Cortex Is the First SOC Platform to Achieve FedRAMP High Authorization

Source: Palo Alto Networks Blog Author: Brendan Powers URL: https://www.paloaltonetworks.com/blog/?p=333549

ONE SENTENCE SUMMARY:

Palo Alto Networks’ Cortex™ becomes the first AI-driven SOC platform to achieve FedRAMP High Authorization, empowering federal agencies with advanced, compliant security solutions.

MAIN POINTS:

  1. Cortex achieves FedRAMP High Authorization, meeting stringent security requirements for managing highly sensitive government data.
  2. FedRAMP High ensures compliance for systems handling law enforcement, emergency services, and healthcare data.
  3. Cortex’s AI-driven platform integrates SOC functions like EDR, SIEM, SOAR, and ASM for unified security operations.
  4. AI-powered analytics enable real-time threat detection with a 100% detection rate in MITRE ATT&CK Evaluations.
  5. Automated workflows reduce manual intervention by up to 75%, enhancing operational efficiency for SOC teams.
  6. Cortex aligns with Executive Order 14028, focusing on improving the nation’s cybersecurity through automation and efficiency.
  7. Key government certifications validate Cortex’s ability to secure critical federal operations and sensitive workloads.
  8. Unit 42 provides tailored guidance, proactive services, and incident response to support SOC transformation.
  9. Cortex Xpanse reduces attack surfaces by proactively identifying and mitigating risks across exposed assets.
  10. Federal agencies benefit from consolidated security tools under one AI-powered platform for streamlined workflows and robust defenses.

TAKEAWAYS:

  1. Cortex’s FedRAMP High Authorization sets a new standard for AI-driven security in government operations.
  2. Integrated SOC capabilities ensure simplified workflows and eliminate silos in security operations.
  3. Advanced automation and analytics deliver unmatched threat detection and reduced manual effort.
  4. Compliance with federal requirements ensures secure adoption of cutting-edge technologies by government agencies.
  5. Unit 42’s expertise strengthens SOC transformation with tailored strategies and proactive services.

89% of AI-powered APIs rely on insecure authentication mechanisms

Source: Help Net Security Author: Help Net Security URL: https://www.helpnetsecurity.com/2025/01/30/ai-powered-api-security/

ONE SENTENCE SUMMARY:

APIs have become the primary attack surface, driven by AI adoption, exposing critical vulnerabilities and emphasizing the need for robust security measures.

MAIN POINTS:

  1. APIs are now the largest attack surface, with AI driving significant API security risks.
  2. 57% of AI-powered APIs are externally accessible, and 89% use insecure authentication mechanisms.
  3. API-related vulnerabilities have increased by 1,025%, with 99% tied to injection flaws, misconfigurations, or memory corruption.
  4. API vulnerabilities now surpass traditional exploits, representing 50% of CISA-recorded exploited vulnerabilities.
  5. AI deployment heavily relies on APIs, exposing unique risks like compromised training data and intellectual property theft.
  6. Modern RESTful APIs face risks due to misconfigurations, while legacy APIs remain vulnerable to outdated designs.
  7. Authentication weaknesses and decentralized API management contribute to escalating breaches, averaging 3–7 incidents monthly.
  8. Key exploit types include injection attacks, improper authentication, CSRF, and outdated session handling mechanisms.
  9. The rise of API-driven systems in critical industries places APIs at the center of cybersecurity concerns.
  10. Organizations must implement real-time API controls to protect operations, customer trust, and enable business transformation.

TAKEAWAYS:

  1. Prioritize API security as a business imperative to counter evolving threats and vulnerabilities.
  2. Address insecure authentication mechanisms and externally accessible APIs to minimize risks.
  3. Monitor and secure API endpoints in AI tools and enterprise systems to prevent data and intellectual property breaches.
  4. Invest in real-time API controls and robust configurations to safeguard modern RESTful APIs.
  5. Recognize the centrality of APIs in cybersecurity and their role in driving innovation and business success.

The Old Ways of Vendor Risk Management Are No Longer Good Enough

Source: Dark Reading Author: Jatin Mannepalli URL: https://www.darkreading.com/vulnerabilities-threats/old-ways-vendor-risk-management-no-longer-good-enough

# ONE SENTENCE SUMMARY:
Managing third-party risk in the SaaS ecosystem requires proactive, dynamic, and data-driven strategies to address evolving security challenges effectively.

# MAIN POINTS:
1. The MOVEit supply chain attack highlighted vulnerabilities in traditional third-party risk management (TPRM) strategies.
2. SaaS adoption is growing rapidly, expanding the attack surface and increasing data flow complexity.
3. Shadow IT and unapproved SaaS apps create security blind spots, complicating risk oversight.
4. Generative AI enhances attackers' capabilities, increasing risks in SaaS integrations and supply chains.
5. Traditional security reviews, including outdated SOC 2 reports, fail to address modern SaaS security needs.
6. Real-time trust centers provide dynamic visibility into vendors' security practices for better risk management.
7. Tailored assessments with scenario-based questions uncover deeper insights into vendors' security measures.
8. Addressing skill gaps in SaaS security and API management is critical for effective TPRM.
9. Shadow IT tools, including unpaid apps and extensions, must be included in security audits.
10. Transitioning from spreadsheets to SaaS security posture management tools improves accuracy and saves time.

