Transcript
A (0:02)
You're listening to the Cyberwire Network powered by N2K.
B (0:12)
Ever wished you could rebuild your network from scratch to make it more secure, scalable and simple? Meet Meter, the company reimagining enterprise networking from the ground up. Meter builds full stack zero trust networks including hardware, firmware and software, all designed to work seamlessly together. The result? Fast, reliable and secure connectivity without the constant patching, vendor juggling or hidden costs. From wired and wireless to routing, switching, firewalls, DNS security and vpn, every layer is integrated and continuously protected in one unified platform. And since it's delivered as one predictable monthly service, you skip the heavy capital costs and endless upgrade cycles. Meter even buys back your old infrastructure to make switching effort, transform complexity into simplicity and give your team time to focus on what really matters, helping your business and customers thrive. Learn more and book your demo@meter.com cyberwire that's M E T E R.com cyberwire. Researchers detail a years long Russian state sponsored cyber espionage campaign Israel's cyber chief warns against complacency Vulnerabilities affect products from Fortinet and Hitachi Energy. Studies show AI models are rapidly improving at offensive cyber tasks. Mitre expands its Defend Cybersecurity ontology to cover operational technology. Texas sues smart TV manufacturers alleging illegal surveillance a fraudulent gift card locks an Apple user out of their digital life. Our guest is Daron Davidson from Cyberproof Israel discussing agentic socks and agentic transformation of an MDR and fat racks. Crack the stacks. Foreign December 17, 2025 I'm Dave Bittner and this is your Cyberwire Intel Briefing. Thanks for joining us. It's great as always to have you with us here today. Amazon's Threat Intelligence team has detailed a years long Russian state sponsored cyber espionage campaign targeting Western critical infrastructure from 2021 through 2025. Attributed with high confidence to Russia's GRU. The activity focused on energy companies, telecom operators, cloud and network infrastructure providers across North America, Europe and parts of the Middle East. The attackers primarily gained access by exploiting vulnerabilities and misconfigurations in cloud hosted network edge devices, including routers, VPNs and management appliances running on AWS. Over time, the campaign shifted from exploiting known software flaws to abusing misconfigurations, allowing quieter and more persistent access. Compromised devices were used to capture network traffic, steal credentials and move laterally into victim environments. Amazon says it has disrupted activity and notified affected customers, highlighting the ongoing risk to critical infrastructure from cloud and supply chain compromises. Israel and the United States face Cyber threats far more severe than those publicly reported, according to Major general Aviad Dagan, head of the Israel Defense Force's Cyber Defense Directorate. Dagan warned that while data breaches often dominate headlines, dozens of cyberattacks have had the potential to damage real world critical infrastructure. He said Israel must assume future cyberattacks will be significantly more destructive than those seen so far and cautioned against complacency despite Israel's strong cyber defenses. Emphasizing national security obligations, Dagan highlighted close cooperation with the United States, including long running joint cyber warfare exercises with US Cyber Command. He cited Iran's 2020 cyberattack on Israel's water system as a near disaster example, noting ongoing hostile activity from Iran, China and others. Alongside reported Israeli cyber responses targeting Iranian infrastructure. CISA has warned of active exploitation of two critical Fortinet authentication bypass vulnerabilities affecting multiple products. Both flaws allow unauthenticated attackers to bypass Forta Cloud single sign on using crafted SAML messages, potentially gaining full administrative control. Exploitation began just days after patches were released. CISA and Fortinet urge organizations to act immediately by isolating management interfaces, disabling Forta Cloud sso, and upgrading to the latest secure versions. Hitachi Energy has disclosed a critical blast radius vulnerability affecting legacy afs, AFR and AFF series products. The flaw stems from weaknesses in the RADIUS protocol that can allow response forgery attacks. Devices are only vulnerable if RADIUS is enabled and the Message Authenticator option is disabled. There is no patch. Hitachi Energy urges organizations to restore default RADIUS settings, verify Message Authenticator is enabled, and ensure affected systems are isolated from the Internet. Researchers and industry leaders warn that fully autonomous AI driven cyberattacks are moving from a distant possibility to an eventual certainty. Recent studies show AI models are rapidly improving at offensive cybertasks, even as today's systems still require human guidance. Executives from Anthropic and Google are set to testify before Congress on how AI is reshaping the cyber threat landscape, with Anthropic warning that AI could enable cyberattacks at unprecedented scale and sophistication. OpenAI has also cautioned that future frontier models may significantly lower the skill and time needed to launch attacks. Academic research, including a Stanford study where an AI agent outperformed most human bug hunters, underscores this trend. While safeguards remain, experts stress urgency in strengthening AI powered defenses and limiting adversarial access to advanced AI technology. MITRE has expanded its Defend Cybersecurity ontology to cover operational technology, creating a structured framework for defending cyber physical systems used in critical infrastructure. Industrial environments and defense operations. Operational technology, which includes controllers, sensors and actuators, directly manages physical processes and poses unique risks as systems become increasingly connected to networks and the cloud. The DEFEND for OT extension provides a shared knowledge model to help organizations understand adversary behaviors, identify essential observations and controls, and protect systems not designed for Internet exposure. Funded by the U.S. department of Defense and the National Security Agency, the framework adds OT specific artifacts, countermeasures and mappings to related resources. MITRE says the open Extensible Ontology will support cybersecurity operations, strategic decision making and collaboration across the global security community. Texas Attorney General Ken Paxton has sued five major smart TV manufacturers Samsung, lg, Sony, Hisense and tcl, alleging they illegally spy on consumers through automated content recognition technology. The lawsuits claim the TVs secretly capture screen data in near real time, track viewing habits across apps and connected devices, and transmit that data for targeted advertising without meaningful user consent. Texas argues the practice violates the state's Deceptive Trade Practices act and seeks significant civil penalties and court orders halting ACR data collection. During litigation, Paxton also raised national security concerns about Chinese based manufacturers Hisense and tcl, citing China's data laws. The complaints say consent mechanisms are misleading, opt out processes are intentionally difficult and consumers are unaware their televisions function as surveillance tools. A long time Apple user has described losing access to their entire Apple digital life after attempting to redeem a $5 Apple gift card, highlighting risks tied to gift card fraud and automated account protections. After the first code was rejected and reissued by a major retailer, Apple locked the account. The affected Apple ID, in use for roughly 25 years, held family photos, messages, purchases and device sync data, effectively disabling multiple devices and a linked developer account. Despite providing receipts, the user says Apple support offered no explanation and refused escalation, suggesting actions that could violate Apple's own policies. While Apple insiders suggest additional factors may be involved, the case underscores the fragility of digital ecosystems, the impact of false fraud flags and the importance of backups and cautious gift card purchases. Coming up after the break, Duron Davidson from Cyber Proof Israel discusses agentic socks and agentic transformation of an MDR and fat racks. Crack the stacks, stick around. What's your 2am Security worry? Is it do I have the right controls in place? Maybe? Are my vendors secure or the one that really keeps you up at night? How do I get out from under these old tools and manual processes? That's where Vanta comes in. Vanta automates the manual work so you can stop sweating over spreadsheets, chasing audit evidence and filling out endless questionnaires. Their trust management platform continuously monitors your systems, centralizes your data and simplifies your security at scale and it fits right into your workflows, using AI to streamline evidence collection, flag risks, and keep your program audit ready all the time. With Vanta, you get everything you need to move faster, scale confidently and finally get back to sleep. Get started@vanta.com cyber that's V A N T A dot com cyber.
