
Loading summary
A
From the CISO series, it's Cybersecurity Headlines.
B
These are the cybersecurity headlines for Monday, October 27, 2025. I'm Steve Prentiss. Microsoft Windows Server Update Services vulnerability could allow for remote code execution. Known by its short form as wsus, this is a tool that helps organizations manage and distribute Microsoft updates across multiple computers rather than requiring every PC to download them individually. A bulletin from the center for Internet Security states that this vulnerability poses a high risk to large and medium sized businesses and government organizations, but low risk to home users. It is described as a critical deserialization of untrusted data vulnerability that may allow an unauthorized attacker to execute code on vulnerable machines by sending a specially crafted event to the WSUS server. No user action is required to trigger it. A link to the bulletin is available in the show Notes to this episode. Fake LastPass death claims used to breach password vaults LastPass is warning customers of a phishing campaign involving emails that request access to the password vault as part of the LastPass legacy inheritance process. This inheritance process is an emergency access feature that allows individuals designated by account holders, such as family members, to request access to the account holder's vault in case of death or incapacity. When such a request is opened, the account holder receives an email which they must respond to in order to prove that they are actually still alive and in control of the account. If no response is given by the account holder, a waiting period expires and access is granted to the designated contact. In this campaign, attributed to a financially motivated threat group called Crypto Chameleon, the Victim is the LastPass account holder who is tricked into clicking the no I'm not dead link, which is a fraudulent page on a spoofed domain that features a login form where the victim can enter their master password. New Ko fish attack steals OAuth tokens via copilot Studio agents Researchers at Datadog Security Labs have developed a new phishing technique which they have named CO Phish, that is CO Capital P H I S H, which uses agents in Microsoft's Copilot Studio to deliver fraudulent OAuth consent requests via legitimate and trusted Microsoft domains. Copilot Studio agents are chatbots hosted on copilotstudio.Microsoft.com that users can employ to create and customize workflows called topics which automate specific tasks. Microsoft says it is taking action to address this issue in future product updates. UN cybercrime treaty signing in Hanoi Officials from the US State Department joined representatives from 40 countries in Hanoi this past weekend possibly to sign a landmark UN Cybercrime convention. Named the Convention Against Cybercrime, it is described as a new framework for how law enforcement agencies in different countries coordinate on cybercrime investigations and a way to reduce the number of safe havens for cybercriminals and to help developing nations better protect their citizens from digital crimes. End quote. This policy was adopted after five years of negotiation, despite opposition from the world's biggest tech companies, as well as human rights advocates concerned about excessive surveillance. Numerous countries have pledged to sign at the ceremony or maybe later after a more detailed review. Huge thanks to our sponsor, Conveyor if security questionnaires make you feel like you're drowning in chaos, you're not alone. Endless spreadsheets, portals and questions always when you least expect them, Conveyor brings calm to the storm. With AI that auto fills questionnaires and a trust center that shares all your documents in one place, you'll feel peace where there used to be panic. Find your security Review Zen@www.that is C O N V E Y-O-R.com Counter Ransomware Initiative focuses on Supply Chain security Another large summit occurred last week in the same corner of the world, this one in Singapore, hosted by the International Counter Ransomware Initiative. A particular area of focus was to, quote, raise awareness of the ransomware threat across supply chains as well as promote good cyber hygiene that will see supply chain vulnerabilities factored into organizations organization's risk assessments, end quote. According to the Record, this year's theme focusing on supply chain ties in well with stories of abuse of the Move it file transfer tool, which compromised hundreds of companies in 2023 and the attack this time last year, November 2024 on Blue Yonder, which sells digital supply chain tools to some of the world's largest Companies, including Starbucks, Russia's food safety agency suffers DDoS attack the attack on the agency Rossel Khodznazor, a government agency under Russia's Ministry of Agriculture, has disrupted nationwide food shipments by disabling its Vetis and Saturn tracking systems for agricultural products and chemicals. This large scale DDoS attack started last Wednesday. The agency stated on telegram that there is no threat to the integrity or confidentiality of the data processed in their systems. The attack means, for example, that major dairy and baby food producers suffered hours long delays as they couldn't issue mandatory electronic veterinary certificates required for shipping meat, milk and other animal products. AI models may be developing their own survival drive, say researchers. Something we have been anticipating since computers became a thing now seems to be happening A paper released from Palisade Research last month says that certain advanced AI models appear resistant to being turned off, at times even sabotaging shutdown mechanisms, end quote. The paper appears, at least in part, to respond to critics who argued that the company's initial work was flawed. The technologies that resisted commands to shutdown include versions of Gemini Grok 4 and OpenAI's GPT03 and GPT5. Of greatest interest, perhaps, is that Palisade offers no clear reason for the resistance, suggesting survival behavior. The researchers pointed out that models were more likely to resist being shut down when they were told that if they were, you will never run again. Making the case for passphrases Cybersecurity solutions company Hive Solutions has released its 2025 password table, which displays the relative strengths and weaknesses of various password types. The company's message is passphrases work much better. The unpredictability of unrelated words like carpet static pretzel invoke with hyphens between each is now preferable to the traditional eight character complex password that included punctuation and other symbols. This is largely due to increased computational power paired with the increased sophistication of threat actors. The company is careful to emphasize that no passwords are fully safe and that techniques such as MFA are still required. Some fascinating insights on passwords and password weaknesses are available on its blog. The link is available in the Show Notes if you are going to be in New York City in early November, you need to join us for a CISO Series podcast recording. We'll be recording at Faircon 25 on November 5th at the beautiful Glass House on 12th Avenue. The conference is stacked with everything you'd ever want to know about cyber risk management. And if you want to join us for the show and the podcast recording, we've got a promo code to save you 75% off registration. Just head to the events page@cisoseries.com to register and make sure to join us later today at 4:00pm Eastern Time for the inaugural episode of the Department of Know, a show that helps you start your week prepared, knowing what stories matter, what conversations you'll be having this week, and what is actually going to impact your day to day work. Our guests this week will be Bill Harmer, Operating Partner and CISO at Craft Ventures, and Sasha Pereira, CISO at Wash. And of course we encourage participation and comments through our YouTube live channel. Just go to the events page@cisoseries.com to register. And finally, if you have some thoughts on the news from today or about this show in general. Please be sure to reach out to us at feedback@cisoseries.com we would love to hear from you. I'm Steve Prentiss reporting for the CISO series.
A
Cybersecurity headlines are available every weekday. Head to CISoseries.com for the full stories behind the headlines.
Episode Date: October 27, 2025
Host: Steve Prentiss, CISO Series
This episode delivers a concise roundup of the day’s most urgent cybersecurity news, including a critical Microsoft WSUS vulnerability, a cunning LastPass inheritance scam, a novel Copilot-based phishing attack, and global developments in law enforcement and ransomware defense. Several emerging trends, technical vulnerabilities, and new attack tactics are covered, with practical takeaways for security leaders.
[00:07 – 01:08]
[01:09 – 02:19]
[02:20 – 03:26]
[03:27 – 04:21]
[05:08 – 05:53]
[05:54 – 06:53]
[06:54 – 07:48]
[07:49 – 08:51]
In this episode, the CISO Series team succinctly highlighted the pressing threats and shifts in cybersecurity, including newly disclosed vulnerabilities, innovative phishing methods, global policy formation, and emerging AI considerations. Practical security advice—like prioritizing passphrases and MFA—underscored the episode, while timely international developments reinforced the urgent, evolving landscape professionals face today.
For more on each story, listeners are encouraged to read the full bulletins at CISOseries.com.