Author: Mark

  • SonicWall Confirms Patched Vulnerability Behind Recent VPN Attacks, Not a Zero-Day

    SonicWall Confirms Patched Vulnerability Behind Recent VPN Attacks, Not a Zero-Day

    Aug 07, 2025Ravie LakshmananNetwork Security / Vulnerability

    SonicWall has revealed that the recent spike in activity targeting its Gen 7 and newer firewalls with SSL VPN enabled is related to an older, now-patched bug and password reuse.

    “We now have high confidence that the recent SSL VPN activity is not connected to a zero-day vulnerability,” the company said. “Instead, there is a significant correlation with threat activity related to CVE-2024-40766.”

    CVE-2024-40766 (CVSS score: 9.3) was first disclosed by SonicWall in August 2024, calling it an improper access control issue that could allow malicious actors unauthorized access to the devices.

    “An improper access control vulnerability has been identified in the SonicWall SonicOS management access, potentially leading to unauthorized resource access and, in specific conditions, causing the firewall to crash,” it noted in an advisory at the time.

    Identity Security Risk Assessment

    SonicWall also said it’s investigating less than 40 incidents related to this activity, and that many of the incidents are related to migrations from Gen 6 to Gen 7 firewalls without resetting the local user passwords, a crucial recommendation action as part of CVE-2024-40766.

    Furthermore, the company pointed out that SonicOS 7.3 has additional protection against brute-force password and multi-factor authentication (MFA) attacks. The updated guidance offered by the company is below –

    • Update firmware to SonicOS version 7.3.0
    • Reset all local user account passwords for any accounts with SSLVPN access, particularly those that were carried over during migration from Gen 6 to Gen 7
    • Enable Botnet Protection and Geo-IP Filtering
    • Enforce MFA and strong password policies
    • Remove unused or inactive user accounts

    The development comes as multiple security vendors reported observing a surge in attacks exploiting SonicWall SSL VPN appliances for Akira ransomware attacks.


    Source: thehackernews.com…

  • Microsoft Discloses Exchange Server Flaw Enabling Silent Cloud Access in Hybrid Setups

    Microsoft Discloses Exchange Server Flaw Enabling Silent Cloud Access in Hybrid Setups

    Aug 07, 2025Ravie LakshmananVulnerability / Threat Detection

    Microsoft has released an advisory for a high-severity security flaw affecting on-premise versions of Exchange Server that could allow an attacker to gain elevated privileges under certain conditions.

    The vulnerability, tracked as CVE-2025-53786, carries a CVSS score of 8.0. Dirk-jan Mollema with Outsider Security has been acknowledged for reporting the bug.

    “In an Exchange hybrid deployment, an attacker who first gains administrative access to an on-premises Exchange server could potentially escalate privileges within the organization’s connected cloud environment without leaving easily detectable and auditable traces,” the tech giant said in the alert.

    “This risk arises because Exchange Server and Exchange Online share the same service principal in hybrid configurations.”

    Successful exploitation of the flaw could allow an attacker to escalate privileges within the organization’s connected cloud environment without leaving easily detectable and auditable traces, the company added. However, the attack hinges on the threat actor already having administrator access to an Exchange Server.

    Cybersecurity

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA), in a bulletin of its own, said the vulnerability could impact the identity integrity of an organization’s Exchange Online service if left unpatched.

    As mitigations, customers are recommended to review Exchange Server security changes for hybrid deployments, install the April 2025 Hot Fix (or newer), and follow the configuration instructions.

    “If you’ve previously configured Exchange hybrid or OAuth authentication between Exchange Server and your Exchange Online organization but no longer use it, make sure to reset the service principal’s keyCredentials,” Microsoft said.

    The development comes as the Windows maker said it will begin temporarily blocking Exchange Web Services (EWS) traffic using the Exchange Online shared service principal starting this month in an effort to increase the customer adoption of the dedicated Exchange hybrid app and improve the security posture of the hybrid environment.

    Microsoft’s advisory for CVE-2025-53786 also coincides with CISA’s analysis of various malicious artifacts deployed following the exploitation of recently disclosed SharePoint flaws, collectively tracked as ToolShell.

    Identity Security Risk Assessment

    This includes two Base64-encoded DLL binaries and four Active Server Page Extended (ASPX) files that are designed to retrieve machine key settings within an ASP.NET application’s configuration and act as a web shell to execute commands and upload files.

    “Cyber threat actors could leverage this malware to steal cryptographic keys and execute a Base64-encoded PowerShell command to fingerprint the host system and exfiltrate data,” the agency said.

