Transcript
A (0:02)
You're listening to the Cyberwire Network, powered by N2K.
B (0:14)
From phishing to ransomware, cyber threats are constant. But with Nordlayer, your defense can be too. Nordlayer brings together secure access and advanced threat protection in a single seamless platform. It helps your team spot suspicious activity before it becomes a problem by blocking blocking malicious links and scanning downloads in real time, preventing malware from reaching your network. It's quick to deploy, easy to scale, and built on zero trust principles so only the right people get access to the right resources. Get 28% off on a yearly plan at nordlayer.com cyberwire daily with code CYBERWIRE28 that's nordlayer.com CyberWire Daily Code CYBERWIRE28 that's valid through December 10, 2025. Cloudflare had a bad morning Google issues an emergency Chrome update. Logitech discloses a data breach. CISA plans a major hiring push. The House renews the state and local cybersecurity grant program. The GAO warns military personnel are oversharing online. Tech groups urged governments worldwide to reject proposals that weaken or bypass encryption. Australian authorities blamed outdated software for the death of a telecom customer. An alleged Void Blizzard hacker faces extradition to the U.S. our guest is Kevin Kennedy from Mantech discussing the future battlefield and the importance of integrating non kinetic effects and AI meets the IRS what could possibly go wrong? It's Tuesday, November 18, 2025. I'm Dave Buettner and this is your Cyberwire Intel Brief. Foreign. Thanks for joining us here today. It's great as always to have you with us. A major outage at Cloudflare disrupted access to numerous websites today, highlighting how much the Internet relies on a few core providers. The company said a spike in unusual traffic caused errors across multiple services, but preventing some users from reaching sites and blocking customers from viewing performance dashboards. Cloudflare reported partial recovery, although elevated error rates continued during remediation. Engineers disabled the warp encryption service in London as they worked to stabilize traffic. Maintenance had been scheduled in several data centers, but the company said the cause of the anomaly remains unknown. Experts noted that the scale of Cloudflare's network makes a cyberattack unlikely. Google has issued an emergency Chrome Update to patch 2 high severity type confusion vulnerabilities in the V8 JavaScript engine, including one zero day already under active exploitation. The first vulnerability discovered by Google's Threat Analysis Group on November 12th is being used in real world attacks, which Google says likely involve government backed actors or commercial spyware operators. A second flaw was reported earlier by Google's Big sleep AI agent. Though there's no evidence of active abuse type confusion, bugs can lead to memory corruption and let attackers escape Chrome security boundaries. The fixes arrive in Chrome versions across major platforms and will roll out gradually. Users and administrators should update immediately, including those running other Chromium based browsers. Logitech has disclosed to the securities and Exchange Commission that attackers exploited a zero day vulnerability in a third party software platform, allowing them to copy some data from the company's internal IT systems. Logitech said the flaw was patched once the vendor released a fixed and noted that the stolen data likely included limited information about employees, consumers, customers and suppliers. The company does not believe sensitive personal data such as national ID numbers or payment information was involved and said its products, operations and financials were unaffected. The disclosure follows Klopp's claim that it breached Logitech using a zero day in Oracle's E business suite, though Logitech has not confirmed this. The broader campaign has impacted multiple organizations, with Klopp listing dozens of victims. CISA plans a major hiring push through 2026 to recover from deep staffing losses under the Trump administration and to prepare for potential conflict with China, According to a Nov. 5 memo from Acting Director Madhu Gadamukkala. He said personal cuts left the agency with about a 40% vacancy rate across key mission areas, limiting its ability to meet national security needs. CISA will prioritize hiring state cybersecurity coordinators and regional advisors, expand use of DHS's Cyber Talent Management system to bring in specialized talent at market rates and streamline hiring with dhs. The agency also plans more flexible workplace policies, expanded university partnerships and renewed internship pipelines to rebuild expertise and restore strained relationships with critical infrastructure partners. The House has overwhelmingly passed the Pillar act, renewing the state and local cybersecurity grant program through 2033 after its Sept. 30 expiration. The initiative has supplied $1 billion to help state and local governments bolster cybersecurity, and lawmakers pushed for a stable long term reauthorization rather than continued short term extensions. Bill sponsor Representative Andy Ogles said the measure drew strong bipartisan support because defending local networks is essential to national security. The chamber also approved the Strengthening Cyber Resilience Against State Sponsored Threats act in a 4028 vote. That legislation establishes an interagency task force led by the FBI and CISA to focus on