
Loading summary
Host
From the CISO series. It's Cybersecurity Headlines.
Steve Prentiss
These are the cybersecurity headlines for Monday, November 3, 2025. I'm Steve Prentiss. Australia warns of Bad Candy attacks exploiting Cisco iOS EE the Australian Signals Directorate.
Rich Stroffolino
ASD is warning of cyber attacks targeting unpatched Cisco iOS devices within Australia as a result of a previously undocument implants called Bad Candy.
Steve Prentiss
These attacks exploit a CVE numbered flaw with a CVSS score of 10 and.
Rich Stroffolino
Which allows unauthenticated attackers to create an account with elevated privileges. Bad Candy is described as a low.
Steve Prentiss
Equity LUA based web shell.
Rich Stroffolino
It lacks a persistence mechanism, which means it cannot survive across system reboots. But if a device remains unpatched and exposed to the Internet, it's possible for.
Steve Prentiss
The threat actor to reintroduce the malware and regain access to it. End quote. Chinese hackers exploit Cisco ASA firewalls used by governments worldwide According to experts at Palo Alto Networks Unit 42, hackers from.
Rich Stroffolino
China based Storm 1849 are scanning for and exploiting a popular line of Cisco.
Steve Prentiss
Firewalls used by governments in the us, Europe and Asia. The group is targeting Cisco Adaptive security appliances, which, in addition to acting as.
Rich Stroffolino
Firewalls, also prevent some intrusions, handle spam, conduct antivirus checks and more, the researchers observed. Several U.S. financial institutions, defense contractors and.
Steve Prentiss
Military organizations attacked in this way throughout October.
Rich Stroffolino
OpenAI's Aardvark GPT5 agent finds and fixes code flaws automatically. This autonomous agent, currently available in private beta, works by embedding itself into the.
Steve Prentiss
Software development pipel, monitoring commits and changes.
Rich Stroffolino
To code bases, detecting security issues and how they might be exploited, and proposing.
Steve Prentiss
Fixes to address them using LLM based.
Rich Stroffolino
Reasoning and tool use. In their announcement, OpenAI also added that Aardvark analyzes a project's codebase to produce a threat model that it thinks best represents its security objectives and design. With this contextual foundation, the agent then scans its history to identify existing issues.
Steve Prentiss
As well as detect new ones by scrutinizing incoming changes to the repository, end quote.
Rich Stroffolino
FCC plans vote to remove cyber regulations installed after theft of presidential information from.
Steve Prentiss
Telecoms this past week, the Federal Communications.
Rich Stroffolino
Commission announced plans to remove some cybersecurity regulations that had been put in place after Chinese hackers breached at least nine.
Steve Prentiss
Telecommunications giants to steal the correspondence of the president and vice president. Last year, Chairman Brendan Carr released a.
Rich Stroffolino
Statement that said the agency would reverse a declaratory ruling published in January which would have mandated telecoms to better secure their networks and submit annual certifications attesting.
Steve Prentiss
To the creation of a cybersecurity risk management plan. On Thursday, FCC Secretary Marlene Dorch added.
Rich Stroffolino
More context, saying telecoms have already taken.
Steve Prentiss
Voluntary steps to secure their networks and that the ruling was legally erroneous. End quote.
Rich Stroffolino
Huge thanks to our sponsor ThreatLocker. Imagine having the power to decide exactly what runs in your IT environment and blocking everything else by default.
Steve Prentiss
That's what ThreatLocker delivers as a zero.
Rich Stroffolino
Trust endpoint protection platform. ThreatLocker fills the gaps traditional solutions leave behind, giving your business stronger security and control.
Steve Prentiss
Don't just react to threats, stop them with ThreatLocker.
Rich Stroffolino
CISA and NSA share tips on securing.
Steve Prentiss
Microsoft Exchange servers More than a dozen.
Rich Stroffolino
Key security recommendations for network defenders were shared between the agencies and their partners. These included keeping servers up to date, migrating from unsupported Exchange versions, enabling emergency mitigation services, activating built in anti spam and anti malware features, restricting administrative access to authorized workstations, and implementing security baselines for both Exchange Server and Windows systems. The agencies also made recommendations around strengthening authentication by enabling MFA, leveraging OAuth 2.0.
Steve Prentiss
And many other procedures.
Rich Stroffolino
The agencies also advised network Defenders to, quote, decommission, end of life on premises or hybrid exchange servers after transitioning to Microsoft.
Steve Prentiss
365End Quote Ukrainian extradited to US over Conti ransomware Oleksiy Litvinenko, 43, was extradited.
Rich Stroffolino
From Cork, Ireland, to face charges of deploying Conti ransomware that extorted over $500,000.
Steve Prentiss
From U.S. victims between 2020 and June 2022.
Rich Stroffolino
Court filings allege that Litvinenko managed stolen Conti victim data and ransom notes. Acting Assistant Attorney General Matthew R. Galeotti of the Justice Department's Criminal Division said Litvinenko's activities defrauded victims in almost every.
Steve Prentiss
US State and from over two dozen countries worldwide. He now faces up to 25 years in prison.
Rich Stroffolino
Another surge of NFC relay malware steals.
Steve Prentiss
Europeans credit cards Related to a story.
Rich Stroffolino
We covered in June, mobile security firm Zimperium says near field communication NFC relay malware has grown massively popular in Eastern Europe, with researchers discovering over 760 malicious Android apps using the technique to steal.
Steve Prentiss
People'S payment card information over the past few months.
