Transcript
Maria Varmazes (0:02)
You're listening to the Cyberwire Network powered by N2K.
Dave Buettner (0:14)
We've all been there. You realize your business needs to hire someone yesterday. How can you find amazing candidates fast? Well, it's easy. Just use Indeed when it comes to hiring, Indeed is all you need. Stop struggling to get your job post noticed Indeed Sponsored Jobs helps you stand out and hire fast. Your post jumps to the top of search results so the right candidates see it first and it works. Sponsored Jobs on indeed get 45% more applications than non sponsored ones. One of the things I love about Indeed is how fast it makes hiring. And yes, we do actually use Indeed for hiring here at N2K CyberWire. Many of my colleagues here came to us through Indeed plus with Sponsored Jobs. There are no subscriptions, no long term contracts. You only pay for results. How fast is Indeed? Oh, in the minute or so that I've been Talking to you, 23 hires were made on Indeed according to Indeed Data Worldwide. There's no need to wait any longer. Speed up your hiring right now with Indeed and listeners to this show will get a $75 sponsored job credit. To get your jobs more visibility at indeed.com cyberwire just go to indee indeed.com cyberwire right now and support our show by saying you heard about Indeed on this podcast. Indeed.com cyberwire terms and conditions apply. Hiring Indeed is all you need.
Maria Varmazes (2:01)
F5 discloses long term Breach tied to Nation State Actors Power School Hacker Receives a four year Prison sentence Senator Scrutinizes Cisco Critical Firewall Vulnerabilities Phishing Campaign Impersonates Lastpass and Bitwarden Credential Phishing with Google Careers Reduce Effort Reuse Past breaches Recycle into new breach Killen Announces New Victims Manoj Nair from Snyk joins us to explore the future of AI security and the emerging risks shaping this rapidly evolving landscape. And AI faces the facts. Today is October 16, 2025. I'm Maria Varmazes, host of T Minus Space Daily in for Dave Fitner and this is your Cyberwire Intel Brief. Happy Thursday everyone. Thank you for joining me today. Let's get started. Seattle based cybersecurity firm F5 disclosed yesterday that state sponsored hackers had long term persistent access to its networks, leading to the theft of source code and customer information. The company says that hackers had access to the development environment for its Big IP product suite and its engineering knowledge management platform. In an SEC filing, the company said through this access, certain files were exfiltrated, some of which contained certain portions of the company's Big IP source code and information about undisclosed vulnerabilities that it was working on in Big ip. We are not aware of any undisclosed critical or remote code vulnerabilities and we are not aware of active exploitation of any undisclosed F5 vulnerabilities. We have no evidence of modification to our software supply chain, including our source code and our build and release pipelines. Bloomberg cites people familiar with the matter as saying that the hack is believed to be linked to China and that the hackers were inside F5 networks for at least 12 months. Ars Technica notes that F5's big IP line is used across the US government and by most of the largest companies in the world. The U.S. cybersecurity and Infrastructure Security Agency, or CISA, issued an emergency directive ordering federal civilian agencies to immediately inventory F5 devices and apply the latest updates by October 22nd. The agency stated the threat actor's access to F5's proprietary source code could provide that threat actor with a technical Advantage to exploit F5 devices and software. The threat actor's access could enable the ability to conduct static and dynamic analysis for identification of logical flaws and zero day vulnerabilities, as well as the ability to develop targeted exploits. 19 year old Matthew Lane of Massachusetts has been sentenced to four years in prison after pleading guilty to hacking education software provider Power School. It was, in the local vernacular, a wicked bad idea. Lane stole information belonging to more than 70 million individuals and demanded a ransom of $2.9 million in exchange for not publishing the data. In addition to his prison sentence, Lane has been ordered to pay $14 million in restitution and a $25,000 fine. U.S. senator Bill Cassidy has formally pressed Cisco for answers over two critical firewall vulnerabilities that allegedly allowed hackers to breach at least one federal agency. The senator's letter demands clarity on Cisco's timeline, knowledge of exploitation, customer guidance and internal communication protocols. The request follows a CISO directive instructing agencies to patch audit logs and retire unsupported devices within 24 hours. Citing unacceptable risk from Cisco's ASA and FTD platforms, Cisco has admitted the flaws were exploited as early as May and linked to the Arcane Door espionage campaign. Leaping Computer reports that a phishing campaign is impersonating LastPass and Bitwarden with phony breach notifications. The emails claim that the companies have been hacked, instruct users to install a more secure version of the Password Managers and that file will download the Synchro remote monitoring and management tool, which the attackers then use to install Screen Connect software Now Screen Connect is a legitimate remote management tool, but is frequently abused by attackers to take control of victims computers. LastPass issued a statement on the phishing campaign noting quote, to be clear, LastPass has not been hacked. This is an attempt on the part of a malicious actor to draw attention and generate urgency in the mind of the recipient, a common tactic for social engineering and phishing emails. Sublime Security shares a new wave of credential phishing scams impersonating Google Careers pages to target job seekers employing near limitless variations to bypass defenses. Legitimate sounding domain names like Google Careers, Site house fake login forms that harvest credentials. Attackers then tweak page Design, copy and URLs constantly, meaning each campaign looks slightly different and evades static detection rules. Very clever. The scammers also exploit password reset flows, job alerts and recruitment messages to lure victims. Sublime Security warns that these campaigns are effectively infinite in variation, making them harder to hunt and block using traditional signatures or rules. The Post recommends defenses such as domain monitoring, anomaly detection, user awareness and strong multi factor authentication. An Elasticsearch cluster exposed nearly 6 billion records, apparently accumulated from multiple past breaches and data scraping operations. The repository contains sensitive user data like emails, names, phone numbers and IPs spanning across over 40 million unique individuals. The leak is believed to aggregate information from many known incidents rather than originate in a single new breach. The database was publicly accessible for weeks, enabling anyone to query it until it was taken offline. Even though the data itself isn't newly stolen, its centralization magnifies risk, making it a rich target for opportunistic cybercrime ransomware group Killin has publicly listed new victims after recent attacks, expanding its victim swap in the ransomware underworld. Reported targets include organizations in France, Italy and the United States across sectors like healthcare, finance and manufacturing. Now Killin is known for double extortion, encrypting data and threatening to release sensitive information unless it is paid. In most recent cases, the group claimed to have stolen proprietary documents, employee records and customer data and demanded multimillion dollar ransoms. Analysts warn that Killen's pressure tactics are intensifying with shorter deadlines and more aggressive leak strategies. Organizations are urged to verify their backups, strengthen segmentation and monitor for signs of reconnaissance. Coming up after the break, Manoj Nair, chief innovation officer at Snyk, joins us to explore the future of AI security and the emerging risks shaping this rapidly evolving landscape. And AI faces the facts. Stick around.