# TAKEAWAYS:
1. Real-time assurance tools like Drata and Sprinto enhance visibility into vendor security controls.
2. Tailored, scenario-based questionnaires provide actionable insights into vendor security practices.
3. Bridging skill gaps through training or partnerships strengthens internal SaaS security expertise.
4. Including shadow IT tools in audits reduces unexpected risks from unapproved applications.
5. Modern TPRM tools and automation streamline processes, enhancing efficiency and accuracy.

Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Execution

Source: The Hacker News Author: [email protected] (The Hacker News) URL: https://thehackernews.com/2025/01/critical-cacti-security-flaw-cve-2025.html

ONE SENTENCE SUMMARY:

A critical Cacti vulnerability (CVE-2025-22604, CVSS 9.1) enables authenticated remote code execution, urging immediate patching to version 1.2.29.

MAIN POINTS:

  1. CVE-2025-22604 is a critical flaw in the Cacti monitoring framework with a CVSS score of 9.1.
  2. The flaw allows authenticated attackers to execute arbitrary code through malformed OIDs in SNMP responses.
  3. Exploitation could lead to data theft, modification, or deletion on vulnerable servers.
  4. The vulnerability affects all Cacti versions up to and including 1.2.28.
  5. The issue has been fixed in Cacti version 1.2.29, released this week.
  6. Security researcher “u32i” discovered and reported the CVE-2025-22604 vulnerability.
  7. Another flaw, CVE-2025-24367 (CVSS 7.2), allows creation of arbitrary PHP scripts for remote code execution.
  8. CVE-2025-24367 exploits Cacti’s graph creation and template functionality in earlier versions.
  9. Organizations using Cacti should prioritize patching to version 1.2.29 to mitigate risks.
  10. Cacti vulnerabilities have been actively exploited in the past, highlighting the urgency for updates.

TAKEAWAYS:

  1. Upgrade Cacti to version 1.2.29 immediately to address CVE-2025-22604 and CVE-2025-24367 vulnerabilities.
  2. Authenticated attackers can exploit SNMP flaws for remote code execution on older Cacti versions.
  3. Data integrity risks include theft, modification, and deletion if vulnerabilities are left unpatched.
  4. Past exploitation history emphasizes the importance of timely patch application for Cacti users.
  5. Monitoring software should always be kept updated to avoid security threats.

Key Performance Indicators for Effective DSPM Implementation

Source: Wiz Blog | RSS feed Author: unknown URL: https://www.wiz.io/blog/dspm-kpis

## ONE SENTENCE SUMMARY:
Organizations can enhance their data security by leveraging KPIs and Wiz DSPM tools to proactively identify and mitigate risks.

## MAIN POINTS:
1. Traditional data security approaches often fail to address complex, distributed environments, leaving critical vulnerabilities.
2. Data Security Posture Management (DSPM) improves visibility, identifies risks, and enables proactive security measures.
3. Key Performance Indicators (KPIs) guide DSPM efforts, ensuring effectiveness and continuous improvement in security.
4. Monitoring KPIs enables real-time risk assessment, proactive threat mitigation, and team alignment on security goals.
5. Critical KPIs include data security issues, data exposure risk, and compliance posture scores.
6. Addressing "toxic combinations" in data security reduces attack paths to sensitive information.
7. Wiz DSPM provides prioritized issue lists, data discovery, and compliance monitoring for enhanced risk management.
8. Automating KPI monitoring reduces manual effort and improves accuracy in tracking security progress.
9. Integrating KPIs with organizational strategy demonstrates ROI and fosters informed decision-making.
10. Continuous improvement with Wiz DSPM features like actionable insights, compliance tracking, and seamless integration strengthens security.

## TAKEAWAYS:
1. DSPM is vital for securing sensitive data in complex, distributed environments.
2. KPIs like data exposure risk and compliance scores measure and enhance security effectiveness.
3. Automating KPI tracking with Wiz DSPM streamlines monitoring and reduces manual effort.
4. Prioritizing critical issues with Wiz tools significantly improves data security posture.
5. Continuous improvement through advanced DSPM features ensures proactive and resilient data protection.

BloodyAD: Open-source Active Directory privilege escalation framework

Source: Help Net Security Author: Mirko Zorz URL: https://www.helpnetsecurity.com/2025/01/28/bloodyad-active-directory-privilege-escalation/

## ONE SENTENCE SUMMARY:
BloodyAD is an open-source Active Directory privilege escalation framework enabling versatile, multi-platform operations through specialized LDAP interactions.

## MAIN POINTS:
1. BloodyAD facilitates privilege escalation in Active Directory using specialized LDAP calls with flexible authentication options.
2. It supports cleartext passwords, pass-the-hash, pass-the-ticket, and certificate-based authentication methods.
3. The framework operates seamlessly on Linux, macOS, and Windows platforms for maximum portability.
4. It allows privilege escalation without requiring LDAPS, enhancing operational flexibility.
5. SOCKS proxy compatibility ensures improved operational transparency during interactions with domain controllers.
6. Designed with verbosity, it helps users troubleshoot issues when domain controllers reject actions.
7. BloodyAD supports reconnaissance and privilege escalation across multi-domain infrastructures.
8. Future updates aim to enhance multi-domain testing, including displaying trusts and DNS records across domains.
9. The tool addresses the lack of Linux-based AD privilege escalation frameworks previously reliant on Windows tools like Powersploit.
10. BloodyAD is open-source, free on GitHub, and requires Python 3, MSLDAP, and dnspython.