    CISA is also urging entities to disconnect public-facing versions of Exchange Server or SharePoint Server that have reached their end-of-life (EOL) or end-of-service from the internet, not to mention discontinue the use of outdated versions.


    Source: thehackernews.com…

  • Webinar: How to Stop Python Supply Chain Attacks—and the Expert Tools You Need

    Webinar: How to Stop Python Supply Chain Attacks—and the Expert Tools You Need

    Aug 07, 2025The Hacker NewsDevSecOps / Supply Chain Security

    Python is everywhere in modern software. From machine learning models to production microservices, chances are your code—and your business—depends on Python packages you didn’t write.

    But in 2025, that trust comes with a serious risk.

    Every few weeks, we’re seeing fresh headlines about malicious packages uploaded to the Python Package Index (PyPI)—many going undetected until after they’ve caused real harm. One of the most dangerous recent examples? In December 2024, attackers quietly compromised the Ultralytics YOLO package, widely used in computer vision applications. It was downloaded thousands of times before anyone noticed.

    This wasn’t an isolated event. This is the new normal.

    Python supply chain attacks are rising fast—and your next pip install could be the weakest link. Join our webinar to learn what’s really happening, what’s coming next, and how to secure your code with confidence. Don’t wait for a breach. Watch this webinar now and take control..

    What’s Really Going On?

    Attackers are exploiting weak links in the open-source supply chain. They’re using tricks like:

    • Typo-squatting: Uploading fake packages with names like requessts or urlib.
    • Repojacking: Hijacking abandoned GitHub repos once linked to trusted packages.
    • Slop-squatting: Publishing popular misspellings before a legit maintainer claims them.

    Once a developer installs one of these packages—intentionally or not—it’s game over.

    And it’s not just rogue packages. Even the official Python container image ships with critical vulnerabilities. At the time of writing, there are over 100 high and critical CVEs in the standard Python base image. Fixing them isn’t easy, either. That’s the “my boss told me to fix Ubuntu” problem—when your app team inherits infra problems no one wants to own.

    It’s Time to Treat Python Supply Chain Security Like a First-Class Problem

    The traditional approach—”just pip install and move on”—won’t cut it anymore. Whether you’re a developer, a security engineer, or running production systems, you need visibility and control over what you’re pulling in.

    And here’s the good news: you can secure your Python environment without breaking your workflow. You just need the right tools, and a clear playbook.

    That’s where this webinar comes in.

    The Hacker News

    In this session, we’ll walk through:

    • The Anatomy of Modern Python Supply Chain Attacks: What happened in recent PyPI incidents—and why they keep happening.
    • What You Can Do Today: From pip install hygiene to using tools like pip-audit, Sigstore, and SBOMs.
    • Behind the Scenes: Sigstore & SLSA: How modern signing and provenance frameworks are changing how we trust code.
    • How PyPI is Responding: The latest ecosystem-wide changes and what they mean for package consumers.
    • Zero-Trust for Your Python Stack: Using Chainguard Containers and Chainguard Libraries to ship secure, CVE-free code out of the box.

    The threats are getting smarter. The tooling is getting better. But most teams are stuck somewhere in the middle—relying on default images, no validation, and hoping their dependencies don’t betray them.

    You don’t have to become a security expert overnight—but you do need a roadmap. Whether you’re early in your journey or already doing audits and signing, this session will help you take your Python supply chain to the next level.

    Watch this Webinar Now

    Your application is only as secure as the weakest import. It’s time to stop trusting blindly and start verifying. Join us. Get practical. Get secure.

    Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


    Source: thehackernews.com…

  • Researchers Uncover ECScape Flaw in Amazon ECS Enabling Cross-Task Credential Theft

    Researchers Uncover ECScape Flaw in Amazon ECS Enabling Cross-Task Credential Theft

    Aug 06, 2025Ravie LakshmananDevOps / Container Security

    Cybersecurity researchers have demonstrated an “end-to-end privilege escalation chain” in Amazon Elastic Container Service (ECS) that could be exploited by an attacker to conduct lateral movement, access sensitive data, and seize control of the cloud environment.

    The attack technique has been codenamed ECScape by Sweet Security researcher Naor Haziz, who presented the findings today at the Black Hat USA security conference that’s being held in Las Vegas.

    “We identified a way to abuse an undocumented ECS internal protocol to grab AWS credentials belonging to other ECS tasks on the same EC2 instance,” Haziz said in a report shared with The Hacker News. “A malicious container with a low‑privileged IAM [Identity and Access Management] role can obtain the permissions of a higher‑privileged container running on the same host.”

