<?xml version="1.0" encoding="UTF-8"?><feed
	xmlns="http://www.w3.org/2005/Atom"
	xmlns:thr="http://purl.org/syndication/thread/1.0"
	xml:lang="en-US"
	>
	<title type="text">Owlysec &#8211; Cyber Security News</title>
	<subtitle type="text">IT Security News for All</subtitle>

	<updated>2025-07-07T08:18:17Z</updated>

	<link rel="alternate" type="text/html" href="https://owlysec.com/" />
	<id>https://owlysec.com/feed/atom</id>
	<link rel="self" type="application/atom+xml" href="https://owlysec.com/feed/atom" />

	<generator uri="https://wordpress.org/" version="6.8.1">WordPress</generator>
	<entry>
		<author>
			<name>admin</name>
					</author>

		<title type="html"><![CDATA[Severe Sudo Security Flaws Let Local Users Gain Root Privileges on Linux Systems]]></title>
		<link rel="alternate" type="text/html" href="https://owlysec.com/malware-threats/severe-sudo-security-flaws-let-local-users-gain-root-privileges-on-linux-systems" />

		<id>https://owlysec.com/?p=5642</id>
		<updated>2025-07-07T08:18:17Z</updated>
		<published>2025-07-05T08:14:35Z</published>
		<category scheme="https://owlysec.com/" term="Developer" /><category scheme="https://owlysec.com/" term="Malware &amp; Threats" /><category scheme="https://owlysec.com/" term="Vulnerabilities" />
		<summary type="html"><![CDATA[<a href="https://owlysec.com/malware-threats/severe-sudo-security-flaws-let-local-users-gain-root-privileges-on-linux-systems" title="Severe Sudo Security Flaws Let Local Users Gain Root Privileges on Linux Systems" rel="nofollow"><img width="150" height="150" src="https://owlysec.com/wp-content/uploads/2025/07/Severe-Sudo-Security-Flaws-Let-Local-Users-Gain-Root-Privileges-on-Linux-Systems-150x150.webp" class="webfeedsFeaturedVisual wp-post-image" alt="Two significant vulnerabilities have been uncovered in the Sudo command-line tool, widely used across Linux and Unix-like operating systems, that could allow local users to escalate privileges and gain root access on affected systems. Here’s a summary of the issues: CVE-2025-32462 (CVSS score: 2.8) — A flaw in Sudo versions before 1.9.17p1 allows users listed in a sudoers file referencing a specific host (other than the current host or &quot;ALL&quot;) to run commands on unintended machines. This primarily impacts setups where a common sudoers file is shared across multiple systems. CVE-2025-32463 (CVSS score: 9.3) — A critical vulnerability in Sudo versions before 1.9.17p1 that lets any local user gain root access. This is due to improper handling of /etc/nsswitch.conf from a user-controlled directory when using Sudo’s --chroot option. The flaw allows attackers to load arbitrary shared libraries and execute malicious commands with elevated privileges. Sudo is designed to let low-privileged users execute commands as another user, typically the superuser, while enforcing least-privilege principles. It’s configured via the /etc/sudoers file, which defines who can run what commands, as which users, and on which systems. The first flaw (CVE-2025-32462) arises from the -h (host) option introduced in 2013. The bug allows commands authorized for a remote host to be mistakenly executed locally, affecting environments that share sudoers files across machines, including those using LDAP-based configurations. The second flaw (CVE-2025-32463) is especially severe because it impacts default Sudo configurations. It requires no special sudoers rules and can be exploited by any unprivileged local user to achieve root access. The maintainers of Sudo plan to remove the --chroot option in future releases due to its complexity and risk. Both issues were responsibly disclosed in April 2025 and have been patched in Sudo version 1.9.17p1. Major Linux distributions, including AlmaLinux, Alpine Linux, Amazon Linux, Debian, Gentoo, Oracle Linux, Red Hat, SUSE, and Ubuntu, have issued advisories. All users are urged to update to the latest Sudo packages to mitigate these risks." style="display: block; margin-bottom: 5px; clear:both;max-width: 100%;" link_thumbnail="1" decoding="async" /></a><p>Two significant vulnerabilities have been uncovered in the Sudo command-line tool, widely used across Linux and Unix-like operating systems, that could allow local users to escalate privileges and gain root access on affected systems. Here&#8217;s a summary of the issues: CVE-2025-32462 (CVSS score: 2.8) &#8212; A flaw in Sudo versions before 1.9.17p1 allows users listed [&#8230;]</p>
<p>The post <a href="https://owlysec.com/malware-threats/severe-sudo-security-flaws-let-local-users-gain-root-privileges-on-linux-systems">Severe Sudo Security Flaws Let Local Users Gain Root Privileges on Linux Systems</a> appeared first on <a href="https://owlysec.com">Owlysec - Cyber Security News</a>.</p>
]]></summary>

