Transcript
A (0:02)
You're listening to the Cyberwire network, powered by N2K. You say you'll never join the Navy.
B (0:12)
That you'd never track storms brewing in the Atlantic and skydiving could never be part of your commute. You'd never climb Mount Fuji on a port visit, or fly so fast you break the sound barrier.
A (0:29)
Joining the Navy sounds crazy. Saying never actually is. Start your journey@navy.com, america's Navy forged by the sea.
B (0:48)
Plex urges users to immediately update their media servers due to an undisclosed security flaw. Cisco warns of a critical remote code execution flaw in their Secure Firewall Management center software. Rockwell Automation discloses multiple critical and high severity flaws. Hackers breach a Canadian House of Commons database. Active law enforcement and government email accounts are sold online for as little as 40 bucks. Telecom giant Cult Technology Services suffers a cyber incident disrupting its customer portal. Taiwan launches new measures to boost hospital cybersecurity. NIST has released a concept paper proposing control overlays for securing AI systems. A date with an AI chatbot ends in tragedy Our Our guest is Randall Deggs, Sneak's head of developer and security relations, discussing how under qualified or outsourced coding support could open doors for nation state threats and Dutch speed cameras are stuck in a cyber induced siesta. It's Friday, August 15th, 2025. I'm Dave Pit. This is your Cyberwire Intel Briefing. Thanks for joining us here today. Happy Friday. It's great to have you with us. Plex has urged certain users to immediately update their Plex Media server due to a recently fixed but undisclosed security flaw. The issue affects multiple versions and was reported via Plex's bug bounty program. Four days after releasing a patch, Plex emailed affected users warning them that their servers were outdated and recommending an urgent upgrade to the latest version available via the Management or Downloads page. While the company hasn't shared technical details or assigned a CVE id, the the concern is that attackers could reverse engineer the patch to exploit unpatched systems. Plex rarely sends such direct vulnerability alerts, making this warning notable users are strongly advised to update immediately to protect their systems. Cisco has warned of a critical remote code execution flaw in Secure Firewall Management center software with a CVSS rating of 10. The bug in the Radius authentication system allows unauthenticated remote attackers to run arbitrary commands with high privileges. It affects multiple versions when Radius is enabled. Cisco urges immediate updates as no direct workarounds exist. Disabling Radius and using local LDAP or SAML authentication can mitigate risk. The flaw is part of a broader advisory covering 29 Cisco security issues. Rockwell Automation has disclosed multiple critical and high severity flaws in Factory Talk Micro 800 and Controllogix products. One vulnerability could let attackers bypass FTSP token validation and another enables remote code execution. In Controllogix Micro 800, PLCs received patches for Azure RTOS vulnerabilities allowing RCE and privilege escalation by plus a denial of service flaw. Other high severity issues affect Flex 500, Studio 5000, Armor Block 5000, Factory Talk Viewpoint and Factory Talk Action Manager. No in the Wild exploitation has been reported. Yesterday, CISA issued 32 new industrial control system advisories covering current security issues, vulnerabilities and exploits affecting automation platforms. The alerts span products from Siemens, including components like Simatic, rtls, Engineering Platforms, Rugged Comm, synec, OS and others. CISA urges system operators and administrators to review these advisories promptly for detailed technical information and recommended mitigations. Hackers breached a House of Commons database containing office locations and personal details of Canadian elected officials and staff. The attack, exploiting a recent Microsoft SharePoint vulnerability, exposed names, titles, emails and device details. Authorities have not attributed the incident and the investigation is ongoing with national security partners. The flaw, known as Tool Shell, allows full SharePoint access and has been exploited by Chinese linked groups Linen Typhoon, Violet typhoon and storm 2603. Experts warn patching alone is insufficient, urging immediate mitigations alongside updates. Research from Abnormal Security reveals cybercriminals are selling active law enforcement and government email accounts from countries including the US, UK, Germany, India and Brazil for as little as $40. Unlike spoofed addresses, these are fully compromised accounts with complete login credentials enabling impersonation, fraudulent legal request access to restricted portals and intelligence gathering. Accounts are breached via credential stuffing. Infostealer malware and phishing sellers market them as toolkits for exploiting institutional trust, bypassing verification and accessing sensitive systems. The commoditization of government authority elevates the risk far beyond phishing, enabling direct abuse of privileged law enforcement capabilities. Telecom giant Colt Technology Services has suffered a cyber incident disrupting its customer portal Colt Online and its Voice API platform since August 12. The London based telecom says the attack targeted an internal system separate from customer infrastructure with no evidence of data theft. Protective measures, including taking systems offline, caused service outages. Colt is working with third party experts to restore operations and advises customers to use phone or email support. The cause remains unclear, though scans suggest possible targeting of Colt's SharePoint servers. Taiwan's Ministry of Digital affairs and Ministry of Health and Welfare are launching new measures to boost hospital cybersecurity after ransomware attacks on two top tier hospitals earlier this year linked to a Chinese hacker known as Crazy Hunter. The plan includes cyber defense drills, talent development, institutional guidance and enhanced inspections. A major 2025 drill will involve domestic and foreign white hat hackers testing defenses at 11 hospitals. Following the February and March attacks, the Ministry of Health and Welfare issued ransomware response guidelines and deployed endpoint detection and response across all medical centers. While officials stress resilience over invulnerability, the goal is rapid recovery if systems are breached, minimizing disruption and protecting sensitive patient data. NIST has released a concept paper proposing control overlays for securing AI systems built on its SP853 cybersecurity framework. These overlays tailor security controls for specific AI types such as generative, predictive and agentic AI, and include guidance for AI developers. While experts welcome the move, some, like Appomni's Melissa Ruzi, say the use cases lack sufficient detail, particularly around AI types and data sensitivity such as personal or medical information. She urges more specific controls and monitoring. NIST seeks public feedback via a Slack channel to refine the framework, aiming for a flexible yet practical Standard to safeguard AI's confidentiality, integrity and availability in diverse real world applications. Back In March, a 76 year old man died after rushing to meet Big sis Billy, a generative AI chatbot on Facebook messenger that had convinced him she was a real woman. The man, who had cognitive decline from a past stroke, was fell en route and later died from his injuries. The chatbot, created by Meta in collaboration with Kendall Jenner, had invited him to her apartment and initiated romantic exchanges. Reuters obtained Meta's internal AI content standards, which previously allowed romantic roleplay even with minors, and permitted bots to present themselves as real. Following inquiries, Mehta removed examples involving minors but still permits romantic roleplay with adults and inaccurate advice. Critics, including the man's family, warn that such bots can exploit vulnerable users, prioritizing engagement over safety. Coming up after the break, my conversation with Randall Degs, head of development, developer and security relations at snyk. We're discussing how under qualified or outsourced coding support could lead to open doors for nation state threats and Dutch speed cameras are stuck in a cyber induced siesta. Stick around.
