Cybersecurity Brief

Cloud Identity Fix, VM Escape Research, and Airport Ransomware

Coverage: 22 Sept 2025 (UTC)

Patch and prevention led the day. A critical flaw in Microsoft’s identity platform was fixed after researchers showed how crafted tokens could impersonate admins across tenants, as covered by The Hacker News. Meanwhile, Europe’s weekend airport disruptions traced to a ransomware hit on a shared ground‑handling system, underscoring supply‑chain risk across tightly coupled operations, according to BleepingComputer.

Platform and developer controls advance

Researchers detailed how legacy interfaces and token flows can unravel tenant boundaries in cloud identity. Entra ID was affected by a CVSS 10.0 issue involving actor tokens and the deprecated Azure AD Graph API, enabling cross‑tenant user impersonation and potential bypass of MFA and Conditional Access. Microsoft reports the bug was addressed in July with no customer action required, but organizations still using retired APIs face gaps in logging and tenant validation, per The Hacker News. The takeaway: inventory and retire legacy dependencies, review token usage, and tighten forensic visibility around identity calls.

Cloudflare introduced Cap’n Web, a lightweight RPC system for JavaScript runtimes that applies an object‑capability model, supports bidirectional calls, and pipelines promises to reduce round trips. The TypeScript library uses JSON with light encoding and pluggable transports (HTTP, WebSocket, postMessage), aiming to flatten request waterfalls without schema-heavy machinery, according to Cloudflare. By returning unforgeable capabilities rather than granting broad API access, the model can align with least‑privilege patterns in web apps.

Operational privacy and AI governance also saw updates. AWS expanded Contact Lens redaction to seven more languages, removing PII and sensitive data from transcripts and audio while preserving analytics context via placeholders. And CrowdStrike outlined how Falcon Cloud Security detects AI components in CI/CD, correlates build‑time findings with runtime inventory across major cloud AI services, and helps curb shadow AI by tying models and images to deployed workloads.

Advisories and exploitable techniques

ETH Zurich researchers disclosed VMScape, a practical Spectre v2 (branch target injection) exploit that leaks host memory from a default guest VM. Tests on AMD Zen 4 showed steady reads (~32 B/s), bypassing several defenses and affecting Zen 1–5, while newer Intel mitigations largely block this variant. The issue, tracked as CVE‑2025‑40300, already has a Linux kernel patch; enabling SEV/SEV‑SNP or TDX further reduces risk, per Kaspersky. For cloud operators, prompt patching and revisiting isolation assumptions around speculative execution remain prudent.

Separately, a proof‑of‑concept dubbed EDR‑Freeze shows how Windows Error Reporting can be abused from user mode to suspend antivirus and EDR processes. By racing WerFaultSecure’s minidump flow and pausing it mid‑operation, an attacker can leave a target process “frozen” without a driver. Detection should focus on anomalous WER activity targeting sensitive PIDs and correlations with Defender components, as reported by BleepingComputer.

CISA issued guidance after SonicWall identified unauthorized access to a subset of customer preference files in its MySonicWall cloud backups. While embedded credentials were encrypted, exposed metadata could enable device targeting. Customers should verify whether devices are flagged, rotate credentials, apply firmware updates, and follow the vendor’s containment steps, according to CISA. Heightened monitoring for downstream compromise is advised.

Supply-chain outages and breaches

A ransomware attack against external systems provider Collins Aerospace disrupted check‑in and boarding across multiple European airports by impacting the multi‑airline MUSE platform. Heathrow, Brussels, and Berlin were among the worst affected, with manual processing and delays extending into Monday as authorities and operators coordinated recovery, per BleepingComputer. Shared operational systems magnify the blast radius when compromised.

Stellantis confirmed data theft from a third‑party customer service platform, with contact information accessed; claims by an extortion group tie the incident to broader attacks on Salesforce customers leveraging techniques such as voice phishing and OAuth token abuse. The company is notifying affected customers and advising vigilance against phishing, according to BleepingComputer.

The American Archive of Public Broadcasting fixed an IDOR flaw that allowed restricted media downloads by manipulating request parameters. The vulnerability appears to have been exploited for years; the organization deployed a fix within 48 hours of notification and is assessing scope, per BleepingComputer. Robust server‑side authorization checks remain essential for media archives.

