Beyond the bomb: When adversaries bring their own virtual machine for persistence

Source: The Red Canary Blog: Information Security Insights

Author: Tony Lambert

URL: https://redcanary.com/blog/threat-intelligence/email-bombing-virtual-machine/

ONE SENTENCE SUMMARY:

In 2025, adversaries used social engineering and a custom QEMU VM to achieve persistence following a spam bombing attack.

MAIN POINTS:

  1. Red Canary Intelligence detected a unique tactic involving a QEMU VM after a spam bombing.
  2. Adversaries posed as tech support following the email attack to gain trust.
  3. Quick Assist was used for remote access, leading to VM deployment.
  4. The VM enabled internal network reconnaissance and connection to a C2 server.
  5. Sliver framework was used for command and control.
  6. Forensic analysis revealed activity through prefetch, browser history, and other artifacts.
  7. Sliver, ScreenConnect, and QDoor were part of the adversary’s toolkit.
  8. Deleted files and volume shadow copies offered recovery opportunities.
  9. This represents a shift in adversary tactics, highlighting advanced persistence methods.
  10. Emphasizes the need for robust defense strategies including social engineering training and remote access monitoring.

TAKEAWAYS:

  1. Adversaries are using VMs to bypass detection and maintain persistence.
  2. Social engineering is a critical tool in sophisticated attacks.
  3. Remote access tools can be leveraged for malicious purposes.
  4. Network reconnaissance is crucial for adversaries’ internal mapping.
  5. Multi-layered defense is essential to counter evolving adversary tactics.

Ivanti warns of critical Endpoint Manager code execution flaw

Source: BleepingComputer

Author: Sergiu Gatlan

URL: https://www.bleepingcomputer.com/news/security/ivanti-warns-of-critical-endpoint-manager-code-execution-flaw/

ONE SENTENCE SUMMARY:

Ivanti urges customers to patch critical Endpoint Manager vulnerabilities allowing remote code execution, emphasizing immediate action due to potential exploitation.

MAIN POINTS:

  1. Ivanti discloses a critical vulnerability in its Endpoint Manager (EPM) solution, CVE-2025-10573.
  2. The flaw enables unauthenticated attackers to execute code through low-complexity cross-site scripting.
  3. Ivanti’s EPM is designed for managing devices across Windows, macOS, Linux, Chrome OS, and IoT.
  4. Vulnerability involves stored XSS allowing JavaScript execution in admin session contexts.
  5. EPM isn’t intended for online exposure, yet hundreds are tracked exposed globally.
  6. Ivanti released patches for three high-severity flaws, needing user interaction and untrusted connections.
  7. No exploitation evidence yet, but EPM vulnerabilities have been previous targets.
  8. CISA warned about critical vulnerabilities in EPM appliances earlier this year.
  9. U.S. agencies were ordered to patch an actively exploited vulnerability in October 2024.
  10. A guide highlights the importance of scalable IAM strategies to meet modern demands.

TAKEAWAYS:

  1. Patch critical EPM vulnerabilities immediately to prevent potential exploitation.
  2. Ensure EPM solutions are not unnecessarily exposed online.
  3. Stay informed about cybersecurity advisories from Ivanti and agencies like CISA.
  4. Apply security updates consistently to safeguard against high-severity threats.
  5. Develop a scalable Identity and Access Management (IAM) strategy to handle evolving security requirements.

Windows PowerShell now warns when running Invoke-WebRequest scripts

Source: BleepingComputer

Author: Sergiu Gatlan

URL: https://www.bleepingcomputer.com/news/security/microsoft-windows-powershell-now-warns-when-running-invoke-webrequest-scripts/

ONE SENTENCE SUMMARY:

Microsoft updates Windows PowerShell to warn against risky script execution, aiming to secure enterprise environments using Invoke-WebRequest.

MAIN POINTS:

  1. PowerShell now warns when scripts use Invoke-WebRequest to download web content.
  2. Mitigates CVE-2025-54100 vulnerability affecting enterprise environments.
  3. Warning added to Windows PowerShell 5.1 on Windows 10 and 11.
  4. Users prompted to use ‘-UseBasicParsing’ for safer web content processing.
  5. Pressing ‘No’ cancels operation; ‘Yes’ allows older parsing with risk.
  6. KB5074204 update displays confirmation prompt about script execution risks.
  7. Admins advised to update scripts to avoid manual confirmation delays.
  8. ‘curl’ command in PowerShell linked to the same warnings.
  9. Scripts downloading content or working with response body require no changes.
  10. Additional details available in Microsoft’s support documentation.

TAKEAWAYS:

  1. Use ‘-UseBasicParsing’ to avoid executing risky scripts.
  2. Update scripts for seamless automation without manual intervention.
  3. PowerShell 5.1 enhances security with essential warnings.
  4. Enterprise environments benefit most from this update.
  5. Stay informed with Microsoft’s documentation for additional guidance.

