Transcript
Dave Buettner (0:02)
You're listening to the Cyberwire Network, powered by N2K. Hey everybody. Dave here. Join me and my guests Outpost 24's Laura Enriquez and Michaelo Steppa on Tuesday, May 13th at noon Eastern time for a live discussion on the biggest threats hitting web applications today and what you can do about them. We're going to talk about why attackers still love Web apps in 2025. The latest threat trends shaping the security landscape, how to spot and prioritize critical vulnerabilities fast, along with scalable practical steps to strengthen your defenses. Again, the webinar is Tuesday, May 13th for our live conversation on the state of modern Web application security. You can register now by visiting events.thecyberwire.com that's events.thecyberwire.Com we'll see you there. Hey everybody, Dave here. I've talked about Deleteme before and I'm still using it because it still works. It's been a few months now and I'm just as impressed today as I was when I signed up. Deleteme keeps finding and removing my personal information from data broker sites, and they keep me updated with detailed reports so I know exactly what's been taken down. I'm genuinely relieved. Knowing my privacy isn't something I have to worry about every day. The Deleteme team handles everything. It's the set it and forget it peace of mind. And it's not just for individuals. Deleteme also offers solutions for businesses, helping companies protect their employees personal information and reduce exposure to social engineering and phishing threats. And right now, our listeners get a special deal 20% off your Delete Me plan. Just go to JoinDelete Me.com N2K and use promo code N2K at checkout. That's JoinDeleteMe.com N2K code N2K House Republicans look to limit state regulation of AI Spain investigates potential cybersecurity weak links in the April 28 power grid collapse, a major security flaw has been found in Asus motherboards Automatic update system a new macOS info stealing malware uses PI installer to evade detection the US charges 14 North Korean nationals in a remote IT job scheme. Europe's cybersecurity agency launches the European vulnerability database. CISA pairs back website security alerts Moldovan authorities arrest a suspect in doppelpamer ransomware attacks on today's threat vector, David Moulton speaks with Noel Russell from the AI Leadership Institute about AI Operational Maturity. And Dave and Buster's invites vanish into the void. It's Tuesday, May 13th, 2025. I'm Dave Buettner and this is your CyberW Intel Briefing. Thanks for joining us here once again. It's always great to have you with us. House Republicans have added controversial language to the new budget reconciliation bill that could severely limit state regulation of artificial intelligence. The bill, introduced by Representative Brett Guthrie, includes a clause barring states from enforcing any AI related laws for 10 years. The sweeping language could nullify existing laws in states like California and New York that require transparency and bias audits for AI tools in healthcare and hiring. Critics argue this is a major gift to the AI industry, which has close ties to Trump era officials and has resisted oversight. If passed, the bill would block states from protecting citizens from unchecked AI use, marking a dramatic shift in tech policy. Spain is investigating whether small renewable energy generators were a cybersecurity weak link in the April 28 power grid collapse that cut 60% of the country's electricity, the Financial Times reports. The National Cybersecurity Institute is questioning solar and wind operators about their cyber defenses, remote access and system anomalies. While no cyber attack has been confirmed, authorities haven't ruled one out, and a judge is now probing that possibility. Spain's shift from centralized fossil fuel plants to thousands of smaller renewable sites has increased potential cyberattack targets. Devices managing energy flow and communication links may offer entry points. Red Electrica, the grid operator, said no attack hit its systems, but flagged risks tied to data gaps from small producers. Despite skepticism from energy experts about the likelihood of a coordinated cyber attack, officials stress that all scenarios remain under review. Spain is investing 1.1 billion euros to boost national cybersecurity across sectors. A major security flaw has been found in Asus Mainboard's automatic update system, affecting Armory Crate and Driver Hub tools on AMD and Intel platforms. Two vulnerabilities allow remote attackers to alter system behavior or access features via crafted HTTP requests. The root issue lies in software auto installed from the UEFI BIOS using Windows platform binary table ASUS has released updates to fix these issues. Users should update immediately and scan BIOS files for threats using VirusTotal. A new info stealing malware targeting macOS systems has been uncovered using PI Installer to evade detection. First spotted in