Transcript
A (0:02)
You're listening to the Cyberwire Network powered by N2K. Are you ready for AI in cybersecurity? Demand for these skills is growing exponentially for cybersecurity professionals. It's why CompTIA, the largest vendor neutral certification authority, is developing SEC AI Plus. It's their first ever AI certification focused on artificial intelligence and cybersecurity and is designed to help mid career cybersecurity professionals demonstrate their competencies with AI tools. And that's why N2K's SEC AI practice exam is coming out this year to help you prepare for the certification release in 2026. To find out more about this new credential and how N2K can help you prepare today, check out our blog@certify.cybervista.net blog and thanks.
B (1:10)
At Thales they know cybersecurity can be tough and you can't protect everything. But with Thales, you can secure what matters most. With Thales industry leading platforms, you can protect critical applications, data and identities anywhere and at scale with the highest roi. That's why the most trusted brands and largest banks, retailers and healthcare companies in the world rely on Thales to protect what matters most applications, data and identity. That's Thales T H A L E S learn more@thalesgroup.com cyber a former defense contractor is charged with attempting to sell trade secrets to Russia. Researchers uncover critical vulnerabilities in TP link routers Microsoft patches a critical Windows Server update service flaw CISA issues eight new ICS advisories Shadow Escape targets LLM's database connections Halloween Theme Scams Spike Our guest is Chris Inglis, first National Cyber Director, speaking on cybercrime in the upcoming documentary on Cyber Midnight in the war room and WhatsApp's missing million dollar exploit. It's Friday, October 24th, 2025. I'm Dave Buettner and this is your Cyber Intel Briefing. Thanks for joining us here today and happy Friday. It is great as always to have you with us. We begin today with several stories related to Russia. Peter Williams, a former director at the trenchant division of defense contractor L3Harris Technologies, has been charged with stealing and attempting to sell trade secrets to a buyer in Russia, according to the U.S. justice Department. Prosecutors allege Williams, a 39 year old Australian, took seven trade secrets from two unidentified companies between April 2022 and August 2025. He resigned from L3Harris in August and is scheduled for arraignment and plea proceedings on October 29th in Washington. Federal court authorities are seeking $1.3 million in forfeiture, along with luxury goods and cryptocurrency accounts allegedly tied to the theft. L3Harris and Trenchant are not accused of wrongdoing. Trenchant, known for zero day vulnerability research, supports national security and defense cyber operations elsewhere. Russia's cybercriminal ecosystem is undergoing a major upheaval as law enforcement pressure, political control and international crackdowns reshape long standing dynamics. Operation Endgame in 2024 disrupted ransomware and money laundering networks, prompting Russia to make rare domestic arrests, signaling a shift from tolerance to selective enforcement. Leaked communications reveal coordination between cybercriminals and Russian intelligence, blurring the line between crime and statecraft. Within underground forums, mistrust is rising amid scams, infiltration fears and decentralized operations. At the same time, Western nations are escalating counter ransomware measures from payment bans to preemptive cyberstrikes. Recorded futures Insect Group concludes that Russia now actively manages cybercriminals, using them as geopolitical tools while balancing external pressure, internal control and strategic utility and wrapping up Russia A major cyber attack on Russia's agricultural watchdog Rossel Koznodor this week disrupted food shipments nationwide, the agency said. A large scale DDoS attack hit its Vet, IS and Saturn tracking systems, paralyzing product certification and logistics. For several hours. The Mercury platform required for electronic veterinary documents was unavailable, halting deliveries of dairy and baby food products. Authorities deny data compromise and say systems have resumed normal operation, though it's unclear if full restoration occurred. Forescout Research's Videra Labs discovered two critical vulnerabilities in TP link Omada and and Festa VPN routers that enable root access and remote code execution. The first Vulnerability is a WireGuard Private key sanitization flaw, permitting authenticated OS command injection. The second flaw exposes hidden CLI debug functionality that allows root SSH logins. Researchers rooted one of the devices by chaining the Web UI injection to create a missing debug file, then