## TAKEAWAYS:
1. BloodyAD provides a Linux-compatible alternative for Active Directory privilege escalation, addressing previous Windows tool dependencies.
2. Its multi-platform support enables versatile use across Linux, macOS, and Windows environments.
3. Flexible authentication methods expand its usability in various operational contexts.
4. Multi-domain infrastructure support opens new privilege escalation opportunities across interconnected domains.
5. The tool is open-source and freely accessible, promoting community-driven development and enhancements.

Cloud Detection Without Drowning: The Zero-Noise Approach

Source: Wiz Blog | RSS feed Author: unknown URL: https://www.wiz.io/blog/the-zero-noise-approach-to-cloud-detection

# ONE SENTENCE SUMMARY:
The Zero Noise approach helps organizations reduce cloud detection noise by prioritizing tailored alerts, feedback loops, and comprehensive triaging.

# MAIN POINTS:
1. Most companies use major cloud providers, leading to shared vulnerabilities and automated attack techniques.
2. High volumes of generic alerts overwhelm organizations, causing alert fatigue and hindering malicious activity detection.
3. The "Zero Noise" approach focuses on reducing noise by prioritizing attacker-specific, high-fidelity alerts.
4. Tailored detections based on baselines and red teaming improve accuracy and reduce unnecessary alerts.
5. Continuous feedback loops help analyze detection effectiveness, removing or enhancing noisy alerts.
6. SOCs must adopt a "no alert left behind" mentality to address all alerts and prevent future noise.
7. False positives should result in detection removal, logic improvement, or internal practice changes.
8. Real-world application of the methodology reduced noise and detected attacks on financial transaction servers.
9. Removing noisy detections saved SOC hours, while enhanced rules reduced false positives.
10. Eliminating redundant tools like PsExec minimized noise and created effective indicators of compromise.

# TAKEAWAYS:
1. Tailored alerts based on attacker behavior significantly reduce noise in cloud detection systems.
2. Continuous feedback loops ensure detections remain effective and manageable over time.
3. Addressing every alert prevents persistent false positives and reduces future alert fatigue.
4. Collaboration across teams helps identify critical assets and refine detection rules.
5. Organizational changes, like banning unnecessary tools, can drastically improve detection fidelity.

Do We Really Need The OWASP NHI Top 10?

Source: The Hacker News Author: [email protected] (The Hacker News) URL: https://thehackernews.com/2025/01/do-we-really-need-owasp-nhi-top-10.html

## ONE SENTENCE SUMMARY:
The OWASP NHI Top 10 highlights critical security risks associated with non-human identities, emphasizing their increasing importance in modern applications.

## MAIN POINTS:
1. The NHI Top 10 addresses unique security risks beyond the scope of existing OWASP Top 10 projects.  
2. Non-human identities (NHIs) include API keys, OAuth apps, IAM roles, and other machine credentials.  
3. NHIs enable critical system connectivity, making them prevalent across development and runtime environments.  
4. Ranking criteria for OWASP Top 10 risks include exploitability, impact, prevalence, and detectability.  
5. Improper offboarding of NHIs is the top risk, with over 50% of organizations lacking formal offboarding processes.  
6. Secret leakage is a leading issue, with 37% of organizations hardcoding secrets into applications.  
7. Overprivileged NHIs and insecure authentication methods expose systems to significant exploitation risks.  
8. NHI reuse and lack of environment isolation increase the blast radius of potential breaches.  
9. Vulnerable third-party NHIs in development pipelines present risks from integrations with external tools and services.  
10. Long-lived secrets and insecure cloud deployment configurations are frequently exploited vulnerabilities.

## TAKEAWAYS:
1. The NHI Top 10 addresses critical gaps in existing security frameworks for non-human identities.  
2. Proper NHI offboarding and least-privilege practices are essential to mitigate significant attack vectors.  
3. Developers must avoid insecure authentication methods and ensure strict environment isolation for NHIs.  
4. Organizations should prioritize secret management to prevent leakage and unauthorized access.  
5. Monitoring third-party NHIs and reducing overprivileged roles can minimize risks in development pipelines.

techspence/ScriptSentry: ScriptSentry finds misconfigured and dangerous logon scripts.

Source: GitHub Author: unknown URL: https://github.com/techspence/ScriptSentry

# ONE SENTENCE SUMMARY:
ScriptSentry identifies misconfigured permissions, plaintext credentials, and risky logon scripts to enhance network security.

# MAIN POINTS:
1. Unsafe UNC folder permissions grant "Everyone" full control over critical shared folders.
2. Logon scripts with weak permissions allow unauthorized access to sensitive files.
3. GPO logon scripts have insecure permissions, enabling risky user access.
4. Unsafe UNC file permissions expose critical files to "Everyone" with full control.
5. NETLOGON/SYSVOL folders have weak permissions for domain users and authenticated users.
6. Plaintext credentials are exposed in multiple scripts, risking unauthorized access.
7. Nonexistent shares referenced in scripts create vulnerabilities and potential misconfigurations.
8. Admin accounts are linked with logon scripts that can be exploited.
9. Exploitable logon scripts map to nonexistent shares, increasing the risk for admin users.
10. Identified risks include DNS exploits, plaintext passwords, and misconfigurations in folder and file permissions.

