Transcript
Hadas Kasorla (0:00)
From the CISO series, it's Cybersecurity Headlines these are the Cybersecurity headlines for August 13, 2025. I'm Hadas Kasorla. The hits just keep on coming Only a couple of weeks after a critical Fortinet vulnerability was added to CISA's vulnerabilities catalog, an unrelated brute force attack on Fortinet's 40s was spotted by Internet threat tracker Graynoise. Starting on August 3, 2025, more than 780 malicious systems around the world began hammering at Fortinet's SSL VPNs, specifically targeting the Fortinet 40s profile. Two days later, the attackers shifted focus to 40 manager, using a different method. Gray Noyes notes that these kinds of concentrated attack spikes often appear shortly before new vulnerabilities are disclosed, suggesting this could be the prelude to another round of bad news for Fortinet users. Where's the little Dutch boy when you need him? The Netherlands, wishing they could plug their data breach as easily as the boy in the fable, is dealing with a serious Citrix netscaler security incident. Dutch authorities report that multiple critical infrastructure organizations have been compromised through a memory overflow vulnerability. According to their National Cybersecurity center, attackers exploited the flaw as early as May 2025, gained access, and then wiped logs to hide their tracks. I felt the Ransomware down in Africa New data shows Africa has overtaken all other regions as the most targeted in the world for cyber attacks, with Nigeria recording the sharpest rise in attack volume on the continent. While many of these incidents are launched from outside Africa, Nigeria also has significant domestic cybercrime activity, with groups like Silver Terrier, BEC Syndicate operating from within its borders and targeting victims globally. These actors, along with foreign counterparts, frequently exploit outdated infrastructure like Internet service providers and unpatched enterprise servers, which remain major conduits for phishing, ransomware and financial fraud campaigns. We are confirming the breach. You already knew about eight months after ransomware group Ransom Hub first announced it had breached Manpower's Lansing, Michigan staffing service franchise, the company has finally confirmed the attack and revealed the number of people affected, an announcement almost as delayed as waiting for a recruiter to call you back after a job interview, Ransom Hub claimed it stole about 500 gigabytes of data, including passport scans, Social Security and driver's license numbers, financial statements, HR analytics and confidential contracts. The group later removed the listing from its Dark Web leak site, a move often associated with ransomware payments, though no payment has been confirmed. But pinpointing when it disappeared is tricky as the leak site was offline for parts of April and May during downtime and migration. Huge thanks to our sponsor Vanta. Do you know the status of your compliance controls right now? Like right now, we know that real time visibility is critical for security, but when it comes to our GRC programs we rely on point in time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. Vanta brings automation to evidence collection across over 35 frameworks like SoC2 and ISO 27001. They also centralize key workflows like policies, access reviews and reporting, and help you get security questionnaires done five times faster with AI. Now that's a new way to GRC. Get started at vanta.com headlines hey Federal Trade Commission, can you block this merger? Cybercrime groups Shiny Hunters and Scattered Spider are working together in a coordinated campaign targeting salesforce users, according to researchers at ReliaQuest. The activity combines phishing, voice phishing and malicious app based attacks. Techniques include impersonating IT support and phone calls, creating fake Okta branded login pages, and setting up spoofed connected apps that look like legitimate tools to collect credentials and data. Many of the malicious domains use ticket related themes and target industries including luxury, retail, aviation, insurance, technology and financial services. Researchers are saying the tactics align with known methods from both groups and suggest a deliberate collaboration. Reddit mods, scrapes Reddit has moved to block the Internet Archive's Wayback Machine from indexing all but its homepage, effectively cutting off access to individual posts, comments, user profiles and subreddits. The company says the decision comes in response to AI firms using archived Reddit data to bypass the platform's data access rules, and also frames it as a way to protect its business by preventing the free harvesting of content it now licenses to partners like Google and OpenAI. Reddit officials alerted the nonprofit Archive in advance and say the changes will help enforce platform policy and protect user privacy. Critics argue the move undermines Web preservation, while supporters see it as a necessary step to close loops and safeguard both users and Reddit's commercial interests. Don't pay the ferrymen Trend Micro has identified a new ransomware strain called Pay Charon C h a R o n targeting public sector and aviation organizations in the Middle east with techniques usually reserved for state sponsored espionage. The campaign uses DLL sideloading, multi stage encrypted payloads, process injection and anti edr invasion, all methods usually reserved for stealing state secrets, not demanding ransoms. Each ransom node is customized with the victim's organization's name, underscoring deliberate targeting. The methods closely mirror those of the China linked Earth Baxia Apt group, but Trend Micro says this could be direct involvement, imitation or independent development. Remember, if you have some thoughts on the news from today or about the show in general, be sure to reach out to us@feedbackisoseries.com we'd love to hear from you. I'm Hadaska Sorla. The reporting for the CISO series. Stay Alert, Stay Patched, Stay Hydrated. Cybersecurity headlines are available every weekday. Head to cisoseries.com for the full stories behind the headlines.
