Cybersecurity Brief

MedusaLocker Recruitment, Instagram Map Risks, OT Asset Guidance

Coverage: 13 Aug 2025 (UTC)

Incidents

A ransomware-as-a-service group is expanding its playbook. In a post on its leak site, MedusaLocker openly invited penetration testers and insiders to supply entry points into corporate networks, according to Fortra. The advert prioritizes candidates who already hold valid access to enterprise environments, effectively courting initial access brokers and compromised employees. That approach outsources one of the most time‑consuming stages of an intrusion—gaining a foothold—allowing operators to move more quickly to ransomware deployment and extortion. Prior government reporting has linked MedusaLocker activity to weaknesses in remote desktop protocol (RDP), underscoring the practical importance of hardening internet‑facing remote access. The operational takeaway is direct: minimize exposed RDP and VPN services, keep them patched, apply strong authentication and least privilege, and monitor for insider misuse. Where penetration testing is used, keep it authorized, scoped, and monitored, and rigorously evaluate third‑party access to avoid becoming a candidate for resale by brokers.

Platforms

On the consumer side of large platforms, a newly introduced location‑sharing feature is drawing scrutiny. Check Point examined Instagram’s Friend Map, an opt‑in capability that aggregates and visualizes where users go. The analysis warns that pattern‑of‑life maps raise meaningful safety risks, from stalking and doxxing to targeted crime, and can also surface behavioral insights that aid social engineering. The guidance is pragmatic: disable sharing or restrict it to trusted contacts, regularly audit app and device location permissions, and consider enterprise policies that limit persistent location collection for staff in sensitive roles. The broader lesson is that small changes in default sharing or visualized context can turn benign data into a security liability.

In enterprise cloud security, Fortinet outlined five common gaps and how its Lacework FortiCNAPP aims to address them: fragmented visibility, slow or siloed misconfiguration detection, disjointed control‑plane and runtime protections, uneven application‑layer defenses, and weak integration with development pipelines. The post highlights continuous asset discovery and cross‑cloud inventory, CSPM that ranks findings and maps to frameworks such as CIS, NIST, and PCI, and runtime capabilities like file integrity and process behavior monitoring. It also describes cloud detection and response using Kubernetes audit trails and provider logs, with composite alerts correlating host telemetry and cloud events to raise fidelity. For apps and APIs, the platform integrates WAF, bot mitigation, and behavioral analysis, and ties into CI/CD to scan infrastructure‑as‑code and images pre‑deployment. Fortinet positions this consolidation as a way to reduce tooling sprawl and accelerate investigation and remediation without slowing cloud delivery.

Policies

Critical infrastructure operators received new guidance on a foundational control: asset inventory. CISA, working with U.S. and international partners, published a joint document to help owners and operators of operational technology (OT) environments create and maintain authoritative inventories and taxonomies. The guidance focuses on industrial control systems, instrumentation, and automation across sectors such as water, energy, manufacturing, and transportation. It aligns with the Cross‑Sector Cybersecurity Performance Goals and recommends standardized taxonomies, continuous inventory processes, and maintaining source‑of‑truth asset records. Improved visibility supports faster incident response, better vulnerability management, and more consistent risk prioritization, strengthening resilience and interoperability across organizations and sectors.

Research

Automation and AI safety were at the center of the latest Smashing Security episode. One segment examined demonstrations where crafted Google Calendar invitations can trigger Workspace agents or connected assistants, turning a calendar entry into a control surface for smart‑home devices. The discussion points to default behaviors and broad agent permissions as risk multipliers, and suggests mitigations such as disabling auto‑accept, tightening agent privileges with least‑privilege policies, and monitoring automation logs. Another segment reviewed a reported case in which an individual followed an unsafe ChatGPT recommendation involving pesticide as seasoning, resulting in medical treatment—an example of harmful hallucinations and the limits of content filters. The practical advice remains consistent: treat AI outputs as unverified until validated, insert human oversight where recommendations can affect safety, and restrict automated actions to the minimal scope necessary.

