Cybersecurity Brief

CISA ICS Alerts, Microsoft Hardening, and a Major F5 Breach

Coverage: 23 Oct 2025 (UTC)

Preventive moves and urgent advisories dominated the day. CISA disclosed critical flaws across widely used industrial automation products, while Microsoft shipped changes to curb credential theft in Windows and outlined a broadened approach to identity defense. In parallel, details shared by Schneier described a serious breach at F5 that reached its build environment and source code, heightening supply‑chain risk for BIG‑IP users.

Platform defenses tighten

A Windows security change reported by BleepingComputer disables File Explorer’s preview pane for files from the Internet Zone or marked with the Mark of the Web, closing a path where selecting a malicious download could leak NTLM hashes with no extra user action. In a separate post, Microsoft detailed expanded Identity Threat Detection and Response, unifying signals across on‑prem and multiple cloud identity providers and shifting to an identity‑centric model that correlates accounts, devices, and sessions for faster investigations. Together, the changes reduce exposure to credential theft and strengthen visibility across hybrid environments.

Securing AI agents in production also featured prominently. Google Cloud outlined a layered defense for agent workflows—from pre‑inference input filtering with Model Armor and least‑privilege execution in sandboxes to network isolation and detailed observability—demonstrating how controls block prompt injection, exfiltration, and context poisoning without breaking intended functionality. The guidance emphasizes auditable logs and governance as agent use scales.

Industrial controls: critical flaws and mitigations

Beyond the headline advisory on AutomationDirect’s Productivity Suite and PLC firmware, which includes issues up to CVSS 10.0 and CVSS v4 9.3 with risks from arbitrary code execution to full project control, operators face additional exposures in energy and tank‑gauge systems. In a separate notice, CISA warned that ASKI Energy ALS‑Mini‑S4/S8 controllers have a CVSS 10.0 unauthenticated access flaw (CVE‑2025‑9574). The devices are end‑of‑life with no planned patch, placing the burden on network isolation, strict access controls, and monitoring.

The latest CISA bulletin on Veeder‑Root’s TLS4B Automatic Tank Gauge details an authenticated SOAP command injection (CVE‑2025‑58428) fixed in Version 11.A and an upcoming patch for a time‑handling integer overflow (CVE‑2025‑55067) that could lock out admin access and disrupt logging at the 2038 epoch rollover. For critical manufacturing and energy deployments, prompt upgrades where available and disciplined segmentation remain the primary risk‑reduction steps. Why it matters: the combination of remote exploitation paths and operational impact spans safety, availability, and regulatory obligations across globally deployed ICS estates.

Cloud moves to streamline secure connectivity and migration

Google Cloud made Cross‑Site Interconnect generally available, delivering managed Layer‑2 adjacencies over its backbone with a 99.95% SLA, MACsec support, and consumption‑based bandwidth to simplify resilient, high‑throughput links between data centers, colocation, and regions. Azure likewise announced GA for cloud‑to‑cloud migration from AWS S3 to Azure Blob via Storage Mover, enabling parallel, agentless transfers with metadata preservation, incremental syncs, RBAC integration, and full telemetry. These services shift complexity from bespoke circuits and scripts to managed offerings with clearer controls, aiding governance and accelerating data‑driven projects.

Active exploitation and evolving threats

Threat actors are actively exploiting a critical RCE in Motex’s Lanscope Endpoint Manager clients (CVE‑2025‑61932), with fixes available across multiple client releases; the issue has been added to the KEV catalog and requires prompt client updates, per coverage by BleepingComputer. Meanwhile, Check Point reports LockBit’s resurgence with new 5.0 activity across Windows, Linux, and ESXi environments and roughly a dozen recent victims, underscoring the need for layered endpoint controls, segmentation, and rehearsed response.

Beyond single campaigns, Unit 42 mapped a decentralized smishing operation attributed to the Smishing Triad, cataloging more than 194,000 FQDNs since early 2024 with rapid domain churn and brand‑mimicking lures aimed at credentials and payment data. Talos incident response trends for Q3 highlight a surge in exploitation of public‑facing apps—particularly unauthenticated SharePoint flaws—frequent ToolShell activity, and ransomware follow‑ons when segmentation is weak. Why it matters: defenders face compressed timelines between disclosure and mass exploitation, making rapid patching and strong network boundaries decisive.