Microsoft Patch Tuesday, December 2025 Security Update Review

Source: Vulnerabilities and Threat Research – Qualys Security Blog

Author: Diksha Ojha

URL: https://blog.qualys.com/vulnerabilities-threat-research/2025/12/09/microsoft-patch-tuesday-december-2025-security-update-review

ONE SENTENCE SUMMARY:

Microsoft Patch Tuesday December 2025 offers crucial security updates addressing 72 vulnerabilities, including critical zero-day and remote code execution risks.

MAIN POINTS:

  1. December update addresses 72 vulnerabilities, including 3 critical and 55 important-severity ones.
  2. Three zero-day vulnerabilities were fixed; one actively exploited, two publicly disclosed.
  3. Updates include 15 vulnerabilities in Microsoft Edge (Chromium-based).
  4. Patches cover Windows Hyper-V, Windows Defender Firewall Service, and more.
  5. Remote code execution vulnerabilities are deemed critical due to potential exploitation.
  6. Elevation of privilege flaws include use-after-free issues enabling SYSTEM privileges.
  7. CISA flagged CVE-2025-62221 for urgent patching due to active exploitation.
  8. New security prompts in PowerShell address script execution risks.
  9. Critical fixes include vulnerabilities in Microsoft Office and Outlook.
  10. Next Patch Tuesday scheduled for January 13, 2026.

TAKEAWAYS:

  1. Microsoft’s December updates are essential for robust security posture maintenance.
  2. Zero-day vulnerabilities require immediate attention to prevent exploitation.
  3. Elevation of privilege flaws pose significant risks if left unpatched.
  4. Regular updating ensures protection against critical remote code execution threats.
  5. Engage with ongoing webinars for best practices in vulnerability management.

AI Explainability Scorecard

Source: Cloud Security Alliance

Author: unknown

URL: https://cloudsecurityalliance.org/articles/ai-explainability-scorecard

ONE SENTENCE SUMMARY:

Transparency and explainability in AI systems are crucial for trust, requiring systematic evaluation through frameworks like the AI Explainability Scorecard.

MAIN POINTS:

  1. AI transparency builds trust by enabling users to understand decision-making processes.
  2. Legal frameworks require AI systems to be transparent and auditable.
  3. Explainability allows developers to improve systems by understanding predictions.
  4. Interpretability and explainability differ; all interpretable models are explainable, not vice versa.
  5. AI transparency requires balancing model complexity and explainability.
  6. The AI Explainability Scorecard measures models across five dimensions to quantify transparency.
  7. Different AI models exhibit varying levels of explainability based on their architecture.
  8. K-Nearest Neighbors (K-NN) is highly transparent and explainable.
  9. Neural networks and transformers require special tools for partial explainability.
  10. Large Language Models (LLMs) use surrogate models for practical transparency.

TAKEAWAYS:

  1. Explainability transforms AI systems into reliable partners by clarifying decision processes.
  2. The AI Explainability Scorecard provides a structured approach to measuring AI transparency.
  3. Understanding AI decision-making prevents misuse and increases user confidence.
  4. Balancing explainability requirements with AI capabilities is essential for various use cases.
  5. Surrogate monitoring enhances transparency in complex models like LLMs.

Why Compliance as Code is the Future (And How to Get Started)

Source: Cloud Security Alliance

Author: unknown

URL: https://cloudsecurityalliance.org/articles/why-compliance-as-code-is-the-future-and-how-to-get-started

ONE SENTENCE SUMMARY:

Compliance as code revolutionizes enterprise compliance by automating policies directly in code, enhancing efficiency, security, and readiness.

MAIN POINTS:

  1. Traditional compliance is inefficient, relying on reactive, documentation-heavy processes.
  2. Compliance as code embeds policies within infrastructure and application code.
  3. Automates compliance checks in CI/CD pipelines for continuous audit readiness.
  4. Real-time compliance verification catches issues early, reducing remediation costs.
  5. Only 46% of CISOs have implemented compliance as code as of 2025.
  6. OSCAL and OCSF provide standardized, machine-readable compliance formats.
  7. Compliance as code reduces manual work and integrates data exchange efficiently.
  8. The three-step framework: establish baselines, connect to monitoring, and assess improvements.
  9. Benefits include cost savings, improved productivity, and enhanced software quality.
  10. Successful implementation transforms compliance from a burden to an engineering solution.

TAKEAWAYS:

  1. Compliance as code reduces time, effort and enhances audit readiness.
  2. Embedding compliance into code improves development velocity and reduces risks.
  3. Standard languages like OSCAL and OCSF are crucial for automating compliance.
  4. Early issue detection through automated compliance reduces costs and vulnerabilities.
  5. Organizations experience significant cost savings and operational transformation with compliance as code.

Cybersecurity strategies to prioritize now​​ 

Source: Microsoft Security Blog

Author: Damon Becknel

URL: https://www.microsoft.com/en-us/security/blog/2025/12/04/cybersecurity-strategies-to-prioritize-now/

ONE SENTENCE SUMMARY:

Damon Becknel emphasizes prioritizing cyber hygiene, modern security standards, fingerprinting techniques, and collaboration for effective cybersecurity.

