Transcript
A (0:02)
You're listening to the Cyberwire network powered by N2K.
B (0:12)
Ever wished you could rebuild your network from scratch to make it more secure, scalable and simple? Meet Meter, the company reimagining enterprise networking from the ground up. Meter builds full stack zero trust networks including hardware, firmware and software, all designed to work seamlessly together. The result? Fast, reliable and secure connectivity without the constant patching, vendor juggling or hidden costs. From wired and wireless to routing, switching, firewalls, DNS security and vpn, every layer is integrated and continuously protected in one unified platform. And since it's delivered as one predictable monthly service, you skip the heavy capital costs and endless upgrade cycles. Meter even buys back your old infrastructure to make switching effort, transform complexity into simplicity and give your team time to focus on what really matters, helping your business and customers thrive. Learn more and book your demo@meter.com cyberwire that's M E T E R.com cyberwire Operation Endgame expands global takedowns the US is creating a Scam Center Strike force Microsoft rolls out its Delayed Prevent screen capture feature for teams Proton pass patches a clickjacking flaw Researchers uncover previously undisclosed zero day flaws in both Citrix and Cisco Identity Services engine. Android based digital picture frames contain multiple critical vulnerab Loomis Stealer rebounds after last month's doxxing campaign Our guest is Garrett Hoffman, Senior manager of Cloud Security Engineering from Adobe. Talking about achieving cloud security at scale and X marks the spot where your passkey stops working. It's Thursday, November 13th, 2025. I'm Dave Bitten and this is your Cyberwire Intel Briefing. Thanks for joining us here today. It's great as always to have you with us. Authorities dismantled three major cybercrime platforms and arrested a key suspect during the latest phase of Operation Endgame, coordinated from Europol's headquarters in the Hague. Starting earlier this week, officials targeted the Ratamanthis Infostealer, the Venom Rat Remote Access Trojan and the Elysium Botnet, according to the provided report, the operation removed more than 1,000 servers, seized 20 domains, and included searches across Germany, Greece and the Netherlands. Hundreds of thousands of computers were infected and millions of stolen credentials were stored in the dismantled infrastructure. Authorities say the Venom Rat suspect was arrested earlier on 3 November in Greece. The takedown disrupts major tools used in global cybercrime and highlights the scale of compromised systems worldwide. Victims may still be unaware of infections, and the report urges them to check their devices. The US is creating a Scam Center Strike Force to confront cyber scam compounds across Southeast Asia that have stolen billions from Americans in recent years. Treasury says the team will include the Justice Department, Secret Service, State Department and FBI personnel who will investigate, disrupt and prosecute major scam operations in Burma, Cambodia and Laos. Officials plan to use sanctions, asset seizures and criminal cases while helping victims with restitution and scam avoidance education. The government estimates Americans lost at least $10 billion in 2024 to romance scams, fake investment platforms and fraudulent cryptocurrency sites. New sanctions target Myanmar's democratic Karen Benevolent army, several of its leaders and Thai companies accused of supporting scam compounds that rely on human traffick and fund armed groups in Myanmar's civil war. Microsoft has begun rolling out its delayed Prevent screen capture feature for Teams Premium, designed to block screenshots and recordings during meetings. Originally planned for July of this year, the rollout shifted to early November. The feature restricts visual content capture on Windows and Android by forcing screenshots to display a black box or or show a warning message. Unsupported platforms join meetings in audio only mode. It's off by default and must be enabled per meeting by organizers. While Microsoft 365 admins manage device enrollment and licensing through Entra ID, Microsoft notes the feature does not stop someone from photographing a screen. The update follows similar privacy protections from WhatsApp and broader Microsoft efforts to strengthen security in Teams chats. ProtonPass has released an updated version of its browser extension to fix a DOM based clickjacking flaw demonstrated at DEFCON 33. Researcher Toth showed that attackers could invisibly trigger password manager UI elements, tricking users into approving autofill or exposing sensitive data with a single misleading click. The vulnerability affected most major managers, though only some vendors have patched it. The Update HardenS Proton Pass's injected UI against manipulation. Users are urged to update immediately and consider disabling autofill on untrusted sites. Amazon's Threat Intelligence team has uncovered a highly sophisticated actor exploiting previously undisclosed zero day flaws and in both Citrix and Cisco Identity Services engine. Amazon's mad pot honeypots detected Citrix