# TAKEAWAYS:
1. Address "Everyone" permissions on shared folders and files to prevent unauthorized access.
2. Secure logon scripts by restricting permissions to authorized users only.
3. Eliminate plaintext credentials from scripts to enhance password security.
4. Audit and correct nonexistent shares referenced in scripts to avoid misconfigurations.
5. Review admin accounts and their logon scripts for potential security risks.

MITRE’s Latest ATT&CK Simulations Tackles Cloud Defenses

Source: Dark Reading Author: Robert Lemos, Contributing Writer URL: https://www.darkreading.com/cybersecurity-operations/mitre-simuluations-shine-light-on-attackers-techniques

# ONE SENTENCE SUMMARY:
MITRE ATT&CK Evaluations simulate real-world cyber threats to assess and improve security tools, defenses, and organizational readiness.

# MAIN POINTS:
1. MITRE ATT&CK Evaluations test cybersecurity tools against advanced real-world threat scenarios annually.
2. The 2025 evaluation focuses on hybrid cloud attacks, response strategies, and post-incident analysis.
3. Vendors are unaware of the exact techniques chosen for evaluation, enhancing the test's unpredictability.
4. The 2024 evaluation emulated attacks from groups like LockBit, Cl0p, and North Korean state-sponsored actors.
5. Results guide vendors to improve detection, protection, and response capabilities.
6. Companies can use evaluations to inform purchasing decisions and enhance internal security operations.
7. Testing incorporates real-world threat intelligence from analysts worldwide and MITRE's own data.
8. Two testing rounds exist: managed-service (black-box) and enterprise (with technical scope provided).
9. False-positive scenarios, like benign user activity, challenge vendors' detection accuracy.
10. Evaluations aim to improve tools and defenses, offering detailed attack logs for organizational learning.

# TAKEAWAYS:
1. Evaluations simulate adversary tactics to improve vendor tools and organizational defenses.
2. Hybrid cloud threats and ransomware are key focuses for upcoming evaluations.
3. Vendors and companies can use results to refine cybersecurity strategies and playbooks.
4. Black-box and enterprise testing methods ensure robust and diverse evaluations.
5. Detailed attack mappings against the ATT&CK Framework provide actionable insights for defenders.

Hackers use Windows RID hijacking to create hidden admin account

Source: BleepingComputer Author: Bill Toulas URL: https://www.bleepingcomputer.com/news/security/hackers-use-windows-rid-hijacking-to-create-hidden-admin-account/

ONE SENTENCE SUMMARY:

North Korean hackers, linked to the Andariel group, exploit RID hijacking to stealthily elevate low-privileged Windows accounts to admin-level.

MAIN POINTS:

  1. RID hijacking modifies the RID of low-privilege accounts to gain administrative permissions in Windows systems.
  2. The attack requires SYSTEM access, which hackers achieve through vulnerabilities and tools like PsExec and JuicyPotato.
  3. Andariel, a group linked to North Korea’s Lazarus hackers, is responsible for these attacks.
  4. Hackers create hidden accounts using the “net user” command with the ‘$’ suffix for stealth.
  5. Modifications to the SAM registry enable RID hijacking, leveraging custom malware and open-source tools.
  6. SYSTEM access does not persist after reboots, prompting attackers to elevate privileges for stealth and persistence.
  7. Hackers add compromised accounts to Remote Desktop Users and Administrators groups for extended control.
  8. To cover tracks, attackers delete rogue accounts and registry keys, then restore them from backups as needed.
  9. Mitigation strategies include monitoring SAM registry changes, using multi-factor authentication, and restricting suspicious tools.
  10. RID hijacking was first disclosed in 2018 as a Windows persistence technique at DerbyCon 8.

TAKEAWAYS:

  1. RID hijacking exploits Windows security identifiers to stealthily elevate user privileges.
  2. Andariel group uses SYSTEM access and registry modifications for stealthy, persistent attacks.
  3. Hidden accounts are created and manipulated to avoid detection during these attacks.
  4. Tools like PsExec and JuicyPotato are instrumental in initial access and privilege escalation.
  5. Robust system monitoring and multi-factor authentication are crucial for mitigating RID hijacking risks.

5 Questions to Ask a Potential Privileged Access Management Vendor

Source: Cloud Security Alliance Author: unknown URL: https://www.britive.com/resource/blog/five-questions-ask-potential-pam-vendor

ONE SENTENCE SUMMARY:

Choosing the right Privileged Access Management (PAM) solution involves assessing its ability to mitigate risks, support multi-cloud environments, manage non-human identities, and enhance operational efficiency.

MAIN POINTS:

  1. Standing privileges pose significant risks, even with MFA, necessitating zero standing privileges (ZSP) and just-in-time (JIT) access.
  2. Implementation timelines and complexity vary; lightweight, agentless, SaaS-based solutions reduce deployment time and management overhead.
  3. Effective PAM solutions secure both application-level and infrastructure-level access across multi-cloud environments like AWS, Azure, and Kubernetes.
  4. Modern PAM platforms must manage and secure both human and non-human identities (NHIs) to ensure consistent policy enforcement.
  5. Centralized policy management simplifies securing NHIs like CI/CD pipelines, API keys, and machine identities.
  6. Inefficient manual workflows in legacy PAM solutions create administrative bottlenecks and delay access for engineering teams.
  7. Automating access requests, approvals, and expirations reduces IAM team burden and improves operational efficiency.
  8. Implementing ephemeral JIT permissions eliminates long-lived credentials, streamlining compliance and audit processes.
  9. Flexible, policy-driven access controls support diverse use cases while reducing friction for end users.
  10. Evaluating PAM solutions requires focusing on security, operational efficiency, and scalability for future needs.