MAIN POINTS:

  1. Most cyberattacks are mundane and preventable with established best practices.
  2. Prioritize network inventory, segmentation, and blocking unnecessary IPs.
  3. Implement effective logging, monitoring, and VPN usage.
  4. Harden identity management with multifactor authentication and proper patching.
  5. Move away from outdated software and protocols to modern standards.
  6. Use phishing-resistant MFA like passkeys instead of email or SMS OTPs.
  7. Enhance network security with DMARC, DNS filtering, and updated BGP practices.
  8. Fingerprinting identifies bad actors by tracking unique user and device identifiers.
  9. Collaborate and share threat intelligence with industry partners for improved security.
  10. Establish a strong foundational security strategy to tackle mundane and novel threats.

TAKEAWAYS:

  1. Basic cyber hygiene practices are crucial for preventing common attacks.
  2. Modernizing security standards helps mitigate risks from obsolete technology.
  3. Fingerprinting improves detection of malicious actors.
  4. Collaboration enhances overall cybersecurity resilience.
  5. Strong foundational security frees resources for addressing serious threats.

Segmentation Remains a Foundational Security Concept

Source: Cisco Security Blog

Author: Aamer Akhter

URL: https://blogs.cisco.com/security/segmentation-remains-a-foundational-security-concept

ONE SENTENCE SUMMARY:

The 2025 Cisco Segmentation Report highlights segmentation as a foundational element for modern enterprise security due to its adaptability.

MAIN POINTS:

  1. Segmentation is crucial for modern enterprise security strategies.
  2. The 2025 report emphasizes segmentation’s adaptability.
  3. Cisco identifies segmentation as a foundational security cornerstone.
  4. Modern enterprises rely heavily on adaptable security measures.
  5. The report outlines the benefits of strategic segmentation.
  6. Adaptability enhances segmentation’s effectiveness.
  7. Enterprises require robust security strategies for protection.
  8. Security strategies must evolve with technological advancements.
  9. Cisco’s report provides insights into future security trends.
  10. Businesses must implement adaptable security solutions.

TAKEAWAYS:

  1. Segmentation is vital for robust enterprise security.
  2. Adaptability is key to effective security strategies.
  3. Future security trends emphasize segmentation.
  4. Enterprises need evolving security solutions.
  5. Cisco underscores segmentation’s foundational role.

How to fuse CTI with threat hunting

Source: Feedly Blog

Author: Will Thomas

URL: https://feedly.com/ti-essentials/posts/how-to-fuse-cti-with-threat-hunting

ONE SENTENCE SUMMARY:

Integrating CTI with threat hunting strengthens defenses by leveraging intelligence, frameworks, and organizational understanding for proactive security.

MAIN POINTS:

  1. Intelligence-driven hunting optimizes threat detection using sources like OSINT, commercial feeds, and internal telemetry.
  2. Effective threat hunting improves security controls, uncovers missing logs, and enhances team skills.
  3. Collaboration between CTI, SOC, and stakeholders is crucial for successful threat hunting programs.
  4. Threat hunting frameworks, like TaHiTi and S.E.A.R.C.H, provide structured methodologies for scalable operations.
  5. Requests for Hunts (RFHs) help CTI teams support specific threat detection needs.
  6. A CTI-to-hunt pipeline uses existing data and tools to enhance threat detection.
  7. Government guidance offers high-quality intelligence for advanced threat detection.
  8. Understanding your organization’s environment is essential for providing actionable intelligence.
  9. Utilizing existing tools and skills maximizes threat hunting effectiveness.
  10. Outcome-focused metrics measure the success of intelligence-driven hunting programs.

TAKEAWAYS:

  1. Strong collaboration between CTI and threat hunting teams enhances organizational security.
  2. Selecting the right framework helps structure and mature threat hunting programs.
  3. Understanding organizational vulnerabilities and attack surfaces improves intelligence application.
  4. Proactive intelligence-driven hunting identifies critical issues, such as unmonitored devices.
  5. Outcome-focused reporting demonstrates real security improvements and investment value.

Threat intelligence programs are broken, here is how to fix them

Source: Help Net Security

Author: Anamarija Pogorelec

URL: https://www.helpnetsecurity.com/2025/12/03/isaca-threat-intelligence-programs-report/

ONE SENTENCE SUMMARY:

Organizations struggle with threat data management, needing structured intelligence programs and automation to enhance detection and response effectiveness.

