Transcript
A (0:02)
You're listening to the Cyberwire Network, powered by N2K.
B (0:14)
Most security conferences talk about Zero Trust Zero Trust World puts you inside this is a hands on cybersecurity event designed for practitioners who want real skills, not just theory. You'll take part in live hacking labs where you'll attack real environments, see how modern threats actually work and learn how to stop them before they turn into incidents. But Zero Trust World is more than labs. You'll also experience expert led sessions, practical case studies and technical deep dives focused on real world implementation. Whether you're Blue team, red team, or responsible for securing an entire organization, the content is built to be immediately useful. You'll earn CPE credits, connect with peers across the industry and leave with strategies you can put into action right away. Join us March 4th through the 6th in Orlando, Florida. Register now at ztw.com and take your zero trust strategy from Theory to execution. Doge staff face scrutiny over possible Hatch act violations violations GitLab fixes a serious 2fa bypass North Korean hackers target macOS developers through visual Studio code. Researchers say the Void Link malware may be largely AI built. MITRE rolls out a new embedded systems threat matrix. Oracle drops a massive patch update. Minnesota DHS reports a breach affecting 300,000 people. Germany looks to Israel for cyber defense lessons A major illicit marketplace goes dark. Our guest is Ashley Jess Sen, intelligence analyst from Intel 471 with a crash course on underground cyber markets and auditors emerge as an unlikely line of cyber defense. It's Wednesday, january 21st, 2026. I'm dave bittner and this is your cyberwire intel brief. Thanks for joining us here today. It's great as always to have you with us. Newly disclosed Justice Department court filings reveal that two members of Elon Musk's DOGE team at the Social Security Administration were in contact with an advocacy group seeking to overturn election results in certain states. One DOGE member signed an agreement that may have involved matching Social Security data with state voter rolls, according to a filing by Justice Department official Elizabeth Shapiro. SSA referred both employees for possible Hatch act violations, which prohibit political activity by federal workers. The disclosures contradict earlier testimony during litigation over Doge's access to Social Security data. Shapiro said DOGE members shared data using unapproved third party servers, including Cloudflare, and may have accessed restricted personal information despite court limits. Emails suggest DOGE members could have been asked to assist the advocacy group by using SSA data, though it remains unclear whether any data was actually shared. Shapiro also reported that a senior DOGE advisor received a password protected file containing private Data on about 1,000 individuals. SSA says it was unaware of these actions at the time and that details remain unclear. GitLab has released security updates to fix a high severity vulnerability that allows attackers to bypass two factor authentication in both its Community Edition and Enterprise Edition platforms. The flaw is caused by an unchecked return value in GitLab's authentication services. According to the company. An attacker who already knows a user's account ID could submit forged device responses and circumvent two factor protections. In the same update, GitLab patched two additional high severity vulnerabilities that could enable unauthenticated denial of service attacks through malformed authentication requests and improper API authorization checks to medium severity. Denial of service issues were also fixed. GitLab has released multiple patched versions urging self managed users to upgrade immediately. GitLab.com is already updated and dedicated customers are not affected. JAMF warns that North Korean threat actors are targeting macOS developers by abusing Visual Studio code task configuration files to deliver malware. The campaign is a new variation of long running fake job offer lures. Victims are tricked into cloning malicious GitHub or GitLab repositories posing as coding assignments. When opened and marked as trusted in VS code, obfuscated JavaScript executes, retrieves additional payloads, and installs a persistent backdoor, according to jamf. The malware collects system data, communicates with command and control servers, and enables remote code execution. Researchers say Voidlink, a recently discovered Linux malware targeting cloud servers, was likely built almost entirely with the help of artificial intelligence. Initially analyzed by Checkpoint Research, voidlink appeared to be the work of a sophisticated, well funded threat group due to its modular design and feature set. Further investigation, however, suggests the malware was developed by a single individual using AI tools to plan, plan, structure and generate code. Evidence includes exposed development documents outlining a 30 week plan even though the malware evolved in roughly four weeks, a mismatch researchers attribute to AI generated documentation check point says AI was used not just for coding but for project orchestration. Marking a turning point, voidlink demonstrates how AI can significantly accelerate and amplify advanced malware development when used by skilled actors. MITRE has announced the launch of its Embedded Systems Threat Matrix, or estm, a new cybersecurity framework focused on protecting embedded systems. Modeled on MITRE attck, the framework maps attack tactics and techniques specific to hardware and firmware environments. According to Mitre, ESTM supports threat modeling and attack path