crown jewel infrastructure with process-criticality-based patching priority</p></li><li><p>Implement network obfuscation and inline data encryption for critical infrastructure environments</p></li></ul><h2>&#127897;&#65039; James Azar&#8217;s CISO&#8217;s Take</h2><p>When I look across this week&#8217;s stories, the most important thing I see is how much risk sits below the surface &#8212; quiet, patient, and methodical. Sweden&#8217;s heating plant, Ukrainian hospitals, Iranian reconnaissance across 12,000 systems, a SharePoint zero-day already known to attackers before patches dropped. These are not loud, chaotic events. They are deliberate campaigns against the systems that keep society functioning. And that&#8217;s exactly what makes them dangerous &#8212; they accumulate unnoticed until the disruption is unavoidable. Stryker hitting a quarterly earnings report is the clearest signal yet that cyber risk is no longer an IT budget line. It is a business event, a financial event, and a human event.</p><p>The second takeaway is about the pace of change. The Cloud Security Alliance&#8217;s Mythos white paper, Jason Clinton and Kevin Mandia&#8217;s commentary, and this Patch Tuesday&#8217;s record-setting CVE count all point to the same reality: AI is compressing vulnerability discovery and exploit development into timelines defenders have never had to operate against before. The answer isn&#8217;t panic &#8212; it&#8217;s prioritization. Know which trusted systems carry the highest blast radius. Harden those first. Build resilience into how you operate, not just how you prevent. Because at the scale and speed this threat environment is moving, perfection isn&#8217;t achievable but preparedness is.</p><h2>&#128203; Week in Summary</h2><p>This was a week that reminded practitioners of something easy to lose sight of under the volume of daily threat intelligence: cybersecurity is not about protecting dashboards. It&#8217;s about protecting the systems that keep hospitals running, supply chains moving, heating plants operating, and governments functioning. Sweden, Ukraine, and Stryker all told the same story from different angles when cyber operations are targeted not at data but at operational continuity, the consequences extend far beyond the perimeter and into people&#8217;s lives.</p><p>Technically, the week was defined by volume and trust exploitation at scale. The second-largest Patch Tuesday ever. Critical patches from SAP, Fortinet, Adobe, Ivanti, and eight industrial vendors simultaneously. And breach after breach &#8212; Booking.com, Rockstar, McGraw-Hill, Kraken &#8212; sharing the same fingerprint: no forced entry, just trusted access misused, misconfigured, or manipulated through the human layer. The defensive posture this demands is not more tools or more rules. It is continuous validation of every trust assumption in your environment, prioritized by blast radius, executed with the speed the threat environment now requires.</p><p>Stay informed. Stay prepared. <strong>Stay Cyber Safe.</strong> &#128272;</p><div><hr></div><p><em>&#169; CyberHub Podcast | Subscribe on Substack | Watch on YouTube | Follow on LinkedIn</em></p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-48?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-48?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/this-week-in-cybersecurity-48?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[AgingFly Malware Hits Ukraine Hospitals, NGINX UI 0-Day Exploited, Sweden Blames Russia for Hack]]></title><description><![CDATA[Pro-Russian Group Attacked Swedish Heating Plant, Iranian-Style Scanning Hits 12,000 Middle East Systems, CISA Flags Windows Task Host Flaw, Ivanti Back in Patch Queue Again]]></description><link>https://www.cyberhubpodcast.com/p/agingfly-malware-hits-ukraine-hospitals</link><guid isPermaLink="false">https://www.cyberhubpodcast.com/p/agingfly-malware-hits-ukraine-hospitals</guid><dc:creator><![CDATA[James Azar]]></dc:creator><pubDate>Thu, 16 Apr 2026 03:31:07 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/194368522/58fd2c845d77466e1f0c7518a1a08cc5.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<h1><strong>Good Morning Security Gang,</strong></h1><p>Today&#8217;s episode is one of those that reminds us cybersecurity isn&#8217;t just about alerts and dashboards, it&#8217;s about heating plants, hospitals, industrial systems, and the very infrastructure that keeps society running.</p><p>What we&#8217;re seeing today is not loud ransomware headlines, it&#8217;s something far more dangerous: low-visibility, high-impact activity targeting the systems people rarely think about but depend on every day.</p><blockquote><p><em>&#8220;You&#8217;re not waiting to be attacked, you&#8217;re already on someone&#8217;s scan list.&#8221;</em></p></blockquote><p>Coffee cup cheers, let&#8217;s dive in.