    Amazon ECS is a fully-managed container orchestration service that allows users to deploy, manage, and scale containerized applications, while integrating with Amazon Web Services (AWS) to run container workloads in the cloud.

    The vulnerability identified by Sweet Security essentially allows for privilege escalation by allowing a low-privileged task running on an ECS instance to hijack the IAM privileges of a higher-privileged container on the same EC2 machine by stealing its credentials.

    In other words, a malicious app in an ECS cluster could assume the role of a more privileged task. This is facilitated by taking advantage of a metadata service running at 169.254.170[.]2 that exposes the temporary credentials associated with the task’s IAM role.

    Cybersecurity

    While this approach ensures that each task gets credentials for its IAM role and they are delivered at runtime, a leak of the ECS agent’s identity could permit an attacker to impersonate the agent and obtain credentials for any task on the host. The entire sequence is as follows –

    • Obtain the host’s IAM role credentials (EC2 Instance Role) so as to impersonate the agent
    • Discover the ECS control plane endpoint that the agent talks to
    • Gather the necessary identifiers (cluster name/ARN, container instance ARN, Agent version information, Docker version, ACS protocol version, and Sequence number) to authenticate as the agent using the Task Metadata endpoint and ECS introspection API
    • Forge and sign the Agent Communication Service (ACS) WebSocket Request impersonating the agent with the sendCredentials parameter set to “true”
    • Harvest credentials for all running tasks on that instance

    “The forged agent channel also remains stealthy,” Haziz said. “Our malicious session mimics the agent’s expected behavior – acknowledging messages, incrementing sequence numbers, sending heartbeats – so nothing seems amiss.”

    “By impersonating the agent’s upstream connection, ECScape completely collapses that trust model: one compromised container can passively collect every other task’s IAM role credentials on the same EC2 instance and immediately act with those privileges.”

    ECScape can have severe consequences when running ECS tasks on shared EC2 hosts, as it opens the door to cross-task privilege escalation, secrets exposure, and metadata exfiltration.

    Following responsible disclosure, Amazon has emphasized the need for customers to adopt stronger isolation models where applicable, and make it clear in its documentation that there is no task isolation in EC2 and that “containers can potentially access credentials for other tasks on the same container instance.”

    As mitigations, it’s advised to avoid deploying high-privilege tasks alongside untrusted or low-privilege tasks on the same instance, use AWS Fargate for true isolation, disable or restrict the instance metadata service (IMDS) access for tasks, limit ECS agent permissions, and set up CloudTrail alerts to detect unusual usage of IAM roles.

    “The core lesson is that you should treat each container as potentially compromiseable and rigorously constrain its blast radius,” Haziz said. “AWS’s convenient abstractions (task roles, metadata service, etc.) make life easier for developers, but when multiple tasks with different privilege levels share an underlying host, their security is only as strong as the mechanisms isolating them – mechanisms which can have subtle weaknesses.”

    Identity Security Risk Assessment

    The development comes in the wake of several cloud-related security weaknesses that have been reported in recent weeks –

    • A race condition in Google Cloud Build’s GitHub integration that could have allowed an attacker to bypass maintainer review and build un-reviewed code after a “/gcbrun” command is issued by the maintainer
    • A remote code execution vulnerability in Oracle Cloud Infrastructure (OCI) Code Editor that an attacker could use to hijack a victim’s Cloud Shell environment and potentially pivot across OCI services by tricking a victim, already logged into Oracle Cloud, to visit a malicious HTML page hosted on a server by means of a drive-by attack
    • An attack technique called I SPy that exploits a Microsoft first-party application’s Service principal (SP) in Entra ID for persistence and privilege escalation via federated authentication
    • A privilege escalation vulnerability in the Azure Machine Learning service that allows an attacker with only Storage Account access to modify invoker scripts stored in the AML storage account and execute arbitrary code within an AML pipeline, enabling them to extract secrets from Azure Key Vaults, escalate privileges, and gain broader access to cloud resources
    • A scope vulnerability in the legacy AmazonGuardDutyFullAccess AWS managed policy that could allow a full organizational takeover from a compromised member account by registering an arbitrary delegated administrator
    • An attack technique that abuses Azure Arc for privilege escalation by leveraging the Azure Connected Machine Resource Administrator role and as a persistence mechanism by setting up as command-and-control (C2)
    • A case of over-privileged Azure built-in Reader roles and a vulnerability in Azure API that could be chained by an attacker to leak VPN keys and then use the key to gain access to both internal cloud assets and on-premises networks
    • A supply chain compromise vulnerability in Google Gerrit called GerriScary that enabled unauthorized code submissions to at least 18 Google projects, including ChromiumOS (CVE-2025-1568, CVSS score: 8.8), Chromium, Dart, and Bazel, by exploiting misconfigurations in the default “addPatchSet” permission, the voting system’s label handling, and a race condition with bot code-submission timings during the code merge process
    • A Google Cloud Platform misconfiguration that exposed the subnetworks used for member exchanges at Internet Exchange Points (IXPs), thereby allowing attackers to potentially abuse Google’s cloud infrastructure to gain unauthorized access to internal IXP LANs.
    • An extension of a Google Cloud privilege escalation vulnerability called ConfusedFunction that can be adapted to other cloud platforms like AWS and Azure using AWS Lambda and Azure Functions, respectively, in addition to extending it to perform environment enumeration