					<content type="html" xml:base="https://owlysec.com/malware-threats/severe-sudo-security-flaws-let-local-users-gain-root-privileges-on-linux-systems"><![CDATA[<a href="https://owlysec.com/malware-threats/severe-sudo-security-flaws-let-local-users-gain-root-privileges-on-linux-systems" title="Severe Sudo Security Flaws Let Local Users Gain Root Privileges on Linux Systems" rel="nofollow"><img width="150" height="150" src="https://owlysec.com/wp-content/uploads/2025/07/Severe-Sudo-Security-Flaws-Let-Local-Users-Gain-Root-Privileges-on-Linux-Systems-150x150.webp" class="webfeedsFeaturedVisual wp-post-image" alt="Two significant vulnerabilities have been uncovered in the Sudo command-line tool, widely used across Linux and Unix-like operating systems, that could allow local users to escalate privileges and gain root access on affected systems. Here’s a summary of the issues: CVE-2025-32462 (CVSS score: 2.8) — A flaw in Sudo versions before 1.9.17p1 allows users listed in a sudoers file referencing a specific host (other than the current host or &quot;ALL&quot;) to run commands on unintended machines. This primarily impacts setups where a common sudoers file is shared across multiple systems. CVE-2025-32463 (CVSS score: 9.3) — A critical vulnerability in Sudo versions before 1.9.17p1 that lets any local user gain root access. This is due to improper handling of /etc/nsswitch.conf from a user-controlled directory when using Sudo’s --chroot option. The flaw allows attackers to load arbitrary shared libraries and execute malicious commands with elevated privileges. Sudo is designed to let low-privileged users execute commands as another user, typically the superuser, while enforcing least-privilege principles. It’s configured via the /etc/sudoers file, which defines who can run what commands, as which users, and on which systems. The first flaw (CVE-2025-32462) arises from the -h (host) option introduced in 2013. The bug allows commands authorized for a remote host to be mistakenly executed locally, affecting environments that share sudoers files across machines, including those using LDAP-based configurations. The second flaw (CVE-2025-32463) is especially severe because it impacts default Sudo configurations. It requires no special sudoers rules and can be exploited by any unprivileged local user to achieve root access. The maintainers of Sudo plan to remove the --chroot option in future releases due to its complexity and risk. Both issues were responsibly disclosed in April 2025 and have been patched in Sudo version 1.9.17p1. Major Linux distributions, including AlmaLinux, Alpine Linux, Amazon Linux, Debian, Gentoo, Oracle Linux, Red Hat, SUSE, and Ubuntu, have issued advisories. All users are urged to update to the latest Sudo packages to mitigate these risks." style="display: block; margin-bottom: 5px; clear:both;max-width: 100%;" link_thumbnail="1" decoding="async" /></a><p data-start="217" data-end="451">Two significant vulnerabilities have been uncovered in the Sudo command-line tool, widely used across Linux and Unix-like operating systems, that could allow local users to escalate privileges and gain root access on affected systems.</p>
<p data-start="453" data-end="484">Here’s a summary of the issues:</p>
<ul data-start="486" data-end="1192">
<li data-start="486" data-end="804">
<p data-start="488" data-end="804"><strong data-start="488" data-end="524">CVE-2025-32462 (CVSS score: 2.8)</strong> — A flaw in Sudo versions before 1.9.17p1 allows users listed in a sudoers file referencing a specific host (other than the current host or &#8220;ALL&#8221;) to run commands on unintended machines. This primarily impacts setups where a common sudoers file is shared across multiple systems.</p>
</li>
<li data-start="806" data-end="1192">
<p data-start="808" data-end="1192"><strong data-start="808" data-end="844">CVE-2025-32463 (CVSS score: 9.3)</strong> — A critical vulnerability in Sudo versions before 1.9.17p1 that lets any local user gain root access. This is due to improper handling of <code data-start="984" data-end="1004">/etc/nsswitch.conf</code> from a user-controlled directory when using Sudo’s <code data-start="1056" data-end="1066">--chroot</code> option. The flaw allows attackers to load arbitrary shared libraries and execute malicious commands with elevated privileges.</p>
</li>
</ul>
<p data-start="1194" data-end="1465">Sudo is designed to let low-privileged users execute commands as another user, typically the superuser, while enforcing least-privilege principles. It’s configured via the <code data-start="1366" data-end="1380">/etc/sudoers</code> file, which defines who can run what commands, as which users, and on which systems.</p>
<p data-start="1467" data-end="1755">The first flaw (CVE-2025-32462) arises from the <code data-start="1515" data-end="1519">-h</code> (host) option introduced in 2013. The bug allows commands authorized for a remote host to be mistakenly executed locally, affecting environments that share sudoers files across machines, including those using LDAP-based configurations.</p>
<p data-start="1757" data-end="2083">The second flaw (CVE-2025-32463) is especially severe because it impacts default Sudo configurations. It requires no special sudoers rules and can be exploited by any unprivileged local user to achieve root access. The maintainers of Sudo plan to remove the <code data-start="2015" data-end="2025">--chroot</code> option in future releases due to its complexity and risk.</p>
<p data-start="2085" data-end="2425">Both issues were responsibly disclosed in April 2025 and have been patched in Sudo version 1.9.17p1. Major Linux distributions, including AlmaLinux, Alpine Linux, Amazon Linux, Debian, Gentoo, Oracle Linux, Red Hat, SUSE, and Ubuntu, have issued advisories. All users are urged to update to the latest Sudo packages to mitigate these risks.</p>
<div class="simplesocialbuttons simplesocial-round-icon simplesocialbuttons_inline simplesocialbuttons-align-left post-5642 post  simplesocialbuttons-inline-no-animation">
<button onClick="javascript:window.open(this.dataset.href, '_blank' );return false;" class="simplesocial-whatsapp-share"  rel="nofollow"  target="_blank"  aria-label="WhatsApp Share" data-href="https://api.whatsapp.com/send?text=https://owlysec.com/malware-threats/severe-sudo-security-flaws-let-local-users-gain-root-privileges-on-linux-systems"><span class="simplesocialtxt">WhatsApp</span></button>
<button class="simplesocial-fb-share"  rel="nofollow"  target="_blank"  aria-label="Facebook Share" data-href="https://www.facebook.com/sharer/sharer.php?u=https://owlysec.com/malware-threats/severe-sudo-security-flaws-let-local-users-gain-root-privileges-on-linux-systems" onClick="javascript:window.open(this.dataset.href, '', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><span class="simplesocialtxt">Facebook </span> </button>
<button class="simplesocial-twt-share"  rel="nofollow"  target="_blank"  aria-label="Twitter Share" data-href="https://twitter.com/intent/tweet?text=Severe+Sudo+Security+Flaws+Let+Local+Users+Gain+Root+Privileges+on+Linux+Systems&url=https://owlysec.com/malware-threats/severe-sudo-security-flaws-let-local-users-gain-root-privileges-on-linux-systems" onClick="javascript:window.open(this.dataset.href, '', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><span class="simplesocialtxt">Twitter</span> </button>
<button  rel="nofollow"  target="_blank"  class="simplesocial-linkedin-share" aria-label="LinkedIn Share" data-href="https://www.linkedin.com/sharing/share-offsite/?url=https://owlysec.com/malware-threats/severe-sudo-security-flaws-let-local-users-gain-root-privileges-on-linux-systems" onClick="javascript:window.open(this.dataset.href, '', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><span class="simplesocialtxt">LinkedIn</span></button>
</div>
<p>The post <a href="https://owlysec.com/malware-threats/severe-sudo-security-flaws-let-local-users-gain-root-privileges-on-linux-systems">Severe Sudo Security Flaws Let Local Users Gain Root Privileges on Linux Systems</a> appeared first on <a href="https://owlysec.com">Owlysec - Cyber Security News</a>.</p>
]]></content>
		
			</entry>
		<entry>
		<author>
			<name>admin</name>
					</author>

		<title type="html"><![CDATA[Alert: Misconfigured JDWP Interfaces Fuel Crypto Mining Attacks, New Hpingbot Botnet Exploits SSH for DDoS]]></title>
		<link rel="alternate" type="text/html" href="https://owlysec.com/vulnerabilities/alert-misconfigured-jdwp-interfaces-fuel-crypto-mining-attacks-new-hpingbot-botnet-exploits-ssh-for-ddos" />

		<id>https://owlysec.com/?p=5639</id>
		<updated>2025-07-07T08:13:24Z</updated>
		<published>2025-07-04T07:38:26Z</published>
		<category scheme="https://owlysec.com/" term="Cybercrime" /><category scheme="https://owlysec.com/" term="Malware &amp; Threats" /><category scheme="https://owlysec.com/" term="Vulnerabilities" />
		<summary type="html"><![CDATA[<a href="https://owlysec.com/vulnerabilities/alert-misconfigured-jdwp-interfaces-fuel-crypto-mining-attacks-new-hpingbot-botnet-exploits-ssh-for-ddos" title="Alert: Misconfigured JDWP Interfaces Fuel Crypto Mining Attacks, New Hpingbot Botnet Exploits SSH for DDoS" rel="nofollow"><img width="150" height="150" src="https://owlysec.com/wp-content/uploads/2025/07/Alert_-Misconfigured-JDWP-Interfaces-Fuel-Crypto-Mining-Attacks-New-Hpingbot-Botnet-Exploits-SSH-for-DDoS-150x150.webp" class="webfeedsFeaturedVisual wp-post-image" alt="Cyber attackers are increasingly abusing exposed Java Debug Wire Protocol (JDWP) interfaces to gain remote code execution and deploy cryptocurrency miners on vulnerable systems. By leveraging a customized version of XMRig with hardcoded settings, these campaigns avoid suspicious command-line arguments that defenders typically monitor. The miners also utilize proxy servers to hide the actual wallet addresses, complicating forensic analysis. Recent activity observed on honeypot systems running popular CI/CD tools like TeamCity highlights how JDWP exposure can serve as a gateway for attackers. JDWP, commonly used for debugging Java applications locally or remotely, lacks built-in authentication. This makes improperly secured deployments an attractive target, enabling attackers to execute arbitrary commands and plant persistent malicious payloads. Common software that may launch JDWP servers in debug mode includes Jenkins, Selenium Grid, Elasticsearch, Quarkus, Spring Boot, Apache Tomcat, and TeamCity. Misconfigurations can easily arise, as developers may not be aware of the associated risks. Recent scans revealed over 2,600 IP addresses searching for JDWP endpoints, with significant activity originating from China, the U.S., Germany, Singapore, and Hong Kong. Once JDWP services are identified, attackers typically download and execute a shell script that terminates competing miners, installs their mining payload, establishes cron jobs for persistence, and cleans up traces. Emerging Threat: Hpingbot Botnet Targets Weak SSH Setups for DDoS A new malware strain, dubbed Hpingbot, is assembling botnets capable of launching distributed denial-of-service (DDoS) attacks against systems running both Windows and Linux. Unlike botnets derived from known families like Mirai, Hpingbot appears to be built from scratch and uses legitimate tools like hping3 to generate malicious traffic, making detection harder and reducing development costs. The botnet spreads through weak SSH configurations by conducting password spraying attacks. Once access is gained, a shell script is downloaded, which identifies system architecture, terminates previous malware instances, and retrieves the main DDoS payload. Persistence mechanisms and history-clearing tactics help the malware remain hidden. Of note, attackers have recently expanded Hpingbot’s capabilities, introducing a variant that forgoes Pastebin-based configuration and external tools in favor of built-in TCP and UDP flood functions. While Windows versions can’t leverage hping3, their activity suggests a shift towards broader malicious payload distribution beyond mere service disruption." style="display: block; margin-bottom: 5px; clear:both;max-width: 100%;" link_thumbnail="1" decoding="async" /></a><p>Cyber attackers are increasingly abusing exposed Java Debug Wire Protocol (JDWP) interfaces to gain remote code execution and deploy cryptocurrency miners on vulnerable systems. By leveraging a customized version of XMRig with hardcoded settings, these campaigns avoid suspicious command-line arguments that defenders typically monitor. The miners also utilize proxy servers to hide the actual wallet [&#8230;]</p>
<p>The post <a href="https://owlysec.com/vulnerabilities/alert-misconfigured-jdwp-interfaces-fuel-crypto-mining-attacks-new-hpingbot-botnet-exploits-ssh-for-ddos">Alert: Misconfigured JDWP Interfaces Fuel Crypto Mining Attacks, New Hpingbot Botnet Exploits SSH for DDoS</a> appeared first on <a href="https://owlysec.com">Owlysec - Cyber Security News</a>.</p>
]]></summary>