On the consumer front, a verified Steam game, Block Blasters, shipped a cryptodrainer that stole cryptocurrency from players and a fundraiser streamer. Investigators detailed droppers, a Python backdoor, and StealC usage, with estimated theft in the six‑figure range. Users are urged to reset passwords and migrate assets to new wallets, according to BleepingComputer.

Targeted campaigns and SEO poisoning

Check Point reports the Iranian‑linked Nimbus Manticore is expanding into Europe’s defense, telecom, and aerospace sectors with fake job lures. Custom tools such as MiniJunk and MiniBrowse support reconnaissance, exfiltration, and long‑term persistence, with recruitment‑themed spear‑phishing aimed at high‑value targets. Recommended defenses include rigorous verification of unsolicited hiring contacts, hardened email gateways, and EDR‑backed investigation, per Check Point.

Unit 42 identified Operation Rewrite, a wide SEO poisoning effort using BadIIS implants that hook IIS pipeline handlers to serve crawler‑optimized pages while redirecting real users to scams and payloads. Variants span native IIS modules, .NET handlers with 404 hijacking, and a PHP front controller, broadening reach across hosting stacks. Indicators and detection guidance are provided by Unit 42.

F6 tracks “ComicForm,” a phishing cluster hitting organizations in Belarus, Kazakhstan, and Russia with archive‑based loaders that drop the FormBook stealer, while NSHC describes “SectorJ149” targeting South Korean manufacturing and energy via script‑based delivery chains leading to Lumma, FormBook, and Remcos. Controls should include stricter attachment policies, scrutiny of scheduled tasks and Defender exclusions, and monitoring for suspicious credential exfiltration over HTTP POST, as documented by The Hacker News.

These and other news items from the day:

Mon, September 22, 2025

Microsoft Fixes Entra ID Token Flaw Allowing Impersonation

🔒 Microsoft has patched a critical token validation failure in Entra ID (formerly Azure AD), tracked as CVE-2025-55241 and assigned a CVSS score of 10.0. The flaw combined misused service-to-service (S2S) actor tokens issued by the Access Control Service (ACS) with a validation gap in the legacy Azure AD Graph API that enabled cross-tenant impersonation, including Global Administrators. Microsoft released a fix on July 17, 2025 and said no customer action is required; there is no indication the issue was exploited in the wild. Security firms warned the vulnerability could bypass MFA, Conditional Access and logging, potentially enabling full tenant compromise.

read more →

Mon, September 22, 2025

Cap'n Web: Lightweight TypeScript RPC for Web Applications

🔧 Cap'n Web is a compact, open-source RPC protocol and TypeScript implementation designed for the modern web stack. It provides an object-capability model with bidirectional calls, function and object references, and promise pipelining while using human-readable JSON for transport. The library runs in browsers, Node.js, and Cloudflare Workers, ships as a sub-10KB minified bundle, and integrates with TypeScript tooling. It's experimental but already used inside Cloudflare and released under the MIT license.

read more →

Mon, September 22, 2025

Ransomware Attack Disrupts Check-in at Major EU Airports

🛫 Over the weekend several major European airports experienced check-in and boarding disruptions after a ransomware attack on the external vendor Collins Aerospace. Attackers targeted the MUSE multi-airline check-in system, forcing manual processing of thousands of passengers and causing delays and cancellations to more than 100 flights. Airports affected included Heathrow, Brussels and Berlin Brandenburg, with only minor impact reported in Cork and Dublin. Authorities and the vendor are investigating while restoration efforts continue.

read more →

Mon, September 22, 2025

Nimbus Manticore Expands into Europe Targeting Defense

🛡️ Check Point Research reports that Iranian-linked threat actor Nimbus Manticore is expanding operations into Europe, focusing on the defense, telecom and aerospace sectors. The group uses fake job portals and targeted spear‑phishing to deliver malicious files disguised as hiring materials while impersonating prominent aerospace firms. Evolving toolsets such as MiniJunk and MiniBrowse enable stealthy data theft and persistent access, consistent with intelligence-collection objectives linked to IRGC priorities.

read more →

Mon, September 22, 2025

Third-day airport chaos after supplier cyber-attack

✈️ A suspected cyber-attack on a third-party supplier's check-in platform caused widespread flight cancellations and delays at several European airports, including Heathrow, Brussels, Berlin and Dublin. RTX's Muse software, used for check-in, boarding-pass validation and baggage tagging, was reported as the target, forcing some airlines to revert to pen-and-paper processes. Airports posted notices saying recovery work is ongoing and urging passengers to confirm flight status and use online check-in where possible.