MAIN POINTS:

  1. Security teams gather vast threat data but struggle to improve detection and response outcomes.
  2. The complex threat environment involves criminal groups operating like supply chains.
  3. Infostealer malware and ransomware operations create significant exposure risks.
  4. Priority intelligence requirements (PIRs) provide essential direction for threat intelligence.
  5. Four types of intelligence—strategic, tactical, operational, and technical—address different business needs.
  6. An effective threat intelligence program integrates data and automates incident responses.
  7. Organizations face challenges like data overload and slow best practice adoption.
  8. Stakeholder alignment ensures PIRs remain relevant and support business growth.
  9. Automation is necessary to manage large volumes of threat data efficiently.
  10. Measurement of threat intelligence should focus on risk reduction and actionable outcomes.

TAKEAWAYS:

  1. Utilize PIRs to focus threat intelligence on specific organizational needs.
  2. Align security and business leaders to maintain relevant and effective PIRs.
  3. Implement automation to handle large volumes of threat data efficiently.
  4. Connect intelligence metrics to risk reduction and actionable outcomes.
  5. Use structured threat intelligence programs to guide enterprise risk decisions effectively.

How CISOs can prepare for the new era of short-lived TLS certificates

Source: How CISOs can prepare for the new era of short-lived TLS certificates | CSO Online

Author: unknown

URL: https://www.csoonline.com/article/4097721/how-cisos-can-prepare-for-the-new-era-of-short-lived-tls-certificates.html

ONE SENTENCE SUMMARY:

Organizations must adapt to shorter TLS certificate lifespans by enhancing automation and management to ensure security and resilience.

MAIN POINTS:

  1. TLS certificate lifespans will reduce incrementally from 398 days to 47 days by 2029.
  2. Shorter lifespans aim to improve security and were proposed by Apple and supported by major browsers.
  3. Organizations relying on manual processes must modernize before the March 2026 deadline.
  4. Automation and centralized management are vital for handling certificate renewals.
  5. ACME protocol is recommended for automated certificate issuance and renewal.
  6. Proper inventory and visibility of certificates are critical to avoid service disruptions.
  7. Communication with leadership about the business impact of expired certificates is essential.
  8. Organizations should continuously scan and alert teams on expiring certificates.
  9. Tabletop exercises can help prepare for emergency certificate replacements.
  10. Culturally adapting to ongoing certificate renewal is necessary for effective change management.

TAKEAWAYS:

  1. Invest in automation and centralized certificate management systems promptly.
  2. Use the ACME protocol to facilitate seamless certificate renewals.
  3. Maintain a comprehensive inventory of all certificates and their dependencies.
  4. Implement continuous scanning and alert systems for proactive certificate management.
  5. Prepare for emergencies with tabletop exercises to ensure rapid response capabilities.

WizOS: Powering Secured Image Adoption with AI

Source: Wiz Blog | RSS feed

Author: unknown

URL: https://www.wiz.io/blog/wizos-secured-image-adoption-with-ai

ONE SENTENCE SUMMARY:

WizOS, now generally available, offers secure container images to mitigate known vulnerabilities and supply chain risks in applications.

MAIN POINTS:

  1. WizOS helps eliminate inherited container image risks with minimal, secure, and trusted foundations.
  2. Container images from public repositories often lack security guarantees, introducing vulnerability and supply chain risks.
  3. WizOS offers near-zero CVE images with cryptographically verifiable provenance for supply chain trust.
  4. The secure package repository in WizOS allows developers to customize images easily.
  5. Wiz’s approach focuses on context-driven prioritization to reduce cloud risk effectively.
  6. The Wiz platform aids secured image adoption through visibility, risk mitigation, and enforcement of trust policies.
  7. AI capabilities assist in planning and prioritizing image migration to WizOS.
  8. Wiz MCP, integrated with AI, aids image swap processes in IDEs.
  9. WizOS product development is expanding the image catalog and streamlining adoption processes for organizations.
  10. WizOS is now available for customers, with tools to track migration and vulnerabilities.

TAKEAWAYS:

  1. Adopting WizOS helps secure cloud applications from the foundation up.
  2. Visibility and prioritization are key to successful risk management with Wiz.
  3. AI enhancements streamline migration and image swap processes.
  4. WizOS development continues to enhance image coverage and user capabilities.
  5. Customers can track image migration impacts and create custom images with Wiz integration.

Security Theater vs. Security: How to Tell the Difference

Source: Lora Vaughn – Cybersecurity Consultant & Virtual CISO

Author: Lora Vaughn

URL: https://vaughncybergroup.com/blog/security-tools-vs-theater/

ONE SENTENCE SUMMARY:

Distinguish between impressive security theater and actual risk-reducing practices to make informed decisions about security investments.

MAIN POINTS:

  1. Real-time threat visualization and AI-powered detection impress executives but may not reduce actual risks.
  2. Security theater includes annual tests, ignored SIEM alerts, and ineffective training programs.
  3. Real security involves addressing specific issues like patching known vulnerabilities and revoking unnecessary access.
  4. Effective monitoring focuses on actionable alerts and responses, not overwhelming data.
  5. Ask critical questions about new tools’ necessity, use, and impact before investing.
  6. Red flags for security theater include unjustified popularity claims and unrealistic implementation timelines.
  7. Many organizations face implementation issues, not a lack of tools.
  8. Evaluate whether new tools solve real problems or just add complexity.
  9. Focus on boring but effective security measures that address existing problems.
  10. Understand the pressure from impressive demos and ensure solutions reduce measurable risk.

