Transcript
Steve Prentiss (0:00)
From the CISO series, it's Cybersecurity Headlines these are the cybersecurity headlines for Monday, July 21, 2025. I'm Steve Prentiss. Hewlett Packard warns of hard coded passwords in Aruba access points. This warning refers to hard coded credentials in Aruba instant on access points which are compact plug and play WI fi dev designed primarily for small to medium sized businesses offering enterprise grade features with cloud mobile app management. The existence of hard coded access points means that attackers can bypass normal device authentication and access the web interface. This issue has a CVE number as well as a critical CVSS score of 9.8. SharePoint Zero day exploited via remote code execution no patch available this critical zero day vulnerability, which also has a CVE number, has been actively exploited since at least July 18. At least 85 servers have already been compromised worldwide. In May, researchers From Vietl Cybersecurity I.e. v I E T T E L demonstrated this vulnerability at Pwn to Own Berlin, in which two other Microsoft SharePoint flaws were chained in a tool shell attack to achieve remote code execution. Microsoft did patch the tool shell flaws as part of the July patch Tuesday. However, they say this new variant is being actively exploited in the wild. The company adds the flaw does not impact Microsoft 365 and that they are working on a security update which will be released as soon as possible. Encrypt Hub uses fake AI platforms to target Web3 developers Encrypt Hub, also known as larva208, is targeting Web3 developers in a new campaign using Information Stealer malware, according to Swiss firm Prodaft. The group lures victims through fake AI platforms like Norlax AI posing as job recruiters or even portfolio reviewers. While previously known for ransomware, Encrypt Hub now focuses on harvesting data from crypto wallets and development environments. Freelance developers working in decentralized ecosystems are particularly vulnerable due to limited security controls. The attackers spread malicious meeting links via platforms like X Telegram and job boards like Remote 3, disguising them as legitimate interview invitations. Russian vodka producer suffers ransomware attack the NovaBev group, which is the Russian producer and distributor of the Beluga and Belenkaya vodka brands, has announced what it calls technical issues involving an unnamed organization that happens to be demanding a ransom. The company has closed more than 2,000 of its liquor stores across Russia as it deals with this issue, one that experts calculate is costing it up to the equivalent of $3.8 million a day. Its website and mobile app are also down no Ransomware Group has yet claimed responsibility for this attack, huge thanks to our sponsor Nudge Security. What do identity risks, d, data security risks and third party risks have in common? They are all made dramatically worse by SaaS sprawl. Nudge security helps you mitigate these risks by discovering every SaaS account ever created by anyone in your organization within minutes of starting a free trial. But discovery is just the first step. With Nudge, you can automate ongoing governance tasks like security posture checks, enforcing MFA, revoking risky app to app access, and more. Visit nudgesecurity.com headlines to start a free trial. That is the two words nudgesecuritytogether.com headlines CISA adds Fortinet 40 web flaw to known exploited vulnerabilities Catalog this flaw is an SQL injection vulnerability with a CVSS score of 9.6 which allows unauthenticated attack to execute unauthorized SQL commands via crafted HTTP or HTTPs requests. The exploitation began on July 11, the same day a proof of concept was released, resulting in dozens of compromised systems. Organizations using the affected Forta Web versions are of course urged to update immediately. Japanese police release decryptor for Phobos ransomware following arrests following up on a story we covered last February, Japan's national police agency has now released a free decryption tool and a guide published in English for organizations impacted by attacks from the Phobos and eight base groups, which collected more than $16 million from about 1,000 victims worldwide dating back to 2019. The decryption tool was shared by the European Cybercrime Centre and the FBI, who pointed out that it was the FBI Baltimore office that led an investigation that brought charges against Phobos affiliates earlier this year. UK government warns of of malware attributed to Russian actors this warning focuses on Russian group APT28, also known as Fancy Bear and Forest Blizzard, and it has been deploying previously unknown malware to harvest Microsoft email credentials and steal access to compromised accounts, end quote. This malware has been nicknamed Authentic Antics by the UK government, which refers to the malware that targets the Windows operating system and which runs within Microsoft Outlook, prompting users to enter their credentials. The malware then steals the credential data along with OAuth authentication tokens, hence the nickname, which allow access to Microsoft services including Exchange Online, SharePoint and OneDrive. The malware also sends the exfiltrated data to an actor controlled email address without the email showing in the sent folder. Virginia Radiology practice suffers a cyberattack Radiology Associates of Richmond, Virginia has been in practice for more than a century. Having opened its doors in 1905, it provides imaging services to several hospitals and outpatient facilities in the Richmond area, and it is now dealing with an infiltration that occurred between April 2nd and 6th of 2024 and confirmed a year later on May 2nd of this year. The personal and health information of over 1.4 million individuals has been affected, but no known ransomware group has claimed responsibility for this attack. Remember to join us this week for Super Cyber Friday at 1pm Eastern, 10am Pacific, where we will be digging into the problem of the cybersecurity poverty line. How do you define it, how do you start identifying when you are below it and what can you do to improve things? Make sure you head on over to the events page@cisoseries.com to register to join us. And also if you find yourself in Toronto this upcoming Friday, please be sure to join David Spark and myself and a whole bunch of great CISOs and fans of the show for coffee at the Brick Street Bakery in the beautiful and historic Distillery District of downtown Toronto. Again, you can register for this event by going to the events page@ciso series.com I'm Steve Prentice reporting for the CISO Series. Cybersecurity headlines are available every weekday. Head to cisoseries.com for the full stories behind the headlines.