These and other news items from the day:

Thu, October 23, 2025

Serious F5 Breach: Build System and BIG-IP Code Compromised

⚠️ F5 disclosed a major intrusion in which a sophisticated, likely nation-state threat actor maintained long-term access to its internal network. During the compromise the attackers gained control of the build and distribution environment for BIG-IP updates and exfiltrated proprietary source code, documentation of unpatched vulnerabilities, and customer configuration files. F5 warned this data could enable widespread supply-chain and targeted attacks against many sensitive networks.

read more →

Thu, October 23, 2025

Google Cloud Cross-Site Interconnect Now Generally Available

🔗 Google Cloud announced that Cross-Site Interconnect is now generally available, providing a cloud-delivered, transparent layer 2 connectivity overlay for global WANs. The service uses Google’s global backbone to deliver high-bandwidth, on-demand links with a 99.95% SLA, dynamic consumption pricing, and support for MACsec encryption and VLAN-based multi-destination handoffs. It exposes operational metrics via dashboards and APIs so teams can monitor latency, loss, and utilization while abstracting failover and resiliency management.

read more →

Thu, October 23, 2025

Google Gen AI .NET SDK Brings Gemini to C#/.NET Developers

🚀 Google has released the Google Gen AI .NET SDK, bringing unified access to Gemini on Google AI and Vertex AI for C#/.NET developers. The SDK is available via NuGet (dotnet add package Google.GenAI) and supports client creation with an API key or with project/location settings for Vertex AI. Examples demonstrate unary and streaming text generation, image generation, and configurable response schemas and generation settings. Google provides the API reference, GitHub source (googleapis/dotnet-genai) and a DemoApp with samples to help developers get started.

read more →

Thu, October 23, 2025

Microsoft Unveils Mico: Copilot Avatar for Empathy

🤖 Microsoft today introduced Mico, a new avatar for its AI-powered Copilot designed to feel more personal, supportive, and empathetic. The optional visual presence listens, adapts its expressions and color to interactions, and will respectfully push back when presented with incorrect information. The Copilot Fall Release also adds features such as Copilot Groups for up to 32 collaborators, long-term memory, Deep Research Proactive Actions, and a Learn Live voice-enabled tutor. These updates begin rolling out in the United States with broader regional availability planned.

read more →

Thu, October 23, 2025

AutomationDirect Productivity Suite: Multiple High-Risk Flaws

⚠️ AutomationDirect's Productivity Suite and several Productivity PLC models contain multiple high-severity vulnerabilities — including relative path traversal (ZipSlip), a weak password recovery mechanism, incorrect permission assignment, and binding to an unrestricted IP address. Exploitation could allow remote attackers to read, write, or delete files, execute arbitrary code, or gain full control of projects. AutomationDirect has released updates (Productivity Suite v4.5.0.x and newer) and recommends applying the latest firmware and implementing network isolation and firewall/NAC controls if immediate upgrades are not possible.

read more →

Thu, October 23, 2025

Amazon Aurora DSQL Now Available in Frankfurt Region

🚀 Amazon Aurora DSQL is now available in Europe (Frankfurt), expanding AWS’s global footprint for its serverless distributed SQL engine. The managed service provides active-active high availability, multi-Region strong consistency, and automatic, virtually unlimited scaling so teams can build always-on applications without infrastructure management. Aurora DSQL is advertised as offering the fastest distributed SQL reads and writes, and is already available across US, Asia Pacific, and European Regions. Customers can trial it via the AWS Free Tier.

read more →

Thu, October 23, 2025

Azure Storage Mover: Cloud-to-Cloud S3 to Blob Migrations

🚀 Azure Storage Mover is now generally available for direct cloud-to-cloud migrations from AWS S3 to Azure Blob Storage. The fully managed service performs high-speed, server-to-server parallel transfers without requiring self-hosted agents, preserving file metadata and supporting incremental syncs to minimize downtime. Integrated automation via the Azure portal, CLI, and REST API removes the need for custom scripts or third-party tools, while RBAC, Azure Active Directory, Multicloud Arc connectivity, and encryption in transit address security and compliance. Customers who tested the preview moved petabytes of data and reported reduced infrastructure overhead and faster access to Azure analytics and AI capabilities.

read more →

Thu, October 23, 2025

Microsoft Disables Explorer Preview for Internet Files

🔒 Microsoft has updated File Explorer to disable the preview pane by default for files downloaded from the Internet or marked with the Mark of the Web. The change, included in Windows security updates released on and after October 14, 2025, is designed to block exploits that can leak NTLM hashes when previewed documents reference external resources. When preview is blocked, File Explorer shows a warning and users can manually unblock trusted files via Properties > Unblock or add the location to Trusted sites/Local intranet; a sign-out may be required for the change to take effect.