Rich Stroffolino
NFC malware takes advantage of Android's host card emulation to emulate or steal contactless credit cards and payment data. The technique was first spotted in the wild in Poland in 2023, and this was followed by campaigns in the Czech Republic and later more massive attack waves in Russia.
Steve Prentiss
Raisida Pwns users with Microsoft Teams ads.
Rich Stroffolino
According to Aaron Walton of Expel, the prolific Ransomer gang is leveraging malicious advertisements to deliver Oyster Loader malware, also known.
Steve Prentiss
As Broomstick and Cleanup Loader, and this.
Rich Stroffolino
Campaign began in June and is continuing. It is being done by purchasing search engine ads, in this case in Bing.
Steve Prentiss
And driving people to spoofed typo squatted sites.
Rich Stroffolino
To ensure a lower detection rate by antivirus engines when victims click on the.
Steve Prentiss
Links, Raisida employs a packing tool to hide the malware's capabilities.
Rich Stroffolino
Remember, if you're in the Big Apple, you can join us on November 5th at Faircon 25 for a live recording.
Steve Prentiss
Of the CISO Series Podcast.
Rich Stroffolino
If you've never attended one of our live shows, you get the same great discussions we feature on every episode, plus fun games and a lightning Q and A. You need to register for the event, but We've got a 75% off registration.
Steve Prentiss
Code for our listeners.
Rich Stroffolino
Just head on over to the events.
Steve Prentiss
Page@Cisoseries.Com for more details.
Rich Stroffolino
Do you want to know more about the most pressing stories of the last few days in time for your weekly stand up? Join us today at 4:00pm Eastern time for the Department of no Where. Our guests will sort out the priority stories and do a deep dive on.
Steve Prentiss
The ones that matter the most.
Rich Stroffolino
And of course, we will actively involve you in the conversation.
Steve Prentiss
Just go to YouTube, search for CISO.
Rich Stroffolino
Series and look for Rich Stroffolino's smiling.
Steve Prentiss
Face under upcoming Live Streams.
Rich Stroffolino
And finally, if you have some thoughts on the news from today or about this show in general, please be sure.
Steve Prentiss
To reach out to us@feedbackisoseries.com we would love to hear from you. I'm Steve Prentiss reporting for the CISO Series.
Host
Cybersecurity headlines are available every weekday. Head to cisoseries.com for the full stories behind the headlines.
Podcast: Cyber Security Headlines
Host: CISO Series (Steve Prentiss & Rich Stroffolino)
Episode: Australia BadCandy warning, Cisco firewall attack, Aardvark eats bugs
Date: November 3, 2025
This episode delivers a rapid-fire rundown of current major cybersecurity stories affecting organizations worldwide. Topics include new threats targeting Cisco devices in Australia, Chinese state-sponsored attacks on government firewalls, OpenAI’s new autonomous security agent, regulatory changes in the US telecom sector, practical security guidance from US agencies, emerging malware trends, and a major Conti ransomware extradition. The hosts maintain a concise, newsy tone, passing the mic between themselves to present headline stories with key context and impact.
Timestamps: 00:06–01:14
Notable Quote:
"It lacks a persistence mechanism, which means it cannot survive across system reboots. But if a device remains unpatched and exposed to the Internet, it's possible for the threat actor to reintroduce the malware and regain access to it."
— Steve Prentiss, 00:49
Timestamps: 01:14–01:48
Timestamps: 01:48–02:36
Notable Quote:
"Aardvark analyzes a project's codebase to produce a threat model that it thinks best represents its security objectives and design. With this contextual foundation, the agent then scans its history to identify existing issues, as well as detect new ones by scrutinizing incoming changes to the repository."
— Steve Prentiss, 02:11–02:29
Timestamps: 02:36–03:30
Notable Quotes:
"Telecoms have already taken voluntary steps to secure their networks and that the ruling was legally erroneous."
— Steve Prentiss, 03:23
Timestamps: 03:58–04:47
Notable Quote:
"Decommission, end of life on premises or hybrid exchange servers after transitioning to Microsoft 365."
— Rich Stroffolino, 04:38
Timestamps: 04:47–05:32
Timestamps: 05:32–06:19
Notable Quote:
"NFC malware takes advantage of Android's host card emulation to emulate or steal contactless credit cards and payment data."
— Rich Stroffolino, 05:58
Timestamps: 06:19–06:54
On Bad Candy reinfection:
"If a device remains unpatched and exposed to the Internet, it's possible for the threat actor to reintroduce the malware and regain access to it."
— Steve Prentiss, 00:59
On Aardvark’s approach:
"Aardvark analyzes a project's codebase to produce a threat model that it thinks best represents its security objectives and design."
— Steve Prentiss, 02:18
On the rollback of FCC regulations:
"Telecoms have already taken voluntary steps to secure their networks and that the ruling was legally erroneous."
— Steve Prentiss, 03:23
On NFC card theft:
"NFC malware takes advantage of Android's host card emulation to emulate or steal contactless credit cards and payment data."
— Rich Stroffolino, 05:58
This episode underscores the dynamism and geographic breadth of current cybersecurity threats, from sophisticated state-sponsored attacks on critical infrastructure to the surge in user-targeted malware and continued legal action against ransomware operators. The tone is brisk, factual, and slightly urgent—a necessary fit for a daily, CISO-focused security news podcast.
Listeners come away with actionable awareness of urgent patch requirements, the state of enterprise defenses, and practical guidance recommended by top cybersecurity agencies.