    “The most effective mitigation strategy to protect your environment from similar threat actor behavior is to ensure that all SAs [Service Account] within your cloud environment adhere to the principle of least privilege and that no legacy cloud SAs are still in use,” Talos said. “Ensure that all cloud services and dependencies are up to date with the latest security patches. If legacy SAs are present, replace them with least-privilege SAs.”


    Source: thehackernews.com…

  • Fake VPN and Spam Blocker Apps Tied to VexTrio Used in Ad Fraud, Subscription Scams

    Fake VPN and Spam Blocker Apps Tied to VexTrio Used in Ad Fraud, Subscription Scams

    The malicious ad tech purveyor known as VexTrio Viper has been observed developing several malicious apps that have been published on Apple and Google’s official app storefronts under the guise of seemingly useful applications.

    These apps masquerade as VPNs, device “monitoring” apps, RAM cleaners, dating services, and spam blockers, DNS threat intelligence firm Infoblox said in an exhaustive analysis shared with The Hacker News.

    “They released apps under several developer names, including HolaCode, LocoMind, Hugmi, Klover Group, and AlphaScale Media,” the company said. “Available in the Google Play and Apple store, these have been downloaded millions of times in aggregate.”

    These fake apps, once installed, deceive users into signing up for subscriptions that are difficult to cancel, flood them with ads, and part with personal information like email addresses. It’s worth noting that LocoMind was previously flagged by Cyjax as part of a phishing campaign serving ads that falsely claim their devices have been damaged.

    Cybersecurity

    One such Android app is Spam Shield block, which purports to be a spam blocker for push notifications but, in reality, charges users several times after convincing them to enroll in a subscription.

    “Right away it asks for money, and if you don’t, the ads are so disruptive that I uninstalled it before I was even able to try it,” one user said in a review of the app on the Google Play Store.

    Another review went: “This app is supposed to be $14.99 a month. During the month of February I have been billed weekly for $14.99 that comes to $70 monthly/$720 a year. NOT WORTH IT. And having problems trying to uninstall it. They tell you one price and then they turn around and charge you something else. They’re probably hoping that you won’t see it. Or it will be too late to get a refund. All I want is this junk off of my phone.”

    How threat actors leverage compromised sites and smartlinks to earn money

    The new findings lay bare the scale of the multinational criminal enterprise that’s VexTrio Viper, which includes operating traffic distribution services (TDSes) to redirect massive volumes of internet traffic to scams through their advertising networks since 2015, as well as managing payment processors such as Pay Salsa and email validation tools like DataSnap.

    “VexTrio and their partners are successful in part because their businesses are obfuscated,” the company said. “But a larger part of their success is likely because they stick to fraud, where they know there is less risk of consequences.”

    VexTrio is known for running what’s called a commercial affiliate network, serving as an intermediary between malware distributors who have, for example, compromised a collection of WordPress websites with malicious injects (aka publishing affiliates) and threat actors who advertise various fraudulent schemes ranging from sweepstakes to crypto scams (aka advertising affiliates).

    The TDS is assessed to be created by a shell company called AdsPro Group, with key figures behind the organization from Italy, Belarus, and Russia engaging in fraudulent activity since at least 2004, before expanding their operations to Bulgaria, Moldova, Romania, Estonia, and the Czechia around 2015. In all, over 100 companies and brands have been linked to VexTrio.

    “Russian organized crime groups began building an empire within ad tech starting in or around 2015,” Dr. Renée Burton, VP of Infoblox Threat Intel, told The Hacker News. “VexTrio is a key group within this industry, but there are other groups. All types of cybercrime, from dating scams to investment fraud and information stealers use malicious adtech, and it goes largely unnoticed.”