					<content type="html" xml:base="https://owlysec.com/vulnerabilities/alert-misconfigured-jdwp-interfaces-fuel-crypto-mining-attacks-new-hpingbot-botnet-exploits-ssh-for-ddos"><![CDATA[<a href="https://owlysec.com/vulnerabilities/alert-misconfigured-jdwp-interfaces-fuel-crypto-mining-attacks-new-hpingbot-botnet-exploits-ssh-for-ddos" title="Alert: Misconfigured JDWP Interfaces Fuel Crypto Mining Attacks, New Hpingbot Botnet Exploits SSH for DDoS" rel="nofollow"><img width="150" height="150" src="https://owlysec.com/wp-content/uploads/2025/07/Alert_-Misconfigured-JDWP-Interfaces-Fuel-Crypto-Mining-Attacks-New-Hpingbot-Botnet-Exploits-SSH-for-DDoS-150x150.webp" class="webfeedsFeaturedVisual wp-post-image" alt="Cyber attackers are increasingly abusing exposed Java Debug Wire Protocol (JDWP) interfaces to gain remote code execution and deploy cryptocurrency miners on vulnerable systems. By leveraging a customized version of XMRig with hardcoded settings, these campaigns avoid suspicious command-line arguments that defenders typically monitor. The miners also utilize proxy servers to hide the actual wallet addresses, complicating forensic analysis. Recent activity observed on honeypot systems running popular CI/CD tools like TeamCity highlights how JDWP exposure can serve as a gateway for attackers. JDWP, commonly used for debugging Java applications locally or remotely, lacks built-in authentication. This makes improperly secured deployments an attractive target, enabling attackers to execute arbitrary commands and plant persistent malicious payloads. Common software that may launch JDWP servers in debug mode includes Jenkins, Selenium Grid, Elasticsearch, Quarkus, Spring Boot, Apache Tomcat, and TeamCity. Misconfigurations can easily arise, as developers may not be aware of the associated risks. Recent scans revealed over 2,600 IP addresses searching for JDWP endpoints, with significant activity originating from China, the U.S., Germany, Singapore, and Hong Kong. Once JDWP services are identified, attackers typically download and execute a shell script that terminates competing miners, installs their mining payload, establishes cron jobs for persistence, and cleans up traces. Emerging Threat: Hpingbot Botnet Targets Weak SSH Setups for DDoS A new malware strain, dubbed Hpingbot, is assembling botnets capable of launching distributed denial-of-service (DDoS) attacks against systems running both Windows and Linux. Unlike botnets derived from known families like Mirai, Hpingbot appears to be built from scratch and uses legitimate tools like hping3 to generate malicious traffic, making detection harder and reducing development costs. The botnet spreads through weak SSH configurations by conducting password spraying attacks. Once access is gained, a shell script is downloaded, which identifies system architecture, terminates previous malware instances, and retrieves the main DDoS payload. Persistence mechanisms and history-clearing tactics help the malware remain hidden. Of note, attackers have recently expanded Hpingbot’s capabilities, introducing a variant that forgoes Pastebin-based configuration and external tools in favor of built-in TCP and UDP flood functions. While Windows versions can’t leverage hping3, their activity suggests a shift towards broader malicious payload distribution beyond mere service disruption." style="display: block; margin-bottom: 5px; clear:both;max-width: 100%;" link_thumbnail="1" decoding="async" /></a><p data-start="236" data-end="679">Cyber attackers are increasingly abusing exposed Java Debug Wire Protocol (JDWP) interfaces to gain remote code execution and deploy cryptocurrency miners on vulnerable systems. By leveraging a customized version of XMRig with hardcoded settings, these campaigns avoid suspicious command-line arguments that defenders typically monitor. The miners also utilize proxy servers to hide the actual wallet addresses, complicating forensic analysis.</p>
<p data-start="681" data-end="1092">Recent activity observed on honeypot systems running popular CI/CD tools like TeamCity highlights how JDWP exposure can serve as a gateway for attackers. JDWP, commonly used for debugging Java applications locally or remotely, lacks built-in authentication. This makes improperly secured deployments an attractive target, enabling attackers to execute arbitrary commands and plant persistent malicious payloads.</p>
<p data-start="1094" data-end="1343">Common software that may launch JDWP servers in debug mode includes Jenkins, Selenium Grid, Elasticsearch, Quarkus, Spring Boot, Apache Tomcat, and TeamCity. Misconfigurations can easily arise, as developers may not be aware of the associated risks.</p>
<p data-start="1345" data-end="1732">Recent scans revealed over 2,600 IP addresses searching for JDWP endpoints, with significant activity originating from China, the U.S., Germany, Singapore, and Hong Kong. Once JDWP services are identified, attackers typically download and execute a shell script that terminates competing miners, installs their mining payload, establishes cron jobs for persistence, and cleans up traces.</p>
<hr data-start="1734" data-end="1737" />
<p data-start="1739" data-end="1808"><strong data-start="1739" data-end="1808">Emerging Threat: Hpingbot Botnet Targets Weak SSH Setups for DDoS</strong></p>
<p data-start="1810" data-end="2210">A new malware strain, dubbed <em data-start="1839" data-end="1849">Hpingbot</em>, is assembling botnets capable of launching distributed denial-of-service (DDoS) attacks against systems running both Windows and Linux. Unlike botnets derived from known families like Mirai, Hpingbot appears to be built from scratch and uses legitimate tools like <em data-start="2115" data-end="2123">hping3</em> to generate malicious traffic, making detection harder and reducing development costs.</p>
<p data-start="2212" data-end="2554">The botnet spreads through weak SSH configurations by conducting password spraying attacks. Once access is gained, a shell script is downloaded, which identifies system architecture, terminates previous malware instances, and retrieves the main DDoS payload. Persistence mechanisms and history-clearing tactics help the malware remain hidden.</p>
<p data-start="2556" data-end="2914">Of note, attackers have recently expanded Hpingbot’s capabilities, introducing a variant that forgoes Pastebin-based configuration and external tools in favor of built-in TCP and UDP flood functions. While Windows versions can’t leverage <em data-start="2794" data-end="2802">hping3</em>, their activity suggests a shift towards broader malicious payload distribution beyond mere service disruption.</p>
<div class="simplesocialbuttons simplesocial-round-icon simplesocialbuttons_inline simplesocialbuttons-align-left post-5639 post  simplesocialbuttons-inline-no-animation">
<button onClick="javascript:window.open(this.dataset.href, '_blank' );return false;" class="simplesocial-whatsapp-share"  rel="nofollow"  target="_blank"  aria-label="WhatsApp Share" data-href="https://api.whatsapp.com/send?text=https://owlysec.com/vulnerabilities/alert-misconfigured-jdwp-interfaces-fuel-crypto-mining-attacks-new-hpingbot-botnet-exploits-ssh-for-ddos"><span class="simplesocialtxt">WhatsApp</span></button>
<button class="simplesocial-fb-share"  rel="nofollow"  target="_blank"  aria-label="Facebook Share" data-href="https://www.facebook.com/sharer/sharer.php?u=https://owlysec.com/vulnerabilities/alert-misconfigured-jdwp-interfaces-fuel-crypto-mining-attacks-new-hpingbot-botnet-exploits-ssh-for-ddos" onClick="javascript:window.open(this.dataset.href, '', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><span class="simplesocialtxt">Facebook </span> </button>
<button class="simplesocial-twt-share"  rel="nofollow"  target="_blank"  aria-label="Twitter Share" data-href="https://twitter.com/intent/tweet?text=Alert%3A+Misconfigured+JDWP+Interfaces+Fuel+Crypto+Mining+Attacks%2C+New+Hpingbot+Botnet+Exploits+SSH+for+DDoS&url=https://owlysec.com/vulnerabilities/alert-misconfigured-jdwp-interfaces-fuel-crypto-mining-attacks-new-hpingbot-botnet-exploits-ssh-for-ddos" onClick="javascript:window.open(this.dataset.href, '', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><span class="simplesocialtxt">Twitter</span> </button>
<button  rel="nofollow"  target="_blank"  class="simplesocial-linkedin-share" aria-label="LinkedIn Share" data-href="https://www.linkedin.com/sharing/share-offsite/?url=https://owlysec.com/vulnerabilities/alert-misconfigured-jdwp-interfaces-fuel-crypto-mining-attacks-new-hpingbot-botnet-exploits-ssh-for-ddos" onClick="javascript:window.open(this.dataset.href, '', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><span class="simplesocialtxt">LinkedIn</span></button>
</div>
<p>The post <a href="https://owlysec.com/vulnerabilities/alert-misconfigured-jdwp-interfaces-fuel-crypto-mining-attacks-new-hpingbot-botnet-exploits-ssh-for-ddos">Alert: Misconfigured JDWP Interfaces Fuel Crypto Mining Attacks, New Hpingbot Botnet Exploits SSH for DDoS</a> appeared first on <a href="https://owlysec.com">Owlysec - Cyber Security News</a>.</p>
]]></content>
		