countering cyber operations linked to China, which House leaders say represent a growing strategic threat. The Government Accountability Office warned that the Defense Department is not adequately training military personnel or civilian staff to prevent sensitive information from leaking online. In tests where auditors posed as threat actors, GAO investigators were able to use publicly available social media posts, family support groups and even Pentagon press releases to trace service members, identify their units, uncover family details and identify operational activities, GAO said. Such data can enable coercion, blackmail or threats to active missions. Ten DoD components showed gaps in training or threat assessments, with most focusing narrowly on operational security while overlooking insider threats and force protection. GAO issued 12 recommendations. DoD agreed to most but argued it cannot fully control the personal online activity of service members and their families. More than 60 digital commerce and technology groups are urging governments worldwide to reject any proposals that weaken or bypass encryption, arguing that strong encryption is essential for privacy, data security and global digital trust. In a joint letter, groups including the App Association, BSA and the Information Technology Industry Council said backdoors, key escrow or technical mandates would harm all users while offering limited benefits to law enforcement. The appeal comes as several countries pursue lawful access measures, from UK disputes over Apple's encrypted services to Ireland's exploration of new access authorities. Europe also nearly advanced the chat control regulation, which critics warned would enable mass device scanning and end digital privacy before opposition halted the vote. Australia's TPG Telecom says a customer died after their Samsung phone running outdated software could not connect to Triple Zero, the country's nationwide emergency number equivalent to 911 in the United States. The failed call occurred on November 13th on TPG's Budget Lebara service, and the relative needing help later died. TPG said its network was functioning normally and that early findings show the Samsung device's outdated software made it incompatible with 000 routing requirements, which ensure calls connect on any available mobile network. Regulators are now investigating whether emergency access rules were breached, especially since older Samsung devices were already known to struggle with automatic network switching. Samsung urged users to keep devices updated, and TPG said it warned customers on November 7th to update older models. Authorities in Thailand have arrested Russian national Denis Abrezko, whom the United States seeks to extradite on cybercrime charges. Police say the 35 year old is linked to Void Blizzard, a cyber espionage group that Microsoft associates with hacking operations aligned with Russian state interests. Abrezko arrived in Thailand on October 30 and was detained on November 6 in a joint operation with the FBI. Thailand's cybercrime investigation Bureau says he previously breached government systems in both Europe and the US Police seized electronic devices from his hotel room for forensic review, and he's being held in Bangkok pending extradition Microsoft reports Void Blizzard typically uses stolen credentials and basic techniques like password spraying to access organizations across government, defense, transportation, media, NGOs and Ukraine related sectors. Coming up after the break, Kevin Kennedy from ManTech explores the future battlefield and the importance of integrating non kinetic effects and AI meets the irs. What could possibly go wrong? Stay with us. Foreign. They know cybersecurity can be tough and you can't protect everything, but with Thales you can secure what matters most. With Thales industry leading platforms, you can protect critical applications, data and identities anywhere and at scale with the highest roi. That's why the most trusted brands and largest banks, retailers and healthcare companies in the world rely on Thales to protect what matters most applications, data and identity. That's Thales T H A L E S learn more@talasgroup.com cyber. Ever wished you could rebuild your network from scratch to make it more secure, scalable and simple? Meet Meter, the company reimagining enterprise networking from the ground up. Meter builds full stack zero trust networks including hardware, firmware and software, all designed to work seamlessly together. The result? Fast, reliable and secure connectivity without the constant patching, vendor juggling or hidden costs. From wired and wireless to routing, switching, firewalls, DNS security and vpn, every layer is integrated and continuously protected in one unified platform. And since it's delivered as one predictable monthly service, you skip the heavy capital costs and endless upgrade cycles. Meter even buys back your old infrastructure to make switching effortless, transform complexity into simplicity and give your team time to focus on what really matters helping your business and customers thrive. Learn more and book your demo@meter.com cyberwire that's M E T E R.com cyberwire. Kevin Kennedy is Vice President for Defense Strategy and War Fighting Integration at Mantech and a retired Lieutenant General in the United States Air Force. In today's sponsored Industry Voices segment, we get together to discuss the future battlefield and the importance of integrating non kinetic effects.