analysis across sectors such as energy, industrial control, robotics, transportation and healthcare. The framework aligns with existing security models, works with the Embed threat model, and is now available as the more mature ESTM 3.0. With community contributions encouraged, Oracle has released its first Critical patch update for 2026, delivering 337 security fixes across more than 30 products. According to Oracle, the update covers roughly 230 unique vulnerabilities, including more than two dozen rated critical and over 235 exploitable remotely without authentication. Several patches address a critical Apache Tika flaw with a maximum CVSS score. Oracle Communications and Fusion Middleware received the most fixes. Oracle also issued separate security updates for Solaris, including remotely exploitable vulnerabilities. The Minnesota Department of Human Services is notifying nearly 304,000 people about a data breach involving unauthorized access to its MnChoices eligibility system. The incident was traced to a user affiliated with a licensed healthcare provider who accessed more data than permitted while using systems managed by FEI systems. The access occurred between late August and September of last year and was detected after FEI identified unusual activity in November. State officials say there's no evidence of external hacking. The exposed information primarily involved demographic data with more detailed personal and benefits information accessed for a smaller subset of individuals. DHS has revoked the provider's access, launched fraud monitoring efforts and reported the incident as a HIPAA breach to federal and state oversight bodies. Germany is seeking to significantly strengthen its cyber defenses against threats from countries including Russia, China, Iran and North Korea, and is turning to Israel for expertise. Earlier this month, German Interior Minister Alexander Dobrinkt signed a Cyber Defense Cooperation Agreement in Tel Aviv with Israeli Prime Minister Benjamin Netanyahu, citing interest in Israel's cyberdome system. Developed under the Israel National Cyber Directorate, the cyberdome is a centralized, partly automated threat detection platform that uses AI to monitor attacks on critical infrastructure. German officials and analysts say Israel's experience shaped by frequent cyberattacks and a mature offensive and defensive ecosystem could inform Germany's own efforts. The partnership includes plans for joint development of next generation cyber defenses, an AI and cyber innovation center, and cooperation on protecting energy infrastructure, connected vehicles and countering drone threats. Toudeau Guarantee, a telegram based illicit marketplace that processed more than $12 billion in fraud related transactions, has shut down, according to Blockchain. Intelligence firm Elliptic Elliptic describes Tudeau as the third largest illicit marketplace ever facilitating money laundering, sales of stolen personal data and services supporting online scams. The shutdown followed the January 6th arrest and extradition to China of Chen Xi, chairman of Cambodia's Prince Group, after which activity in Tudeau's wallets sharply declined. Some functions, including gambling services, remain active, leaving uncertainty over whether the closure is complete. The disruption impacts Southeast Asia's fraud ecosystem, where scam operations have flourished. Tudo had risen rapidly after the shutdown of Huanguarante, its predecessor. Elliptic expects fraud activity to fragment across multiple smaller marketplaces, complicating but not preventing tracking efforts. Coming up after the break, Ashley Jess from Intel 471 has a crash course on underground cyber markets, and auditors emerge as an unlikely line of cyber defense. Stay with us. Ever wished you could rebuild your network from scratch to make it more secure, scalable and simple? Meet Meter, the company reimagining enterprise networking from the ground up. Meter builds full stack zero trust networks, including hardware, firmware and software, all designed to work seamlessly together. The result? Fast, reliable and secure connectivity without the constant patching, vendor juggling, or hidden costs. From wired and wireless to routing, switching, firewalls, DNS security and vpn, every layer is integrated and continuously protected in one unified platform. And since it's delivered as one predictable monthly service, you skip the heavy capital costs and endless upgrade cycles. Meter even buys back your old infrastructure to make switching effortless, transform complexity into simplicity, and give your team time to focus on what really matters, helping your business and customers thrive. Learn more and book your demo@meter.com cyberwire that's M E T E R.com cyberwire. What's your 2am Security worry? Is it do I have the right controls in place? Maybe? Are my vendors secure? Or the one that really keeps you up at night? How do I get out from under these old tools and manual processes? That's where Vanta comes in. Vanta automates the manual work so you can stop sweating over spreadsheets, chasing audit evidence, and filling out endless questionnaires. Their trust management platform continuously monitors your systems, centralizes your data, and simplifies your security at scale. And it fits right into your workflows, using AI to streamline evidence collection, flag risks, and keep your program audit ready all the time. With Vanta, you get everything you need to move faster, scale confidently, and finally get back to sleep. Get started@vanta.com cyber that's V A N T A dot com cyber. Ashley Jess is senior intelligence analyst at Intel 471. Today, she shares a crash course on underground cyber markets and emerging trends.