TAKEAWAYS:

  1. Prioritize solutions offering zero standing privileges (ZSP) with just-in-time (JIT) access for enhanced security.
  2. Opt for lightweight, agentless, SaaS-based platforms to minimize deployment time and complexity.
  3. Ensure the PAM solution supports consistent access management across both multi-cloud environments and infrastructure levels.
  4. Choose platforms that manage both human and non-human identities seamlessly through centralized policy management.
  5. Streamlined, automated workflows and ephemeral permissions improve productivity while simplifying compliance processes.

Hunting-Queries-Detection-Rules/DefenderXDR/CVE-2025-21298 Zero-Click RCE.kql at main · SlimKQL/Hunting-Queries-Detection-Rules · GitHub

Source: GitHub Author: unknown URL: https://github.com/SlimKQL/Hunting-Queries-Detection-Rules/blob/main/DefenderXDR/CVE-2025-21298%20Zero-Click%20RCE.kql

# ONE SENTENCE SUMMARY:
A potential zero-click remote code execution (RCE) vulnerability, CVE-2025-21298, has been identified with detailed metadata in a file.

# MAIN POINTS:
1. CVE-2025-21298 refers to a zero-click remote code execution vulnerability.
2. The vulnerability requires no user interaction for exploitation.
3. A file named "CVE-2025-21298 Zero-Click RCE.kql" contains metadata about the issue.
4. The file comprises 18 lines, 16 of which contain executable code.
5. The total file size is 648 bytes.
6. This vulnerability could pose significant risks to affected systems.
7. The file appears to be hosted in a repository for collaborative access.
8. Specific actions on the file might currently be restricted.
9. Users are required to reload their sessions when switching accounts or logging in/out.
10. The vulnerability is critical for cybersecurity teams to address promptly.

# TAKEAWAYS:
1. Zero-click vulnerabilities are particularly dangerous as they require no user interaction.
2. CVE-2025-21298 needs urgent attention from developers and security teams.
3. Metadata in the file provides essential insights for mitigating the vulnerability.
4. Restricted file actions suggest controlled access, emphasizing its sensitivity.
5. Collaborative environments must ensure proper session management to safeguard against risks.

From qualitative to quantifiable: Transforming cyber risk management for critical infrastructure

Source: CyberScoop Author: mbracken URL: https://cyberscoop.com/from-qualitative-to-quantifiable-transforming-cyber-risk-management-for-critical-infrastructure/

# ONE SENTENCE SUMMARY:
Cyber risk quantification (CRQ) is a transformative approach for managing modern cyber threats to critical infrastructure, replacing outdated qualitative methods.

# MAIN POINTS:
1. Cyberattacks on critical infrastructure are increasingly common, executed remotely, cheaply, and with significant regional impacts.
2. Traditional cyber risk management (CRM) methods rely on subjective scoring, lacking precision for high-stakes decision-making.
3. Qualitative CRM fails to quantify financial impacts, leaving organizations ill-equipped to prioritize investments effectively.
4. Critical infrastructure sectors are prime cyberattack targets due to potential nationwide operational disruptions.
5. Cyber Risk Quantification (CRQ) provides objective, financial-based analysis for prioritizing and addressing cybersecurity risks.
6. CRQ enables organizations to weigh potential losses against mitigation costs, improving investment decisions.
7. CRQ surpasses traditional ROI methods, reframing cybersecurity spending as essential for loss prevention.
8. TSA's new disclosure requirements emphasize the need for CRQ to manage and report cyber incidents effectively.
9. Incident playbooks with CRQ-based loss valuations streamline response processes and compliance with regulations.
10. CRQ ensures organizations build proactive cybersecurity strategies aligned with enterprise priorities and regulatory mandates.

# TAKEAWAYS:
1. CRQ provides a data-driven, financial lens for prioritizing cybersecurity risks and investments.
2. Traditional qualitative methods are outdated and insufficient for today’s complex cyber threat landscape.
3. CRQ improves incident management by quantifying potential losses and aligning with compliance requirements.
4. TSA regulations highlight the growing importance of CRQ in critical infrastructure sectors.
5. Adopting CRQ strengthens cybersecurity strategies, balancing cost-efficiency and risk mitigation.

13,000 MikroTik Routers Hijacked by Botnet for Malspam and Cyberattacks

Source: The Hacker News Author: [email protected] (The Hacker News) URL: https://thehackernews.com/2025/01/13000-mikrotik-routers-hijacked-by.html

## ONE SENTENCE SUMMARY:
A global botnet of 13,000 MikroTik routers exploits misconfigured DNS records and SPF vulnerabilities to propagate malware and conduct cyberattacks.