read more →

Thu, October 23, 2025

ASKI Energy ALS-Mini S4/S8: Missing Authentication Flaw

⚠ An unauthenticated access vulnerability in the embedded web server of ASKI Energy ALS‑Mini‑S4 and ALS‑Mini‑S8 IP controllers allows remote actors to read and modify device configuration, potentially yielding full control. Tracked as CVE-2025-9574, the issue is a Missing Authentication for Critical Function (CWE‑306) with a CVSS v4 base score of 9.9. ABB reports these products reached end of life in 2022 and will not be patched; operators should remove internet exposure, place devices behind firewalls or secure proxies that enforce authentication and logging, restrict access to whitelisted IPs, monitor for unauthorized access with IDS/IPS, or physically disconnect the Ethernet port if web features are not required.

read more →

Thu, October 23, 2025

AWS RTB Fabric Generally Available for Low-Latency AdTech

🚀 AWS today announced RTB Fabric, a fully managed service that connects publishers and buyers with AdTech partners such as Amazon Ads, GumGum, Kargo, MobileFuse, Sovrn, TripleLift, Viant, and Yieldmo over a private, high‑performance network delivering single‑digit millisecond latency. The service can reduce standard cloud networking costs by up to 80% and requires no upfront commitments. Built-in modules support containerized applications and foundation models and run inline to optimize traffic, improve bid efficiency, and increase bid response rates.

read more →

Thu, October 23, 2025

Harden Identity Defense: Richer Context and Correlation

🔒Microsoft outlines expanded Identity Threat Detection and Response (ITDR) capabilities designed for modern, hybrid environments. The post highlights general availability of unified identity and endpoint sensors, broad on‑premises sensors for Domain Controllers, AD FS, and AD CS, and native integration with Microsoft Entra ID. It emphasizes an identity‑centric approach that correlates accounts across platforms, integrates with PAM, and links identity signals into Defender XDR to enable contextualized alerts, coordinated response, and automatic attack disruption across devices and sessions.

read more →

Thu, October 23, 2025

Veeder-Root TLS4B: Remote Command Injection and 2038 Bug

🔒 Veeder-Root's TLS4B Automatic Tank Gauge System contains two serious vulnerabilities: a SOAP-based command injection (CVE-2025-58428) that allows remote authenticated attackers to execute system-level commands, and an integer overflow/2038 time wraparound (CVE-2025-55067) that can disrupt authentication and core functions. The command injection carries very high severity (CVSS v3.1 9.9 / CVSS v4 9.4); Veeder-Root recommends upgrading to Version 11.A. For the time-related overflow, Veeder-Root is developing a patch and advises applying network-security best practices, isolating devices, and restricting access until a fix is available.

read more →

Thu, October 23, 2025

LockBit Resurges with New Variant and Fresh Victims

🛡️ LockBit has reemerged after a disruption in early 2024 and is actively extorting new victims. Check Point Research identified roughly a dozen organizations hit in September 2025, and about half of those incidents involved the new LockBit 5.0 variant, labeled ChuongDong. The group is deploying attacks across Windows, Linux and ESXi environments in Europe, the Americas and Asia. Check Point Harmony Endpoint and Quantum customers are protected via Threat Emulation, which can block these attacks before encryption occurs.

read more →

Thu, October 23, 2025

CISA Warns of Critical Lanscope Endpoint Manager Flaw

⚠️ CISA warns that attackers are exploiting a critical flaw (CVE-2025-61932) in Motex's Lanscope Endpoint Manager, enabling unauthenticated remote code execution via specially crafted packets. The issue affects client components in versions 9.4.7.2 and earlier; Motex has released patched client builds and noted managers do not require updates. No mitigations are available—install the vendor updates; CISA added the flaw to its KEV with a Nov. 12 remediation deadline for federal agencies.

read more →

Thu, October 23, 2025

Agent Factory Recap: Securing AI Agents in Production

🛡️ This recap of the Agent Factory episode explains practical strategies for securing production AI agents, demonstrating attacks like prompt injection, invisible Unicode exploits, and vector DB context poisoning. It highlights Model Armor for pre- and post-inference filtering, sandboxed execution, network isolation, observability, and tool safeguards via the Agent Development Kit (ADK). The team demonstrates a secured DevOps assistant that blocks data-exfiltration attempts while preserving intended functionality and provides operational guidance on multi-agent authentication, least-privilege IAM, and compliance-ready logging.

read more →

Thu, October 23, 2025

Global Smishing Campaign Targets Toll, Delivery, Services

🚨 Unit 42 attributes a widespread smishing campaign to the Smishing Triad that uses urgent SMS messages and realistic phishing pages to impersonate toll, delivery and other critical services. Since April 2024 the operation has registered and churned over 194,000 malicious domains and 136,900 root domains, leveraging a Hong Kong registrar while primarily hosting on U.S. cloud infrastructure. The campaign appears powered by a large phishing-as-a-service ecosystem and seeks PII, credentials and payment data. Advanced URL Filtering and Advanced DNS Security provide protections; contact Unit 42 Incident Response for urgent help.