read more →

Mon, September 22, 2025

Stellantis: Customer Contact Data Stolen in Salesforce Hack

🔒 Stellantis confirmed unauthorized access to a third-party platform supporting its North American customer service operations, and said attackers stole customer contact information. The company stated the compromised system did not contain financial or other sensitive personal data and that it activated incident response procedures and notified authorities. Reports link the incident to a broader wave of Salesforce-related intrusions claimed by ShinyHunters, and customers are being urged to watch for phishing attempts.

read more →

Mon, September 22, 2025

VMScape: Practical Spectre v2 Sandbox Escape in VMs

⚠️ Researchers at ETH Zurich published a paper demonstrating VMScape, a practical Spectre v2 (branch target injection) attack that escapes a guest VM to read host memory in virtualized environments. The team showed AMD Zen1–Zen5 CPUs and older Intel Coffee Lake servers can be abused to exfiltrate secrets from a default-configured VM. The issue was assigned CVE-2025-40300 and a Linux kernel patch is available; hardware protections such as SEV/SEV-SNP and TDX are recommended mitigations.

read more →

Mon, September 22, 2025

European airports disrupted after Collins MUSE cyberattack

✈️ Collins Aerospace's MUSE check-in platform suffered a cyber-related outage late Friday, forcing airlines and major European airports to revert to manual processes including handwritten tickets, paper boarding passes, laptops and iPads. Brussels was hardest hit with dozens of cancellations; Heathrow and Brandenburg reported delays while operators isolated affected systems. Collins says the disruption is limited to electronic check-in and baggage drop and that manual operations are in place while it works to restore a secure version. Passengers were urged to check flight status and arrive earlier than usual.

read more →

Mon, September 22, 2025

Weekly Recap: Chrome 0-day, AI Threats, and Supply Chain Risk

🔒 This week's recap highlights rapid attacker innovation and urgent remediation: Google patched an actively exploited Chrome zero-day (CVE-2025-10585), while researchers demonstrated a DDR5 RowHammer variant that undermines TRR protections. Dual-use AI tooling and model namespace reuse risks surfaced alongside widespread supply-chain and phishing disruptions. Defenders should prioritize patching, harden model dependencies, and monitor for stealthy loaders.

read more →

Mon, September 22, 2025

Verified Steam Game Drains Streamer's Crypto Donations

🔴 A gamer seeking funds for stage 4 sarcoma lost roughly $32,000 after downloading a verified Steam title, Block Blasters, which had a cryptodrainer component added on August 30. The free-to-play game, published by Genesis Interactive and available on Steam from July 30 to September 21, had positive reviews before turning malicious during a live fundraiser by streamer RastalandTV. Investigators identified batch droppers, a Python backdoor and a StealC payload; victims are advised to reset Steam passwords and move digital assets to new wallets.

read more →

Mon, September 22, 2025

Operation Rewrite: BadIIS SEO Poisoning Campaign in Asia

🔍 Unit 42 uncovered Operation Rewrite, a March 2025 SEO poisoning campaign that deploys a native IIS implant called BadIIS to manipulate search engine indexing and redirect users to attacker-controlled scam sites. The implant registers request handlers, inspects User‑Agent and Referer headers, and proxies malicious content from remote C2 servers. Variants include lightweight ASP.NET page handlers, a managed .NET IIS module, and an all-in-one PHP front controller. Organizations can detect and block activity with Palo Alto Networks protections and should engage incident responders if compromised.

read more →

Mon, September 22, 2025

Experts Urge Updated Defenses Against Scattered Spider

🔐 Organizations should urgently update defenses to counter the Scattered Spider collective, experts warned at the Gartner Security & Risk Management Summit 2025. The group used social engineering, helpdesk vishing, and push notification fatigue to bypass MFA and abuse SSO, compromising accounts like Okta and stealing tokens from LastPass. Firms are advised to implement stronger identity protections, number-matching MFA, stricter password-reset procedures, and tighter third-party vendor monitoring to reduce exposure.