Bleed 2 exploitation before public disclosure, leading investigators to a second zero day in Cisco ISE that enabled pre authentication remote code execution. The actor weaponized both vulnerabilities before patches were available, a sign of advanced capability. After gaining access, the attacker deployed a custom in memory web shell tailored for Cisco ISE using Reflection encrypted communication and Tomcat listener registration to evade detection. Amazon notes the campaign reflects a growing focus on identity and network access infrastructure security Teams are urged to enforce strict access controls and strengthen behavioral detection. Elsewhere, CISA is urging federal agencies to fully patch two actively exploited Cisco, ASA and Firepower vulnerabilities. The flaws allow unauthenticated access to restricted URLs and remote code execution and when chained, can give attackers complete control of unpatched devices. Cisco confirmed both were zero day exploits tied to the Arcane Door campaign. CISA's emergency directive mandates agencies secure all Cisco firewalls within 24 hours, noting some mistakenly applied incomplete updates. Shadow Server still tracks over 30,000 vulnerable devices online. Researchers at Quokka found that Uhail Android based digital picture frames contain multiple critical vulnerabilities, including behavior that downloads and executes malware at boot. Many frames fetch an app update from China based servers that installs a payload linked to the Void and Mismas malware families, which then runs at every startup. Devices ship with Selinux, disabled, are rooted by default, and use insecure configurations that enable remote code execution, command injection and unauthorized file access. Zxen, the vendor behind the platform, has not responded to repeated disclosures. Trend Micro's latest research shows lumastealer has rebounded after last month's Doxxing campaign, with activity rising again starting October 20th. The malware now uses browser fingerprinting alongside its traditional command and control methods, collecting extensive system network hardware and browser details through JavaScript payloads and stealthy HTTP traffic. These additions help operators evaluate victim environments, guide follow on actions, and evade detection. Trend also observed process injection into Chrome and new fingerprinting endpoints on the CNC infrastructure. Despite reduced underground visibility and signs of operational strain, lumasteela remains active, continues targeting endpoints, and deploys secondary payloads like Ghost socks. Coming up after the break, Garrett Hoffman, senior manager of cloud security engineering at Adobe, talks about achieving cloud security at scale and X marks the spot where your pass keys stop working. Stay with us, we've all been there. You realize your business needs to hire someone yesterday. How can you find amazing candidates fast? Well, it's easy. Just use Indeed when it comes to hiring, Indeed is all you need. Stop struggling to get your job post noticed. Indeed. Sponsored Jobs helps you stand out and hire fast. Your post jumps to the top of search results so the right candidates see it first and it works. Sponsored Jobs on indeed get 45% more applications than non sponsored ones. One of the things I love about Indeed is how fast it makes hiring. And yes, we do actually use Indeed for hiring here at N2K CyberWire. Many of my colleagues here came to us through Indeed plus with Sponsored Jobs There are no subscriptions, no long term contracts. You only pay for results. How fast is Indeed? Oh, in the minute or so that I've been Talking to you, 23 hires were made on Indeed according to Indeed Data Worldwide. There's no need to wait any longer. Speed up your hiring right now with Indeed and listeners to this show will get a $75 sponsored job credit. To get your jobs more visibility@indeed.com cyberwire just go to indeed.com cyberwire right now and support our show by saying you heard about Indeed on this podcast. Indeed.com cyberwire terms and conditions apply. Hiring Indeed is all you need. What's your 2am Security worry? Is it do I have the right controls in place? Maybe are my vendors secure? Or the one that really keeps you up at night? How do I get out from under these old tools and manual processes? That's where Vanta comes in. Vanta automates the manual work so you can stop sweating over spreadsheets, chasing audit evidence and filling out endless questionnaires. Their trust management platform continuously monitors your systems, centralizes your data, and simplifies your security at scale. And it fits right into your workflows, using AI to streamline evidence collection, flag risks, and keep your program audit ready all the time. With Vanta, you get everything you need to move faster, scale confidently, and finally get back to sleep. Get started@vanta.com cyber that's v a n t a dot com cyber Garrett Hoffman is Senior Manager of Cloud Security Engineering from Adobe. In today's sponsored Industry Voices conversation, I speak with him about achieving cloud security at scale. Let's start off by getting to know you a little bit, Garrett. Can you tell us where you got your start and what led you to where you are today?