read more →

Thu, October 23, 2025

Jaguar Land Rover Cyberattack: Costliest in UK History

🔒 The cyberattack on Jaguar Land Rover in late August forced a global shutdown of IT systems and halted production across its factories. According to the Cyber Monitoring Centre, the weeks-long outage inflicted an estimated £1.9 billion in losses and affected more than 5,000 organizations, including suppliers and dealers. The UK government intervened with guarantees and up to £1.5 billion in support to secure the supply chain as production is gradually resumed.

read more →

Thu, October 23, 2025

CISA: Critical Lanscope Endpoint Manager Flaw Exploited

⚠️ CISA has added a critical defect in Motex LANSCOPE Endpoint Manager to its Known Exploited Vulnerabilities catalog after observing active exploitation. Tracked as CVE-2025-61932 (CVSS v4: 9.3), the flaw affects on-premises Client program and Detection Agent components and allows arbitrary code execution via specially crafted packets. Motex released patches for multiple 9.3/9.4 builds, and federal agencies are advised to remediate by November 12, 2025.

read more →

Thu, October 23, 2025

Lazarus Targets UAV Sector with Operation DreamJob

🛩️ ESET researchers observed a renewed Operation DreamJob campaign that targeted European defense and UAV-related companies and has been linked to the North Korea-aligned Lazarus group. Attackers used social-engineering lures and trojanized open-source projects on GitHub to deliver loaders and the ScoringMathTea RAT. Techniques included DLL side-loading, reflective in-memory loading and encrypted C2 channels. The apparent objective was theft of proprietary UAV designs and manufacturing know-how.

read more →

Thu, October 23, 2025

Microsoft Blocks Ransomware Campaign Targeting Teams Users

🛡️ Microsoft said it disrupted a ransomware campaign that used fake Teams installers to deliver a backdoor and prepare for encryption operations. Attackers lured victims with impersonated MSTeamsSetup.exe files hosted on malicious domains, which installed a loader and a fraudulently signed Oyster backdoor. The group identified as Vanilla Tempest intended to follow with Rhysida ransomware. Microsoft revoked over 200 fraudulent code-signing certificates and says a fully enabled Defender Antivirus will block the threat.

read more →

Thu, October 23, 2025

IR Trends Q3 2025: ToolShell Drives Access & Response

🛡️ Cisco Talos Incident Response observed a surge in attacks exploiting public-facing apps in Q3 2025, driven chiefly by ToolShell chains targeting on-premises Microsoft SharePoint servers. Rapid automated scanning and unauthenticated RCE vulnerabilities led to widespread compromise, highlighting the need for immediate patching and strict network segmentation. Post-compromise phishing from valid accounts and diverse ransomware families, including Warlock and LockBit, continued to impact victims.

read more →

Thu, October 23, 2025

Pakistan-linked APT36 deploys DeskRAT against BOSS Linux

🔍 Sekoia.io researchers uncovered a cyber-espionage campaign, beginning June 2025, that targets Indian government Linux systems using a new Golang RAT named DeskRAT. The operation primarily abused the Indian government‑endorsed BOSS Linux distribution via phishing ZIPs that executed Bash downloaders and displayed decoy PDFs. Attackers used dedicated staging servers and a new operator dashboard to manage victims and exfiltrate files.

read more →

Thu, October 23, 2025

North Korean Hackers Target European Defense Firms

🛡️ European defense and aerospace firms are being targeted in a renewed Operation Dream Job campaign attributed to North Korean-linked Lazarus actors, ESET reports. Active since March 2025, attackers use social-engineering job lures and trojanized documents to deploy ScoringMathTea and MISTPEN-like downloaders such as BinMergeLoader that abuse Microsoft Graph API. The goal is theft of proprietary UAV manufacturing know‑how and related intellectual property.

read more →

Thu, October 23, 2025

Lazarus Group's Operation DreamJob Hits EU Drone Firms

🛡️ ESET attributes a March 2025 wave of cyber-espionage against three European defense firms to the North Korea-aligned Lazarus Group, describing it as a renewed phase of Operation DreamJob. Targets tied to UAV development were lured with convincing fake job offers that delivered trojanized PDF readers and chained loaders. The primary payload, ScoringMathTea, is a remote access Trojan that provides attackers full control, and researchers found malicious components disguised as legitimate open-source tools.

