Transcript
A (0:02)
You're listening to the Cyberwire Network powered by N2K. Are you ready for AI in cybersecurity? Demand for these skills is growing exponentially for cybersecurity professionals. It's why CompTIA, the largest vendor neutral certification authority, is developing SEC AI Plus. It's their first ever AI certification focused on artificial intelligence and cybersecurity and is designed to help mid career cybersecurity professionals demonstrate their competencies with AI tools. And that's why N2K's SEC AI practice exam is coming out this year to help you prepare for the certification release in 2026. To find out more about this new credential and how N2K can help you prepare today, check out our blog@certify.cybervista.net blog and thanks.
B (1:10)
@ Thales they know cybersecurity can be.
C (1:13)
Tough and you can't protect everything. But with Thales you can secure what matters most.
B (1:19)
With Thales industry leading platforms, you can protect critical applications, data and identities anywhere and at scale with the highest roi. That's why the most trusted brands and.
C (1:31)
Largest banks, retailers and healthcare companies in.
B (1:34)
The world rely on Thales to protect what matters most applications, data and identity. That's Thales T H A L E S. Learn more@thalesgroup.com cyber.
C (2:03)
An AWS outage sparks speculation An F5 exposure and breach raise patching and supply chain concerns SALT Typhoon breaches a European Telecom via a netscaler flaw A judge bans NSO group from WhatsApp China alleges irrefutable evidence of NSA hacking Connectwise patches adversary in the middle risks a Dolby decoder flaw enables zero click remote code execution on Android. We've got a Cyber M and A and funding surge that signals a busy consolidation cycle. Our guest is Jeff Collins, CEO of Wanaware, sharing how hospital consolidations are reshaping it, asset visibility and what it takes to close Those gaps and one man's quest to make AI art legit.
D (2:54)
Foreign.
C (3:00)
October 20, 2025 I'm Dave Buettner and this is your Cyberwire Intel Briefing. Thanks for joining us here today. It is great to have you with us and good to be back from a lovely week long vacation last week. My thanks to Maria Vermazes for filling in on the mic. A widespread Amazon Web Services outage disrupted major apps worldwide, fueling attack rumors that sources say lack evidence. Amazon's status page reported increased error rates and latency in the US East 1 region, cascading across services like Snapchat, Robin Hood Roblox and Fortnite Down Detector logged thousands of reports in the United States, Canada and Europe. AWS said engineers were mitigating the issues and services were gradually recovering Monday morning. It's noteworthy that a single cloud region's failure can interrupt trading, communications and gaming at scale. Security teams should stress test multi region failover and vendor resilience. The speculation shows how routine outages can trigger geopolitical anxiety so clear timely incident communication remains essential. The Shadow Server foundation found over 262,000 F5 Big IP systems exposed online, while F5 disclosed a nation state breach with stolen Big IP source code. Over 130,000 exposed systems are in the United States. Patch status remains unclear. F5 says attackers accessed big IP development and engineering systems in August, the company reports containment no tampering with source code or supply chain and limited customer configuration data stolen. F5 is notifying clients they filed a Form 8K and and delayed disclosure at the US government's request. F5 privately links the activity to China Nexus Group UNC5221 and warns about the Brickstorm backdoor. Broad exposure plus uncertain patching increases exploitation risk. NCSC and CISA urge customers to locate F5 assets, secure management interfaces, assess for compromise and and apply current updates. China based group Salt Typhoon is exploiting a Citrix netscaler gateway flaw to infiltrate a European telecom darktrace reports in July, attackers moved from the gateway to Citrix Virtual Delivery agent hosts. Attackers hid behind softether VPN infrastructure. They deployed Snappy Bee, also called DeeDrat via dll sideloading with antivirus executables from Norton BCAV and IOBIT Command and Control used HTTP and unidentified TCP with Internet Explorer headers observed. The case underscores persistent stealthy tradecraft that blends into trusted software. It highlights the need for anomaly based detection and proactive defense across critical sectors. Organizations should harden exposed appliances and monitor lateral movement from remote access gateways. A federal judge barred NSO group from targeting WhatsApp and cut Meta's jury award to just over $4 million. U.S. district Judge Phyllis Hamilton found evidence Pegasus Spyware could still infiltrate WhatsApp, granted a permanent injunction and capped punitive damages at 9 to 1. Meta's 2019 suit alleged violations of the Computer Fraud and Abuse act and the California Comprehensive Computer Data Access and Fraud act, plus terms of service. The injunction covers WhatsApp only. Hamilton wrote that NSO continued trying to bypass WhatsApp's security and that the unauthorized access harms users informational privacy. This matters because the order blocks data collection and addresses zero click techniques while signaling consequences for commercial spyware targeting encrypted communications. China accused the USNSA of hacking its National Time Service center, citing irrefutable evidence and a detailed timeline. The Ministry of State Security said NSA exploited mobile phone vulnerabilities of center employees since March 25, 2022 and used stolen credentials from April of 2023 to access computers private servers. Masked origins the Xi' an facility supports high precision time services and international time calculation. The claims point to risks for critical infrastructure that supports government, civil society and industry. They also come amid escalating U S China tensions and mutual cyber accusations. Defenders should review protections for time sources and monitor for credential abuse and mobile exploitation. ConnectWise has patched two adversary in the middle flaws, urging on prem customers to Update and enforce TLS 1.2. The first vulnerability, with a CVSS of 9.6, exposed clear text transmissions. The second lacked integrity checks on downloads. Agents configured for HTTP or weak encryption risked intercepted communications or malicious update replacement. The patch enforces HTTPs for all agent traffic. The vulnerabilities meant local network attackers could view, modify and tamper with automate operations. Users should patch immediately and validate secure configurations. A Dolby Unified decoder flaw enables remote code execution, including zero click exploitation on Android, researchers from Google report. The decoder processes Dolby Digital plus AC4 and other formats. Project Zero found an out of bounds write triggered by Evolution data handling. Integer wrap caused an undersized buffer and bounds check failure, enabling overwrite of struct members, including a pointer used on a following sync frame. Audio messages can trigger the flaw. Android decodes audio automatically, enabling zero click code execution in the media codec context. Microsoft addressed the issue in October. Updates with user interaction required on Windows and Google included patches in Chrome OS releases in this week's business roundup. Cyber deal making accelerated across spyware, managed security, email and identity as NSO confirmed a sale and major roll ups. Advanced NSO said. A U.S. investment group acquired the firm for tens of millions while keeping Israeli regulatory and operational control, Calcalist reported. A Robert Simons led investor group not confirmed by nso Level Blue agreed to acquire Cyber Reason, adding Softbank Corp. SoftBank Vision Fund 2 and Liberty Strategic Capital as Level Blue investors and aligning with prior trustwave and Strauss Friedberg deals. Kaseya acquired Inki, which remained standalone and joins Kaseya365 user Pantera bought Devotion to extend from adversarial testing to remediation. French MSSP Nomui acquired Intragen targeting 650 million euros revenue in 2026 capital flowed to core security segments. Resistant AI raised a $25 million Series B. Pantheron secured $12 million in a Series A Authenticate obtained $12 million in debt financing. Site Hop raised 7.5 million pounds. Arcjet announced $8.3 million in a Series A Mind the Hack closed a 2.8 million euro seed. Nimiz raised 2 million euros. Talion secured 2 million pounds while Hyperbunker raised €800,000. The pattern points to bundling XDR, MDR, DFIR, email security and IAM at scale Coming up after the break, Jeff Collins from Wanaware shares how hospital consolidations reshape it, asset visibility and what it takes to close those gaps and one man's quest to make AI art legit. Stay with us.
