Transcript
A (0:00)
From the CISO series. It's Cybersecurity Headlines.
B (0:07)
These are the cybersecurity headlines for Wednesday, June 11, 2025. I'm Sarah Lane, CISA Microsoft warn of Windows 0day used an attack on major Turkish defense Org Microsoft patched a high severity Windows Zero Day used in a March attack on a major Turkish defense organization. This was discovered by Checkpoint. The flaw is effect, the WebDAV component and was exploited via a phishing email using a disguised URL file. The attack was linked to the Stealth Falcon, a UAE associated apt known for zero days and custom malware. The group used tools like Horus Agent and Horus Loader to evade detection in a multi stage espionage campaign. The bug has been added to CISA's Exploited Vulnerabilities Catalog 40,000 IoT cameras worldwide stream secrets to anyone with a browser Security researchers at BitSight accessed 40,000 Internet connected cameras globally, mostly in the US revealing live feeds from data centers, hospitals, factories and homes. Many required no hacking, just a Web browser. About 78% used HTTP the REST RTSP. The findings back a DHS warning that exposed often Chinese made cameras in critical infrastructure that could aid spies or criminals. Researchers also found IP feeds being shared on forums showing bedrooms and workshops, potentially for stalking or extortion. DHS flagged risks like data theft or tampering with safety systems. Marks and Spencer begins taking online orders again out for seven weeks due to cyber attack Marks and Spencer has reopened online shopping six weeks after a cyber attack forced it to pause orders, costing the retailer an estimated £25 million per week. Deliveries to England, Scotland and Wales have resumed with other services to follow. The hack linked to Scattered Spider could cost up to 300 million pounds. Marks and Spencer also confirmed that customer data was stolen. CEO Stuart Machin called it a setback, not a crisis, and plans to accelerate a full IT overhaul. Originally slated for three years to just 18 months. POC code escalates Round tube vuln threat A critical round tube webmail flaw with a CVSS score of 9.9 is now a major threat after Proof of concept code was publicly released. The 10 year old bug lets authenticated attackers execute remote code via malicious URL exploiting PHP's object handling. Over 85,000 unpatched servers are exposed globally. Login credentials are required to exploit it, but attackers can pair it with older credential theft bugs for full compromise. A patch is available now, but researchers warn organizations to update immediately and and monitor for malicious activity. Huge thanks to our sponsor Vanta. Is your manual GRC program slowing you down there's something more efficient than spreadsheets, screenshots, and manual processes. That's Vanta. With Vanta, GRC can be so much easier while also strengthening your security posture and driving revenue to your business. Vanta automates key key areas of your GRC program, including compliance, risk and customer trust, and streamlines the way that you manage information. The impact is real. A recent IDC analysis found that compliance teams using Vanta are 129% more productive. Get back time to focus on strengthening security and scaling your business. Get started at vanta.com headline ConnectWise rotating code signing certificates over security concerns ConnectWise is replacing digital code signing certificates for Screen Connect, Automate, and RMM Tools after a researcher flagged a potential configuration abuse issue. The flaw requires system level access but could be exploited to distribute tampered installers. No breach is linked to this move, but the update comes amid phishing campaigns using fake signed ConnectWise clients. DigiCert planned to revoke the old certs on June 10, but ConnectWise got an extension to June 13. Cloud users get auto updates, but all users are urged to update agents before the deadline. A bit more on Twitter X's New Encrypted Messaging Johns Hopkins cryptographer Matthew Green analyzed X's new end to end encrypted messaging system called Xchat and found some major flaws. Unlike Signal, XChat lacks forward secrecy and stores private keys on X's servers encrypted with weak user pins. The keys are managed using a protocol called Juicebox, which splits keys across servers. But all servers appear to be controlled by X and and likely don't use hardware security modules or HSMs, despite vague internal claims. Without verifiable HSM use or multi party server control, X can potentially access any user's messages, undermining the core promise of end to end encryption. Poisoned NPM packages disguised as utilities aim for system wipeout Researchers at Socket Security found two malicious NPM packages that that include backdoors capable of deleting all files in production environments. Published by a user named Bot Sailor, the packages pose as a developer utility but are designed for sabotage, not theft. One activates file deletion on the first HTTP request, the other gathers system intel and adapts its attack to the os. Socket warns this trend marks a shift toward destruction based attacks targeting software supply chains. Both packages have been flagged and removed. Stolen Ticketmaster data from Snowflake attacks briefly for sale again over the weekend. Extortion group Arcana listed what it claimed was new stolen Ticketmaster data, but it turned out to be the same 569 gigabytes of data taken in the 2024 snowflake attacks. Bleeping computer confirmed the files match previously leaked samples. The post referenced Rapeflake, a tool used in the original breach. It is unclear if Arcana acquired the data or is connected to Shiny Hunters, but the listing was taken down on June 9th. Ticketmaster has already confirmed the breach and notified affected customers. All right, Everybody, you have one mission add our weekend review show to your calendar this Friday, 3:30pm Eastern Time this week. We're joined by Christina Shannon and we'll get her input on all the latest news. Just head on over to our YouTube channel, watch the stream and get involved in our lively chat room. It's a ton of fun and we want to see you there. If you have thoughts on the news from today or about the show in general, be sure to reach out to us@feedbackisoseries.com we'd love to hear from you. I'm Sarah Lane reporting for the CISO series and we'll talk to you next time.