			</entry>
		<entry>
		<author>
			<name>admin</name>
					</author>

		<title type="html"><![CDATA[Is Your AI Agent Putting Sensitive Data at Risk? Join This Webinar to Discover How to Secure It]]></title>
		<link rel="alternate" type="text/html" href="https://owlysec.com/privacy/is-your-ai-agent-putting-sensitive-data-at-risk-join-this-webinar-to-discover-how-to-secure-it" />

		<id>https://owlysec.com/?p=5636</id>
		<updated>2025-07-07T07:38:14Z</updated>
		<published>2025-07-03T07:20:14Z</published>
		<category scheme="https://owlysec.com/" term="Business" /><category scheme="https://owlysec.com/" term="Developer" /><category scheme="https://owlysec.com/" term="Privacy" /><category scheme="https://owlysec.com/" term="Vulnerabilities" />
		<summary type="html"><![CDATA[<a href="https://owlysec.com/privacy/is-your-ai-agent-putting-sensitive-data-at-risk-join-this-webinar-to-discover-how-to-secure-it" title="Is Your AI Agent Putting Sensitive Data at Risk? Join This Webinar to Discover How to Secure It" rel="nofollow"><img width="150" height="150" src="https://owlysec.com/wp-content/uploads/2025/07/Is-Your-AI-Agent-Putting-Sensitive-Data-at-Risk_-Join-This-Webinar-to-Discover-How-to-Secure-It-150x150.webp" class="webfeedsFeaturedVisual wp-post-image" alt="Generative AI is transforming the way organizations operate, learn, and innovate. But behind the benefits, there&#039;s a hidden threat: AI agents and custom AI workflows are opening new channels for unintended data exposure — and many teams remain unaware. If you’re involved in building, deploying, or managing AI solutions, it’s time to consider: Could your AI systems be unintentionally leaking confidential information? While GenAI models don’t leak data on purpose, their integration into enterprise environments creates risk. These AI systems often connect to internal platforms like SharePoint, Google Drive, S3, and other corporate tools to deliver smarter results — and that’s where the trouble can begin. Without strong access controls, clear governance, and active oversight, even the most helpful AI assistant could expose sensitive data to unauthorized users — or worse, to the public. Think of a chatbot revealing internal salaries, or an assistant disclosing unreleased product plans during a simple query. These incidents aren’t theoretical; they’re already occurring. Stay Ahead of Data Leaks — Join the Free Webinar A live session, Securing AI Agents and Preventing Data Exposure in GenAI Workflows, will guide you through how AI systems can unintentionally expose sensitive data and, more importantly, what you can do to prevent breaches before they happen. The session will cover: Where GenAI applications most often leak enterprise data by accident Common vulnerabilities attackers target in AI-powered environments How to apply stricter access controls without limiting innovation Effective frameworks to secure AI agents before incidents occur Who Should Attend? This session is designed for: Security teams focused on data protection DevOps professionals working with GenAI deployments IT leaders managing integrations and access IAM and data governance experts shaping AI security policies Product owners and executives balancing AI innovation with safety Generative AI is powerful — but unpredictable. The same tools that help employees work faster can also cause sensitive data to end up where it shouldn’t. This webinar provides practical guidance to help you secure your AI workflows and protect your organization’s data. Reserve your spot today to strengthen your AI security strategy." style="display: block; margin-bottom: 5px; clear:both;max-width: 100%;" link_thumbnail="1" decoding="async" /></a><p>Generative AI is transforming the way organizations operate, learn, and innovate. But behind the benefits, there&#8217;s a hidden threat: AI agents and custom AI workflows are opening new channels for unintended data exposure &#8212; and many teams remain unaware. If you&#8217;re involved in building, deploying, or managing AI solutions, it&#8217;s time to consider: Could your [&#8230;]</p>
<p>The post <a href="https://owlysec.com/privacy/is-your-ai-agent-putting-sensitive-data-at-risk-join-this-webinar-to-discover-how-to-secure-it">Is Your AI Agent Putting Sensitive Data at Risk? Join This Webinar to Discover How to Secure It</a> appeared first on <a href="https://owlysec.com">Owlysec - Cyber Security News</a>.</p>
]]></summary>