read more →

Thu, October 23, 2025

NIHON KOHDEN CNS-6201 NULL Pointer DoS Advisory Update

⚠️ A remote NULL pointer dereference in NIHON KOHDEN CNS-6201 central monitors can be triggered by a specially crafted UDP packet, causing the monitoring process to terminate and producing a denial-of-service. The issue is unauthenticated, reproducible when UDP is reachable, and is tracked as CVE-2025-59668 with CVSS v4 8.7. Vendor support for affected versions has ended; users should migrate to successor products or apply strict network-level mitigations such as isolation, boundary devices, and careful traffic monitoring.

read more →

Thu, October 23, 2025

Critical and High Flaws Found in TP-Link VPN Routers

🔒 Researchers at Forescout’s Vedere Labs have disclosed two vulnerabilities in TP-Link Omada and Festa VPN routers that enable command injection and potential unauthorized root access. The flaws are tracked as CVE-2025-7850 (critical, CVSS v4.0 9.3) and CVE-2025-7851 (high, CVSS v4.0 8.7) and stem from an incomplete 2024 fix that left debug functionality and alternate attack paths. TP-Link has published firmware updates; Vedere Labs urges immediate patching and additional mitigations including WAFs, disabling remote admin, and improved monitoring.

read more →

Thu, October 23, 2025

ThreatsDay: Widespread Attacks Exploit Trusted Systems

🔒 This ThreatsDay bulletin highlights a series of recent incidents where attackers favored the easiest paths in: tricking users, abusing trusted services, and exploiting stale or misconfigured components. Notable items include a malicious npm package with a post-install backdoor, a CA$176M FINTRAC penalty for missed crypto reporting, session hijacking via MCP (CVE-2025-6515), and OAuth-based persistent backdoors. Practical defenses emphasized are rapid patching, disabling risky install hooks, auditing OAuth apps and advertisers, and hardening agent and deserialization boundaries.

read more →

Thu, October 23, 2025

Over 250 Magento Stores Targeted Using SessionReaper Bug

⚠️ Sansec warns that threat actors have begun exploiting CVE-2025-54236 (SessionReaper) in Adobe Commerce and Magento Open Source, with over 250 attack attempts recorded in 24 hours. The critical (CVSS 9.1) improper input validation flaw can enable customer account takeover via the Commerce REST API, and Adobe released a patch last month. Sansec cautions that 62% of Magento stores remain unpatched six weeks after disclosure, and observed activity includes dropping PHP webshells via '/customer/address_file/upload' and probing phpinfo from several attacker IPs.

read more →

Thu, October 23, 2025

YouTube Ghost Network: Disrupting a Massive Malware Campaign

🛡️ Check Point Research uncovered the YouTube Ghost Network, a large-scale operation that used fake and compromised accounts to distribute infostealers like Rhadamanthys and Lumma. More than 3,000 malicious videos — often disguised as cracked software or game hacks — were reported and removed after being linked to password-protected archives that carried the malware. Compromised accounts, coordinated comment manipulation, and false endorsements were used to build trust and drive downloads.

read more →

Thu, October 23, 2025

Vietnam Actors Use Fake Job Postings to Hijack Ad Accounts

🔎 GTIG describes a targeted campaign by a Vietnam-based cluster tracked as UNC6229 that uses fake job postings on legitimate platforms to socially engineer remote digital advertising workers. Victims are enticed to open password-protected attachments or visit convincing phishing portals that harvest corporate credentials and can bypass MFA. The actors abuse reputable CRM and SaaS services to increase trust, deliver remote access trojans, and ultimately take over high-value advertising and social media accounts for sale or resale.

read more →

Thu, October 23, 2025

Lazarus Operation DreamJob Targets European Defense

🔍 North Korean-linked Lazarus actors ran an Operation DreamJob campaign in late March that targeted three European defense companies involved in UAV technology. Using fake recruitment lures, victims were tricked into installing trojanized open-source applications and plugins which loaded malicious payloads via DLL sideloading. Final-stage malware included the ScoringMathTea RAT, while an alternate chain used the BinMergeLoader (MISTPEN) to abuse Microsoft Graph API tokens. ESET published extensive IoCs to aid detection.

read more →

Thu, October 23, 2025

'Jingle Thief' Exploits Cloud to Steal Gift Cards at Scale

🔒Researchers detail a threat cluster called Jingle Thief that leverages phishing and smishing to harvest credentials and compromise cloud environments of retailers and consumer services to issue unauthorized gift cards. Palo Alto Networks Unit 42 links the activity to financially motivated actors and notes coordinated campaigns in April-May 2025. The attackers favor identity misuse over malware, persistently mapping tenants, abusing Microsoft 365 services, and minimizing logs to sustain large-scale fraud.