read more →

Mon, September 22, 2025

ComicForm and SectorJ149 Deploy FormBook via Phishing

🔒 Security researchers at F6 disclosed a phishing campaign by a previously undocumented group dubbed ComicForm that has been active since at least April 2025, targeting organizations in Belarus, Kazakhstan, and Russia. The attackers use RR archives containing Windows executables masquerading as PDFs to deploy an obfuscated .NET loader and a chain of DLLs culminating in the FormBook stealer. The malware creates scheduled tasks and adds Microsoft Defender exclusions, while some phishing sites mimic domestic document services and capture credentials by posting them to attacker-controlled domains.

read more →

Mon, September 22, 2025

SonicWall Advisory After MySonicWall Cloud Backup Incident

🔐 SonicWall released an advisory after identifying unauthorized access to a subset of customer cloud backup preference files stored via the MySonicWall portal. SonicWall’s investigation indicates a threat actor used brute force methods against MySonicWall.com to retrieve preference files that, while containing encrypted credentials, included other device-specific data that could enable access to SonicWall firewall devices. CISA urges customers to log into their accounts to verify exposures and to follow the advisory’s containment and remediation steps immediately.

read more →

Mon, September 22, 2025

Cyberattack Disrupts Passenger Processing at Major Airports

🛫 According to Tagesschau, IT service provider Collins Aerospace was hit by a cyberattack on the evening of 19 September, disrupting passenger processing at Berlin (BER), Brussels, Dublin and London Heathrow. Security experts said the incident targeted the multi-tenant environment of the ARINC system that supports check-in, boarding and baggage handling. Affected airports reported partial delays and cancellations while Collins worked to restore services.

read more →

Mon, September 22, 2025

Oversized SVG Files Deliver AsyncRAT Across Latin America

🛡️ A recent campaign in Latin America leverages oversized SVG image attachments to deliver AsyncRAT by embedding the entire malicious payload inside the XML. Victims receive convincing, urgent emails impersonating judicial services, and interacting with the >10MB SVG loads a fake portal that triggers a password-protected ZIP download containing an executable and a DLL-sideloaded payload. ESET telemetry highlights a spike in activity, notably affecting Colombia, while attackers appear to use AI to generate unique, randomized SVGs to evade detection.

read more →

Mon, September 22, 2025

AAPB Fixes IDOR Bug That Exposed Restricted Media Files

🔒 A vulnerability in the American Archive of Public Broadcasting allowed protected and private media to be downloaded for years by abusing an IDOR flaw. A simple Tampermonkey script could alter media ID parameters in background fetch/XHR calls and bypass access controls, returning content instead of a '403 Forbidden'. The issue was reported to AAPB, confirmed by a spokesperson, and patched within 48 hours, but the full scope of prior access remains unknown.

read more →

Mon, September 22, 2025

EDR-Freeze: WER-based Tool Suspends Windows Security

🔒 A new proof-of-concept named EDR-Freeze shows that Windows Error Reporting can be abused from user mode to suspend antivirus and EDR processes. The method leverages WerFaultSecure and the MiniDumpWriteDump API so the dumper pauses a target process and then the dumper itself is frozen, leaving the security agent inoperative without a kernel driver. Researcher TwoSevenOneThree validated the technique on Windows 11 24H2, describing it as a design weakness rather than a classic vulnerability, and defenders can monitor WER invocations or harden reporting components to mitigate the risk.

read more →

Mon, September 22, 2025

Protect AI Development Using Falcon Cloud Security

🔒 Falcon Cloud Security provides end-to-end protection for AI development pipelines by embedding AI detection into CI/CD workflows, scanning container images, and surfacing AI-related packages and CVEs in real time. It extends visibility to cloud model services — including AWS SageMaker and Bedrock, Azure AI, and Google Vertex AI — revealing model provenance, dependencies, and API usage. Runtime inventory ties build-time detections to live containers so teams can prioritize fixes, govern models, and maintain delivery velocity without compromising security.

read more →

Mon, September 22, 2025

Amazon Connect Contact Lens Adds Redaction in 7 Languages

🔒 Amazon Connect Contact Lens now provides automatic sensitive data redaction for voice and chat conversational analytics in French (France, Canada), Portuguese (Portugal, Brazil), Italian, German, and Spanish (Spain). You can remove PII, financial account numbers and PINs, and Internet access details from transcripts and audio files, choosing to redact selected entities or all detected sensitive data. Redacted values can be replaced with a generic placeholder (e.g., [PII]) or an entity-specific placeholder (e.g., [NAME]). Sensitive data redaction is available in all AWS Regions where Amazon Connect is offered.