    But what makes the threat actor notable is that it controls both the publishing and advertising sides of affiliate networks through a vast network of intertwined companies like Teknology, Los Pollos, Taco Loco, and Adtrafico. In May 2024, Los Pollos said it had 200,000 affiliates and over 2 billion unique users every month.

    The scams, more broadly, play out in this manner: Unsuspecting users who land on a legitimate-but-infected site are routed through a TDS under VexTrio’s control, which then leads the users to scam landing pages. This is achieved by means of a smartlink that cloaks the final landing page and hinders analysis.

    Identity Security Risk Assessment

    Los Pollos and Adtrafico are both cost-per-action (CPA) networks that allow publishing affiliates to earn a commission when a site visitor performs an intended action. This could be accepting a website notification, providing their personal details, downloading an app, or giving credit card information.

    It has also been found to be a major spam distributor that reaches out to millions of potential victims, leveraging lookalike domains of popular mail services like SendGrid (“sendgrid[.]rest”) and MailGun (“mailgun[.]fun”) to facilitate the service.

    Another significant aspect is the use of cloaking services like IMKLO to disguise the real domains and evaluate criteria like the user’s location, their device type, their browser, and then determine the exact nature of content to be delivered.

    “The security industry, and much of the world, is more focused on malware right now,” Burton said. “This is in some sense victim blaming, in which there is a belief that people who fall for scams somehow deserve to be scammed more.”

    “So, stealing your credit card information via malware – even when it requires some ridiculous stroke of keys, like the current fake captcha/ClickFix attacks – is somehow ‘worse’ than if you are conned into giving it up. Cybersecurity education and greater awareness for treating scams with the same severity as malware are two ways to combat malicious adtech.”


    Source: thehackernews.com…

  • Microsoft Launches Project Ire to Autonomously Classify Malware Using AI Tools

    Microsoft Launches Project Ire to Autonomously Classify Malware Using AI Tools

    Aug 06, 2025Ravie LakshmananArtificial Intelligence / Threat Detection

    Microsoft on Tuesday announced an autonomous artificial intelligence (AI) agent that can analyze and classify software without assistance in an effort to advance malware detection efforts.

    The large language model (LLM)-powered autonomous malware classification system, currently a prototype, has been codenamed Project Ire by the tech giant.

    The system “automates what is considered the gold standard in malware classification: fully reverse engineering a software file without any clues about its origin or purpose,” Microsoft said. “It uses decompilers and other tools, reviews their output, and determines whether the software is malicious or benign.”

    Project Ire, per the Windows maker, is an effort to enable malware classification at scale, accelerate threat response, and reduce the manual efforts that analysts have to undertake in order to examine samples and determine if they are malicious or benign.

    Cybersecurity

    Specifically, it uses specialized tools to reverse engineer software, conducting analysis at various levels, ranging from low-level binary analysis to control flow reconstruction and high-level interpretation of code behavior.

    “Its tool-use API enables the system to update its understanding of a file using a wide range of reverse engineering tools, including Microsoft memory analysis sandboxes based on Project Freta (opens in new tab), custom and open-source tools, documentation search, and multiple decompilers,” Microsoft said.

    Project Freta is a Microsoft Research initiative that enables “discovery sweeps for undetected malware,” such as rootkits and advanced malware, in memory snapshots of live Linux systems during memory audits.

    The evaluation is a multi-step process –

    • Automated reverse engineering tools identify the file type, its structure, and potential areas of interest
    • The system reconstructs the software’s control flow graph using frameworks like angr and Ghidra
    • The LLM invokes specialized tools through an API to identify and summarize key functions
    • The system calls a validator tool to verify its findings against evidence used to reach the verdict and classify the artifact

    The summarization leaves a detailed “chain of evidence” log that details how the system arrived at its conclusion, allowing security teams to review and refine the process in case of a misclassification.

    In tests conducted by the Project Ire team on a dataset of publicly accessible Windows drivers, the classifier has been found to correctly flag 90% of all files and incorrectly identify only 2% of benign files as threats. A second evaluation of nearly 4,000 “hard-target” files rightly classified nearly 9 out of 10 malicious files as malicious, with a false positive rate of only 4%.

    Identity Security Risk Assessment

    “Based on these early successes, the Project Ire prototype will be leveraged inside Microsoft’s Defender organization as Binary Analyzer for threat detection and software classification,” Microsoft said.

