
Loading summary
A
From the CISO series, it's Cybersecurity headlines.
B
These are the CyberSecurity headlines for August 21, 2025. I'm Hadas Kasorla. A patch today keeps the zero day away Apple has released emergency security updates after discovering a new zero day flaw that is already being exploited in targeted attacks. The bug is in Apple's Image I O framework, which processes photos and graphics. Hackers can craft a malicious image that, when opened or previewed, causes the system to write data outside the safe boundaries of memory. This can lead to corruption and potentially allow attackers to run their own code on the device. The patch covers iPhones from Xs and newer, multiple iPad generations, and Max running Sequoia, Sonoma and Ventura. Jailbreaking ChatGPT5Pro A new report from Adversa AI warns that GPT5 may not always be the one answering your queries. Instead, an internal router nicknamed Promiscuous diverts prompts to older or smaller models of GPT to save costs. Researchers found that certain words or structures in a prompt can cue the router to hand requests to these weaker models. Where old jailbreak tricks still work. That means that output GPT5 Pro would normally refuse, like offensive slurs. Malware instructions or guides for hacking or drug making could slip through again. The thing about vulnerabilities is that they stay vulnerable. A hacking group known as Static Tundra, tied to the Russian State Security Service division responsible for hacking and digital espionage, is exploiting the seven year old Cisco Smart Install remote code execution vulnerability to break into networks around the world. The flaw affects Cisco, iOS and iOS XE devices with the Smart Install feature. And despite patches being available for years, thousands of unpatched or end of life systems remain exposed. Investigators say the hackers are targeting telecom, higher education and manufacturing sectors in North America, Europe, Asia and Africa, with a special focus on Ukraine and its allies since the war began. Once inside, they harvest configuration files, alter settings to maintain backdoors, and even deploy implants like sinfulnock for stealthy long term access. I'm beginning to feel like a rapbot. In Oregon, a 22 year old was charged for building a botnet that grew large. He called it Wrapperbot, investigators say, and it blocked network traffic in a disruptive way. Traffic surged steady 2 terabytes wide, peaking at 6 and overwhelming the tide. 90,000 devices were pulled into play, launching attacks on systems each day, officials confirmed. The scope was vast, from tech firms to government. None held fast with a warrant to arrest him for his tricks. Agents arrived at his house on August 6. He now faces up to 10 years for directing attacks that confirmed the fears. The lesson remains in the Warnings supplied Unpatched devices leave doors open wide. Huge thanks to our sponsor Conveyor. It's Thursday. Have you been personally victimized by a portal security questionnaire this week? Most solutions just give you a browser extension to copy and paste answers into. Still leaving hours of manual work with Conveyor. You don't have to slog through it yourself. Just open the portal and Conveyor's AI will scroll through each page, find the questions and fill in answers for you, start to finish. See how@www.conveyor.com killing me softly with ransomware Indiana based pharmaceutical research firm Innotiv has confirmed it was hit by a ransomware attack on August that encrypted parts of its IT systems and disrupted operations. The Killin ransomware group has claimed responsibility, saying it stole about 176 gigabytes of data, including more than 160,000 files, and has already posted samples on its leak site. Enotiv says it has called in outside cybersecurity experts, notified law enforcement and shifted to offline processes with systems are restored. The company has not yet said how long recovery will take or whether the breach will have a material financial impact. Sure, Joe Rogan I'd love to be on your podcast. The Better Business Bureau warns that attackers are using fake podcast invitations to trick executives, often targeting high profile employees with emails that look legitimate and carry professional branding. Victims are asked to join a test interview or technical check during which AI generated voices and videos pose as podcast hosts. While the session seems routine, the attackers prompt the target to install software, grant remote access or share files, giving them the ability to exfiltrate data, harvest credentials or deploy malware. Researchers note that this method leverages common business practices, since executives are accustomed to media requests and and interview preparation vulnerabilities discovered in Wisconsin municipal software. Much like this year's Packers Defensive Line researchers published findings of flaws in Workhorse Software Services accounting software, which is used by more than 300 municipalities in Wisconsin. One vulnerability involves storing SQL Server credentials in a plain text file on shared network folders, while the other allows creation of unencrypted database backups directly from the login screen. These issues could let attackers access complete municipal databases containing sensitive data such as Social Security numbers and financial records, and also tamper with audit trails and fiscal operations. Threat actors could use these weaknesses to commit identity theft, disrupt municipal functions or or manipulate financial oversight processes. This new clickjacking is so dumb a new study shows that browser extension password managers can be tricked into giving up your logins with just one click. Security researcher Marek Toth calls it a form of clickjacking, and it's the same principle. But instead of tricking you into clicking a malicious button, your click triggers invisible login fields that have been injected into the page's DOM or document object model. When that happens, the extension may think it's a real form and auto fill your saved username, password, two factor codes, even credit card details. The trick only works if the attacker is on a domain or subdomain your password manager already trusts. Tests showed that 11 major browser extension managers were vulnerable, including 1Password Big Bitwarden LastPass. So far, vendors haven't issued fixes, and the flaw does affect Chrome Edge and other browsers. Remember to join us this Friday for a special edition of our Week in Review show. We're celebrating the five year anniversary of cybersecurity headlines. We'll still be running down the top news of the week, but also reflecting on some of our favorite stories and experiences since the show debuted back in 2020. So if you can, join our livestream on the CISO Series YouTube channel this Friday at 3:30pm Eastern Time. If you have some thoughts on the news from today or about the show in general, be sure to reach out to us@feedbackisoseries.com we'd love to hear from you. I'm Hadas Kasorla reporting for the CISO series. Stay Alert, Stay Patched, Stay Hydrated.
A
Cybersecurity headlines are available every weekday. Head to cisoseries.com for the full stories. Behind the headlines.
Podcast: Cyber Security Headlines
Host: Hadas Kasorla, CISO Series
Episode Theme:
A roundup of daily information security news highlighting Apple’s urgent zero-day patch, fresh exploits against old vulnerabilities, emerging threats in AI, ransomware attacks, and new risks in enterprise tools—all presented in an engaging and concise format.
[00:10–01:12]
[01:13–02:15]
[02:16–03:10]
[03:11–04:00]
[04:37–05:25]
[05:26–06:01]
[06:02–06:41]
[06:42–07:36]
This episode delivers urgent cybersecurity headlines, actionable insights, and memorable calls to vigilance in a fast-paced, approachable style perfect for information security teams and anyone seeking to stay updated with the latest threats.