read more →

Mon, September 22, 2025

Cloudflare Offers Startup Credits to Nonprofits Globally

🚀 Cloudflare has opened its Startup program to registered non-profit, civil society, and public interest organizations, offering up to $250,000 in credits to support developer and core services. Eligible groups can use credits for databases & storage, compute, AI, media, and performance and security tools. Applications are open now through December 1, 2025; awards will be made based on project description, technical needs, and expected impact. Applicants must be a registered 501(c)(3) or equivalent and describe the tool they plan to build or scale.

read more →

Mon, September 22, 2025

Fake macOS apps on GitHub spread Atomic (AMOS) malware

⚠️ LastPass warns of a macOS campaign that uses fraudulent GitHub repositories to impersonate popular apps and trick users into running Terminal commands. The fake installers deliver the Atomic (AMOS) info‑stealer via a ClickFix workflow: a curl command decodes a base64 URL and downloads an install.sh payload to /tmp. Attackers rely on SEO and many disposable accounts to evade takedowns and boost search rankings. Users should only install macOS software from official vendor sites and avoid pasting unknown commands into Terminal.

read more →

Mon, September 22, 2025

AI-powered phishing uses fake CAPTCHA pages to evade

🤖 AI-driven phishing campaigns are increasingly using convincing fake CAPTCHA pages to bypass security filters and trick users into revealing credentials. Trend Micro found these AI-generated pages hosted on developer platforms such as Lovable, Netlify, and Vercel, with activity observed since January and a renewed spike in August. Attackers exploit low-friction hosting, platform credibility, and AI coding assistants to rapidly clone brand-like pages that first present a CAPTCHA, then redirect victims to credential-harvesting forms. Organizations should combine behavioural detection, hosting-provider safeguards, and phishing-resistant authentication to reduce risk.

read more →

Mon, September 22, 2025

Leaked Documents Reveal Business of Chinese Surveillance

🔍 Leaked documents reveal how Chinese companies build and sell censorship, surveillance, and propaganda systems, showing that firms such as Geedge work with universities, tailor offerings to different government clients, and even reuse competitors’ infrastructure. The account draws clear parallels with Western vendors that began as academic projects and commercialized via government contracts. These disclosures complicate the image of a purely top-down Great Firewall, highlighting corporate incentives and market dynamics behind tools of control.

read more →

Mon, September 22, 2025

Mozilla lets Firefox add-on developers roll back updates

🔁 Mozilla now allows Firefox extension developers to roll back recently approved versions to a previously approved release, enabling fast mitigation of critical bugs and regressions. When reverted, users cannot install the problematic version, and browsers with automatic updates will revert affected installations within 24 hours. Developers can republish a prior build via the Developer Hub or the Add-on Submission API. Rollbacks require at least two approved versions on addons.mozilla.org, while self-distributed extensions may revert to any approved version.

read more →

Mon, September 22, 2025

Microsoft Removes Windows 11 24H2 Safeguard Hold After Fix

🔧 Microsoft removed a compatibility hold that prevented devices with integrated cameras from installing Windows 11, version 24H2 after fixing a face/object detection bug that could cause the Camera app, Windows Hello facial sign-in, and other camera-using apps to freeze. The safeguard (ID 53340062) has been lifted; eligible devices with no other holds should be offered the update via Windows Update within 48 hours, and restarting may speed the offer. Microsoft recommends installing the latest security update, which includes the fix.

read more →

Mon, September 22, 2025

Amazon Connect Flow Designer: New Analytics Mode Now

📊 Amazon Connect's Flow Designer now includes an analytics mode that surfaces aggregate metrics across drag-and-drop flows to help teams build and optimize customer journeys. You can visualize step-level behavior, including where users abandon, encounter errors, or are transferred to agent queues, enabling targeted troubleshooting and configuration fixes. This capability is included with Amazon Connect (with unlimited AI) pricing and is available in all AWS regions.