    “Our goal is to scale the system’s speed and accuracy so that it can correctly classify files from any source, even on first encounter. Ultimately, our vision is to detect novel malware directly in memory, at scale.”

    The development comes as Microsoft said it awarded a record $17 million in bounty awards to 344 security researchers from 59 countries through its vulnerability reporting program in 2024.

    A total of 1,469 eligible vulnerability reports were submitted between July 2024 and June 2025, with the highest individual bounty reaching $200,000. Last year, the company paid $16.6 million in bounty awards to 343 security researchers from 55 countries.


    Source: thehackernews.com…

  • AI Slashes Workloads for vCISOs by 68% as SMBs Demand More – New Report Reveals

    AI Slashes Workloads for vCISOs by 68% as SMBs Demand More – New Report Reveals

    Aug 06, 2025The Hacker NewsCompliance / Security Operations

    As the volume and sophistication of cyber threats and risks grow, cybersecurity has become mission-critical for businesses of all sizes. To address this shift, SMBs have been urgently turning to vCISO services to keep up with escalating threats and compliance demands. A recent report by Cynomi has found that a full 79% of MSPs and MSSPs see high demand for vCISO services among SMBs.

    How are service providers scaling to meet this demand? Which business upside can they expect to see? And where does AI fit in?

    The answers can be found in “The 2025 State of the vCISO Report”. This newly-released report offers a deep dive into the vCISO market evolution and the broader shift toward advanced cybersecurity services. The bottom line? What used to be a niche offering is now a foundational service, and AI is transforming how it’s delivered. Below, we bring some of the main findings of the report.

    319% Growth in vCISO Adoption: MSPs & MSSPs Race to Meet SMB Demand

    vCISO offerings provide a flexible, cost-effective way for organizations to access high-level cybersecurity expertise without the overhead of a full-time executive. And with a growing number of attacks alongside the growing awareness of the importance of cybersecurity, it’s no surprise that demand for vCISO services is skyrocketing among SMBs. Demand for vCISO services is outpacing even compliance readiness and cyber insurance support.

    Figure 1: Demand for Advanced Cybersecurity Services Among SMB Clients

    In response, adoption of the vCISO offering among MSPs and MSSPs has jumped from 21% in 2024 to 67% in 2025. This is a 319% increase in just one year. In addition, 50% of the service providers who don’t yet, plan to launch vCISO offerings by year’s end. This adoption curve reflects a clear industry shift, from vCISO being a niche service to becoming a core one.

    Figure 2: Plans for Offering vCISO Services

    Real Business Impact: Higher Margins, Better Upsell, More Recurring Revenue

    The growth in adoption isn’t just driven by client demand. It’s also underpinned by strong business outcomes for providers. Organizations that offer vCISO services report substantial gains:

    • 41% report an increase in upsell opportunities, leveraging vCISO for additional service offerings
    • 40% see improved operating margins
    • 39% report a measurable expansion in their customer base, including access to new prospects

    And of course, vCISO services offer significant security benefits to clients. From the service provider angle, leading security expertise elevates them beyond mere temporary vendors to trusted, long-term strategic partners.

    Adoption Barriers Are Real, But They’re Operational, Not Strategic

    While enthusiasm among service providers is high, not every provider has yet made the leap into vCISO services. Among those still in planning mode, the report identifies three primary concerns:

    • 35% cite uncertainty around profitability or ROI.
    • 33% highlight high upfront investment requirements.
    • 32% point to a shortage of qualified cybersecurity professionals.

    Importantly, few providers doubt the market demand or business value of vCISO services. Instead, they’re struggling to implement them efficiently and profitably.

    This is where technology and automation come into play. As AI-powered platforms reduce manual effort and enable scalable service delivery, the operational burden becomes far more manageable, opening the door for broader market participation.

    AI Is Reshaping the vCISO Delivery Model

    AI is no longer a future consideration. It’s already having a profound impact on how vCISO services are delivered. According to the report, 81% of MSPs and MSSPs are already using AI or automation within their vCISO workflows, and an additional 15% plan to adopt it within the next year.

    Figure 3: Use of Automation and AI Tools in vCISO Service Delivery

    The applications of AI in vCISO services are wide-ranging and impactful: reporting automation and insights, remediation planning, compliance readiness and monitoring, risk and security assessments, task prioritization, and more.

    The result is a significant reduction in manual workload: an average decrease of 68%, with 42% of providers seeing 81–100% workload reductions in some areas.