					<content type="html" xml:base="https://owlysec.com/privacy/is-your-ai-agent-putting-sensitive-data-at-risk-join-this-webinar-to-discover-how-to-secure-it"><![CDATA[<a href="https://owlysec.com/privacy/is-your-ai-agent-putting-sensitive-data-at-risk-join-this-webinar-to-discover-how-to-secure-it" title="Is Your AI Agent Putting Sensitive Data at Risk? Join This Webinar to Discover How to Secure It" rel="nofollow"><img width="150" height="150" src="https://owlysec.com/wp-content/uploads/2025/07/Is-Your-AI-Agent-Putting-Sensitive-Data-at-Risk_-Join-This-Webinar-to-Discover-How-to-Secure-It-150x150.webp" class="webfeedsFeaturedVisual wp-post-image" alt="Generative AI is transforming the way organizations operate, learn, and innovate. But behind the benefits, there&#039;s a hidden threat: AI agents and custom AI workflows are opening new channels for unintended data exposure — and many teams remain unaware. If you’re involved in building, deploying, or managing AI solutions, it’s time to consider: Could your AI systems be unintentionally leaking confidential information? While GenAI models don’t leak data on purpose, their integration into enterprise environments creates risk. These AI systems often connect to internal platforms like SharePoint, Google Drive, S3, and other corporate tools to deliver smarter results — and that’s where the trouble can begin. Without strong access controls, clear governance, and active oversight, even the most helpful AI assistant could expose sensitive data to unauthorized users — or worse, to the public. Think of a chatbot revealing internal salaries, or an assistant disclosing unreleased product plans during a simple query. These incidents aren’t theoretical; they’re already occurring. Stay Ahead of Data Leaks — Join the Free Webinar A live session, Securing AI Agents and Preventing Data Exposure in GenAI Workflows, will guide you through how AI systems can unintentionally expose sensitive data and, more importantly, what you can do to prevent breaches before they happen. The session will cover: Where GenAI applications most often leak enterprise data by accident Common vulnerabilities attackers target in AI-powered environments How to apply stricter access controls without limiting innovation Effective frameworks to secure AI agents before incidents occur Who Should Attend? This session is designed for: Security teams focused on data protection DevOps professionals working with GenAI deployments IT leaders managing integrations and access IAM and data governance experts shaping AI security policies Product owners and executives balancing AI innovation with safety Generative AI is powerful — but unpredictable. The same tools that help employees work faster can also cause sensitive data to end up where it shouldn’t. This webinar provides practical guidance to help you secure your AI workflows and protect your organization’s data. Reserve your spot today to strengthen your AI security strategy." style="display: block; margin-bottom: 5px; clear:both;max-width: 100%;" link_thumbnail="1" decoding="async" /></a><p data-start="238" data-end="490">Generative AI is transforming the way organizations operate, learn, and innovate. But behind the benefits, there&#8217;s a hidden threat: AI agents and custom AI workflows are opening new channels for unintended data exposure — and many teams remain unaware.</p>
<p data-start="492" data-end="658">If you’re involved in building, deploying, or managing AI solutions, it’s time to consider: Could your AI systems be unintentionally leaking confidential information?</p>
<p data-start="660" data-end="950">While GenAI models don’t leak data on purpose, their integration into enterprise environments creates risk. These AI systems often connect to internal platforms like SharePoint, Google Drive, S3, and other corporate tools to deliver smarter results — and that’s where the trouble can begin.</p>
<p data-start="952" data-end="1321">Without strong access controls, clear governance, and active oversight, even the most helpful AI assistant could expose sensitive data to unauthorized users — or worse, to the public. Think of a chatbot revealing internal salaries, or an assistant disclosing unreleased product plans during a simple query. These incidents aren’t theoretical; they’re already occurring.</p>
<p data-start="1323" data-end="1375"><strong data-start="1323" data-end="1375">Stay Ahead of Data Leaks — Join the Free Webinar</strong></p>
<p data-start="1377" data-end="1621">A live session, <em data-start="1393" data-end="1461">Securing AI Agents and Preventing Data Exposure in GenAI Workflows</em>, will guide you through how AI systems can unintentionally expose sensitive data and, more importantly, what you can do to prevent breaches before they happen.</p>
<p data-start="1623" data-end="1646">The session will cover:</p>
<ul data-start="1648" data-end="1929">
<li data-start="1648" data-end="1720">
<p data-start="1650" data-end="1720">Where GenAI applications most often leak enterprise data by accident</p>
</li>
<li data-start="1721" data-end="1791">
<p data-start="1723" data-end="1791">Common vulnerabilities attackers target in AI-powered environments</p>
</li>
<li data-start="1792" data-end="1861">
<p data-start="1794" data-end="1861">How to apply stricter access controls without limiting innovation</p>
</li>
<li data-start="1862" data-end="1929">
<p data-start="1864" data-end="1929">Effective frameworks to secure AI agents before incidents occur</p>
</li>
</ul>
<p data-start="1931" data-end="1953"><strong data-start="1931" data-end="1953">Who Should Attend?</strong></p>
<p data-start="1955" data-end="1984">This session is designed for:</p>
<ul data-start="1986" data-end="2270">
<li data-start="1986" data-end="2031">
<p data-start="1988" data-end="2031">Security teams focused on data protection</p>
</li>
<li data-start="2032" data-end="2087">
<p data-start="2034" data-end="2087">DevOps professionals working with GenAI deployments</p>
</li>
<li data-start="2088" data-end="2135">
<p data-start="2090" data-end="2135">IT leaders managing integrations and access</p>
</li>
<li data-start="2136" data-end="2200">
<p data-start="2138" data-end="2200">IAM and data governance experts shaping AI security policies</p>
</li>
<li data-start="2201" data-end="2270">
<p data-start="2203" data-end="2270">Product owners and executives balancing AI innovation with safety</p>
</li>
</ul>
<p data-start="2272" data-end="2426">Generative AI is powerful — but unpredictable. The same tools that help employees work faster can also cause sensitive data to end up where it shouldn’t.</p>
<p data-start="2428" data-end="2608">This webinar provides practical guidance to help you secure your AI workflows and protect your organization’s data. Reserve your spot today to strengthen your AI security strategy.</p>
<div class="simplesocialbuttons simplesocial-round-icon simplesocialbuttons_inline simplesocialbuttons-align-left post-5636 post  simplesocialbuttons-inline-no-animation">
<button onClick="javascript:window.open(this.dataset.href, '_blank' );return false;" class="simplesocial-whatsapp-share"  rel="nofollow"  target="_blank"  aria-label="WhatsApp Share" data-href="https://api.whatsapp.com/send?text=https://owlysec.com/privacy/is-your-ai-agent-putting-sensitive-data-at-risk-join-this-webinar-to-discover-how-to-secure-it"><span class="simplesocialtxt">WhatsApp</span></button>
<button class="simplesocial-fb-share"  rel="nofollow"  target="_blank"  aria-label="Facebook Share" data-href="https://www.facebook.com/sharer/sharer.php?u=https://owlysec.com/privacy/is-your-ai-agent-putting-sensitive-data-at-risk-join-this-webinar-to-discover-how-to-secure-it" onClick="javascript:window.open(this.dataset.href, '', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><span class="simplesocialtxt">Facebook </span> </button>
<button class="simplesocial-twt-share"  rel="nofollow"  target="_blank"  aria-label="Twitter Share" data-href="https://twitter.com/intent/tweet?text=Is+Your+AI+Agent+Putting+Sensitive+Data+at+Risk%3F+Join+This+Webinar+to+Discover+How+to+Secure+It&url=https://owlysec.com/privacy/is-your-ai-agent-putting-sensitive-data-at-risk-join-this-webinar-to-discover-how-to-secure-it" onClick="javascript:window.open(this.dataset.href, '', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><span class="simplesocialtxt">Twitter</span> </button>
<button  rel="nofollow"  target="_blank"  class="simplesocial-linkedin-share" aria-label="LinkedIn Share" data-href="https://www.linkedin.com/sharing/share-offsite/?url=https://owlysec.com/privacy/is-your-ai-agent-putting-sensitive-data-at-risk-join-this-webinar-to-discover-how-to-secure-it" onClick="javascript:window.open(this.dataset.href, '', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><span class="simplesocialtxt">LinkedIn</span></button>
</div>
<p>The post <a href="https://owlysec.com/privacy/is-your-ai-agent-putting-sensitive-data-at-risk-join-this-webinar-to-discover-how-to-secure-it">Is Your AI Agent Putting Sensitive Data at Risk? Join This Webinar to Discover How to Secure It</a> appeared first on <a href="https://owlysec.com">Owlysec - Cyber Security News</a>.</p>
]]></content>
		
			</entry>
		<entry>
		<author>
			<name>admin</name>
					</author>

		<title type="html"><![CDATA[Rethinking Secrets as Unique Identifiers for Non-Human Identity Governance]]></title>
		<link rel="alternate" type="text/html" href="https://owlysec.com/cybercrime/rethinking-secrets-as-unique-identifiers-for-non-human-identity-governance" />