TAKEAWAYS:

  1. Differentiate between visually appealing solutions and those that genuinely cut security risks.
  2. Focus on pragmatic security practices that address known vulnerabilities and improve systems.
  3. Scrutinize vendor claims and tool effectiveness with targeted questions.
  4. Invest in solutions with proven, actual benefits to your organization.
  5. Prioritize complete, optimized implementation of existing tools over acquiring new ones.

Microsoft cracks down on malicious meeting invites

Source: Help Net Security

Author: Sinisa Markovic

URL: https://www.helpnetsecurity.com/2025/11/25/enhance-microsoft-calendar-threat-protection/

ONE SENTENCE SUMMARY:

Microsoft enhances Defender for Office 365 by linking Hard Delete to calendar entry removal and strengthening domain blocking.

MAIN POINTS:

  1. Phishing attacks exploit calendar entries from auto-created Outlook invites.
  2. Microsoft updates Defender for Office 365 to remove calendar entries via Hard Delete.
  3. Security actions like Hard Delete now erase linked calendar items.
  4. Update applies across security surfaces like Explorer, Advanced Hunting, and API.
  5. Limitations include .ics files remaining untouched and reissued invites reappearing.
  6. Domain blocking update simplifies blocking for repeated URLs from the same domain.
  7. Changes streamline incident response for Security Operations Center (SOC) teams.
  8. Update aligns email and calendar cleaning processes.
  9. IT teams benefit from reduced follow-up tasks on calendar inquiries.
  10. Enhancements help reduce phishing risks and alert noise.

TAKEAWAYS:

  1. New update connects Hard Delete with calendar item removal.
  2. Domain-wide blocking reduces repetitive URL handling.
  3. Changes improve efficiency in phishing incident response.
  4. Email and calendar entries now follow a unified cleanup process.
  5. IT teams experience fewer follow-up inquiries about calendar discrepancies.

What You Can’t See Can Hurt You: Are Your Security Tools Hiding the Real Risks?

Source: Tenable Blog

Author: Hadar Landau

URL: https://www.tenable.com/blog/what-you-cant-see-can-hurt-you-are-your-security-tools-hiding-the-real-risks

ONE SENTENCE SUMMARY:

Unified security data reveals hidden risks, providing clearer insights by connecting disparate sources for effective risk reduction and prioritization.

MAIN POINTS:

  1. Disconnected tools create critical blind spots, concealing significant risks.
  2. Siloed tools generate data but offer little actionable insight.
  3. More tools don’t improve visibility; understanding asset relationships is crucial.
  4. Tenable One unifies data to prioritize business-critical issues.
  5. Biggest risks are often hidden between security tools.
  6. Each tool offers valuable data but misses compounded risks across domains.
  7. Fragmented visibility leads to an incomplete risk picture.
  8. Effective risk reduction requires tool integration, not addition.
  9. unified data reveals hidden relationships forming dangerous attack paths.
  10. Integrated data creates a connected risk story for better threat prioritization.

TAKEAWAYS:

  1. Unified data eliminates blind spots and uncovers hidden risks.
  2. Siloed tools prevent comprehensive risk insights.
  3. Understanding interrelated risks is crucial for effective security.
  4. Integrated tools improve business-level threat prioritization.
  5. A connected risk story permits confident remediation actions.

cyb3rfox/ghost: EDR/Analyst validation tool

Source: GitHub

Author: unknown

URL: https://github.com/cyb3rfox/ghost

ONE SENTENCE SUMMARY:

GHOST Framework 2.0 provides zero-footprint testing of EDR solutions through versatile remote execution and multi-target orchestration capabilities.

MAIN POINTS:

  1. GHOST offers a controlled, repeatable method for EDR testing using multiple remote execution methods.
  2. Version 2.0 adds orchestration for multi-target testing and features like pivoting support.
  3. Supports execution methods: WMI, PowerShell Remoting, and WinRS.
  4. Automatic detection of best method and lateral movement targets is included.
  5. Provides HTML reporting with visual dashboards for analysis.
  6. Multi-target orchestration supports group-based target organization and automatic pivot discovery.
  7. Interactive setup available with script Start-GHOST.ps1 for ease of use.
  8. Execution methods comparison highlights best use cases for WMI, PSRemoting, WinRS, and Auto.
  9. The framework uses JSON configuration files for target and credential management.
  10. Includes standard, advanced, and minimal test suites for EDR validation.

TAKEAWAYS:

  1. GHOST Framework leaves no footprint on target systems during testing.
  2. Multi-method execution engine allows flexibility in testing environments.
  3. Configuration is managed through JSON files, supporting customization for various needs.
  4. Comprehensive documentation includes error troubleshooting and test pattern addition.
  5. Offers robust logging and automatic path conversion for ease of use and traceability.