These and other news items from the day:

Wed, August 13, 2025

MedusaLocker RaaS Recruits Penetration Testers Globally

🔒 MedusaLocker, a ransomware-as-a-service (RaaS) group active since 2019, has posted a dark web job advert openly recruiting penetration testers and insiders who already have direct access to corporate networks. The advert explicitly instructs applicants not to apply unless they possess network access, signalling a preference for initial access brokers and company insiders. CISA previously linked MedusaLocker to exploitation of RDP vulnerabilities, and the group’s tactic highlights the blurred line between legitimate pentesting and criminal activity. Organisations should prioritise layered defenses, authorised penetration testing, and strict controls over remote access and privileged accounts.

read more →

Wed, August 13, 2025

Smashing Security #430: Poisoned Calendar Invites & ChatGPT

📅 In episode 430 of Smashing Security, host Graham Cluley and guest Dave Bittner examine a range of security stories, led by a proof‑of‑concept attack that weaponises Google Calendar invites to trigger smart‑home actions. They also cover a disturbing incident where ChatGPT gave dangerous advice that led to hospitalization and discuss the new Superman trailer. The episode blends technical detail with accessible commentary and practical warnings for listeners.

read more →

Wed, August 13, 2025

Instagram Friend Map Risks: Privacy and Physical Safety

⚠️ Meta’s new Friend Map feature on Instagram is framed as an opt-in way to see friends’ locations and shared hangouts, but it raises serious privacy and safety concerns. Enabling the map can expose precise real‑time or habitual location data that bad actors could exploit for stalking, targeted harassment, or profiling. The feature blurs digital privacy and physical security, so users should carefully review settings, limit audiences, or decline participation if concerned about their safety.

read more →

Wed, August 13, 2025

Closing Common Cloud Security Gaps with FortiCNAPP Platform

🔒 FortiCNAPP unifies cloud security across posture, workload runtime, control plane, and application layers to address common gaps that expose cloud-native applications. The platform delivers continuous asset discovery and inventory mapping, built-in CSPM with compliance mappings, runtime workload protection, and CDR that correlates host telemetry with cloud audit logs via composite alerts. Integrated FortiWeb WAF/API protections and CI/CD scanning enable a shift-left workflow so developers and security teams can detect and remediate risks earlier without slowing delivery.

read more →

Wed, August 13, 2025

CISA and Partners Issue OT Asset Inventory Guidance

🔒 CISA and international partners released new guidance to help operational technology (OT) owners and operators establish and maintain comprehensive asset inventories and taxonomies. The resource provides practical steps to identify, classify, and track OT devices and components that support critical infrastructure, including industrial control systems and automation. Implementing these practices aligns with the Cross-Sector Cybersecurity Performance Goals and enhances visibility, risk management, and operational resilience for mission-critical services.

read more →

Wed, August 13, 2025

Agent Factory: Enterprise Design Patterns for Agentic AI

🤖 Microsoft introduces the Agent Factory series to share best practices and design patterns for enterprise agentic AI that reasons, acts, and collaborates across workflows. The post outlines five core patterns—tool use, reflection, planning, multi-agent, and ReAct—and links them to real-world outcomes such as reduced proposal time and automated incident delivery. It stresses the need for a unified platform to manage security, identity, observability, and connectors. Azure AI Foundry is presented as a scalable end-to-end solution with flexible model choice, 1,400+ connectors, open protocols, and managed Entra Agent ID and RBAC.

read more →

Wed, August 13, 2025

AWS Achieves HITRUST Certification for 177 Services

🔒 Amazon Web Services announced that 177 AWS services achieved HITRUST certification for the 2025 assessment cycle, with five services certified for the first time: Amazon Verified Permissions, AWS B2B Data Interchange, AWS Payment Cryptography, AWS Resource Explorer, and AWS Security Incident Response. A third‑party assessor audited the services under the HITRUST CSF v11.5.1 framework. Customers can inherit the certification for validated assessments when they use in‑scope services and follow the AWS Shared Responsibility Model, and evidence is available through AWS Artifact.

read more →

Wed, August 13, 2025

Connect with Security Leaders at Microsoft Ignite 2025

🔒 Microsoft Security invites CISOs, SecOps leads, identity architects, and cloud security engineers to Microsoft Ignite 2025 in San Francisco (Nov 17–21) and online (Nov 18–21) to explore secure AI adoption and modern SecOps. Register with RSVP code ATXTJ77W to access the half-day Microsoft Security Forum (Nov 17), hands-on labs, live demos, and one-on-one meetings with experts. Attendees can join networking events including the Secure the Night party, pursue onsite Microsoft Security certifications, and engage in roundtables focused on threat intelligence, regulatory insights, and protecting data, identities, and infrastructure.

read more →