		<id>https://owlysec.com/?p=5630</id>
		<updated>2025-07-02T09:28:18Z</updated>
		<published>2025-07-02T09:28:18Z</published>
		<category scheme="https://owlysec.com/" term="Cybercrime" /><category scheme="https://owlysec.com/" term="Data Leaks" /><category scheme="https://owlysec.com/" term="Malware &amp; Threats" /><category scheme="https://owlysec.com/" term="Vulnerabilities" />
		<summary type="html"><![CDATA[<a href="https://owlysec.com/cybercrime/rethinking-secrets-as-unique-identifiers-for-non-human-identity-governance" title="Rethinking Secrets as Unique Identifiers for Non-Human Identity Governance" rel="nofollow"><img width="150" height="150" src="https://owlysec.com/wp-content/uploads/2025/07/Rethinking-Secrets-as-Unique-Identifiers-for-Non-Human-Identity-Governance-150x150.webp" class="webfeedsFeaturedVisual wp-post-image" alt="Identity-based cyberattacks continue to surge, with stolen credentials now playing a central role in most breaches. Recent data suggests that compromised secrets are involved in over 80% of incidents, highlighting how attackers increasingly favor credential theft over exploiting software vulnerabilities. While much focus has been on protecting human identities, machine identities — or non-human identities (NHIs) — represent a far larger and growing attack surface. NHIs, which can include service accounts, API clients, and automated workloads, outnumber human identities in the enterprise by a factor of at least 50 to 1. Unlike human users, machines typically rely on secrets like API keys, tokens, and certificates for authentication — often without the safeguard of multi-factor authentication. The Fragmented State of NHI Management Organizations today struggle to maintain a clear inventory of their NHIs. Different environments — from Kubernetes clusters and cloud platforms to legacy systems — define and manage machine identities in incompatible ways. This fragmented approach makes it challenging to apply consistent security policies or automate governance, leaving organizations exposed to risk. Compounding the problem is a lack of accountability and metadata around NHIs. Many machine identities are poorly documented, with unclear ownership or purpose. Over time, secrets tied to discontinued systems or temporary projects are forgotten, creating a hidden and growing security liability. Secrets as the Foundation of Modern NHI Governance Every NHI ultimately authenticates using a secret. When treated as unique identifiers, these secrets — whether short-lived tokens, API keys, or certificates — offer a powerful means of tracking and managing machine identities across platforms. A secret used for authentication becomes a traceable artifact, linking specific workloads or processes to a distinct identity and action. This approach enables unified visibility across complex environments, helping security teams monitor NHIs regardless of where they operate. It also aligns naturally with Zero Trust principles: unused or expired secrets can be flagged for cleanup, reducing identity sprawl and eliminating ghost credentials. Addressing the Risks of Secret Sprawl However, secrets themselves are a common point of failure. Millions of secrets are exposed annually through public repositories, misconfigured systems, or neglected infrastructure. Once leaked, a secret grants attackers direct access to systems without further verification. Long-lived or over-permissioned credentials are especially dangerous, as they can provide attackers with broad, persistent access. Managing these risks requires more than detecting leaked secrets. It demands a proactive, centralized inventory of all credentials, with robust metadata and lifecycle controls. A Path Forward: Comprehensive NHI Security Through Secrets Management Modern solutions now enable organizations to build cross-environment inventories of all secrets — whether stored securely in vaults or exposed elsewhere. By fingerprinting and contextualizing each credential, security teams can: Identify NHIs with leaked or duplicated secrets. Spot long-lived credentials that require rotation. Detect and decommission orphaned or unauthorized secrets. Enforce lifecycle policies like expiration and revocation. By anchoring machine identity management to the secrets that authenticate them, organizations can move from reactive detection to proactive governance, closing critical gaps in their security posture and reducing the risk of identity-based attacks." style="display: block; margin-bottom: 5px; clear:both;max-width: 100%;" link_thumbnail="1" decoding="async" /></a><p>Identity-based cyberattacks continue to surge, with stolen credentials now playing a central role in most breaches. Recent data suggests that compromised secrets are involved in over 80% of incidents, highlighting how attackers increasingly favor credential theft over exploiting software vulnerabilities. While much focus has been on protecting human identities, machine identities &#8212; or non-human identities [&#8230;]</p>
<p>The post <a href="https://owlysec.com/cybercrime/rethinking-secrets-as-unique-identifiers-for-non-human-identity-governance">Rethinking Secrets as Unique Identifiers for Non-Human Identity Governance</a> appeared first on <a href="https://owlysec.com">Owlysec - Cyber Security News</a>.</p>
]]></summary>

