Transcript
Dave Buettner (0:02)
You're listening to the Cyberwire network, powered by N2K. Hey everybody, Dave here. I've talked about Deleteme before and I'm still using it because it still works. It's been a few months now and I'm just as impressed today as I was when I signed up. Deleteme keeps finding and removing my personal information from data broker sites and and they keep me updated with detailed reports so I know exactly what's been taken down. I'm genuinely relieved. Knowing my privacy isn't something I have to worry about every day. The Deleteme team handles everything. It's the set it and forget it peace of mind. And it's not just for individuals. Deleteme also offers solutions for businesses, helping companies protect their employees personal information and reduce exposure to social engineering and phishing threats. And right now our listeners get a special 20% off your delete me plan. Just go to JoinDeleteMe.com N2K and use promo code N2K at checkout. That's JoinDeleteMe.com N2k code N2K it was a busy patch Tuesday Investigators discover undocumented communications devices inside Chinese made power inverters. A newly discovered branch privilege injection flaw affects Intel CPUs a UK retailer may claim up to £100 million from its cyber insurers after a major cyber attack. A Kosovo national has been extradited to the US for alleged allegedly running an illegal online marketplace. CISA will continue alerts on its website following industry backlash. Our guest is Neil Hair Brown, CEO at Storm Guidance, discussing cyber incident response, retainer service provision and shoring up the future of the CVE program. Wednesday, May 14, 2025 I'm Dave Buettner and this is your CyberWire Intel Briefing. Thanks for joining us here today. It is great as always to have you with us. Yesterday marked May's patch Tuesday and Microsoft took center stage by addressing 78 vulnerabilities, including 50 days actively exploited in the wild. These critical flaws span across Windows, Office, Azure and Microsoft Defender. Notably, one of the zero days carries a perfect CVSS score of 10 impacting Azure DevOps Server. Additionally, six vulnerabilities are rated as critical, with five being remote code execution flaws and one an information disclosure bug. SAP has released patches for a second zero day vulnerability in its netweaver servers. This flaw was discovered during investigations into previous zero day attacks involving another vulnerability fixed back in April. Both vulnerabilities have been exploited in the wild, emphasizing the need for immediate patching. Ivanti has patched two vulnerabilities in its endpoint Manager mobile software that attackers have chained together to achieve unauthenticated remote code execution. The first is an authentication bypass and the second allows arbitrary code execution via crafted API requests. Ivanti urges customers to update to the latest versions to mitigate these threats. Fortinet has addressed a critical remote code execution vulnerability in its Forta Voice enterprise phone system. This stack based overflow flaw has been actively exploited, allowing unauthenticated attackers to execute arbitrary code through malicious HTTP requests. The vulnerability also affects Fortamail, Forta, NDR, FortaRecorder and FortaCamera. Juniper Networks VMware and Zoom have released patches for numerous vulnerabilities across their products. Juniper addressed nearly 90 bugs in its Secure analytics platform, some dating back several years. VMware fixed a high severity cross site scripting flaw in its ARIA automation appliance and a medium severity issue in VMware tools. Zoom resolved nine security defects in its workplace apps, including a high severity privilege escalation vulnerability. Industrial control system giants Siemens, Schneider Electric and Phoenix Contact have issued security advisories addressing vulnerabilities in their products. While most flaws have been patched, some only have mitigations or workarounds available. These advisories are crucial for organizations relying ON ICS infrastructure. Adobe's Patch Tuesday rollout includes fixes for at least 39 vulnerabilities across various products, and a significant update addresses seven critical flaws in Adobe Cold Fusion, which could lead to arbitrary file system reads, code execution and privilege escalation. These vulnerabilities carry a CVSS score of 9.1 out of 10, highlighting their severity overall. This month's patch Tuesday highlights the importance of timely updates across a broad spectrum of software and hardware. Organizations are urged to prioritize patching these vulnerabilities to safeguard against active threats. US Energy officials are investigating Chinese made inverters and batteries after discovering undocumented communication devices inside them, Reuters reports. These components, used widely in solar panels, batteries and EV chargers, could bypass firewalls and pose risks to the power grid, experts warn. They could enable remote disruptions or even destruction of infrastructure. While such devices are built for remote maintenance, some found had hidden