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!tc9h!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3507811b-1b65-465d-862f-c28b5de23a4f_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tc9h!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3507811b-1b65-465d-862f-c28b5de23a4f_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!tc9h!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3507811b-1b65-465d-862f-c28b5de23a4f_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!tc9h!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3507811b-1b65-465d-862f-c28b5de23a4f_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!tc9h!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3507811b-1b65-465d-862f-c28b5de23a4f_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tc9h!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3507811b-1b65-465d-862f-c28b5de23a4f_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3507811b-1b65-465d-862f-c28b5de23a4f_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:329486,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberhubpodcast.com/i/194368522?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3507811b-1b65-465d-862f-c28b5de23a4f_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!tc9h!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3507811b-1b65-465d-862f-c28b5de23a4f_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!tc9h!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3507811b-1b65-465d-862f-c28b5de23a4f_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!tc9h!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3507811b-1b65-465d-862f-c28b5de23a4f_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!tc9h!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3507811b-1b65-465d-862f-c28b5de23a4f_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>Sweden Blames Russia for Energy Infrastructure Attack</strong></h2><p>We begin in Sweden, where officials have attributed a cyberattack on a heating plant to a pro-Russian group linked to intelligence services.</p><p>The attack itself failed, but that&#8217;s not the story. The story is intent.</p><p>This fits a broader European pattern: probing civilian infrastructure heating, power, utilities not necessarily to destroy, but to create instability and psychological pressure.</p><p>These aren&#8217;t battlefield operations. These are <strong>societal pressure campaigns</strong>.</p><p>The risk is clear: disruption of everyday life systems without triggering full-scale conflict. And that&#8217;s exactly the kind of gray-zone warfare we&#8217;re seeing more of.</p><h2><strong>AgingFly Malware Targets Ukrainian Government and Hospitals</strong></h2><p>Next, we move to Ukraine, where a new malware strain&#8212;AgingFly&#8212;is actively targeting government organizations and healthcare systems.</p><p>This is not opportunistic cybercrime. This is deliberate targeting of public service continuity.</p><p>Hospitals and government agencies are being hit because they represent stability. Disrupt them, and you disrupt society. This is cyber warfare in its purest form, pressure without kinetic escalation.</p><p>The takeaway here is that resilience in healthcare and public sector systems is no longer optional, it&#8217;s strategic.</p><h2><strong>12,000 Systems Scanned in Iranian-Style Recon Campaign</strong></h2><p>In the Middle East, more than 12,000 systems have been scanned in what mirrors Iranian reconnaissance tactics.</p><p>And this number matters. Because scanning is the beginning not the end.</p><p>This is patient threat actor behavior: map the environment, identify weaknesses, and come back later with precision. This aligns with everything we&#8217;ve been saying about pre-positioning. Attackers aren&#8217;t rushing, they&#8217;re preparing.</p><p>The risk is that today&#8217;s scan becomes tomorrow&#8217;s disruption.</p><div class="pullquote"><p>"If we treated our power plants the way pilots treat an airplane, we would likely have less of these events on the engineering side. But that's just it, it doesn't have the same due care. It should, but it doesn't. As security practitioners, we ought to be planning for the day after. That day after is network obfuscation. That day after is inline data encryption even within your air-gapped networks." James Azar</p></div><h2><strong>CISA Flags Windows Task Host Flaw Under Active Exploitation</strong></h2><p>CISA has flagged a Windows Task Host vulnerability as actively exploited, allowing attackers to escalate privileges to SYSTEM.</p><p>This is a classic move. Initial access is just step one. Privilege escalation is where the real control begins.</p><p>Once attackers reach SYSTEM-level access, they own the box, and often the network. This is a reminder that even &#8220;local&#8221; vulnerabilities matter, especially in shared or high-value environments.