read more →

Thu, October 23, 2025

AWS Outposts 2U Server Now Available in GovCloud Regions

🔒 AWS now supports the Outposts 2U server in AWS GovCloud (US-East) and GovCloud (US-West). The fully managed, industry-standard 2U form factor delivers up to 128 vCPUs and extends AWS infrastructure, services, APIs, and tools to on-premises or edge locations with limited space. Customers can run Amazon EC2, Amazon ECS, and AWS IoT Greengrass locally while connecting to the parent GovCloud region for broader management and operations.

read more →

Thu, October 23, 2025

Hugging Face and VirusTotal: Integrating Security Insights

🔒 VirusTotal and Hugging Face have announced a collaboration to surface security insights directly within the Hugging Face platform. When browsing model files, datasets, or related artifacts, users will now see multi‑scanner results including VirusTotal detections and links to public reports so potential risks can be reviewed before downloading. VirusTotal is also enhancing its analysis portfolio with AI-driven tools such as Code Insight and format‑aware scanners (picklescan, safepickle, ModelScan) to highlight unsafe deserialization flows and other risky patterns. The integration aims to increase visibility across the AI supply chain and help researchers, developers, and defenders build more secure models and workflows.

read more →

Thu, October 23, 2025

Threat Source: SharePoint Exploits and Patch Urgency

⚠ Cisco Talos reports a sharp increase in attacks against public-facing applications, with the ToolShell chain exploiting unpatched Microsoft SharePoint servers rising to over 60% of IR cases this quarter. Ransomware-related incidents fell to about 20% but show evolving tactics, including leveraging legitimate tools and compromised internal accounts for persistence and phishing. Organizations are urged to prioritize rapid patching, robust network segmentation, centralized logging, MFA, and user education to reduce exposure.

read more →

Thu, October 23, 2025

Spoofed AI Sidebars Can Trick Atlas and Comet Users

⚠️ Researchers at SquareX demonstrated an AI Sidebar Spoofing attack that can overlay a counterfeit assistant in OpenAI's Atlas and Perplexity's Comet browsers. A malicious extension injects JavaScript to render a fake sidebar identical to the real UI and intercepts all interactions, leaving users unaware. SquareX showcased scenarios including cryptocurrency phishing, OAuth-based Gmail/Drive hijacks, and delivery of reverse-shell installation commands. The team reported the findings to vendors but received no response by publication.

read more →

Thu, October 23, 2025

Delta ASDA-Soft Stack Overflow Vulnerabilities (2025)

⚠️ Delta Electronics' ASDA-Soft contains two stack-based buffer overflow vulnerabilities (CVE-2025-62579, CVE-2025-62580) affecting versions 7.0.2.0 and earlier. Both issues were assigned a CVSS v4 base score of 8.4 and can allow writing outside the intended stack buffer when a valid user opens a crafted project file. Exploitation requires local access and user interaction; no public exploitation has been reported to CISA. Delta has released ASDA-Soft v7.1.1.0 and users should update and apply network isolation and standard email/attachment precautions.

read more →

Thu, October 23, 2025

Practical Guide to Google Cloud Parameter Manager Overview

🔒 Google Cloud's Parameter Manager centralizes application configuration to avoid hard-coded credentials and fragile config files, supporting validated JSON and YAML payloads as well as arbitrary unformatted data. It integrates with Secret Manager using a __REF__ syntax to keep confidential values separate and uses versioned, immutable parameter versions to prevent accidental changes. The post walks through storing an API key in Secret Manager, granting the Parameter Manager IAM principal access, and calling renderParameterVersion from a Node backend. A sample React/Node weather app demonstrates runtime configuration, fallback dummy data, and advanced patterns such as regional parameters and feature rollouts.

read more →

Thu, October 23, 2025

Amazon QuickSight Adds Visual Data Preparation Experience

📊 Amazon QuickSight now provides a visual data preparation experience that enables business users to clean, transform, and combine data without writing code. The interface supports multi-step workflows—appends, aggregations, flexible joins—and records each transformation step to improve traceability and shareability. It increases dataset source depth from 3 to 10 levels and boosts cross-source join capacity 20× (1GB to 20GB), and is available to Author, Author Pro, and select Quick Suite Enterprise subscribers across multiple regions.

read more →

Thu, October 23, 2025

Amazon EC2 I8g Storage-Optimized Instances Expand Regions

💾 Amazon Web Services has made Amazon EC2 I8g storage-optimized instances generally available in Europe (London), Asia Pacific (Singapore), and Asia Pacific (Tokyo). Powered by AWS Graviton4 processors and third-generation Nitro SSDs, I8g delivers up to 60% better compute performance and up to 65% improved real-time storage performance per TB versus the previous generation. These instances offer up to 45 TB of local NVMe storage, up to 100 Gbps networking, and are aimed at transactional databases, real-time analytics, and I/O-intensive AI pre-processing workloads.

