Transcript
A (0:00)
From the CISO series, it's Cybersecurity Headlines.
B (0:07)
These are the cybersecurity headlines for Friday, April 4, 2025. I'm Steve Prentiss. Google Patches Quick Share Vulnerability this app formerly known as Nearby Share, is a peer to peer file sharing utility similar to Apple Airdrop that allows users to transfer files, photos, videos and other Docum documents between Android devices, Chromebooks and Windows desktops and laptops in close physical proximity. Researchers at Safe Breach Labs disclosed details of this new vulnerability that could be exploited to achieve a denial of service or send arbitrary files to a target's device without their approval. In other words, a zero click. This vulnerability was one of 10 that researchers discovered last August Chatgpt suffered a brief outage on Wednesday the AI powered Chatbot suffered some issues mid morning Eastern time on Wednesday, with users worldwide experiencing failures when asking follow up questions to answers already delivered. Instead they encountered the message something went wrong while generating the response. The issue was quickly resolved by OpenAI's team. When asked about the outage 24 hours later, ChatGPT itself did not offer a clear cause, but quoted Sam Altman who attributed the disruptions to quote, capacity challenges due to a surge in demand for the AI chatbot. UK's Royal Mail investigates data leak claims the Royal Mail, the UK's national postal service, is looking into a potential security breach after a threat actor leaked over 144 gigabytes of data allegedly stolen from Spectos, which is a third party company involved in data collection, analytics and logistics services. Spectos has confirmed in a statement shared with Bleeping Computer that its systems were breached on March 29 and the attackers gained access to customer data. This is the second breach incident in the Royal Mail's 500 year history. CISA adds Apache Tomcat flaw to its KEV catalog this is in relation to an Apache Tomcat path equivalence vulnerability which became actively exploited just 30 hours after a public proof of concept was released. As we reported in mid March, the issue confirmed by researchers at API security company Walarm, is a path equivalence flaw in Apache Tomcat that allows remote code execution or information disclosure if specific conditions are met. End quote. As with all additions to the known exploited vulnerabilities catalog, federal agencies must fix this vulnerability promptly, specifically by April 22nd. Huge thanks to our sponsor Qualys. Overwhelmed by noise in your cybersecurity processes? Cut through the clutter with Qualys Enterprise True Risk Management. Quantify your cyber risk in clear financial terms and focus on what matters most. Actionable insights help you prioritize critical threats, streamline remediation and accelerate risk reduction while effectively communicating impact to stakeholders. Empower your cybersecurity strategy with tools that drive faster, smarter and more efficient risk management. Your secure future starts today with Qualys Enterprise True risk management. Visit qualys.com ETM for more information, I.e. qualysq u-a l y-s.com ETM Juniper Networks and Palo Alto Networks devices in mystery scanning event the Register is reporting that scanning of login portals for devices made by both companies has increased substantially in recent weeks. On Wednesday, the SANS Institute's Johannes Ulrich said he noticed a surge in scans for the username t128, which when accompanied by the password 128Troots, is a well known default account for Juniper's Session smart network networking products. Internet scanning security firm Greynoise has also spotted mass probing, in this case directed at the login portals of Palo Alto Network's Panos Global Protect Remote Access products. They believe anonymous scanners are searching for exposed or vulnerable products and noted almost 24,000 unique IP addresses attempting to log in over the past 30 days. End quote. Security companies clash over Crushftp CVE number this story starts with a critical vulnerability in the Crush FTP enterprise file transfer solution. In short, its own developers alerted customers to the vulnerability, which could have exposed systems to remote hacking. Five days later, with no CVE number announced, the vulnerability, intelligence firm Vulncheck assigned one. However, Crush FTP itself rejected this number, arguing that the real CVE had been pending. And 10 days after disclosure, a new CVE was released, this one assigned by Outpost 24. This company is a security firm that had been credited for responsibly disclosing the flaw to the vendor. The crux of this issue was around a suitable delay period intended to keep the vulnerability under wraps to avoid malicious exploitation, something that did not happen. And in fact, according to the Shadow Server foundation, this exploitation is still continuing. A link to this intriguing story from Security Week, which contains more details and background, is available in the show. Notes to this episode. France and UK governments meet to discuss commercial hacking tools Representatives from the two governments are meeting in Paris this month to tackle the proliferation and irresponsible use of commercial hacking tools known as commercial Cyber intrusion capabilities, or CCICs. This summit, the Pall Mall process faces the joint challenge of establishing categories and a regulatory process alongside convincing the other member countries and individual companies to amend their own practices. Russian State Railway suffers cyber disruption the state owned railway has reported a cyber attack that temporarily disrupted its website and mobile application. This is the second incident this week for Russia's transit systems following a Monday attack and disruption on the app and website for Moscow's subway system. This RZD attack is being confirmed by RZD officials as a DDoS attack, which meant that ticket sales remained operational at physical offices across stations and terminals. No group has yet claimed responsibility for this attack. As you know, in the cloud, problems can crop up quickly, often out of your control. If your cloud environment has been compromised, you need to move fast, reducing mean time to remediate, respond or recover MTTR isn't just about speed. It is about business resiliency, which includes smarter automation, streamlined processes and reducing inefficiencies. At CISO series, we asked 30 of your professional colleagues for their best and swiftest options, and their insight reveal the story of what truly works for reducing mttr. This advice is now available in our new Strategy article entitled 22 Tips to Speed Up Mean Time to Remediate in the Cloud. Check it out and leave your comments. You can find it@cisoceries.com as well as the CISO series LinkedIn newsletter. And finally, make sure to join us later today at 3:30pm Eastern for our Week in Review show. Howard Halton, COO and Industry Analyst at gigaom, will be our guest providing his expert commentary on the news of the week. And of course, we encourage participation and comments through our YouTube live channel. Just go to the events page@ciso series.com to register. I'm Steve Prentiss reporting for the CISO Series.
