Transcript
Dave Bittner (0:02)
You're listening to the Cyberwire network, powered by N2K.
Sarah Pawczyk (0:12)
And now a word from our sponsor, ThreatLocker, the powerful Zero Trust Enterprise Solution that stops ransomware in its tracks. Allow Listing is a deny by default software that makes application control simple and fast. Ring Fencing is an application containment strategy ensuring apps can only act access the files, registry keys, network resources and other applications they truly need to function. Shut out cybercriminals with world class endpoint protection from Threat Locker Two Chinese nationals are arrested for allegedly exporting sensitive Nvidia AI chips A critical security flaw has been discovered in Microsoft Microsoft's new NL Web Protocol. Vulnerabilities in Dell laptop firmware could let attackers bypass Windows logins and install malware. Trend Micro warns of an actively exploited remote code execution flaw. Google confirms a data breach involving one of its Salesforce databases. A lack of MFA leaves a Canadian city on the hook for ransomware recovery costs. Nvidia's CSO denies the need for backdoors or kill switches on the company's GPUs. CISA flags multiple critical vulnerabilities in Tigo Energy's Cloud Connect advanced platform. DHS grants, funding cuts off the Ms. ISAC our guest is Sarah Pawezek from UC Berkeley's center for Long Term Cybersecurity discussing her proposed nationwide roadmap to scale cyber defense for community organizations. And live From Black Hat USA 2025, we've got a special Woman on the street segment with Halcyon Cynthia Kaiser and Stacy Cameron and helicopter parenting officially hits the footwear AIs. It's Wednesday, August 6th, 2025. I'm Dave Bittner and this is your Cyberwire Intel Briefing. Thanks for joining us here today. It's great to have you with us. Two Chinese nationals were arrested in the US for allegedly exporting sensitive Nvidia AI chips, including H1 hundreds and RTX 4090s to China without a license. Operating through their California company ALX Solutions Inc. They're accused of routing tens of millions of dollars worth of GPUs through countries like Singapore and Malays to evade US export laws. The chips are critical for AI applications like self driving cars and medical diagnostics. Federal authorities uncovered incriminating evidence during a raid, including communications and payment records, with one transaction totaling $1 million. Both men faced charges under the Export Control Reform act carrying up to 20 years in prison. A critical security flaw has been discovered in Microsoft's new NL Web protocol, billed as HTML for the Agentic Web. Just weeks after its debut at the BUILD conference, the vulnerability. A basic path traversal bug allowed attackers to access sensitive files like system configs and API keys for AI services such as OpenAI and Gemini. Researchers Wanan Guan and Li Wang reported the issue to Microsoft in May, and a patch was issued in July. Though no CVE has been assigned yet, Guan warns the flaw could let attackers steal the brains of AI agents, potentially causing major damage. While Microsoft says its own products weren't affected, NL web users must manually update to fix the issue. Five serious vulnerabilities in Dell's Control Vault 3 firmware used in over 100 Latitude and Precision Laptop models could let attackers bypass Windows logins and install malware that survives reinstalls known as revault. The flaws impact Dell's hardware based security module, which stores sensitive data like passwords and biometrics. Discovered by Cisco Talos, the bugs include out of bounds errors, stack overflows, and unsafe deserialization affecting both Firmware and Windows APIs. If exploited, attackers with physical access can gain control over the Unified Security Hub, escalate privileges, or trick fingerprint readers into accepting unauthorized users. Dell has released patches, but Talos advises extra precautions like disabling unused authentication devices, enabling BIOS intrusion detection, and using enhanced sign in security in Windows to defend against potential firmware level threats. Trend Micro has issued an urgent warning about an actively exploited remote code execution flaw in its Apex1 endpoint security platform. The vulnerability affects the On Premise Management console and allows pre authenticated attackers to execute code remotely. No patch is available yet, but Trend Micro has released a mitigation tool that blocks known exploits, though it disables remote agent installation. A full fix is expected mid August. Administrators are urged to secure systems immediately, especially if consoles are exposed online. Google has confirmed a data breach involving one of its Salesforce databases, with threat group Shiny Hunters stealing contact information from small and medium business clients. The compromised data includes basic, mostly public business info like names and contact details. Google hasn't disclosed how many were affected and hasn't confirmed any ransom demands. The attackers used voice phishing tactics to gain access. This breach follows similar incidents targeting Salesforce systems used by Cisco, Qantas and Pandora. Google warned that Shiny Hunters may soon publish the stolen data on a leak site to pressure victims. The group is linked to the. Com, a cybercriminal collective known for hacking and extortion. Google has not said whether it will notify impacted businesses directly or provide additional security support. The city of Hamilton, Ontario, in Canada must cover the full $18.3 million cost of recovering from a February ransomware after its insurance claim was denied. The insurer rejected the claim because Multi Factor Authentication was not fully in place when the attack occurred. A third party review upheld the denial. Most costs went to external experts, with over a million dollars each spent on infrastructure, staffing and other needs. Attackers disabled 80% of the city's network and demanded $18.5 million in ransom, which the city refused to pay. City officials say no personal or health data was compromised. While most systems have been restored, several, like finance and fire department records, were lost. Mayor Andrea Horwath acknowledged the failure and emphasized a renewed commitment to stronger CyberSecurity moving forward. Nvidia's chief security officer, David Reber Jr. Strongly denied the existence or need for backdoors or kill switches in the company's GPU use, responding to rising pressure from both U.S. lawmakers and Chinese authorities. His blog post follows U.S. proposals like the Chip Security act, which could mandate tracking tech or remote shutdown features in AI chips. Meanwhile, China is investigating Nvidia's H2O chips for alleged vulnerabilities. Reber warned such measures would pose serious security risks, calling backdoors dangerous vulnerabilities and kill switches an open invitation for disaster. While Nvidia hopes to regain limited access to the Chinese market, the idea of US Controlled hardware access could undermine trust abroad. China is accelerating domestic chip development, threatening Nvidia's lead in the AI hardware space as companies like Huawei catch up. CISA has flagged multiple critical vulnerabilities in Tigo Energy's Cloud Connected Advanced platform, widely used in residential and critical solar energy infrastructure. The flaws include hard coded credentials, a command injection vulnerability enabling remote code execution, and weak session ID generation. Tigo is working on patches, but no release date has been set. CISA urges users to isolate devices behind firewalls and avoid exposing them directly to the Internet. The Department of Homeland Security has released the final funding round for the $1 billion state and local cybersecurity grant program. This round, totaling $91.7 million each U.S. state will get at least $1 million, while U.S. territories will receive a minimum of $250,000. A new rule prohibits using grant funds for services from the multi state ISAC and the Elections infrastructure isac, both previously funded by dhs. The Ms. Isac, which has helped local governments with cybersecurity for over two decades, is now shifting to a paid subscription model due to reduced federal funding. North Dakota CISO Chris Gergen expressed disappointment, noting Ms. ISAC's services align closely with the grant's goals. The grant also prohibits spending on ransoms, insurance or construction. DHS emphasizes cyber resilience while cutting redundant costs. CISA says it remains committed to supporting governments with free services despite pulling direct funding from long standing partners like Ms. Isac. Coming up after the break, my conversation with Sarah Powazek from UC Berkeley's center for Long Term Cybersecurity discussing her proposed nationwide roadmap to scale cyber defense for community organizations. And from Black Hat, it's a special Woman on the street segment with halcyons Cynthia Kaiser and Stacy Cameron. Plus helicopter parenting officially hits the footwear aisle. Stay with us.
