Transcript
A (0:02)
You're listening to the Cyberwire network, powered by N2K. Ever wished you could rebuild your network from scratch to make it more secure, scalable and simple? Meet Meter, the company reimagining enterprise networking from the ground up. Meter builds full stack zero trust networks including hardware, firmware and software, all designed to work seamlessly together. The result? Fast, reliable and secure connectivity without the constant patching, vendor juggling or hidden costs. From wired and wireless to routing, switching, firewalls, DNS security and vpn, every layer is integrated and continuously protected in one unified platform. And since it's delivered as one predictable monthly service, you skip the heavy capital costs and endless upgrade cycles. Meter even buys back your old infrastructure to make switching effort, transform complexity into simplicity and give your team time to focus on what really matters, helping your business and customers thrive. Learn more and book your demo@meter.com cyberwire that's M E T E R.com cyberwire we've got a patch Tuesday roundup Google sues a phishing as a service network linked to global SMS scams and launches a private AI Compute Hyundai notifies vehicle owners of a data breach. Amazon launches a bug bounty program for its AI models. The Radamanthis info stealer operation has been disrupted. An initial access broker is set to plead guilty in US federal court. Our guest is Bob Maley, CSO from Black Kite, discussing a new AI assessment framework and the Bitcoin Queen $7.3 billion crypto laundering empire collapses It's Wednesday, November 12, 2025. I'm Dave Buettner and this is your CyberWire Intel BR. Thanks for joining us here today. It's great to have you with us. Microsoft's November Patch Tuesday addressed more than 60 security flaws, including one actively exploited in the wild. Among them is a race condition and double free bug which allows low privileged attackers to corrupt kernel memory and escalate to full system privileges. While exploitation requires precise timing and local access, chaining it with other flaws could enable full system compromise, credential theft and ransomware deployment. Researchers also warned about a critical remote code execution bug in the Windows GDI graphics library. With a CVSS score of 9.8, the flaw can be triggered by uploading a crafted image file, making it a top patching priority for any Internet facing systems. This update cycle also marks the first after Windows 10's end of life, with Microsoft issuing an out of band fix for enrollment issues in its Extended Security Updates program. In the industrial control systems sphere, major vendors including Siemens, Rockwell Automation, Aviva and Schneider Electric issued advisories for a batch of vulnerabilities affecting their ICS and OT products. This includes an Aviva flaw that also impacts Schneider Electric Solutions, underscoring vendor interdependencies. Although exploitation evidence is not detailed in the reporting, the risks revolve around unauthorized access and potential disruption of industrial processes. Meanwhile, Adobe released updates addressing 29 vulnerabilities across products such as InDesign, InCopy, Photoshop, Illustrator, Substance 3D, Stager and Format plugins. Several of the flaws permit arbitrary code execution, and one involves a security bypass issue in Adobe Pass. Adobe assigned all bugs a priority rating of 3, which indicates that exploitation is not expected, and noted no current evidence of these vulnerabilities being used in the wild in the hardware and firmware space. Intel Corporation published around 30 new advisories covering more than 60 vulnerabilities in areas including Xeon processors, Slim bootloader, graphics, Quick Assist technology and firmware and driver modules. The issues include high severity flaws that could enable privilege escalation, denial of service and information disclosure. Ivanti and Zoom released patches this week for multiple vulnerabilities, including several rated high severity. Ivanti fixed three flaws in its endpoint Manager platform that could enable remote code execution or privilege escalation, affecting all versions before 2024 SU4. The company says there's no evidence of exploitation so far. Zoom also issued nine advisories addressing three high severity and six medium severity bugs across its desktop and mobile mobile apps. The most serious issues could allow privilege escalation, though none are known to be exploited. Google has filed a lawsuit in U.S. federal court against a China based criminal network it calls Lighthouse, accused of running a large scale phishing as a service operation. The group allegedly sells software kits and fake website templates that mimic major US Organizations, including Google itself, to power widespread smishing scams sent via text message. According to the suit, Lighthouse has operated more than 32,000 fraudulent sites impersonating the U.S. postal Service and may have compromised millions of credit cards across 120 countries. The defendant's real identities are unknown, identified only by online aliases on Telegram. Google's goal isn't prosecution, but deterrence, seeking a court declaration that Lighthouse's infrastructure is illegal illegal to help other platforms shut it down and protect users from future phishing campaigns