CISO Talk by James Azar
CyberHub Podcast
3 VMware Zero-days Exploited, Rubrik Rotates Keys, Russian Beeline Outage tied to Cyber, Iran Botnet DDoS Telecom, Iran Targets UAE Aviation
0:00
Current time: 0:00 / Total time: -20:14
-20:14

3 VMware Zero-days Exploited, Rubrik Rotates Keys, Russian Beeline Outage tied to Cyber, Iran Botnet DDoS Telecom, Iran Targets UAE Aviation

From Zero-Days to Diplomatic Pauses: Unraveling Global Cyber Threats, Innovative Key Management, and Essential Security Patches

CyberHub Podcast: Latest Cybersecurity Developments and Insights

Good morning, Security Gang! In this edition of the CyberHub Podcast, we examine critical developments in the cybersecurity world—from active zero-day vulnerabilities and evolving key management strategies to international DDoS incidents and diplomatic nuances affecting offensive cyber operations.

Below is a detailed breakdown of each story’s context, significance, and the lessons security professionals can draw from these events.

Team8 CISO Village Highlights
The show began by highlighting the recent Team8 CISO Village event, which featured prominent speakers such as Deborah Wheeler (CISO at Delta), Charles Bonner (former CISO at Citi), and Admiral Mike Rogers (ex-NSA Director).

A key takeaway was Admiral Rogers’ concise framework for situational awareness in cybersecurity: “Cyber happens in the context.” This phrase underscores how critical it is to frame all cyber threats within the broader organizational and geopolitical environment.

Broadcom’s Zero-Day Warnings for VMware
Next, Broadcom issued urgent alerts regarding three zero-day vulnerabilities affecting VMware ESXi, Workstation, and Fusion. These vulnerabilities can potentially allow attackers with local admin privileges on virtual machines to bypass sandbox protections and execute code on the host. Since no workarounds are currently available, the show stressed the importance of immediate patching to mitigate active exploits.

Rubrik’s Security Incident and Key Rotation
Data protection firm Rubrik disclosed that a log server breach exposed authentication keys. While the company promptly rotated those keys, this incident highlights the vital need for robust key management. Automated and frequent key rotation can prevent adversaries from leveraging static credentials, reducing the risk and damage of potential breaches.

Qualcomm and MediaTek Patch Releases
Qualcomm and MediaTek both released updates addressing numerous vulnerabilities in their chipsets—some ranked as critical. The patches address memory corruption issues present in proprietary software used across millions of devices. With these vulnerabilities potentially impacting a large user base, immediate patch deployment is key to maintaining security on Android devices and other products.

DDoS Attacks Hit Russian Telecom Beeline
The Russian telecom giant Beeline suffered a massive Distributed Denial-of-Service (DDoS) attack, causing widespread internet disruptions for a significant portion of Russia’s population. The Russian media’s willingness to report the attack signals a notable change in disclosure policy. Though no group has claimed responsibility, this incident reflects the evolving nature of global cyber warfare, with DDoS attacks increasingly targeting critical infrastructure.

Pause on New Offensive Cyber Operations Against Russia
Recent reports suggest that the Department of Defense has temporarily halted planning for new cyber offensives against Russia, ostensibly to support ongoing negotiations related to the Russia–Ukraine conflict. CISA and other agencies, however, remain proactive in detecting and disrupting Russian Advanced Persistent Threats (APTs). Balancing diplomatic efforts with continued cyber defense underscores the complexity of modern international relations and cyber deterrence.

Massive Iranian Botnet Emerges
Security researchers at Nokia Deepfield and GrayNoise identified “Eleven,” a botnet comprising more than 30,000 compromised security cameras and NVR devices primarily in Iran. Capable of launching sizeable DDoS assaults, this botnet demonstrates the scale of threat actors leveraging IoT vulnerabilities. The intensity and size of “Eleven” make it one of the most significant non-state actor botnets observed in recent years.

Highly Targeted Phishing in the UAE
Fewer than five organizations in the United Arab Emirates were targeted by a new backdoor, “Cesano,” delivered through carefully crafted phishing emails. Attackers compromised the email account of an Indian electronics firm to appear more credible and bypass defenses. This underscores the importance of stringent security checks, both internally and across supply chains, to mitigate such trusted-channel attacks.

SharePoint Phishing and the Havoc C2 Framework
A sophisticated phishing campaign leveraging Microsoft SharePoint lures victims into running a PowerShell command that ultimately deploys the open-source Havoc C2 framework. By disguising communications through Microsoft Graph APIs, threat actors can blend malicious traffic with legitimate network activity. Visibility and monitoring of Graph API usage, along with a strong baseline of normal network behavior, are essential for early threat detection.

FTC Halts “Phantom Debt Collection” Scheme
In a win for consumers, the Federal Trade Commission (FTC) shut down a “phantom debt collection” scam run by Ryan and Mitchell Evans under names like BlackRock Services and Blackstone Legal Group. The operation fabricated payday loan debts and threatened victims with severe legal consequences. This enforcement action highlights the need for public awareness and continual vigilance against social engineering and fraudulent debt-collection attempts.

Share

Bullet Point Action List

  • Patch Immediately: Update VMware, Qualcomm, and MediaTek products to address known zero-days and critical vulnerabilities.

  • Automate Key Rotations: Implement frequent, automated key management solutions to avoid overreliance on static credentials.

  • Monitor Microsoft Graph Usage: Regularly review Graph API logs and baseline activity to detect malicious anomalies.

  • Secure Supply Chains: Vet third-party partners and enforce secure authentication protocols to prevent compromised email accounts from impacting your organization.

  • Track Global Threats: Keep abreast of new botnet activity, targeted phishing campaigns, and changing diplomatic stances to adjust defenses accordingly.

  • Educate and Train: Continuously update employees on phishing red flags, especially for files shared via platforms like SharePoint.

  • Report Scams: Immediately report suspicious debt-collection attempts or fraudulent communications to the FTC or other relevant authorities.

Stay Cyber Safe!

Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.

Share

✅ Story Links:

https://www.securityweek.com/broadcom-patches-3-vmware-zero-days-exploited-in-the-wild/

https://www.bleepingcomputer.com/news/security/rubrik-rotates-authentication-keys-after-log-server-breach/

https://www.securityweek.com/vulnerabilities-patched-in-qualcomm-mediatek-chipsets/

https://therecord.media/russian-telecom-beeline-outages-cyber

https://www.securityweek.com/cisa-no-change-on-defending-against-russian-cyber-threats/

https://www.darkreading.com/cyberattacks-data-breaches/phishers-wreak-havoc-disguising-attack-inside-sharepoint

https://thecyberexpress.com/ftc-halts-phantom-debt-collection-scheme/

https://www.cybersecuritydive.com/news/massive-iran-botnet-ddos-telecom/741359/

https://thehackernews.com/2025/03/suspected-iranian-hackers-used.html

🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1

🚨 Important Links to Follow:

👉Website:

👉Listen here: https://linktr.ee/cyberhubpodcast

Stay Connected With Us.

👉Facebook: https://www.facebook.com/CyberHubpodcast/

👉LinkedIn: https://www.linkedin.com/company/cyberhubpodcast/

👉Twitter (X): https://twitter.com/cyberhubpodcast

👉Instagram: https://www.instagram.com/cyberhubpodcast

🤝 For Business Inquiries: info@cyberhubpodcast.com

=============================

🚀 About The CyberHub Podcast.

The Hub of the Infosec Community.

Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.

Tune in to our podcast Monday through Thursday at 9AM EST for the latest news.

Discussion about this episode