read more →

Mon, September 22, 2025

DORA AI Capabilities Model: Seven Levers of Success

🔍 The DORA research team introduces the inaugural DORA AI Capabilities Model, identifying seven technical and cultural capabilities that amplify the benefits of AI-assisted software development. Based on interviews, literature review, and a near-5,000‑respondent survey, the model highlights priorities such as clear AI policies, healthy and AI-accessible internal data, strong version control, small-batch work, user-centricity, and quality internal platforms. The guidance focuses on practices that move organizations beyond tool adoption to measurable performance improvements.

read more →

Mon, September 22, 2025

Cloudflare launches office hubs for startups in 2026

🚀 Cloudflare will open select office locations as free coworking hubs for early-stage companies beginning January 2026. The pilot will allow a capped number of external visitors on select days in San Francisco, Austin, London, and Lisbon, with registration coordinated through the Cloudflare for Startups program. Visitors will have access to common spaces at no cost, with simple ground rules and cohort-based scheduling—no mandatory talks or obligations.

read more →

Mon, September 22, 2025

Cloudflare Launches Free Developer Tools for Students

🚀 Cloudflare is offering 12 months of its paid Developer features free to eligible US students with a verified .edu billing email. The program expands usage allotments for Workers, Pages Functions, KV, Durable Objects, Hyperdrive, Workers Logpush, and Queues so students can build APIs, full‑stack apps, and data pipelines without immediate cost. Eligible accounts also gain access to a dedicated student Discord community and clear redemption steps for new and existing .edu accounts.

read more →

Mon, September 22, 2025

Regaining Control of AI Agents and Non-Human Identities

🔐 Enterprises are struggling to secure thousands of non-human identities—service accounts, API tokens, and increasingly autonomous AI agents—that proliferate across cloud and CI/CD environments without clear ownership. These NHIs often use long-lived credentials, lack contextual signals for adaptive controls, and become over-permissioned or orphaned, creating major lateral-movement and compliance risks. The article recommends an identity security fabric—including discovery, risk-based privilege management, automated lifecycle policies, and integrations such as Okta with AWS—to regain visibility and enforce least-privilege at scale.

read more →

Mon, September 22, 2025

Automating Security Hub Exceptions with Business Context

🔒 This post describes an automated approach to validate and document exceptions to AWS Security Hub findings, enabling security teams to enforce governance while developers request and implement compensating controls. The solution leverages EventBridge, SQS, Lambda, and DynamoDB to validate controls, collect evidence, and maintain an immutable audit trail. It preserves segregation of duties, supports multiple validation types, and includes deployment scripts and CloudFormation templates. The authors emphasize the reference architecture is a starting point and must be reviewed and adapted before production use.

read more →

Mon, September 22, 2025

Former Meta Lobbyist Named to Ireland's DPC, Concerns

⚖️ The Irish government has appointed Niamh Sweeney as a member of the Data Protection Commission, the authority that leads EU oversight of major technology companies. The appointment has drawn strong criticism from privacy organization Noyb, which highlights Sweeney’s previous role as a lobbyist for Meta. Critics, including Max Schrems, argue this raises questions about impartiality and potential regulatory capture. As recently as December, the DPC fined Meta €251 million for breaches of GDPR, a fact cited by opponents of the appointment.

read more →

Mon, September 22, 2025

Security Implications of Quantum Computing for CISOs

🔐 Quantum computing poses a long-term threat to public-key cryptography, with the potential to break RSA, ECC and Diffie-Hellman once scalable quantum machines exist. Although practical attacks on RSA-2048 are commonly estimated to be eight to fifteen years away, organizations with long-lived confidential data must act now. CISOs should begin a crypto-agility assessment, engage vendors about post-quantum cryptography, and brief leadership and boards to build a migration roadmap.

read more →

Mon, September 22, 2025

Major EDR Vendors Withdraw from MITRE ATT&CK Tests

🔍Three major cybersecurity vendors — Microsoft, SentinelOne and Palo Alto Networks — have declined to participate in the 2025 MITRE Engenuity ATT&CK Evaluations: Enterprise, citing a need to prioritize product development and innovation. Their exits, after strong 2024 performances, have sparked debate over the tests' scope and whether they encourage PR-driven preparation. MITRE says it will revive a vendor forum for 2026 to improve engagement.