elsewhere, Google has introduced a new platform called Private AI Compute, designed to bring its Gemini AI models to the cloud while keeping user data private. The system processes information in a sealed, hardware secured environment using encryption and remote attestation to prevent access even by Google itself. The company says the approach delivers the speed and capability of cloud AI with the privacy of on device processing. It's part of Google's broader push to prove that powerful AI can also be privacy preserving. Hyundai Auto Ever America, the digital arm of Hyundai Motor Group, is notifying vehicle owners about a data breach that exposed names, Social Security numbers and driver's license details. Hackers accessed company systems for nine days between February and March before detection. While the company serves over 2.7 million users, only about 2,000 were affected. Hyundai says it's investigating with outside experts and offering two years of credit monitoring. The breach underscores growing industry concern over how automakers protect driver data. Amazon has announced a new bug bounty program, inviting select researchers to probe its Nova large language models for security flaws. The program will reward discoveries involving prompt injection, jailbreaking and other vulnerabilities with real world exploitation. Potential participants, chosen through an invite only process, will also test whether Nova could be manipulated to aid in developing weapons of mass destruction. Amazon says the effort aims to strengthen AI safety across its ecosystem, which powers services like Alexa and AWS Bedrock the Radamanthis infostealer operation has been disrupted, leaving many of its criminal customers unable to access their servers. Researchers say users are reporting lost SSH access and new certificate based logins signs which suggest law enforcement intervention. Radamanthis, a subscription based malware that steals credentials and cookies, is typically spread through fake software and ads. Investigators believe German police or Operation Endgame, a multinational campaign targeting cybercriminal infrastructure, may be behind the takedown. The malware's Tor sites are offline but not officially seized. Russian national Alexei Olegovich Volkov, age 25, is set to plead guilty in US federal court for helping ransomware gangs gain access to victim networks. Prosecutors say Volkov acted as an initial access broker, selling stolen credentials to the Yang Lo Wang ransomware group in exchange for a share of ransom payments earning over $250,000. Arrested in Rome in 2023 and extradited to the U.S. volkoff has agreed to pay more than $9 million in restitution. His case highlights the growing specialization within ransomware operations. Coming up after the break, Bob Maley, CSO from Black Kite, discusses a new AI assessment framework and a Bitcoin Queen $7.3 billion crypto laundering empire collapses. Stay with us. We've all been there. You realize your business needs to hire someone you yesterday. How can you find amazing candidates fast? Well, it's easy just use indeed when it comes to hiring indeed is all you need. Stop struggling to get your job post noticed indeed. Sponsored Jobs helps you stand out and hire fast. Your post jumps to the top of search results so the right candidates see it first and it works. Sponsored Jobs on indeed get 45% more applications than non sponsored ones. One of the things I love about Indeed is how fast it makes hiring. And yes, we do actually use Indeed for hiring here at N2K CyberWire. Many of my colleagues here came to us through Indeed plus with Sponsored Jobs. There are no subscriptions, no long term contracts. You only pay for results. How fast is Indeed? Oh, in the minute or so that I've been Talking to you, 23 hires were made on Indeed according to Indeed Data Worldwide. There's no need to wait any longer. Speed up your hiring right now with Indeed and listeners to this show will get a $75 sponsored job credit. To get your jobs more visibility@indeed.com cyberwire just go to indeed.com cyberwire right now and support our show by saying you heard about Indeed on this podcast. Indeed.com cyberwire terms and conditions apply. Hiring Indeed is all you need. What's your 2am Security worry? Is it do I have the right controls in place? Maybe Are my vendors secure? Or the one that really keeps you up at night? How do I get out from under these old tools and manual processes? That's where Vanta comes in. Vanta automates the manual work so you can stop sweating over spreadsheets, chasing audit evidence and filling out endless questionnaires. Their trust management platform continuously monitors your systems, centralizes your data and simplifies your security at scale. And it fits right into your workflows, using AI to streamline evidence collection, flag risks, and keep your program audit ready all the time. With Vanta, you get everything you need to move faster, scale confidently, and finally get back to sleep. Get started@vanta.com cyber that's v a n t a dot com cyber Bob Maley is Chief Security Officer at Black Kite and in today's sponsored Industry Voices segment, we're discussing a new AI assessment framework. Can we start with the big picture here from your point of view, what kind of pressure are third party risk management teams feeling right now when it.