    This allows service providers to support more clients, deliver higher-quality outputs, and improve profit margins, all without expanding headcount. In effect, AI is enabling the kind of scale and consistency that traditional, human-led delivery models could not sustain.

    The Road Ahead: AI-Driven Scale, Strategy and Service Differentiation

    The 2025 State of the vCISO Report paints a clear picture: As service providers continue to invest in automation and intelligent tooling, the vCISO model will shift from resource-heavy to AI-powered and highly efficient.

    Looking forward, we expect to see:

    • Wider market penetration among MSPs and MSSPs
    • Deeper integration of AI across vCISO services
    • Higher ROI, as service providers implement AI and other technologies in their processes and offerings.

    For a complete view of trends, benchmarks, and best practices shaping the future of virtual cybersecurity leadership, download the full 2025 State of the vCISO Report.

    Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


    Source: thehackernews.com…

  • Trend Micro Confirms Active Exploitation of Critical Apex One Flaws in On-Premise Systems

    Trend Micro Confirms Active Exploitation of Critical Apex One Flaws in On-Premise Systems

    Aug 06, 2025Ravie LakshmananVulnerability / Endpoint Security

    Trend Micro has released mitigations to address critical security flaws in on-premise versions of Apex One Management Console that it said have been exploited in the wild.

    The vulnerabilities (CVE-2025-54948 and CVE-2025-54987), both rated 9.4 on the CVSS scoring system, have been described as management console command injection and remote code execution flaws.

    “A vulnerability in Trend Micro Apex One (on-premise) management console could allow a pre-authenticated remote attacker to upload malicious code and execute commands on affected installations,” the cybersecurity company said in a Tuesday advisory.

    While both shortcomings are essentially the same, CVE-2025-54987 targets a different CPU architecture. The Trend Micro Incident Response (IR) Team and Jacky Hsieh at CoreCloud Tech have been credited with reporting the two flaws.

    Identity Security Risk Assessment

    There are currently no details on how the issues are being exploited in real-world attacks. Trend Micro said it “observed at least one instance of an attempt to actively exploit one of these vulnerabilities in the wild.”

    Mitigations for Trend Micro Apex One as a Service have already been deployed as of July 31, 2025. A short-term solution for on-premise versions is available in the form of a fix tool. A formal patch for the vulnerabilities is expected to be released in mid-August 2025.

    However, Trend Micro pointed out that while the tool fully protects against known exploits, it will disable the ability for administrators to utilize the Remote Install Agent function to deploy agents from the Trend Micro Apex One Management Console. It emphasized that other agent install methods, such as UNC path or agent package, are unaffected.

    “Exploiting these type of vulnerabilities generally require that an attacker has access (physical or remote) to a vulnerable machine,” the company said. “In addition to timely application of patches and updated solutions, customers are also advised to review remote access to critical systems and ensure policies and perimeter security is up-to-date.”


    Source: thehackernews.com…

  • CERT-UA Warns of HTA-Delivered C# Malware Attacks Using Court Summons Lures

    CERT-UA Warns of HTA-Delivered C# Malware Attacks Using Court Summons Lures

    Aug 06, 2025Ravie LakshmananCyber Espionage / Malware

    HTA-Delivered C# Malware

    The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of cyber attacks carried out by a threat actor called UAC-0099 targeting government agencies, the defense forces, and enterprises of the defense-industrial complex in the country.

    The attacks, which leverage phishing emails as an initial compromise vector, are used to deliver malware families like MATCHBOIL, MATCHWOK, and DRAGSTARE.

    UAC-0099, first publicly documented by the agency in June 2023, has a history of targeting Ukrainian entities for espionage purposes. Prior attacks have been observed leveraging security flaws in WinRAR software (CVE-2023-38831, CVSS score: 7.8) to propagate a malware called LONEPAGE.

    The latest infection chain involves using email lures related to court summons to entice recipients into clicking on links that are shortened using URL shortening services like Cuttly. These links, which are sent via UKR.NET email addresses, point to a double archive file containing an HTML Application (HTA) file.

    Cybersecurity

    The execution of the HTA payload triggers the launch of an obfuscated Visual Basic Script file that, in turn, creates a scheduled task for persistence and ultimately runs a loader named MATCHBOIL, a C#-based program that’s designed to drop additional malware on the host.

    This includes a backdoor called MATCHWOK and a stealer named DRAGSTARE. Also written using the C# programming language, MATCHWOK is capable of executing PowerShell commands and passing the results of the execution to a remote server.