January and analyzed by JAMF Threat Labs, the malware is bundled in macho binaries and remains undetected by most antivirus tools. PI Installer allows the malware to run without a native Python installation, especially effective since Mac OS 12.3 removed. Built in Python, the malware harvests user credentials via fake AppleScript dialogs, extracts data from the keychain and targets crypto wallets. It uses multiple obfuscation layers, including base 85 encoding, XOR encryption, and ZLib compression. The malware's behavior is stealthy, leaving little trace on disk, and operates across Mac architectures. Researchers warn users to be wary of unsigned executables and unexpected password prompts. They recommend monitoring for PI installer activity and suspicious environment variables as this method grows more popular among attackers. Meanwhile, Apple has issued a critical security update for macros sequoia to patch eight major vulnerabilities that could allow malicious apps to access sensitive user data. The flaws affect key components like Apple Intelligence Reports, Core, Bluetooth Finder, and the TCC Privacy Framework. Notable issues include permission bypasses and improper state management that could expose personal data. Though no active exploitation has been reported, security experts warn these flaws underscore growing challenges in maintaining privacy and across complex operating systems. The US has charged 14 North Korean nationals in a scheme that used stolen identities to secure remote IT jobs at US companies, sending at least $88 million to the DPRK over six years. Flashpoint's investigation, based on a DOJ indictment, revealed that the group used fake companies, malware and remote access tools to infiltrate corporate networks. Domains linked to fake firms like Baby Box Info and cubixtech US were used to build fake resumes and references. Infected devices in places like Pakistan, Nigeria and Dubai were found with saved credentials, job board activity, and evidence of coordination with North Korean handlers. Signs included Korean language settings, VPNs masking DPRK connections, and tactics to avoid detection like faking voice calls and smuggling laptops. The findings point to a global operation aimed at stealing money, data and access, reinforcing the need for stronger cybersecurity and hiring verification across industries. Europe's cybersecurity agency has officially launched the European Vulnerability Database, a centralized platform for tracking cybersecurity flaws. Developed under the NIS 2 directive, the EUVD mirrors the US National Vulnerability Database and aims to enhance risk management and transparency across the EU. It gathers data from sources like CCERTs, vendors and databases such as MITRE's CVE and CISA's KEV catalog. Users can access three dashboards highlighting critical exploited and EU coordinated vulnerabilities. Each entry includes details like affected products, severity and mitigation steps. Concerns over the future of the U S based CVE program have increased interest in the EUVD as a stable, independent resource. Enissa says the tool is vital for public users, companies and authorities to better manage threats and respond effectively to known vulnerabilities. CISA announced a major change in how it shares cybersecurity updates. Only urgent alerts about emerging threats or major cyber activity will now appear on its website. Routine guidance, vulnerability notices and product warnings will be distributed via email, RSS and X Twitter. This shift, possibly tied to budget cuts and staff reductions under a Trump aligned cost cutting initiative, has raised concerns among experts. Critics, including former CISA director Jen Easterly, warn that reducing visibility for routine security updates undermines national cybersecurity. The policy reflects a broader trend of federal agencies moving communications to X Twitter despite its limitations. Agencies like the NTSB and Social Security Administration have also begun phasing out traditional press releases and email updates. Observers worry this change favors Elon Musk's platform and limits accessibility to critical public information. CISA urges users to subscribe to its email notifications to stay informed. Moldovan authorities have arrested a 45 year old foreign national suspected of involvement in Doppelpamer ransomware attacks, including a 2021 attack on the Dutch Research Council that caused 4.5 million euros in damages. The suspect, whose identity remains undisclosed, is accused of ransomware deployment, extortion and money laundering. Seized items include laptops, phones and €84,800 in cash. The arrest follows international efforts to dismantle DoppelPamer, a ransomware strain linked to the TA505 group, which has targeted critical infrastructure and multiple sectors since 2019. Coming up after the break, David Moulton speaks with Noel Russell, CEO of the AI Leadership Institute, about AI operational maturity and Dave and Buster's invites vanish into the void.
