Transcript
A (0:02)
You're listening to the Cyberwire Network, powered by N2K.
B (0:12)
What's your 2am Security worry? Is it do I have the right controls in place? Maybe are my vendors secure? Or the one that really keeps you up at night? How do I get out from under these old tools and manual processes? That's where Vanta comes in. Vanta automates the manual work so you can stop sweating over spreadsheets, chasing audit evidence and filling out endless questionnaires. Their trust management platform continuously monitors your systems, centralizes your data and simplifies your security at scale. And it fits right into your workflows, using AI to streamline evidence collection, flag risks, and keep your program audit ready all the time. With Vanta, you get everything you need to move faster, scale confidently and finally get back to sleep. Get started@vanta.com cyber that's V A N T A dot com cyber.
A (1:21)
CrowdStrike fires an insider who allegedly shared screenshots with hackers Cox Enterprises confirms Oracle EBS breach Alleged transport for London Hackers plead not guilty Iberia discloses breach of customer data we have our Monday business briefing and our guest today is Brandon Karpf, friend of the show, discussing maritime GPS jamming and spoofing and the launderers who wanted a bank for Christmas. Today is Monday, November 24, 2025. I'm Maria Varmazes, host of T Minus Space Daily, in for Dave Buettner as he's defrosting his turkey and this is your Cyberwire Intel Briefing. Thank you for joining me, everyone. Let's dive in. CrowdStrike has fired an insider who allegedly shared screenshots of internal systems with hackers. According to a report from TechCrunch, the scattered lapsus hunters published the screenshots in a Telegram channel last week, claiming to have gained access to CrowdStrike's systems after breaching gainsight. CrowdStrike says these claims are false, stating that, quote, its systems were never compromised and customers remained protected throughout. The company says the hackers obtained the screenshots from a malicious insider whose access has been terminated. Bleeping computer cites a Shiny Hunters member who said the group offered the insider $25,000 to grant access to CrowdStrike's networks, but the insider was detected and locked out before they could do so. These details have not, however, been confirmed by CrowdStrike. In related news, Google's Threat Intelligence Group reports that hackers accessed and stole Data from over 200 instances Salesforce via third party apps published by Gainsight. The campaign claimed by the scattered Lapses Hunters collective including Shiny Hunters, exploited integrations, not the core Salesforce platform, to infiltrate high profile targets such as dentor sign, LinkedIn and Verizon. Salesforce says the breach quote is not the result of any vulnerability in the Salesforce platform. US based global conglomerate Cox Enterprises has confirmed that its Oracle E Business suite or EBS instance was breached, leading to the theft of personal information belonging to nearly 9,500 individuals. According to a report from Security Week, Cox is one of the more than 100 entities named by the Clop ransomware gang as victims of a campaign targeting a zero day flaw in Oracle ebs, Logitech, Harvard University, the Washington Post, Envoy Air and Mazda have also confirmed that they were targeted by this campaign. Mazda told Security Week, however, that its defenses prevented the attackers from exfiltrating information. Two alleged Scattered Spider hackers have pleaded not guilty to charges related to last year's cyber attack against Transport for London, according to a BBC report. The defendants, 19 year old Talha Jubeir from East London and 18 year old Owen Flowers from the West Midlands, were arrested last year and charged with offenses under the Computer Misuse Act. Flowers has also been charged with attempting to hack two US based healthcare entities. The two defendants will be held in custody until their trial in June 2026. Attackers have exploited a recently patched vulnerability in Windows Server Update Services, more commonly known as WSUS, and it is CVE 20, 25, 59, 287 rated as a CVSS score of 9.8 enabling unauthenticated remote code execution at the system level. Once inside WSUS enabled servers, the adversary deployed the sophisticated backdoor shadow pad by chaining tools like PowerCat, Certutil and Curl to download and sideload a malicious DLL which then persists via scheduled tasks and system process injection. CISA has added the flaw to own exploited vulnerabilities Catalog and organizations using WSUS are urged to patch immediately, restrict access and audit for abnormal activity. Spanish airline Iberia has disclosed a breach affecting customers names, email addresses and loyalty card identification numbers. According to a new report from Bleeping Computer, the incident did not affect login credentials or financial details. The airline has attributed the breach to a third party vendor, saying in a statement, quote, as soon as we became aware of the incident, we activated our security protocol and procedures and implemented all necessary technical and organizational measures to contain it, mitigate its effects and prevent its recurrence. The Bleeping Computer story also notes that a threat actor posted on a criminal forum claiming to have stolen data from Iberia and offering to sell it for $150,000. It is unclear if these claims are related, however, since the threat actor claimed to have breached Iberia's own servers and stolen technical details related to aircraft. Harvard University has disclosed that its alumni affairs and development systems were compromised following a voice phishing attack on November 18, 2025, which allowed an unauthorized party to access data related to alumni, donors, students, faculty and staff. The exposed information includes email addresses, phone numbers, home and business addresses, donation and event attendance records, but notably not Social Security numbers, payment card data or financial account credentials. The University is working with law enforcement and third party cybersecurity experts and has begun notifying affected individuals and now it's time for your Monday business briefing. Last week's business breakdown highlights just over $180 million raised across seven investments and three acquisitions. On the investment front, US based social engineering defense company Doppel raised $70 million in a series C round. With this new funding, Doppel aims to expand its digital risk protection product portfolio alongside expanding its existing human risk management offerings. Additionally, Bedrock Data, a US based data security firm, raised $25 million in a series A round. Through this funding, the company aims to accelerate product development timelines and invest in scaling its data security integrations, classification and AI governance. Additionally, the company also aims to meet its growing enterprise demand for infrastructure platforms and software as a service and AI systems at the multi petabyte scale. For acquisitions, cloudflare announced its intention to acquire Replicate and that's a US based AI model development company. Through Replicate, Cloudflare is looking to expand its Cloudflare workers, offering to allow it to build scalable and reliable AI applications. Additionally, Cloudflare aims to enable developers to access AI models across the globe with minimal code. And that wraps up this week's business breakdown. For deeper analysis on major business moves shaping the cybersecurity landscape, subscribe to N2K Pro and check out TheCyberWire.com every Wednesday for the latest updates. Now make sure to stick around after the break because Dave Buettner and I recently sat down with Brandon Karp, friend of the show, as we discuss maritime GPS jamming and spoofing and the launderers who wanted a bank for Christmas.
