Transcript
Unknown Host (0:00)
From the CISO series, it's Cybersecurity Headlines.
Sarah Lane (0:07)
These are the cybersecurity headlines for Thursday, July 10, 2025. I'm Sarah Lane. AMD warns of new meltdown Spectre like bugs affecting CPUs, AMD disclosed a new side channel vulnerability, dubbed the Transient Scheduler Attack, or tsa, affecting a wide range of its channel chips, including Ryzen and EPYC processors. The individual flaws are rated low to medium severity, but Trend Micro and CrowdStrike both consider the threat critical due to potential kernel data leakage. The attack requires local code execution, and AMD has issued patches and recommends sysadmins update affected systems. Multiple vulnerabilities in Mozilla Thunderbird could allow for arbitrary code execution Multiple vulnerabilities in Mozilla Thunderbird, some rated high severity, could allow arbitrary code execution, potentially letting attackers install programs or access sensitive data, especially on systems with admin privileges. The flaws include a critical use after free bug and memory safety issues. Though there are no known active exploits, users are being urged to Update to version140 or later, apply least privilege principles and follow patch management and endpoint protection. Best Practices Bitcoin Depot breach exposes Data of nearly 27,000 crypto users More than $40 million stolen from GMX crypto platform Hours after Bitcoin Depot, a major Bitcoin ATM operator, disclosed a breach affecting nearly 27,000 users, decentralized crypto exchange GMX confirmed a $43 million theft from its platform due to an exploit. GMX says it had undergone top tier security audits but has now suspended trading and is offering the attacker a 10% bounty for the return of stolen funds. Threat actor targeting Indian defense sector A new report from Sai Firma reveals that Pakistani linked APT36 is targeting India's defense sector which with a phishing campaign exploiting Boss Linux widely used in Indian government systems. The attack uses zip files containing malicious linux.desktop shortcuts that then download decoy PowerPoint files while deploying an ELF binary for unauthorized access. Experts warn that the shift to Linux shows evolving tactics and call for stronger email filtering and endpoint monitoring, user training and least privileged access to counter persistent threats in government infrastructure. Huge thanks to our sponsor Vanta. Do you know the status of your compliance controls right now? Like right now, right this second? We know that real time visibility is critical for security, but when it comes to our GRC programs we rely on point in time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. Vanta brings automation to evidence collection across 35 frameworks like SoC2 and ISO 27001. They also centralize key workflows like policies, access reviews and reporting, and helps you get security questionnaires done five times faster with AI. Now that is a new way to GRC. Get started at vanta.com headlines Ruckus Networks leaves severe flaws unpatched in management devices Researchers have disclosed multiple severe vulnerabilities in Ruckus Networks Virtual Smart Zone, or vsz, and Ruckus Network Detector or rnd, including hard coded SSH keys, unauthenticated remote code execution and weak secret management, none of which have been patched. The flaws could allow attackers full control over wireless infrastructure, especially in large scale deployments. Carnegie Mellon's Cert CC says that Ruckus and parent company Commscope have not responded to disclosure attempts until patches are released. Admins are urged to isolate management interfaces and enforce secure access protocols. The Czech Republic bans Deepseek in state administration over cybersecurity concerns the Czech Republic has banned Chinese AI startup Deepseek from use in state administration over cybersecurity concerns, citing risks of unauthorized data access due to China's data laws. The decision follows warning from the country's cybersecurity agency and mirrors similar moves by Italy and Australia. Deep Seq was founded back in 2023 and released its first large language model the same year. Ingram Micro starts restoring systems after ransomware attack Ingram Micro is restoring systems following a global ransomware attack by the SafePay group that hit just before July 4th. The attack took down ordering systems and forced employees to work remotely. The company has resumed taking phone and email orders in multiple countries and and reset all passwords and mfa. Internal systems tied to logistics and fulfillment are gradually coming back online, but full recovery is ongoing. It's unclear if data was stolen, though. SafePay is known for exfiltration and similar attacks. Do Not APT expands operations targets European Foreign ministries with LopticMod malware Cybersecurity firm Trellix says. Indian Linked Apt Group do not team targeted a Europe foreign Ministry with its custom Loptic mod malware delivered via phishing emails impersonating defense officials. The malware, active since at least 2018, enables data exfiltration, remote access and long term persistence using anti analysis innovation techniques. Though the campaign's command and control server is now offline, the attack signals a shift in do nots focused from South Asia to European diplomatic targets. Be sure to register to join us for this week's Super Cyber Friday event. All about hacking the Resilience mindset. We'll be talking about how to get buy in for shifting the overall framing of your security program, both within your security team and within the organization as a whole. It all starts 1pm this Friday, July 11th. Be sure to register and join us at our Events page and@cisoseries.com and if you have thoughts on the news from today or about the show in general, be sure to reach out to us@feedbackisoseries.com we'd love to hear from you. I'm Sarah Lane reporting for the CISO series, and we'll talk to you next time.