## MAIN POINTS:
1. 13,000 hijacked MikroTik routers form a global botnet used for malware propagation through spam campaigns.
2. The campaign, dubbed "Mikro Typo," exploits misconfigured DNS records to bypass email protection techniques.
3. Attackers use freight invoice lures to deliver malicious ZIP files containing obfuscated JavaScript payloads.
4. The botnet leverages a PowerShell script to connect compromised devices to a command-and-control server.
5. Vulnerable MikroTik firmware, including those affected by CVE-2023-30799, facilitates botnet exploitation.
6. SOCKS proxies on compromised routers mask malicious traffic origins, complicating detection and attribution.
7. Misconfigured SPF TXT records with the "+all" option enable attackers to spoof legitimate domains.
8. The botnet supports malicious activities like DDoS attacks, phishing, and data theft.
9. Lack of authentication for proxies allows other threat actors to exploit the botnet infrastructure.
10. MikroTik owners are advised to update firmware and secure accounts to prevent exploitation.

## TAKEAWAYS:
1. Keeping MikroTik routers updated and secured is critical to mitigating botnet exploitation risks.
2. Misconfigured SPF records with permissive settings can undermine email security safeguards.
3. SOCKS proxies complicate tracking and mitigation of malicious botnet activities.
4. The botnet's versatility enables a range of threats, from phishing to DDoS attacks.
5. Robust security measures are essential to address vulnerabilities in IoT devices like MikroTik routers.

jakehildreth/Locksmith: A small tool built to find and fix common misconfigurations in Active Directory Certificate Services.

Source: GitHub Author: unknown URL: https://github.com/jakehildreth/Locksmith

# ONE SENTENCE SUMMARY:
Locksmith is a PowerShell tool designed to detect and fix common Active Directory Certificate Services (AD CS) misconfigurations.

# MAIN POINTS:
1. Locksmith must be run on a domain-joined system with ActiveDirectory and ServerManager PowerShell modules installed.
2. Administrative rights may be required for some checks and remediation tasks.
3. Locksmith can be installed via PowerShell Gallery or used as a standalone script.
4. Mode 0 identifies and outputs AD CS issues in a console table format.
5. Mode 1 identifies issues and fixes, outputting them in a console list format.
6. Mode 2 outputs identified issues to a CSV file named ADCSIssues.CSV.
7. Mode 3 outputs issues and example fixes to a CSV file named ADCSRemediation.CSV.
8. Mode 4 identifies and offers to fix all misconfigurations, warning of potential operational impacts.
9. The -Scans parameter allows targeted scans for specific vulnerabilities or interactive selection of scans.
10. Example outputs for all modes and instructions are available on Locksmith's GitHub repository.

# TAKEAWAYS:
1. Locksmith simplifies AD CS misconfiguration detection and remediation for administrators.
2. Multiple modes allow tailored outputs, from console summaries to detailed CSV reports.
3. Mode 4 is an all-in-one solution for automatic issue identification and remediation.
4. The -Scans parameter enhances flexibility by allowing specific or interactive vulnerability scans.
5. Comprehensive installation and usage instructions ensure accessibility for various user preferences.

Active Directory Hardening Series – Part 7 – Implementing Least Privilege

Source: TECHCOMMUNITY.MICROSOFT.COM Author: JerryDevore URL: https://techcommunity.microsoft.com/blog/coreinfrastructureandsecurityblog/active-directory-hardening-series—part-7-%e2%80%93-implementing-least-privilege/4366626

# ONE SENTENCE SUMMARY:
The blog emphasizes the importance of implementing least privilege in Active Directory to enhance security and reduce risks.

# MAIN POINTS:
1. Least privilege is a core principle of Zero Trust and achievable using native Active Directory features.
2. Overprivileged service accounts should be reviewed and remediated to minimize security risks.
3. Restricting local administrative rights on devices reduces malware installation and credential theft.
4. Harden User Rights Assignments (URA) to eliminate unnecessary privileges and align with security baselines.
5. Group Policy delegations should be minimized to prevent attackers from exploiting GPOs.
6. Organizational Unit (OU) permissions need regular audits to avoid privilege accumulation over time.
7. Privileged groups like Domain Admins and Enterprise Admins must have strictly limited memberships.
8. Implement constrained Kerberos delegation to reduce risks from compromised accounts or services.
9. Split permissions for Exchange servers can reduce excessive privileges in hybrid environments.
10. Credential vaulting must be paired with proper account tiering and monitoring to mitigate risks.

# TAKEAWAYS:
1. Regularly audit and remove unnecessary privileged accounts and permissions in Active Directory.
2. Use tools like AD ACL Scanner and Policy Analyzer to identify and remediate privilege issues.
3. Prioritize the use of constrained delegation and minimize Kerberos trust configurations.
4. Separate accounts by security tiers to ensure privileged accounts are not exposed in lower-tier systems.
5. Document changes and actively monitor privileged access to maintain a secure environment.

Command Line Underdog: WMIC in Action

Source: TrustedSec Author: Oddvar Moe URL: https://trustedsec.com/blog/command-line-underdog-wmic-in-action

ONE SENTENCE SUMMARY:
The author reflects on their experience with terminal server application breakouts during a recent Red Team engagement.