read more →

Thu, October 23, 2025

CISA Issues Eight New Industrial Control Systems Advisories

🔔 CISA released eight Industrial Control Systems advisories addressing vulnerabilities and updates across multiple vendors and products, including AutomationDirect, ASKI Energy, Veeder-Root, Delta Electronics, NIHON KOHDEN, Schneider Electric, and Hitachi Energy. The notices cover new findings and several updates (for example, Update A and Update C) and list ICSA/ICSMA identifiers for each advisory. Administrators and asset owners should review the technical details, apply available patches or vendor mitigations, and reinforce network segmentation, access controls, and monitoring to reduce exposure.

read more →

Thu, October 23, 2025

Vidar 2.0 Emerges as Lumma Stealer Declines, Upgraded

🔒 Trend Micro reports that the Vidar infostealer has been upgraded to Vidar 2.0, featuring a complete rewrite in C, multithreaded exfiltration, custom browser credential extraction and an AppBound bypass targeting Chrome's app-bound encryption. The release, announced by an actor calling themselves "Loadbaks" on October 6, follows a decline in Lumma Stealer activity after law enforcement disruption and doxxing of its developers. Researchers warn security teams to anticipate increased Vidar activity through Q4 2025 and to adapt detection and mitigation strategies accordingly.

read more →

Thu, October 23, 2025

Amazon Connect Introduces Granular Recording Permissions

🔒 Amazon Connect now offers granular UI permissions for conversation recordings and transcripts, enabling administrators to control access to playback, copying and downloads separately. Administrators can allow users to listen to calls while preventing transcript copying, and set download rules that permit redacted recordings but block unredacted downloads. The capability supports complex scenarios where sensitive conversations remain redacted while other interactions remain fully available.

read more →

Thu, October 23, 2025

DynamoDB Zero-ETL Integration with Redshift in Taipei

🔁 The Amazon DynamoDB zero-ETL integration with Amazon Redshift is now available in the Asia Pacific (Taipei) region, enabling analytics on production DynamoDB tables without impacting operational workloads. Customers can run high-performance SQL, leverage built-in ML and Spark integrations, and use materialized views with automatic incremental refresh and data sharing. History mode provides built-in support for analyzing historical data and building Type 2 Slowly Changing Dimension (SCD 2) tables without custom ETL code.

read more →

Thu, October 23, 2025

Amazon Connect adds threaded email views and history

📧 Amazon Connect now includes threaded email views and appends conversation history to agent replies, helping agents and customers preserve context and continuity across exchanges. The update provides a familiar, mail-like threading model and surfaces prior messages inline within Amazon Connect Email, making follow-ups and issue resolution faster. The capability is available in multiple AWS regions and streamlines agent workflows.

read more →

Thu, October 23, 2025

Toys R Us Canada confirms customer data leak; regulators

🔔 Toys R Us Canada has notified customers that a threat actor leaked records taken from its database after a posting on the dark web on July 30, 2025. An investigation with third-party cybersecurity experts confirmed the data's authenticity and found exposed fields may include full name, physical address, email, and phone number, while passwords and payment card details were not exposed. The retailer says it has strengthened IT security, is notifying Canadian privacy regulators, and warns customers to beware of phishing attempts.

read more →

Thu, October 23, 2025

Amazon Connect Adds Preview Dialing to Outbound Campaigns

📞 Amazon Connect outbound campaigns introduces a preview dialing mode that gives agents customer context—name, balance, and prior interactions—before placing calls. Campaign managers can set review time limits, optionally remove contacts, and use new dashboards to monitor agent behavior, discard rates, and engagement trends. By reserving an agent prior to dialing, teams gain operational control and help support TCPA and OFCOM compliance.

read more →

Thu, October 23, 2025

Zero Trust Blind Spot: Identity Risk in AI Agents Now

🔒 Agentic AI introduces a mounting Zero Trust challenge as autonomous agents increasingly act with inherited or unmanaged credentials, creating orphaned identities and ungoverned access. Ido Shlomo of Token Security argues that identity must be the root of trust and recommends applying the NIST AI RMF through an identity-driven Zero Trust lens. Organizations should discover and inventory agents, assign unique managed identities and owners, enforce intent-based least privilege, and apply lifecycle controls, monitoring, and governance to restore auditability and accountability.

read more →

Thu, October 23, 2025

Cross-Cloud VPC Peering with NVAs and Regional Affinity

🌐 This blog presents a reference architecture for deploying Network Virtual Appliances (NVAs) in a regional hub-and-spoke design using VPC Network Peering. It explains how Google’s Cross-Cloud Network and software-defined global backbone support any-to-any connectivity while preserving regional affinity for latency and data residency. The post details traffic flows and key services such as Cloud Interconnect, HA VPN, Internal Passthrough Network Load Balancers, policy-based routes, and Private Service Connect to integrate managed services and workload VPCs.

