Transcript
Rich Strofalino (0:00)
From the CISO series, it's Cybersecurity Headlines these are the cybersecurity headlines for Tuesday, June 3, 2025. I'm Rich Strofalino. Microsoft and CrowdStrike partner to link threat actor names. The two companies announced a partnership to connect aliases used for specific threat groups. Unfortunately, this won't set a single naming standard. Instead, Microsoft updated its Threat Actor Reference Guide with a linked map of common threat groups using each company's naming. The idea is to make attribution faster and cleaner so defenders can maintain a comprehensive view of malicious campaigns. Microsoft also said Google Mandiant and Palo Alto Networks Unit 42 will be contributing their information and would welcome support for the initiative from other companies. Qualcomm sees Adreno bugs under active exploitation in its June 2025 security bulletin, the chip maker patched three flaws in its Adreno GPUs that could lead to memory corruption as well as a use free flaw in the Adreno driver. The company now says that the flaws appear under limited targeted exploitation, according to indications from Google Threat Analysis Group. There are no other details on the exploitation, but the phrasing could indicate spyware. The patches don't go directly to devices, but to OEMs to push out to phones. Qualcomm urged phone makers to push these updates out as soon as possible. Firepanel security flaws could put OT systems to in hot water Consilium Safety makes fire and gas detection systems used across a variety of sectors, with an estimated install base of 85,000. CISA issued an advisory about two flaws impacting its CS5000 fire panel. One flaw allows for a device takeover using a default account pre installed on the device. While owners can change their account over ssh, CISA found that it remained unchanged on every installed system observed. The other flaw comes from a hard coded password that runs on a VNC server, which is, you know, bad. Consilium said it was aware of the flaws but chose not to mitigate them. Instead, it recommended that customers upgrade to its newer line of products. New details on proposed CISA Cuts A new document produced by the Department of Homeland Security details already announced cuts in President Trump's fiscal 2026 budget proposal. The amount cut would marginally increase to $495 million. This would include removing 325 positions through early retirement and voluntary separation payment programs, as well as not funding 301 current vacant positions of the cuts. CISA's Mission Support, Enterprise Services and Stakeholder Engagement Consolidation divisions would each cut over 100 rolls. Other cuts would come from regional operations and the cancellation of federal funding for bombing prevention and and federal school safety programs. The budget proposal now awaits congressional approval. And now, thanks to our episode sponsor, Conveyor, does trying to get the security questionnaire done and back to your customer ever feel like you're herding cats? It's not answering questions. Most of you have automation software for that. It's all the manual back and forth that becomes a slog, like communicating between teams, tracking people down to get their review, updating sources and updating systems. Conveyor just launched an AI agent, Sue, to do all of those things and more for you. Learn more about sue@conveyor.com that's C-O-N-V-E-Y-O-R.com Chrome removed support for two certificate authorities Google announced that starting with version 139, Chrome will no longer trust TLS server authentication certificates issued by Chunghua Telecom and Netlock. Citing patterns of concerning behavior behavior observed over the past year, Google found both companies failed to meet compliance requirements and didn't take meaningful steps to respond to publicly disclosed incidents. Existing certificates won't be impacted, but Those issued after July 31, 2025 will show a potential security threat warning in Chrome. Black Owl group poses a threat to Russia Researchers at Kaspersky released a report on the threat group Black Owl, also known as BO Team, which recently carried out a cyberattack in Russia that wiped out a large part of the Russ Russian national electronic court filing system. The group first appeared online in 2024, operating exclusively against organizations in Russia. Unlike typical Pro Ukrainian hacktivists, BlackOwl seems to work independently, showing no signs of coordination, collaboration or tool sharing with others. The group typically gains access through phishing emails and can wait up to months to set up an attack. They use backdoors, darkgate, Broken Door and Remcos, and have been known to deploy Babak ransomware as well as pre installed apps Open the door to device resets Security researchers at certpolska released details on security vulnerabilities found in pre installed apps on phones sold by Ulefone and Kruger and Mats. One flaw exposes a service in an app that would allow any installed app on the system to perform a factory reset. Two other flaws in a pre installed app lock app allow another app to steal PIN codes and inject arbitrary intent within system level privileges to a protected app. All three of these flaws require some other malicious app on the phone to be effective, but don't require any Android system permissions themselves. No word on if either company plans to patch the issues. New cryptojacking campaign targets DevOps web servers researchers at WIZ began tracking a campaign called Jinx0132, which looks to exploit a range of misconfigurations and vulnerabilities on web servers associated with HashiCorp's console and Nomad offerings, as well as Docker and Gidya. The attacks download off the shelf tooling directly from GitHub repositories rather than using independent infrastructure. Nomad seems particularly vulnerable to these attacks, with the researchers noting this default configuration effectively means that unrestricted access to the server API can be tantamount to remote code execution capabilities on the server itself and all connected nodes. The first reaction to AI tools is often that it'll take jobs, but for analysts, it allows them to free up repetitive tasks for more hypothesis driven threat hunting that would likely slip through the cracks in automation. The promise of time to focus on higher level work is alluring, but what will that look like for analysts? That's one of the segments we're digging into on this week's episode of the CISO Series podcast. Look for the episode AI Isn't Going to Take youe Job. It's going to Eliminate It. Wherever you get your podcasts. And if you have some thoughts on the news from today, or just some feedback on the show in general, be sure to reach out to us@feedbacksoseries.com we'd love to hear from you. Reporting for the CISO series, I'm Rich Trofalino reminding you to have a super sparkly day. Cybersecurity headlines are available every weekday. Head to cisoseries.com for the full stories behind the headlines. It.
