Transcript
A (0:02)
You're listening to the CyberWire network powered by N2K.
B (0:12)
Ever wished you could rebuild your network from scratch to make it more secure, scalable and simple? Meet Meter, the company reimagining enterprise networking from the ground up. Meter builds full stack zero trust networks including hardware, firmware and software, all designed to work seamlessly together. The result? Fast, reliable and secure connectivity without the constant patching, vendor juggling or hidden costs. From wired and wireless to routing, switching, firewalls, DNS security and vpn, every layer is integrated and continuously protected in one unified platform. And since it's delivered as one predictable monthly service, you skip the heavy capital costs and endless upgrade cycles. Meter even buys back your old infrastructure to make switching effort, transform complexity into simplicity and give your team time to focus on what really matters helping your business and customers thrive. Learn more and book your demo@meter.com cyberwire that's M E T E R.com cyberwire. Hewlett Packard patches a maximum severity vulnerability in its OneView infrastructure management software Cisco warns a critical zero day is under active exploitation. An emergency Chrome update fixes two high severity vulnerabilities. French authorities make multiple arrests. US Authorities dismantle an unlicensed crypto exchange Sonicwall highlights an exploited Zero Day Research earn $320,000 for demonstrating critical remote code execution flaws in cloud infrastructure A US Senator urges electronic health record vendors to give patients greater control over who can access their medical data. Our guest is Larry Zorio, CISO, from Mark 43, discussing first responders and insider cyber risks and a Right to Repair group puts cash on the T.
C (2:33)
Foreign.
B (2:39)
It's Thursday, december 18th, 2025. I'm dave bittner and this is your cyberwire intel briefing. Thanks for joining us here today. It's great to have you with us. Hewlett Packard Enterprise has released patches for a maximum severity vulnerability in its OneView infrastructure management software that allows remote code execution by unauthenticated attackers. The flaw affects all OneView versions prior to version 11 and can be exploited through low complexity code injection attacks. The issue was reported by a Vietnamese security researcher and disclosed in an HPE advisory, warning that no mitigations or workarounds are available. Organizations are urged to patch immediately. HPE says customers can remediate the issue by upgrading to Oneview 11 or later or by applying specific security hotfixes for other versions. HPE has not confirmed any active exploitation of the vulnerability. Cisco has warned that a China linked threat group is actively exploiting a critical zero day affecting Cisco Async OS based secure email gateway and secure email and Web Manager appliances. The flaw allows unauthenticated attackers to execute commands with root privileges. Cisco Talos discovered the activity and attributed it with moderate confidence to a Chinese state sponsored tracked as UAT9686. The campaign uses multiple backdoors and tunneling tools. No patch or workaround is currently available and CISA has added the flaw to its known exploited vulnerabilities catalog. Google has released an emergency Chrome update fixing two high severity vulnerabilities that could allow remote code execution. The flaws include a use after free bug in the Web GPU component and an out of bounds read and write issue in the V8 JavaScript engine. Google has patched the issues and users are strongly urged to update immediately, including those running Chromium based browsers such as Edge, Brave, Opera and Vivaldi. French authorities have been busy. They arrested a 22 year old suspect in connection with a cyber attack on France's Interior Ministry that compromised multiple email accounts and confidential documents. Officials say the breach claimed on breach forums, exposed files related to judicial records and wanted persons with attackers inside the network for several days. No ransom demand was made and authorities say public safety was not endangered. Prosecutors allege the suspect acted as part of an organized group and note prior convictions for similar offenses. French authorities have arrested two crew members of an Italian passenger ferry after malware capable of remote access was found aboard the vessel. A Bulgarian national was released without charge while a Latvian crew member remains detained and faces charges of conspiring to infiltrate computer systems on behalf of a foreign power. The malware was discovered while the ferry was docked and was neutralized without impact. Officials say the investigation involves suspected foreign interference and is ongoing in coordination with Italian authorities. US Authorities have dismantled Enote, an unlicensed cryptocurrency exchange accused of laundering more than $70 million in illicit proceeds for cybercriminals. The FBI, working with European and US partners, seized servers, domains and apps used by the service, which allegedly helped ransomware groups and other criminals convert stolen cryptocurrency into harder to trace assets. Prosecutors unsealed charges against 39 year old Russian national Mikhailo Petrovich Chudnovets, accused of operating E notes and offering laundering services for over a decade. He faces up to 20 years in prison if convicted and remains at large. Officials say the takedown targets the financial infrastructure that enables cybercrime, not just individual attackers. Sonicwall has warned that attackers are exploiting a zero day vulnerability in the secure mobile access 1000 appliance management console. The Medium Severity Flaw allows local privilege escalation and has been used alongside a previously disclosed bug to achieve unauthenticated remote code execution with root privileges. The issue has been patched in recent hotfixes, and CISA has added it to the known Exploited Vulnerabilities catalog, urging rapid remediation and mitigations where patching is delayed. The inaugural Zero Day Cloud Hacking Competition in London awarded researchers $320,000 for demonstrating critical remote code execution flaws in cloud infrastructure components. Hosted by Wiz Research with Amazon Web Services, Microsoft and Google Cloud, the event focused exclusively on cloud systems. Across 13 sessions, researchers succeeded in 85% of attempts uncovering 11 zero day vulnerabilities. Day one awards totaled $200,000 for exploits targeting Redis, PostgreSQL, Grafana, and the Linux kernel, including a container escape flaw that broke cloud tenant isolation. DayTwo added $120,000 for database exploits involving Redis, PostgreSQL and MariaDB team. Xcentcode won the competition with three successful exploits, earning $90,000. Despite the results, most of the $4.5 million prize pool went unclaimed, with no successful exploits against Kubernetes, Docker, major Web servers or AI targets. Senator Ron Wyden of Oregon is urging US Electronic health record vendors to give patients greater control over who can access their medical data, framing the issue as both a privacy and national security concern. His push comes as regulators more aggressively enforce data interoperability rules under the 21st Century Cures act, which aimed to improve data sharing while allowing exceptions for privacy and CyberSecurity. Wyden contacted 10 major EHR vendors calling for direct control features for patients. He warned that widespread data sharing increases risks of misuse. Citing past Defense Department findings, EPIC responded that it is developing new MyChart features to let patients opt out of sharing with, hide records, track access and manage preferences for sensitive care. Coming up after the break, Larry Zorio from Mark 43, discusses first responders and insider cyber threats and a Right to Repair group Puts cash on the table. What's your 2am Security worry? Is it Do I have the right controls in place? Maybe? Are my vendors secure? Or the one that really keeps you up at night? How do I get out from under these old tools and manual processes? That's where Vanta comes in. Vanta automates the manual work so you can stop sweating over spreadsheets, chasing audit evidence and filling out endless questionnaires. Their trust management platform continuously monitors your systems, centralizes your data, and simplifies your security at scale. And it fits right into your workflows, using AI to streamline evidence collection, flag risks, and keep your program audit ready all the time. With Vanta, you get everything you need to move faster, scale confidently, and finally get back to sleep. Get started at vanta.com cyber that's V-A-N-T A.com cyber.