</p><h2><strong>NGINX UI Zero-Day Under Active Exploitation</strong></h2><p>We also have active exploitation of a critical NGINX UI vulnerability.</p><p>And this one is painfully familiar. Management interfaces exposed to the internet. Admin panels left accessible. These are some of the easiest entry points for attackers, and they keep working.</p><p>Why? Because convenience keeps winning over security.</p><p>The risk is full server compromise through exposed administrative tooling.</p><h2><strong>Ivanti Vulnerabilities Continue to Surface</strong></h2><p>Ivanti is back again with two new vulnerabilities, including an RCE and an authentication bypass. At this point, this isn&#8217;t surprising, it&#8217;s expected.</p><p>Platforms that broker access and manage systems sit directly in the flow of trust. That makes them prime targets. And attackers know it.</p><p>The risk is control of the control plane, visibility, automation, and access all in one place.</p><h2><strong>ICS Patch Tuesday: Industrial Giants Face Ongoing Risk</strong></h2><p>Eight major industrial vendors, including Siemens, Schneider Electric, and Rockwell, released new advisories in ICS Patch Tuesday.</p><p>This highlights a persistent issue: OT environments are long-lived, hard to patch, and often ignored. Unlike IT systems, these environments accumulate risk over time.</p><blockquote><p><em>&#8220;If it runs the physical world, attackers are already looking at it.&#8221;</em></p></blockquote><p>And when vulnerabilities are finally exploited, the impact isn&#8217;t just data&#8212;it&#8217;s physical operations.</p><h2><strong>Privacy Research: Tracking Persists Despite Opt-Outs</strong></h2><p>New research suggests that major tech companies can still track users even after opt-out mechanisms are used. This isn&#8217;t just a privacy issue, it&#8217;s a trust issue.</p><p>If controls don&#8217;t behave as expected, then assumptions about compliance and protection break down. For defenders, this means we can&#8217;t just trust vendor claims, we have to validate them.</p><h2><strong>FCC Grants Netgear Exemption in Router Certification Rules</strong></h2><p>Finally, the FCC granted Netgear an exemption related to router certification rules tied to foreign-owned test labs. This may seem administrative, but it&#8217;s not.</p><p>It sits at the intersection of cybersecurity, geopolitics, and supply chain. Policy decisions now directly impact how secure or insecure, our infrastructure becomes.</p><h2><strong>Action Items for Security Leaders</strong></h2><ul><li><p>Eliminate internet exposure for OT and industrial control systems</p></li><li><p>Implement network obfuscation and segmentation for critical infrastructure</p></li><li><p>Isolate healthcare and government systems from public-facing networks</p></li><li><p>Prioritize patching of privilege escalation vulnerabilities on key systems</p></li><li><p>Remove or restrict access to exposed management interfaces</p></li><li><p>Segment ITSM and administrative platforms from broader environments</p></li><li><p>Establish dedicated OT vulnerability management processes</p></li><li><p>Validate privacy and tracking controls independently of vendor claims</p></li><li><p>Monitor large-scale scanning activity as early indicators of future attacks</p></li><li><p>Plan for resilience&#8212;not just prevention&#8212;in critical infrastructure environments</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/agingfly-malware-hits-ukraine-hospitals/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/agingfly-malware-hits-ukraine-hospitals/comments"><span>Leave a comment</span></a></p><h2><strong>James Azar&#8217;s CISOs Take</strong></h2><p>What stands out to me today is how much of the risk we face sits below the surface. These aren&#8217;t flashy ransomware attacks or headline-grabbing breaches. These are quiet, methodical campaigns targeting the systems that keep society functioning. And that&#8217;s what makes them dangerous, because they often go unnoticed until it&#8217;s too late.</p><p>The second takeaway is that we have to stop thinking about cybersecurity as purely digital. When attacks impact heating plants, hospitals, and industrial systems, the consequences are physical, human, and immediate. Our job as practitioners isn&#8217;t just to prevent compromise, it&#8217;s to ensure continuity. Because in today&#8217;s world, cyber resilience is societal resilience.</p><p><strong>Stay Cyber Safe.</strong></p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/agingfly-malware-hits-ukraine-hospitals?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberhubpodcast.com/p/agingfly-malware-hits-ukraine-hospitals?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberhubpodcast.com/p/agingfly-malware-hits-ukraine-hospitals?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item></channel></rss>