read more →

Thu, October 23, 2025

Samsung Galaxy S25 Hacked at Pwn2Own Ireland 2025 Event

🔒 At Pwn2Own Ireland 2025, researchers from Mobile Hacking Lab and Summoning Team successfully exploited a Samsung Galaxy S25 using a five‑vulnerability chain to achieve code execution. The findings, credited to Ken Gannon and Dimitrios Valsamaras, were surrendered to Samsung under the event's coordinated disclosure rules. Hours later a second team, Interrupt Labs, used an improper input validation bug to seize camera and location access. Each team received $50,000; Samsung has 90 days to issue fixes.

read more →

Thu, October 23, 2025

Enterprises Move From Static Secrets to Managed Identities

🔐 Organizations are rapidly replacing embedded API keys and passwords with platform-native managed identities to reduce manual credential management and leakage risk. Enterprises report significant productivity gains—case studies cite up to a 95% reduction in time spent managing credentials and a 75% drop in time learning platform authentication. While major clouds (AWS, Azure, GCP) and CI platforms have built-in solutions, legacy systems and third-party APIs remain the primary obstacles to eliminating static secrets entirely.

read more →

Thu, October 23, 2025

HP Pulls Update That Broke Entra ID Auth on AI PCs

⚠️ HP has pulled an over-the-air update to HP OneAgent for Windows 11 after a cleanup script removed Microsoft certificates required for some organizations to authenticate to Microsoft Entra ID. The silent update deployed on HP AI PCs ran package SP161710 and an install.cmd that deleted any certificate containing the substring "1E", producing false positives. Affected devices disconnected from Entra ID/Intune; HP says the update is no longer available and is assisting impacted customers.

read more →

Thu, October 23, 2025

Mic-E-Mouse: Eavesdropping via High-Resolution Mice

🔊 A recent study by researchers at the University of California, Irvine shows that very high-resolution optical sensors in some mice can detect minute desk vibrations produced by speech. The theoretical attack, labeled Mic-E-Mouse, requires mice with extremely high DPI (≈10,000+) and very high polling rates (≈4,000 Hz+) and malware to exfiltrate raw sensor frames. The raw signals are extremely noisy, but Wiener filtering and ML-based denoising allowed partial speech recovery under controlled lab conditions. Significant practical limitations — few qualifying models, controlled setups with speakers inches from the sensor, and steep drops in accuracy with common barriers — plus straightforward mitigations make the attack largely a proof of concept for now.

read more →

Thu, October 23, 2025

Manipulating Meeting Notetakers: AI Summarization Risks

📝 In many organizations the most consequential meeting attendee is the AI notetaker, whose summaries often become the authoritative meeting record. Participants can tailor their speech—using cue phrases, repetition, timing, and formulaic phrasing—to increase the chance their points appear in summaries, a behavior the author calls AI summarization optimization (AISO). These tactics mirror SEO-style optimization and exploit model tendencies to overweight early or summary-style content. Without governance and technical safeguards, summaries may misrepresent debate and confer an invisible advantage to those who game the system.

read more →

Thu, October 23, 2025

Six IT Risk-Assessment Frameworks for Enterprise Governance

🛡️ This article summarizes six prominent IT risk-assessment frameworks—COBIT, FAIR, ISO/IEC 27001, NIST RMF, OCTAVE and TARA—and explains their core purpose and methods. It contrasts governance-oriented, standards-based, lifecycle and threat-centric approaches and highlights where quantitative analysis or certification focus applies. The overview helps security and IT leaders identify which model or combination of models best fits organizational needs.

read more →

Thu, October 23, 2025

Secure AI at Scale and Speed: Free Webinar Framework

🔐 The Hacker News is promoting a free webinar that presents a practical framework to secure AI at scale while preserving speed of adoption. Organizers warn of a growing “quiet crisis”: rapid proliferation of unmanaged AI agents and identities that lack lifecycle controls. The session focuses on embedding security by design, governing AI agents that behave like users, and stopping credential sprawl and privilege abuse from Day One. It is aimed at engineers, architects, and CISOs seeking to move from reactive firefighting to proactive enablement.

read more →

Thu, October 23, 2025

CISOs: Earning Business Respect Through Incident Response

🛡️ How a CISO handles a major incident can make or break their career. A Cytactic survey of 480 senior US cybersecurity leaders, including 165 CISOs, found that 65% said leading an incident response elevated their internal reputation while only 5% said it hurt it. Experts say a well-managed response can translate into better budgets and authority, but prevention work is often invisible and a single failure can still cost a CISO their job.

read more →