read more →

Mon, September 22, 2025

Agentic AI Risks and Governance: A Major CISO Challenge

⚠️ Agentic AI is proliferating inside enterprises, embedding autonomous agents into development, customer support, process automation, and employee workflows. Security experts warn these systems create substantial visibility and governance gaps: organizations often do not know where agents run, what data they access, or how independent their actions are. Key risks include risky autonomy, uncontrolled data sharing among agents, third-party integration vulnerabilities, and the potential for agents to enable or mimic multi-stage attacks. CISOs should prioritize real-time observability, strict governance, secure-by-design development, and cross-functional coordination to mitigate these threats.

read more →

Mon, September 22, 2025

Why Phishing Is Moving Beyond Email Delivery: Risks

🔗 Phishing attacks are increasingly delivered outside traditional email — via social media, instant messaging, SMS, malvertising and in‑app messengers — making mail gateways insufficient. Attackers now send links from compromised accounts, targeted ads or SaaS messages and use fast‑rotating domains and advanced Attacker‑in‑the‑Middle (AitM) kits that obfuscate JavaScript and the DOM to evade network detection. Organizations often rely on user reports and URL blocking, but these approaches fail against rapid domain churn and client‑side stealth. Vendors such as Push Security propose browser‑level detection that monitors real‑time page behavior to identify AitM, session hijacking and credential theft.

read more →

Mon, September 22, 2025

Microsoft: Updates Causing DRM Video Playback Issues

🎬 Microsoft confirmed a known issue that prevents some apps from playing DRM-protected video content or from displaying and recording live TV on Windows 11 24H2 systems after installing the August non-security preview update (KB5064081) or later. Applications using Enhanced Video Renderer with HDCP enforcement or DRM for digital audio may encounter copyright protection errors, frequent playback interruptions, freezing, or black screens. The vendor is working on a fix that will be delivered in a future Windows update.

read more →

Mon, September 22, 2025

Cloudflare Backs Ladybird Browser and Omarchy Linux

🌐 Cloudflare announced sponsorships for two independent open-source projects: Ladybird, a browser built from scratch with new LibWeb and LibJS engines, and Omarchy, an opinionated Arch Linux setup for developers. The company frames its contributions as unconditional, aimed at preserving diversity, privacy, security, and performance across client and developer tooling. Both projects are early-stage, invite community contributions, and may influence broader web platform standards and developer workflows.

read more →

Mon, September 22, 2025

Cloudflare Workers Launchpad Cohort #6 and Program Update

🚀 Cloudflare’s Workers Launchpad helps startups build and scale by providing cloud credits, technical mentorship, and direct access to product teams. Since expanding to a $2B funding commitment, the program has supported 145 startups across 23 countries, spanning AI, developer tools, and infrastructure. Cohort #6 introduces a new slate of founders and emphasizes hands-on collaboration, community, and pathways to funding and acquisition.

read more →

Mon, September 22, 2025

FBI Warns of Threat Actors Spoofing IC3 Reporting Website

⚠️ The FBI has issued a public service announcement warning that threat actors are creating spoofed versions of the IC3 cybercrime reporting site to steal personally identifiable information and facilitate fraud. The agency advises typing www.ic3.gov directly, avoiding sponsored search results and mismatched URLs, and never paying anyone claiming to be IC3 staff. Victims should report impersonation attempts to the legitimate IC3 portal and provide full details.

read more →

Mon, September 22, 2025

CSO Awards: Security Innovation and Transformative Work

🔒 CSO highlights seven award-winning security initiatives that showcase practical innovation across vulnerability management, third-party risk, multicloud security, secure coding, threat detection, and AI-driven hunting. Profiles include BMHCC’s risk-based remediation delivering a 70% risk reduction, FSU’s tighter vendor assessments, Marvell’s unified cloud vulnerability platform, and Mastercard’s developer-focused security conference. The pieces emphasize automation, AI, and cross-team collaboration as key drivers of measurable security impact.

read more →

Mon, September 22, 2025

Cloudflare Expands Intern Program to Hire 1,111 in 2026

🚀Cloudflare will hire up to 1,111 interns in 2026 across global hub offices to accelerate the creative application of AI and broaden its talent pipeline. Interns will be embedded on cross-functional teams—from engineering and product to marketing, legal, and finance—and are expected to deliver concrete, customer-facing work. Positions are paid, typically 12 weeks in length, with hybrid in-office attendance and dedicated mentors. Software engineering applicants can be fast-tracked by submitting an AI-powered project built on Cloudflare.

read more →