Transcript
A (0:02)
You're listening to the Cyberwire Network powered by N2K.
B (0:14)
We've all been there. You realize your business needs to hire someone yesterday. How can you find amazing candidates fast? Well, it's easy. Just use Indeed when it comes to hiring, Indeed is all you need. Stop struggling to get your job post noticed Indeed Sponsored Jobs helps you stand out and hire fast. Your post jumps to the top of search results so the right candidates see it first and it works. Sponsored Jobs on indeed get 45% more applications than non sponsored ones. One of the things I love about Indeed is how fast it makes hiring. And yes, we do actually use Indeed for hiring here at N2K CyberWire. Many of my colleagues here came to us through Indeed. Plus with Sponsored Jobs. There are no subscriptions, no long term contracts. You only pay for results. How fast is Indeed? Oh, in the minute or so that I've been Talking to you, 23 hires were made on Indeed according to Indeed Data Worldwide. There's no need to wait any longer. Speed up your hiring right now with Indeed and listeners to this show will get a $75 sponsored job credit. To get your jobs more visibility at indeed.com cyberwire just go to indee indeed.com cyberwire right now and support our show by saying you heard about Indeed on this podcast. Indeed.com cyberwire terms and conditions apply. Hiring Indeed is all you need. A new executive order targets State's AI regulatory regulations while the White House shifts course on an NSA Deputy Director pick the UK finds LastPass over inadequate security measures Researchers warn of active attacks against Gladonet center stack instances OpenAI outlines future cybersecurity plans MITRE ranks the top 25 vulnerabilities of 2025 CISA orders US federal agencies to urgently patch a critical geo server vulnerability an anti piracy coalition shuts down one of India's most popular Illeg streaming services Our guest is Mark Lance, vice President for DFIR and threat intelligence at GuidePoint Security, unpacking Purple Team tabletop exercises and preparing for AI generated attacks and hackers set their sights on DNA. This Friday, December 12, 2025. I'm Dave Bittner and this is your Cyberwire Intel Briefing. Thanks for joining us here today. Happy Friday. It is great as always to have you with us. President Donald Trump signed an executive order aimed at preventing US States from creating their own artificial intelligence regulations, arguing that a fragmented regulatory landscape could hinder innovation and weaken America's ability to compete with China. Trump said requiring companies to navigate approvals in all 50 states would discourage investment and slow development. The order directs the attorney general to form a task force to challenge state AI laws and instructs the Commerce Department to identify regulations deemed problematic. It also threatens to withhold certain federal funds, including broadband grants, from states that enact AI rules. The move comes amid bipartisan calls in Congress and pressure from civil liberties and consumer groups for stronger AI oversight. Several states, including California, Colorado, Utah and Texas, have already passed AI laws focused on data limits, transparency and discrimination risks. Supporters say such measures address real harms, while the administration argues only the most burdensome regulations should be targeted, leaving room for protections like child safety elsewhere. The Trump administration has reversed its decision on who will serve as deputy director of the National Security Agency, withdrawing its earlier pick amid internal opposition and pressure from far right conservatives. Joe Franciscan, announced in August for the number two role, was recently informed he would no longer be appointed, according to multiple sources. Francesca, a former NSA analyst and National Security Council official, never began the job and faced criticism from conservative activists as well as resistance within the administration. He has since declined alternative NSA roles and moved to the private sector. The White House now plans to name Tim Kosiba, a former senior NSA and FBI official, to the position. Kosiba reportedly has backing from Trump allies and recently completed a polygraph at NSA headquarters. The change adds to ongoing leadership instability at the nsa, which remains without a Senate confirmed director and faces additional senior departures in the coming weeks. The UK Information Commissioner's Office has fined LastPass about $1.6 million over a 2022 data breach that affected roughly 1.6 million UK users. Regulators concluded that LastPass failed to implement sufficiently robust technical and security measures, allowing a hacker to gain unauthorized access to a backup database tied to a third party cloud storage service. While there is no evidence that customer passwords were decrypted, the ICO said the company nonetheless failed users who trusted it to protect sensitive information. LastPass, which serves more than 20 million customers and 100,000 businesses globally, remains a recommended security tool despite the incident. Industry experts described the fine as a watershed moment, highlighting that modern breaches often stem from identity compromise, governance failures and supplier risk rather than weak passwords alone. Huntress is warning of active attacks against gladonet Center Stack instances where attackers exploit a newly identified cryptography flaw to to steal machine keys and gain remote code