Ransomware gangs seize a new hostage: your AWS S3 buckets

Source: OAuth token compromise hits Salesforce ecosystem again, Gainsight impacted | CSO Online

Author: unknown

URL: https://www.csoonline.com/article/4094475/ransomware-gangs-find-a-new-hostage-your-aws-s3-buckets.html

ONE SENTENCE SUMMARY:

Ransomware operators are targeting AWS S3 buckets by exploiting cloud-native encryption and key management services, prompting enhanced security measures.

MAIN POINTS:

  1. Ransomware is shifting from on-premises to cloud storage, especially targeting AWS S3 buckets.
  2. Attackers use cloud-native encryption, key management, rather than just data theft.
  3. Techniques evolve as organizations enhance cloud defenses, abusing services like encryption management.
  4. Attackers probe S3 setups, including AWS-managed and customer-provided key management systems.
  5. S3 buckets contain critical data, making them prime targets for ransomware attacks.
  6. Attackers aim for a “complete and irreversible lockout” of data using encryption mechanisms.
  7. Five S3 ransomware variants exploit AWS’s built-in encryption, especially SSE-KMS and SSE-C.
  8. Abuse of imported key material and external key stores allows attackers to control key management.
  9. Researchers recommend hardening S3 with stricter controls and monitoring for suspicious activities.
  10. An “assume breach” approach is vital, emphasizing comprehensive security and backup strategies.

TAKEAWAYS:

  1. Organizations must enhance security protocols around cloud storage, especially AWS S3.
  2. Understanding encryption abuse in cloud environments is crucial to prevent ransomware.
  3. Implementing least privilege access and protective controls is essential for data protection.
  4. Constant monitoring of cloud environments can detect potential ransomware activities.
  5. An “assume breach” mindset ensures preparedness against sophisticated ransomware strategies.

Velociraptor WSUS Exploitation, Pt. I: WSUS-Up?

Source: Huntress Blog

Author: unknown

URL: https://www.huntress.com/blog/velociraptor-misuse-part-one-wsus-up

ONE SENTENCE SUMMARY:

Threat actors exploited a WSUS vulnerability to install Velociraptor for remote access, increasing incidents of dual-use tool abuse.

MAIN POINTS:

  1. In November, threat actors exploited a WSUS vulnerability (CVE-2025-59287) to gain initial access.
  2. Velociraptor, an open-source tool, was used for command-and-control (C2) communications.
  3. Huntress SOC observed increased misuse of Velociraptor over recent months.
  4. The WSUS vulnerability was patched by Microsoft on October 23.
  5. Cisco Talos linked Velociraptor activity to a SharePoint vulnerability called ToolShell.
  6. Threat actors installed Velociraptor with a malicious MSI from s3.wasabisys.com.
  7. PowerShell commands were used post-installation for system discovery.
  8. Dual-use tools like Cobalt Strike and Mimikatz have been similarly abused.
  9. Velociraptor is part of a larger trend of legitimate tools being misused.
  10. Further insights on Velociraptor misuse will continue in part two of the series.

TAKEAWAYS:

  1. Vigilance is crucial as legitimate tools like Velociraptor are increasingly misused for attacks.
  2. Regular patching can mitigate vulnerabilities, like the recently addressed WSUS flaw.
  3. Velociraptor’s use in attacks highlights the need for careful monitoring of network tools.
  4. Understanding tool behavior and misuse patterns can enhance incident response strategies.
  5. Expect continued evolution in the misuse of dual-purpose open-source tools by threat actors.

GlobalProtect VPN portals probed with 2.3 million scan sessions

Source: BleepingComputer

Author: Bill Toulas

URL: https://www.bleepingcomputer.com/news/security/globalprotect-vpn-portals-probed-with-23-million-scan-sessions/

ONE SENTENCE SUMMARY:

A coordinated campaign has spiked malicious scanning on Palo Alto Networks GlobalProtect VPN portals, amplifying security concerns significantly.

MAIN POINTS:

  1. Malicious activity targeting GlobalProtect VPN surged 40 times in one day.
  2. Activity began escalating on November 14, reaching a 90-day high.
  3. October saw a 500% increase in IPs scanning GlobalProtect, 91% suspicious.
  4. April reported 24,000 IPs targeting GlobalProtect, many suspicious.
  5. The surge linked to previous campaigns via fingerprints and timing.
  6. Primary attacks originated from ASNs in Germany and Canada.
  7. 2.3 million sessions targeted VPN logins between November 14 and 19.
  8. Attacks focused on US, Mexico, and Pakistan users.
  9. 80% of scanning spikes precede new security flaw disclosures.
  10. February saw active exploitation of vulnerabilities in Palo Alto Networks.