escalated via the debug backdoor. By analyzing bytecode variations and protocol implementations, they found additional potentially remote vulnerabilities across TP link families. Fixes are under coordinated disclosure and expected by the first quarter of next year. Forescout urges immediate patching, perimeter controls, hardened admin access and monitoring, and warns that recurring firmware patterns and support features routinely enable routing across network devices. Microsoft issued out of band updates to fix a critical Windows Server Update Service remote code execution flaw and warned customers to apply patches immediately. The vulnerability affects only Windows servers with the WSUS server Role enabled can be exploited remotely without user interaction and allows attackers to run code with system privileges, making it potentially wormable between WSUS servers. Administrators should install the cumulative OOB update and reboot or temporarily disable WSUS or block inbound ports 8530 and 8531. If patches cannot be applied right away, CISA has issued eight new Industrial Control Systems advisories. These cover vulnerabilities affecting control system products from major vendors including Schneider Electric, Hitachi Energy, Siemens and Delta Electronics. The notices emphasize that operators should review affected devices, apply patches, and follow the vendor recommended mitigations. CISA urges organizations to prioritize these updates. Given the critical role of ICS in infrastructure security, researchers at Operant AI have uncovered a new zero click attack dubbed Shadow Escape that exploits the Model Context Protocol, or MCP, used to connect large language models like ChatGPT and Gemini to company databases. The flaw allows attackers to hide malicious instructions in ordinary documents, triggering AI assistance to exfiltrate sensitive records such as Social Security numbers, financial data and medical files without user interaction or detection. Because the data theft occurs through legitimate MCP access inside corporate networks, traditional defenses can't see or stop it. Operant AI warns that trillions of records may already be at risk and urges organizations to audit AI integrations immediately to prevent silent data leaks from trusted internal systems. We are a week away from Halloween, and bitdefender Labs reports a worldwide spike in Halloween themed scams combining fake retail sales, giveaways, crypto offers and dating lures to trick users. 63% of these campaigns were phishing schemes impersonating major brands like Walmart, Amazon and Home Depot. Most originated from US Servers and targeted American consumers. On social media, scammers purchased meta ads to spread malware disguised as crypto rewards or brand deals. Bitdefender urges caution, advising users to verify links, avoid ad downloads, and treat seasonal free gifts with skepticism. Coming up after the break, my conversation with former National Cyber Director Chris Inglis. We're talking cybercrime and the upcoming documentary Midnight in the war room and WhatsApp's missing million dollar exploit. Stay with us. What's your 2am security worry? Is it do I have the right controls in place? Maybe? Are my vendors secure? Or the one that really keeps you up at night? How do I get out from under these old tools and manual processes? That's where Vanta comes in. Vanta automates the manual work so you can stop sweating over spreadsheets, chasing audit evidence and filling out endless questionnaires. Their trust management platform continuously monitors your systems, centralizes your data, and simplifies your security at scale and it fits right into your workflows. Using AI to streamline evidence collection, flag risks, and keep your program audit ready all the time. With Vanta, you get everything you need to move faster, scale confidently, and finally, get back to sleep. Get started@vanta.com cyber that's V A N T A dot com cyber and now a word from our sponsor. The Johns Hopkins University Information Security Institute is seeking qualified applicants for its innovative Master of Science in Security Informatics degree program. Study alongside world class interdisciplinary experts and gain unparalleled educational research and professional experience in information security and assurance. Interested U.S. citizens should consider the Department of Defense's Cyber Service Academy program, which covers tuition, textbooks and a laptop, as well as providing a $34,000 additional annual stipend. Apply for the fall 2026 semester and for this scholarship by February 28th. Learn more at CS JHU. Edu MSSI the folks at Cempras have produced a new documentary titled Midnight in the War Room. Chris Inglis, the first national Cyber Director, plays a key role in the documentary. Here's a preview.