					<content type="html" xml:base="https://owlysec.com/cybercrime/rethinking-secrets-as-unique-identifiers-for-non-human-identity-governance"><![CDATA[<a href="https://owlysec.com/cybercrime/rethinking-secrets-as-unique-identifiers-for-non-human-identity-governance" title="Rethinking Secrets as Unique Identifiers for Non-Human Identity Governance" rel="nofollow"><img width="150" height="150" src="https://owlysec.com/wp-content/uploads/2025/07/Rethinking-Secrets-as-Unique-Identifiers-for-Non-Human-Identity-Governance-150x150.webp" class="webfeedsFeaturedVisual wp-post-image" alt="Identity-based cyberattacks continue to surge, with stolen credentials now playing a central role in most breaches. Recent data suggests that compromised secrets are involved in over 80% of incidents, highlighting how attackers increasingly favor credential theft over exploiting software vulnerabilities. While much focus has been on protecting human identities, machine identities — or non-human identities (NHIs) — represent a far larger and growing attack surface. NHIs, which can include service accounts, API clients, and automated workloads, outnumber human identities in the enterprise by a factor of at least 50 to 1. Unlike human users, machines typically rely on secrets like API keys, tokens, and certificates for authentication — often without the safeguard of multi-factor authentication. The Fragmented State of NHI Management Organizations today struggle to maintain a clear inventory of their NHIs. Different environments — from Kubernetes clusters and cloud platforms to legacy systems — define and manage machine identities in incompatible ways. This fragmented approach makes it challenging to apply consistent security policies or automate governance, leaving organizations exposed to risk. Compounding the problem is a lack of accountability and metadata around NHIs. Many machine identities are poorly documented, with unclear ownership or purpose. Over time, secrets tied to discontinued systems or temporary projects are forgotten, creating a hidden and growing security liability. Secrets as the Foundation of Modern NHI Governance Every NHI ultimately authenticates using a secret. When treated as unique identifiers, these secrets — whether short-lived tokens, API keys, or certificates — offer a powerful means of tracking and managing machine identities across platforms. A secret used for authentication becomes a traceable artifact, linking specific workloads or processes to a distinct identity and action. This approach enables unified visibility across complex environments, helping security teams monitor NHIs regardless of where they operate. It also aligns naturally with Zero Trust principles: unused or expired secrets can be flagged for cleanup, reducing identity sprawl and eliminating ghost credentials. Addressing the Risks of Secret Sprawl However, secrets themselves are a common point of failure. Millions of secrets are exposed annually through public repositories, misconfigured systems, or neglected infrastructure. Once leaked, a secret grants attackers direct access to systems without further verification. Long-lived or over-permissioned credentials are especially dangerous, as they can provide attackers with broad, persistent access. Managing these risks requires more than detecting leaked secrets. It demands a proactive, centralized inventory of all credentials, with robust metadata and lifecycle controls. A Path Forward: Comprehensive NHI Security Through Secrets Management Modern solutions now enable organizations to build cross-environment inventories of all secrets — whether stored securely in vaults or exposed elsewhere. By fingerprinting and contextualizing each credential, security teams can: Identify NHIs with leaked or duplicated secrets. Spot long-lived credentials that require rotation. Detect and decommission orphaned or unauthorized secrets. Enforce lifecycle policies like expiration and revocation. By anchoring machine identity management to the secrets that authenticate them, organizations can move from reactive detection to proactive governance, closing critical gaps in their security posture and reducing the risk of identity-based attacks." style="display: block; margin-bottom: 5px; clear:both;max-width: 100%;" link_thumbnail="1" decoding="async" /></a><p data-start="280" data-end="585">Identity-based cyberattacks continue to surge, with stolen credentials now playing a central role in most breaches. Recent data suggests that compromised secrets are involved in over 80% of incidents, highlighting how attackers increasingly favor credential theft over exploiting software vulnerabilities.</p>
<p data-start="587" data-end="1083">While much focus has been on protecting human identities, machine identities — or non-human identities (NHIs) — represent a far larger and growing attack surface. NHIs, which can include service accounts, API clients, and automated workloads, outnumber human identities in the enterprise by a factor of at least 50 to 1. Unlike human users, machines typically rely on secrets like API keys, tokens, and certificates for authentication — often without the safeguard of multi-factor authentication.</p>
<hr data-start="1085" data-end="1088" />
<h3 data-start="1090" data-end="1132">The Fragmented State of NHI Management</h3>
<p data-start="1134" data-end="1503">Organizations today struggle to maintain a clear inventory of their NHIs. Different environments — from Kubernetes clusters and cloud platforms to legacy systems — define and manage machine identities in incompatible ways. This fragmented approach makes it challenging to apply consistent security policies or automate governance, leaving organizations exposed to risk.</p>
<p data-start="1505" data-end="1799">Compounding the problem is a lack of accountability and metadata around NHIs. Many machine identities are poorly documented, with unclear ownership or purpose. Over time, secrets tied to discontinued systems or temporary projects are forgotten, creating a hidden and growing security liability.</p>
<hr data-start="1801" data-end="1804" />
<h3 data-start="1806" data-end="1860">Secrets as the Foundation of Modern NHI Governance</h3>
<p data-start="1862" data-end="2243">Every NHI ultimately authenticates using a secret. When treated as unique identifiers, these secrets — whether short-lived tokens, API keys, or certificates — offer a powerful means of tracking and managing machine identities across platforms. A secret used for authentication becomes a traceable artifact, linking specific workloads or processes to a distinct identity and action.</p>
<p data-start="2245" data-end="2551">This approach enables unified visibility across complex environments, helping security teams monitor NHIs regardless of where they operate. It also aligns naturally with Zero Trust principles: unused or expired secrets can be flagged for cleanup, reducing identity sprawl and eliminating ghost credentials.</p>
<hr data-start="2553" data-end="2556" />
<h3 data-start="2558" data-end="2599">Addressing the Risks of Secret Sprawl</h3>
<p data-start="2601" data-end="3006">However, secrets themselves are a common point of failure. Millions of secrets are exposed annually through public repositories, misconfigured systems, or neglected infrastructure. Once leaked, a secret grants attackers direct access to systems without further verification. Long-lived or over-permissioned credentials are especially dangerous, as they can provide attackers with broad, persistent access.</p>
<p data-start="3008" data-end="3185">Managing these risks requires more than detecting leaked secrets. It demands a proactive, centralized inventory of all credentials, with robust metadata and lifecycle controls.</p>
<hr data-start="3187" data-end="3190" />
<h3 data-start="3192" data-end="3265">A Path Forward: Comprehensive NHI Security Through Secrets Management</h3>
<p data-start="3267" data-end="3495">Modern solutions now enable organizations to build cross-environment inventories of all secrets — whether stored securely in vaults or exposed elsewhere. By fingerprinting and contextualizing each credential, security teams can:</p>
<ul data-start="3497" data-end="3721">
<li data-start="3497" data-end="3547">
<p data-start="3499" data-end="3547">Identify NHIs with leaked or duplicated secrets.</p>
</li>
<li data-start="3548" data-end="3600">
<p data-start="3550" data-end="3600">Spot long-lived credentials that require rotation.</p>
</li>
<li data-start="3601" data-end="3660">
<p data-start="3603" data-end="3660">Detect and decommission orphaned or unauthorized secrets.</p>
</li>
<li data-start="3661" data-end="3721">
<p data-start="3663" data-end="3721">Enforce lifecycle policies like expiration and revocation.</p>
</li>
</ul>
<p data-start="3723" data-end="3971">By anchoring machine identity management to the secrets that authenticate them, organizations can move from reactive detection to proactive governance, closing critical gaps in their security posture and reducing the risk of identity-based attacks.</p>
<div class="simplesocialbuttons simplesocial-round-icon simplesocialbuttons_inline simplesocialbuttons-align-left post-5630 post  simplesocialbuttons-inline-no-animation">
<button onClick="javascript:window.open(this.dataset.href, '_blank' );return false;" class="simplesocial-whatsapp-share"  rel="nofollow"  target="_blank"  aria-label="WhatsApp Share" data-href="https://api.whatsapp.com/send?text=https://owlysec.com/cybercrime/rethinking-secrets-as-unique-identifiers-for-non-human-identity-governance"><span class="simplesocialtxt">WhatsApp</span></button>
<button class="simplesocial-fb-share"  rel="nofollow"  target="_blank"  aria-label="Facebook Share" data-href="https://www.facebook.com/sharer/sharer.php?u=https://owlysec.com/cybercrime/rethinking-secrets-as-unique-identifiers-for-non-human-identity-governance" onClick="javascript:window.open(this.dataset.href, '', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><span class="simplesocialtxt">Facebook </span> </button>
<button class="simplesocial-twt-share"  rel="nofollow"  target="_blank"  aria-label="Twitter Share" data-href="https://twitter.com/intent/tweet?text=Rethinking+Secrets+as+Unique+Identifiers+for+Non-Human+Identity+Governance&url=https://owlysec.com/cybercrime/rethinking-secrets-as-unique-identifiers-for-non-human-identity-governance" onClick="javascript:window.open(this.dataset.href, '', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><span class="simplesocialtxt">Twitter</span> </button>
<button  rel="nofollow"  target="_blank"  class="simplesocial-linkedin-share" aria-label="LinkedIn Share" data-href="https://www.linkedin.com/sharing/share-offsite/?url=https://owlysec.com/cybercrime/rethinking-secrets-as-unique-identifiers-for-non-human-identity-governance" onClick="javascript:window.open(this.dataset.href, '', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><span class="simplesocialtxt">LinkedIn</span></button>
</div>
<p>The post <a href="https://owlysec.com/cybercrime/rethinking-secrets-as-unique-identifiers-for-non-human-identity-governance">Rethinking Secrets as Unique Identifiers for Non-Human Identity Governance</a> appeared first on <a href="https://owlysec.com">Owlysec - Cyber Security News</a>.</p>
]]></content>
		
			</entry>
		<entry>
		<author>
			<name>admin</name>
					</author>

		<title type="html"><![CDATA[Airline Industry Targeted in Sophisticated Social Engineering Attacks by Expanding Cybercrime Group]]></title>
		<link rel="alternate" type="text/html" href="https://owlysec.com/cybercrime/airline-industry-targeted-in-sophisticated-social-engineering-attacks-by-expanding-cybercrime-group" />

		<id>https://owlysec.com/?p=5633</id>
		<updated>2025-07-02T09:35:34Z</updated>
		<published>2025-07-01T09:34:01Z</published>
		<category scheme="https://owlysec.com/" term="Cybercrime" /><category scheme="https://owlysec.com/" term="Malware &amp; Threats" /><category scheme="https://owlysec.com/" term="Vulnerabilities" /><category scheme="https://owlysec.com/" term="White Papers" />
		<summary type="html"><![CDATA[<a href="https://owlysec.com/cybercrime/airline-industry-targeted-in-sophisticated-social-engineering-attacks-by-expanding-cybercrime-group" title="Airline Industry Targeted in Sophisticated Social Engineering Attacks by Expanding Cybercrime Group" rel="nofollow"><img width="150" height="150" src="https://owlysec.com/wp-content/uploads/2025/07/Airline-Industry-Targeted-in-Sophisticated-Social-Engineering-Attacks-by-Expanding-Cybercrime-Group-150x150.webp" class="webfeedsFeaturedVisual wp-post-image" alt="A well-known cybercriminal collective, often referred to as Scattered Spider, has been identified as increasingly focusing its attacks on the aviation sector. Security agencies and private cybersecurity firms are raising alarms about a surge in social engineering attacks designed to bypass even robust security controls such as multi-factor authentication (MFA). The group&#039;s tactics rely heavily on impersonation techniques, where attackers pose as employees or contractors to deceive IT help desks. Through convincing scenarios, they manipulate support staff into adding unauthorized MFA devices or resetting credentials, effectively granting attackers access to privileged accounts. Recent incidents highlight that not only airline operators but also trusted third-party IT service providers are in the crosshairs. Once inside, attackers aim to steal data, extort victims, and in many cases, deploy ransomware. Investigations have revealed that attackers often single out high-value targets, such as executives, whose accounts typically have elevated privileges and whose requests are handled with urgency by internal teams. The attackers’ process involves detailed reconnaissance, combining information from social media, past breaches, and public data to convincingly impersonate employees. Once initial access is gained, they move swiftly, escalating privileges, compromising cloud infrastructure, and disabling recovery mechanisms. The operations often culminate in double-extortion ransomware attacks, where data theft and encryption are used in tandem for maximum leverage. Security experts warn that these campaigns represent a shift from traditional brute-force attacks toward highly personalized identity threats. The group’s strategy blends deep social engineering, technical expertise, and aggressive tactics to compromise both cloud and on-premises environments. In some of the latest attacks, threat actors exploited weaknesses in identity verification workflows, successfully convincing help desk staff to reset MFA devices and provide sensitive account information. In one case, attackers gained control over a company’s virtual infrastructure, shut down key systems, accessed sensitive databases, and exfiltrated password vaults, before being interrupted by the company’s response team and platform providers. The growing threat posed by such groups underscores the need for organizations to strengthen identity verification procedures, particularly around help desk operations and account recovery processes. Relying solely on technical defenses like MFA is no longer sufficient when attackers target the people and processes behind those systems. Companies are urged to provide realistic training for staff, implement stricter help desk protocols, and reevaluate their incident response strategies to reduce the risk posed by these evolving identity-based attack campaigns." style="display: block; margin-bottom: 5px; clear:both;max-width: 100%;" link_thumbnail="1" decoding="async" /></a><p>A well-known cybercriminal collective, often referred to as Scattered Spider, has been identified as increasingly focusing its attacks on the aviation sector. Security agencies and private cybersecurity firms are raising alarms about a surge in social engineering attacks designed to bypass even robust security controls such as multi-factor authentication (MFA). The group&#8217;s tactics rely heavily [&#8230;]</p>
<p>The post <a href="https://owlysec.com/cybercrime/airline-industry-targeted-in-sophisticated-social-engineering-attacks-by-expanding-cybercrime-group">Airline Industry Targeted in Sophisticated Social Engineering Attacks by Expanding Cybercrime Group</a> appeared first on <a href="https://owlysec.com">Owlysec - Cyber Security News</a>.</p>
]]></summary>