capabilities not listed in manuals. The US Department of Energy is working to tighten transparency and supply chain security as tensions with China grow, utilities and lawmakers are pushing to limit reliance on Chinese technology in critical infrastructure. Some nations like Lithuania and Estonia are already taking steps to ban or restrict Chinese inverters to protect energy systems from foreign control. A newly discovered branch privilege injection flaw affects all Intel CPUs from the 9th generation onward. Researchers at ETH Zurich found that speculative execution on Intel's branch predictors can leak sensitive kernel data to user level attackers by exploiting race conditions during privileged switches. Their exploit bypasses Spectre version 2 mitigations and successfully reads protected data like hashed passwords. Non Intel CPUs tested, including AMD and ARM, are not vulnerable. Intel CPUs before 9th gen may still be at risk from older Spectre variants. UK retailer Marks & Spencer may claim up to 100 million pounds from its cyber insurers after a major cyber attack compromised some customer data and disrupted operations for nearly three weeks, the Financial Times reports. Allianz is expected to cover at least the first 10 million pounds, with Beasley also potentially liable, while Ms. Confirmed that no payment details or passwords are exposed by personal data like contact info and order history may have been the attack halted online sales and caused supply issues in food stores, with estimated losses exceeding 60 million pounds. Since disclosing the breach on April 27, Ms. Shares have dropped 16%, wiping 1.3 billion pounds off its market value. The company's insurance policies, arranged by wtw, is expected to cover both direct and third party losses. Experts warn premiums could rise if Ms. Fails to show stronger risk management in future renewals. Lirodon Masurica, a 33 year old Kosovo national, has been extradited to the US for allegedly running BlackDB CC, an illegal online marketplace selling stolen account data and personal information. Known online as BlackDB, Masurica is accused of enabling fraud schemes, including tax fraud and identity theft. Arrested in December, he appeared in a Tampa court and remains in custody. Kosovo authorities seized digital devices and cryptocurrency during the arrest. If convicted, Masurica faces up to 55 years in prison. CISA reversed its decision to scale back cybersecurity alerts on its website following backlash and confusion from the cyber community. Initially, CISA announced it would prioritize social media, particularly X Twitter, for updates, claiming it would enhance user experience. Critics argued this shift could limit access to critical information, including threat alerts and vulnerability disclosures. CISA's website has long been a trusted source for urgent cyber threat guidance, especially as the agency faces budget cuts and staffing shortages. The move raised concerns about transparency and reliance on private platforms for public safety information. Under scrutiny from Congress and amid potential $500 million in budget reductions, CISA has paused changes to reassess how to best communicate with stakeholders while maintaining its commitment to dot gov platforms for verified alert. Coming up after the break My conversation with Neil Hair Brown, CEO at Storm Guidance. We're discussing cyber incident response, retainer service provision and shoring up the future of the CVE program. Stay with us. And now a word from our sponsor, ThreatLocker. Keeping your system secure shouldn't mean constantly reacting to threats. ThreatLocker helps you take a different approach by giving you full control over what software can run in your environment. If it's not approved, it doesn't run. Simple as that. It's a way to stop ransomware and other attacks before they start without adding extra complexity to your day. See how ThreatLocker can help you lock down your environment at www.threatlocker.com. let's be real. Navigating security compliance can feel like assembling IKEA furniture without the instructions. You know you need it, but it takes forever and you're never quite sure if you've done it right. That's where Vanta comes in. Vanta is a trust management platform that automates up to 90% of the work for frameworks like SoC2, ISO 27001 and HIPAA, getting you audit ready in weeks, not months. Whether you're a founder, an engineer, or managing IT and security for the first time, Vanta helps you prove your security posture without taking over your Life. More than 10,000 companies, including names like Atlassian and Quora, trust Vanta to monitor compliance, streamline risk, and speed up security reviews by up to five times. And the roi. A recent IDC report found Vanta saves businesses over half a million dollars a year and pays for itself in just three months. For a limited time, you can get $1,000 off vanta@vanta.com cyber that's v a n t a dot com cyber Neil Hair Brown is CEO at Storm Guidance and in today's sponsored Industry Voices discussion, we're talking about cyber incident response retainer service provision.