MAIN POINTS:

  1. Author primarily engages in Red Team activities.
  2. Terminal server application breakouts are less common in their work.
  3. Recent engagement provided a refreshing experience.
  4. Engaging with terminal servers can enhance skills.
  5. Breakouts involve manipulating applications within a terminal server environment.
  6. The experience reminded the author of typical strategies.
  7. Learning from practical engagements is valuable for skill development.
  8. Red Teams focus on simulating attacks to identify vulnerabilities.
  9. Terminal server breakouts can demonstrate security weaknesses effectively.
  10. Hands-on experiences contribute to a deeper understanding of cybersecurity.

TAKEAWAYS:

  1. Engaging in diverse cybersecurity tasks enhances overall expertise.
  2. Practical experiences reinforce theoretical knowledge in security.
  3. Terminal server breakouts are useful for testing application security.
  4. Continuous learning is vital in the ever-evolving cybersecurity field.
  5. Red Team exercises provide insights into potential vulnerabilities.

How to Address CVE-2025-21307 Without a Patch Before the Weekend

Source: Qualys Security Blog Author: Eran Livne URL: https://blog.qualys.com/product-tech/2025/01/17/how-to-address-cve-2025-21307-without-a-patch-before-the-weekend

ONE SENTENCE SUMMARY:

Microsoft’s January 2025 Patch Tuesday addresses a critical CVE-2025-21307 vulnerability in Windows RMCAST with a CVSS score of 9.8, offering patching and mitigation solutions to reduce risk before full deployment.

MAIN POINTS:

  1. CVE-2025-21307 affects the Windows Reliable Multicast Transport Driver (RMCAST) with a critical CVSS score of 9.8.
  2. The vulnerability allows remote attackers to execute arbitrary code via specially crafted packets to a Windows PGM socket.
  3. RMCAST facilitates reliable multicast communication, commonly used in video streaming and financial data distribution.
  4. The core issue stems from the lack of authentication in the Pragmatic General Multicast (PGM) protocol.
  5. Successful exploitation requires a program actively listening to a PGM port on the system.
  6. Applying the Microsoft patch requires a server reboot and extensive testing, delaying deployment in many organizations.
  7. Delayed patch deployment creates opportunities for attackers to exploit unpatched vulnerabilities on critical systems.
  8. Qualys offers mitigation techniques, like disabling the MSMQ service, to reduce risk without immediately applying patches.
  9. The MSMQ service is non-essential for most servers, making its temporary disablement a low-risk mitigation measure.
  10. Organizations can leverage Qualys TruRisk Eliminate for rapid mitigation and risk reduction before deploying permanent patches.

TAKEAWAYS:

  1. CVE-2025-21307 poses a critical threat due to the unauthenticated execution vulnerability in Windows RMCAST.
  2. Microsoft’s patch requires careful testing and server reboots, delaying immediate deployment in production environments.
  3. Mitigation strategies, such as disabling MSMQ, can reduce risk with minimal operational disruption.
  4. Qualys provides tools and scripts to help organizations implement mitigation techniques quickly and efficiently.
  5. Rapid response to critical vulnerabilities, even without patching, is vital to prevent exploitation by attackers.

Microsoft expands testing of Windows 11 admin protection feature

Source: BleepingComputer Author: Sergiu Gatlan URL: https://www.bleepingcomputer.com/news/security/microsoft-expands-testing-of-windows-11-admin-protection-feature/

ONE SENTENCE SUMMARY:

Microsoft enhances Windows 11 security with admin protection, requiring Windows Hello authentication for critical system changes.

MAIN POINTS:

  1. Windows 11 admin protection tests expanded for Insiders to enable from Windows Security settings.
  2. Admin protection uses a just-in-time elevation mechanism and Windows Hello authentication.
  3. Logged-in admin users have standard permissions, needing authentication for app installations or registry changes.
  4. Authentication prompts are more difficult to bypass than traditional User Account Control (UAC).
  5. Admin protection is off by default and requires group policy or MDM tools for activation.
  6. Windows home users can enable admin protection through Windows Security settings.
  7. A reboot is necessary after changing the admin protection setting.
  8. New “Quick Machine Recovery” feature will launch in early 2025 for fixing unbootable devices.
  9. Upcoming features include Config Refresh and Zero Trust DNS for enhanced admin support.
  10. Hotpatching is being tested for seamless security updates without rebooting in Windows 11.

TAKEAWAYS:

  1. Admin protection enhances security by limiting admin permissions and requiring verification for critical actions.
  2. Users can enable admin protection independently, improving accessibility for home users.
  3. Upcoming recovery features will assist in managing unbootable devices efficiently.
  4. Continuous updates in Windows 11 reflect Microsoft’s commitment to cybersecurity.
  5. Testing new features like hotpatching demonstrates a focus on user convenience and system stability.

One Active Directory Account Can Be Your Best Early Warning

Source: Black Hills Information Security Author: BHIS URL: https://www.blackhillsinfosec.com/one-active-directory-account-can-be-your-best-early-warning/

ONE SENTENCE SUMMARY:

Jordan discusses Active Directory detection techniques that can catch common adversarial activities early through specific account monitoring.

MAIN POINTS:

  1. One AD account can provide three early detection methods for adversarial activities.
  2. Active Directory enumeration can be achieved using ADExplorer, BloodHound, and LDP.exe.
  3. Kerberoasting and service principal attacks are common threats to monitor.
  4. Password spraying and credential stuffing are prevalent attack methods.
  5. A lab environment can be deployed on Microsoft Azure for practical exercises.
  6. PowerShell commands can create user accounts and set audit rules in AD.
  7. Event IDs 4624, 4625, and 4662 are crucial for monitoring account activities.
  8. KQL queries help in detecting specific events related to user account access.
  9. Creating alerts in Microsoft Sentinel can enhance security monitoring.
  10. A methodology for detection engineering includes creating decoy accounts and setting audit rules.