TAKEAWAYS:

  1. Coordinate security efforts to address escalating VPN portal threats.
  2. Track IP activity patterns to preempt future security disclosures.
  3. Recognize geographical attack concentration for better defense strategies.
  4. Identify imminent threats by examining historical scanning spikes.
  5. Utilize intelligence reports to inform security budget planning.

The confidence trap holding security back

Source: Help Net Security

Author: Anamarija Pogorelec

URL: https://www.helpnetsecurity.com/2025/11/20/immersive-cyber-readiness-gap-report/

ONE SENTENCE SUMMARY:

Organizations overestimate cyber readiness due to focusing on participation metrics instead of capabilities, resulting in a gap between confidence and actual performance.

MAIN POINTS:

  1. Security leaders feel prepared, but performance data reveals missed steps in scenarios.
  2. Confidence increases without a corresponding rise in capability and effectiveness.
  3. Readiness programs focus more on activity than true capability development.
  4. Training often centers on outdated, familiar threats rather than current intrusion tactics.
  5. Many security teams remain at basic skill levels, hindering progress.
  6. Business roles often excluded from simulations lead to poor coordination during incidents.
  7. Training usually aligns with compliance, not actual attack behaviors.
  8. AI-related threats are not adequately addressed in training exercises.
  9. Boards receive metrics that mask true capability, leading to a false sense of security.
  10. Effective readiness requires practicing under pressure with relevant, challenging scenarios.

TAKEAWAYS:

  1. Focus on developing true capabilities rather than merely tracking training participation.
  2. Incorporate current threat scenarios and advanced skills into training programs.
  3. Ensure business roles are included in incident response practice.
  4. Align training with real-world attacker behaviors rather than just compliance.
  5. Shift readiness evaluations from activity metrics to performance metrics.

The Cloudflare Outage May Be a Security Roadmap

Source: Krebs on Security

Author: BrianKrebs

URL: https://krebsonsecurity.com/2025/11/the-cloudflare-outage-may-be-a-security-roadmap/

ONE SENTENCE SUMMARY:

Cloudflare’s outage revealed vulnerabilities, offering organizations insights into their reliance on its services for security and functionality.

MAIN POINTS:

  1. The Cloudflare outage briefly disrupted many major websites.
  2. Some customers managed to switch away from Cloudflare during the outage.
  3. Experts recommend reviewing web application firewall logs for vulnerabilities.
  4. Cloudflare effectively blocks malicious traffic but outages expose potential weaknesses.
  5. Companies should reevaluate security practices relying on Cloudflare protection.
  6. The outage served as a network penetration test opportunity for threat actors.
  7. Nicole Scott described the outage as a necessary stress test for organizations.
  8. Organizations should consider emergency DNS or routing changes and their implications.
  9. Cloudflare’s disruption was due to a database system permissions change, not an attack.
  10. Over-reliance on single providers like Cloudflare presents a significant risk.

TAKEAWAYS:

  1. Evaluate current reliance on Cloudflare for security protections.
  2. Review and analyze logs for vulnerabilities during outages.
  3. Develop intentional fallback plans for similar future incidents.
  4. Spread dependencies across multiple providers to prevent single points of failure.
  5. Monitor security controls continuously to prevent over-reliance on single solutions.

Active Directory Trust Misclassification: Why Old Trusts Look Like Insecure External Trusts

Source: Tenable Blog

Author: Clément Notin

URL: https://www.tenable.com/blog/active-directory-trust-misclassification-why-old-trusts-look-like-insecure-external-trusts

ONE SENTENCE SUMMARY:

Tenable Research discovered Windows 2000 intra-forest trusts missing a key flag, impacting trust identification across upgraded Active Directory environments.

MAIN POINTS:

  1. Active Directory trusts originating from Windows 2000 may lack proper identification as intra-forest trusts.
  2. The TRUST_ATTRIBUTE_WITHIN_FOREST flag, introduced in Windows 2003, was not retroactively applied.
  3. Upgraded domains maintain zero trust attributes, misidentifying internal trusts as potentially insecure external ones.
  4. CrossRef objects can accurately determine if a trust is intra-forest or external.
  5. External trusts lack a dedicated flag, often appearing as trustAttributes=0.
  6. AD administrative tools may still identify correct trust types despite missing flags.
  7. Tenable conducted lab tests confirming the persistence of the legacy issue.
  8. The issue affects security-analysis tools by confusing internal and external trusts.
  9. New interpretation methods have been validated in real-world environments.
  10. Tenable’s discovery aims to improve trust management in legacy AD environments.

TAKEAWAYS:

  1. Windows 2000 intra-forest trusts may be misidentified due to absent flags.
  2. CrossRef objects offer a solution for identifying trust types.
  3. Upgrades do not resolve missing trust flags in older domains.
  4. Accurate trust interpretation is vital for exposure management tools.
  5. Awareness of this issue aids security professionals in managing legacy AD environments.