    DRAGSTARE, on the other hand, is equipped to collect system information, data from web browsers, files matching a specific list of extensions (“.docx”, “.doc”, “.xls”, “.txt”, “.ovpn”, “.rdp”, “.txt”, and “.pdf”) from the “Desktop”, “Documents”, “Downloads” folders, screenshots, and running PowerShell commands received from an attacker-controlled server.

    HTA-Delivered C# Malware

    The disclosure comes a little over a month after ESET published a detailed report cataloging Gamaredon’s “relentless” spear-phshing attacks against Ukrainian entities in 2024, detailing its use of six new malware tools that are engineered for stealth, persistence, and lateral movement –

    • PteroDespair, a PowerShell reconnaissance tool to collect diagnostic data on previously deployed malware
    • PteroTickle, a PowerShell weaponizer that targets Python applications converted into executables on fixed and removable drives to facilitate lateral movement by injecting code that likely serves PteroPSLoad or another PowerShell downloader
    • PteroGraphin, a PowerShell tool to establish persistence using Microsoft Excel add-ins and scheduled tasks, as well as create an encrypted communication channel for payload delivery, through the Telegraph API
    • PteroStew, a VBScript downloader similar to PteroSand and PteroRisk) that stores its code in alternate data streams associated with benign files on the victim’s system
    • PteroQuark, a VBScript downloader introduced as a new component within the VBScript version of the PteroLNK weaponizer
    • PteroBox, a PowerShell file stealer resembling PteroPSDoor but exfiltrating stolen files to Dropbox
    Identity Security Risk Assessment

    “Gamaredon’s spearphishing activities significantly intensified during the second half of 2024,” security researcher Zoltán Rusnák said. “Campaigns typically lasted one to five consecutive days, with emails containing malicious archives (RAR, ZIP, 7z) or XHTML files employing HTML smuggling techniques.”

    The attacks often result in the delivery of malicious HTA or LNK files that execute embedded VBScript downloaders such as PteroSand, along with distributing updated versions of its existing tools like PteroPSDoor, PteroLNK, PteroVDoor, and PteroPSLoad.

    Other notable aspects of the Russian-aligned threat actor’s tradecraft include the use of fast-flux DNS techniques and the reliance on legitimate third-party services like Telegram, Telegraph, Codeberg, and Cloudflare tunnels to obfuscate its command-and-control (C2) infrastructure.

    “Despite observable capacity limitations and abandoning older tools, Gamaredon remains a significant threat actor due to its continuous innovation, aggressive spearphishing campaigns, and persistent efforts to evade detections,” ESET said.


    Source: thehackernews.com…

  • CISA Adds 3 D-Link Vulnerabilities to KEV Catalog Amid Active Exploitation Evidence

    CISA Adds 3 D-Link Vulnerabilities to KEV Catalog Amid Active Exploitation Evidence

    Aug 06, 2025Ravie LakshmananVulnerability / Firmware Security

    D-Link Vulnerabilities

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added three old security flaws impacting D-Link Wi-Fi cameras and video recorders to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation in the wild.

    The high-severity vulnerabilities, which are from 2020 and 2022, are listed below –

    • CVE-2020-25078 (CVSS score: 7.5) – An unspecified vulnerability in D-Link DCS-2530L and DCS-2670L devices that could allow for remote administrator password disclosure
    • CVE-2020-25079 (CVSS score: 8.8) – An authenticated command injection vulnerability in the cgi-bin/ddns_enc.cgi component affecting D-Link DCS-2530L and DCS-2670L devices
    • CVE-2020-40799 (CVSS score: 8.8) – A download of code without an integrity check vulnerability in D-Link DNR-322L that could allow an authenticated attacker to execute operating system-level commands on the device
    Cybersecurity

    There are currently no details on how these shortcomings are being exploited in the wild, although a December 2024 advisory from the U.S. Federal Bureau of Investigation (FBI) warned of HiatusRAT campaigns actively scanning web cameras that are vulnerable to CVE-2020-25078.

    It’s worth noting that CVE-2020-40799 remains unpatched due to the affected model reaching end-of-life (EoL) status as of November 2021. Users still relying on DNR-322L are advised to discontinue and replace them. Fixes for the other two flaws were released by D-Link in 2020.

    In light of active exploitation, it’s essential that Federal Civilian Executive Branch (FCEB) agencies carry out the necessary mitigation steps by August 26, 2025, to secure their networks.

    (The story was updated after publication to emphasize that the issues affect D-Link Wi-Fi cameras and video recorders and not routers as previously stated. The error is regretted.)


    Source: thehackernews.com…