TAKEAWAYS:

  1. Implement early detection methods for adversarial activities in Active Directory.
  2. Utilize PowerShell and KQL queries for effective monitoring and alerting.
  3. Regularly audit and analyze event logs for signs of compromise.
  4. Engage in hands-on lab exercises to understand AD security better.
  5. Stay updated with common attack techniques to enhance security measures.

Certificate Awareness & Automated Renewal with Qualys CertView

Source: Qualys Security Blog Author: Marcus Burrows URL: https://blog.qualys.com/product-tech/2025/01/15/certificate-awareness-automated-renewal-with-qualys-certview

ONE SENTENCE SUMMARY:

Managing digital certificates is essential yet challenging for organizations, but Qualys CertView offers solutions for visibility and risk reduction.

MAIN POINTS:

  1. Digital certificates are crucial for accessing various online services.
  2. Poor management of certificates can lead to significant organizational risks.
  3. Qualys CertView provides visibility into certificate configurations and statuses.
  4. The tool helps measure and eliminate risks associated with weak certificates.
  5. CertView allows unlimited external scans for proactive certificate management.
  6. A grading system categorizes certificates based on security parameters.
  7. Users receive alerts about expiring certificates to prevent outages.
  8. The tool enforces organizational standards for certificate compliance.
  9. Integration with DigiCert streamlines the renewal process for certificates.
  10. Upcoming features will include automated certificate renewal using ACME.

TAKEAWAYS:

  1. Qualys CertView enhances visibility and management of digital certificates.
  2. Proactive monitoring helps avoid service disruptions from expired certificates.
  3. A grading system simplifies risk assessment for security teams.
  4. Alerts ensure timely communication about certificate expirations to stakeholders.
  5. Automation of renewals will streamline certificate lifecycle management processes.

Undercover Operations: Scraping the Cybercrime Underground

Source: SANS Blog Author: unknown URL: https://www.sans.org/blog/undercover-operations-scraping-the-cybercrime-underground/

ONE SENTENCE SUMMARY:

Web scraping is essential for cybercrime intelligence, enabling analysts to gather data, monitor threats, and enhance cybersecurity measures.

MAIN POINTS:

  1. Web scraping automates data extraction from websites, crucial for cybercrime intelligence analysis.
  2. Analysts monitor dark web forums and marketplaces using scraping to identify emerging threats.
  3. Python libraries like BeautifulSoup and Scrapy are popular tools for web scraping tasks.
  4. Anti-scraping mechanisms include CAPTCHAs, user agent detection, and IP address tracking to prevent data collection.
  5. Countermeasures for scraping include using proxies, rotating user agents, and mimicking human behavior.
  6. The ELK stack (Elasticsearch, Logstash, Kibana) is vital for storing and analyzing scraped data.
  7. Case studies illustrate scraping’s practical applications in investigating cybercriminal activities and data leaks.
  8. Large Language Models (LLMs) assist in generating scraping scripts and analyzing scraped data efficiently.
  9. Continuous adaptation to anti-scraping techniques is necessary for successful scraping operations.
  10. Cybercrime intelligence professionals can enhance their skills through specialized training courses like SANS FOR589.

TAKEAWAYS:

  1. Web scraping is a powerful tool for enhancing cybercrime intelligence efforts.
  2. Understanding and countering anti-scraping measures is critical for successful data collection.
  3. Efficient data storage and analysis are essential for extracting actionable insights from scraping.
  4. Integrating LLMs can streamline scraping operations and improve data analysis.
  5. Continuous learning and adaptation are necessary to stay ahead in the evolving cybercrime landscape.

CISA Releases Microsoft Expanded Cloud Logs Implementation Playbook

Source: All CISA Advisories Author: CISA URL: https://www.cisa.gov/news-events/alerts/2025/01/15/cisa-releases-microsoft-expanded-cloud-logs-implementation-playbook

ONE SENTENCE SUMMARY:

CISA’s playbook assists organizations in utilizing Microsoft Purview Audit logs for enhanced cybersecurity and compliance investigations.

MAIN POINTS:

  1. CISA released a playbook for utilizing Microsoft Purview Audit logs.
  2. The guide helps detect advanced intrusion techniques effectively.
  3. It includes methodologies for analyzing expanded cloud logs.
  4. Newly introduced logs support forensic and compliance investigations.
  5. Critical events tracked include accessed mail items and user searches.
  6. Instructions for integrating logs with Microsoft Sentinel and Splunk SIEM.
  7. Discusses significant events in Microsoft 365 services, like Teams.
  8. Encourages organizations to operationalize these logs for cybersecurity.
  9. Aimed at empowering technical personnel in security operations.
  10. Promotes proactive defense against potential cyber threats.

TAKEAWAYS:

  1. The playbook enhances cybersecurity operations using Microsoft Purview logs.
  2. Understanding log events is crucial for effective incident response.
  3. Integration with SIEM systems is essential for comprehensive monitoring.
  4. Awareness of M365 events can improve overall security posture.
  5. Organizations should actively implement the playbook’s recommendations.