Analyze AWS Network Firewall logs using Amazon OpenSearch dashboard

Source: AWS Security Blog

Author: Hoorang Broujerdi

URL: https://aws.amazon.com/blogs/security/analyze-aws-network-firewall-logs-using-amazon-opensearch-dashboard/

ONE SENTENCE SUMMARY:

Amazon’s new dashboard for OpenSearch simplifies AWS Network Firewall log analysis, enhancing security monitoring and troubleshooting effectiveness.

MAIN POINTS:

  1. New dashboard simplifies analyzing AWS Network Firewall logs with OpenSearch, eliminating complex setup steps.
  2. Network Firewall protects Amazon VPCs by monitoring and filtering traffic with stateful inspection.
  3. Analyzing logs helps troubleshoot issues and maintain effective security controls over time.
  4. Firewall generates Flow, Alert, and TLS logs for traffic analysis.
  5. Prerequisites include having an active Network Firewall, configured CloudWatch log groups, and understanding AWS networking basics.
  6. Integration setup involves creating OpenSearch Service connections and configuring IAM permissions.
  7. A new dashboard offers insights into firewall events with customizable filters.
  8. Dashboards display top protocols and alert log analysis for detailed monitoring.
  9. Example uses include identifying traffic patterns, monitoring rule effectiveness, and troubleshooting connectivity.
  10. Cost considerations apply for using Network Firewall and OpenSearch services.

TAKEAWAYS:

  1. Streamlines firewall log analysis with a simpler dashboard setup.
  2. Provides visual insights and customizable filters for detailed security monitoring.
  3. Requires understanding of AWS services and configuration of specific logging prerequisites.
  4. Enhances operational efficiency, threat detection, and compliance monitoring.
  5. Incur charges for using AWS Network Firewall and OpenSearch services.

Microsoft is bringing native Sysmon support to Windows 11, Server 2025

Source: BleepingComputer

Author: Lawrence Abrams

URL: https://www.bleepingcomputer.com/news/microsoft/microsoft-is-bringing-native-sysmon-support-to-windows-11-server-2025/

ONE SENTENCE SUMMARY:

Microsoft will integrate Sysmon natively into Windows 11 and Windows Server 2025, simplifying monitoring, deployment, and management.

MAIN POINTS:

  1. Sysmon will be native in Windows 11 and Server 2025, eliminating standalone deployment.
  2. Integration announced by Sysinternals creator, Mark Russinovich.
  3. Sysmon logs events to the Windows Event Log for security applications.
  4. Advanced configuration enables monitoring of process tampering, DNS, file creation, and clipboard changes.
  5. Previously required individual installation, complicating management in large environments.
  6. Native integration allows installation via Windows 11 “Optional features” and updates through Windows Update.
  7. Command line activation with sysmon -i or custom config files enhances functionality.
  8. Example configuration logs executable creation in specific directories.
  9. Key events logged: process creation, network connections, process access, file creation, and tampering.
  10. Comprehensive documentation, enterprise features, and AI threat detection planned for next year.

TAKEAWAYS:

  1. Native Sysmon simplifies monitoring in Windows environments.
  2. Easier deployment and management through Windows Update.
  3. Supports custom configurations for detailed event filtering.
  4. Enhances threat detection and diagnostics in IT environments.
  5. Comprehensive documentation and AI capabilities forthcoming.

More work for admins as Google patches latest zero-day Chrome vulnerability

Source: More work for admins as Google patches latest zero-day Chrome vulnerability | CSO Online

Author: unknown

URL: https://www.csoonline.com/article/4092287/more-work-for-admins-as-google-patches-latest-zero-day-chrome-vulnerability.html

ONE SENTENCE SUMMARY:

Google urgently patched a high-severity zero-day flaw in Chrome’s V8 engine, raising security concerns for other Chromium browsers.

MAIN POINTS:

  1. Google addressed a zero-day flaw in Chrome’s V8 JavaScript engine, identified as CVE-2025-13223.
  2. Clément Lecigne from Google’s Threat Analysis Group discovered the vulnerability.
  3. The flaw has a CVSS score of 8.8 and was actively exploited.
  4. It is a Type Confusion flaw affecting multiple Chromium-based browsers.
  5. Google’s usual policy restricts detail release until a majority are updated.
  6. The V8 engine is crucial for Chromium browsers, posing widespread risk.
  7. Enterprises are advised to urgently patch to Chrome version 142.0.7444.175/.176.
  8. Type Confusion flaws can lead to memory corruption or code execution.
  9. A separate V8 vulnerability, CVE-2025-13224, was patched simultaneously.
  10. Chrome has faced two other V8 zero days in 2025 alone.

TAKEAWAYS:

  1. Urgent patching of Chrome for enterprises is critical due to high-severity flaws.
  2. Type Confusion vulnerabilities in V8 can lead to serious security risks.
  3. Multiple Chromium browsers are affected, increasing the scope of risk.
  4. Enterprises face pressure to patch quickly due to zero-day vulnerabilities.
  5. Shared components like V8 increase the impact radius of attacks.