execution. The issue stems from Center Stack reusing static cryptographic strings, allowing attackers to access the Web config file, forge trusted requests and abuse ASPX View state deserialization. Huntress has observed nine impacted organizations across multiple sectors. No CVE has been assigned, gladonet has fixed issues and organizations are urged to update immediately and review indicators of compromise. OpenAI has outlined plans to treat all future AI models as having potentially high cybersecurity capabilities, acknowledging they could both aid defenders and be misused by attackers. Under its preparedness framework, such models might automate vulnerability, discovery or cyber operations, prompting a defense in depth approach. Rather than limiting access or knowledge. OpenAI plans to rely on targeted training, red teaming and system wide monitoring to curb abuse. Models are designed to refuse or safely respond to malicious requests with suspicious activity blocked, downgraded or escalated for enforcement. OpenAI also plans a Trusted Access Program offering enhanced capabilities to qualified cybersecurity defenders and a Frontier Risk Council of experts. While OpenAI cites improving model performance as evidence of advancing capabilities, outside analysts caution against overstating current AI driven threats. MITRE has published their 2025 CWE Top 25 ranking the past year's vulnerabilities Cross site scripting was the most dangerous software weakness, followed by SQL injection and cross site request forgery. Missing authorization climbed to fourth while out of bounds right placed fifth. The list adds six new entries, including multiple buffer overflow flaws and access control weaknesses. While several issues dropped off due to methodology changes, CISA says the updated list is designed to help reduce vulnerabilities and costs. Agencies urge developers and security teams to use it to guide secure by design practices, testing and vendor evaluations. CISA has ordered US Federal agencies to urgently patch a critical geoserver vulnerability that's being actively exploited in the wild. The flaw is an unauthenticated XML external entity or XXE vulnerability affecting multiple geoserver versions. By abusing weak XML input handling in a specific GetMap endpoint, the attackers can retrieve arbitrary files, trigger denial of service conditions, access sensitive data, or enable server side request forgery. CISA has added the flaw to its known exploited vulnerabilities catalog and directed federal Civilian Executive branch agencies to remediate by January 1. While the mandate applies only to federal agencies, CISA strongly urges all organizations running GeoServer to patch immediately, noting widespread exposure and active exploitation. An anti piracy coalition has shut down Mark V Cinemas, one of India's most popular illegal streaming services, cutting off access to free movies and TV shows used by millions of the operation was led by the alliance for Creativity and Entertainment, or ACE, backed by more than 50 major studios and networks including Disney, Netflix and Warner Bros. ACE identified the operator in Bihar, India, who agreed to cease operations and transfer 25 related domains now redirected to a legal streaming portal. The coalition also dismantled a file cloning tool widely used in India and Indonesia to to distribute pirated content via cloud storage. Ace says the takedown underscores its continued collaboration with global law enforcement to disrupt large scale piracy networks. Coming up after the break, my conversation with mark Lance from GuidePoint Security. We're discussing Purple Team tabletop exercises to prepare for AI generated attacks and hackers set their sights on DNA. Stay with us. Most environments trust far more than they should, and attackers know it. ThreatLocker solves that by enforcing default deny at the point of execution. With ThreatLocker allowlisting you stop unknown executables cold. With ring fencing you control how trusted applications behave and with threatlocker DAC defense against configurations, you get real assurance that your environment is free of misconfigurations and clear visibility into whether you meet compliance standards. ThreatLocker is the simplest way to enforce zero trust principles without the operational pain. Its powerful protection that gives CISOs real visibility, real control and real peace of mind. ThreatLocker makes zero trust attainable even for small security teams. See why thousands of organizations choose ThreatLocker to minimize alert fatigue, stop ransomware at the source and regain control over their environments. Schedule your demo@threatlocker.com n2k today foreign. Is transforming every industry, but it's also creating new risks that traditional frameworks can't keep up with. Assessments today are fragmented, overlapping and often specific to industries, geographies or regulations. That's why Black kite created the BKGA3AI assessment framework to give cybersecurity and risk teams a unified, evolving standard for measuring AI risk across their own organizations and their vendors. AI use it's global, research driven, built to evolve with the threat landscape and free to use because Black Kite is committed to strengthening the entire cybersecurity community. Learn more@blackkite.com. Mark Lance is Vice President for DFIR and threat intelligence with GuidePoint Security. I recently sat down with him to discuss Purple Team tabletop exercises to help prepare for AI generated attacks.