					<content type="html" xml:base="https://owlysec.com/cybercrime/airline-industry-targeted-in-sophisticated-social-engineering-attacks-by-expanding-cybercrime-group"><![CDATA[<a href="https://owlysec.com/cybercrime/airline-industry-targeted-in-sophisticated-social-engineering-attacks-by-expanding-cybercrime-group" title="Airline Industry Targeted in Sophisticated Social Engineering Attacks by Expanding Cybercrime Group" rel="nofollow"><img width="150" height="150" src="https://owlysec.com/wp-content/uploads/2025/07/Airline-Industry-Targeted-in-Sophisticated-Social-Engineering-Attacks-by-Expanding-Cybercrime-Group-150x150.webp" class="webfeedsFeaturedVisual wp-post-image" alt="A well-known cybercriminal collective, often referred to as Scattered Spider, has been identified as increasingly focusing its attacks on the aviation sector. Security agencies and private cybersecurity firms are raising alarms about a surge in social engineering attacks designed to bypass even robust security controls such as multi-factor authentication (MFA). The group&#039;s tactics rely heavily on impersonation techniques, where attackers pose as employees or contractors to deceive IT help desks. Through convincing scenarios, they manipulate support staff into adding unauthorized MFA devices or resetting credentials, effectively granting attackers access to privileged accounts. Recent incidents highlight that not only airline operators but also trusted third-party IT service providers are in the crosshairs. Once inside, attackers aim to steal data, extort victims, and in many cases, deploy ransomware. Investigations have revealed that attackers often single out high-value targets, such as executives, whose accounts typically have elevated privileges and whose requests are handled with urgency by internal teams. The attackers’ process involves detailed reconnaissance, combining information from social media, past breaches, and public data to convincingly impersonate employees. Once initial access is gained, they move swiftly, escalating privileges, compromising cloud infrastructure, and disabling recovery mechanisms. The operations often culminate in double-extortion ransomware attacks, where data theft and encryption are used in tandem for maximum leverage. Security experts warn that these campaigns represent a shift from traditional brute-force attacks toward highly personalized identity threats. The group’s strategy blends deep social engineering, technical expertise, and aggressive tactics to compromise both cloud and on-premises environments. In some of the latest attacks, threat actors exploited weaknesses in identity verification workflows, successfully convincing help desk staff to reset MFA devices and provide sensitive account information. In one case, attackers gained control over a company’s virtual infrastructure, shut down key systems, accessed sensitive databases, and exfiltrated password vaults, before being interrupted by the company’s response team and platform providers. The growing threat posed by such groups underscores the need for organizations to strengthen identity verification procedures, particularly around help desk operations and account recovery processes. Relying solely on technical defenses like MFA is no longer sufficient when attackers target the people and processes behind those systems. Companies are urged to provide realistic training for staff, implement stricter help desk protocols, and reevaluate their incident response strategies to reduce the risk posed by these evolving identity-based attack campaigns." style="display: block; margin-bottom: 5px; clear:both;max-width: 100%;" link_thumbnail="1" decoding="async" /></a><p data-start="291" data-end="654">A well-known cybercriminal collective, often referred to as Scattered Spider, has been identified as increasingly focusing its attacks on the aviation sector. Security agencies and private cybersecurity firms are raising alarms about a surge in social engineering attacks designed to bypass even robust security controls such as multi-factor authentication (MFA).</p>
<p data-start="656" data-end="977">The group&#8217;s tactics rely heavily on impersonation techniques, where attackers pose as employees or contractors to deceive IT help desks. Through convincing scenarios, they manipulate support staff into adding unauthorized MFA devices or resetting credentials, effectively granting attackers access to privileged accounts.</p>
<p data-start="979" data-end="1420">Recent incidents highlight that not only airline operators but also trusted third-party IT service providers are in the crosshairs. Once inside, attackers aim to steal data, extort victims, and in many cases, deploy ransomware. Investigations have revealed that attackers often single out high-value targets, such as executives, whose accounts typically have elevated privileges and whose requests are handled with urgency by internal teams.</p>
<p data-start="1422" data-end="1876">The attackers’ process involves detailed reconnaissance, combining information from social media, past breaches, and public data to convincingly impersonate employees. Once initial access is gained, they move swiftly, escalating privileges, compromising cloud infrastructure, and disabling recovery mechanisms. The operations often culminate in double-extortion ransomware attacks, where data theft and encryption are used in tandem for maximum leverage.</p>
<p data-start="1878" data-end="2172">Security experts warn that these campaigns represent a shift from traditional brute-force attacks toward highly personalized identity threats. The group’s strategy blends deep social engineering, technical expertise, and aggressive tactics to compromise both cloud and on-premises environments.</p>
<p data-start="2174" data-end="2624">In some of the latest attacks, threat actors exploited weaknesses in identity verification workflows, successfully convincing help desk staff to reset MFA devices and provide sensitive account information. In one case, attackers gained control over a company’s virtual infrastructure, shut down key systems, accessed sensitive databases, and exfiltrated password vaults, before being interrupted by the company’s response team and platform providers.</p>
<p data-start="2626" data-end="2964">The growing threat posed by such groups underscores the need for organizations to strengthen identity verification procedures, particularly around help desk operations and account recovery processes. Relying solely on technical defenses like MFA is no longer sufficient when attackers target the people and processes behind those systems.</p>
<p data-start="2966" data-end="3192">Companies are urged to provide realistic training for staff, implement stricter help desk protocols, and reevaluate their incident response strategies to reduce the risk posed by these evolving identity-based attack campaigns.</p>
<div class="simplesocialbuttons simplesocial-round-icon simplesocialbuttons_inline simplesocialbuttons-align-left post-5633 post  simplesocialbuttons-inline-no-animation">
<button onClick="javascript:window.open(this.dataset.href, '_blank' );return false;" class="simplesocial-whatsapp-share"  rel="nofollow"  target="_blank"  aria-label="WhatsApp Share" data-href="https://api.whatsapp.com/send?text=https://owlysec.com/cybercrime/airline-industry-targeted-in-sophisticated-social-engineering-attacks-by-expanding-cybercrime-group"><span class="simplesocialtxt">WhatsApp</span></button>
<button class="simplesocial-fb-share"  rel="nofollow"  target="_blank"  aria-label="Facebook Share" data-href="https://www.facebook.com/sharer/sharer.php?u=https://owlysec.com/cybercrime/airline-industry-targeted-in-sophisticated-social-engineering-attacks-by-expanding-cybercrime-group" onClick="javascript:window.open(this.dataset.href, '', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><span class="simplesocialtxt">Facebook </span> </button>
<button class="simplesocial-twt-share"  rel="nofollow"  target="_blank"  aria-label="Twitter Share" data-href="https://twitter.com/intent/tweet?text=Airline+Industry+Targeted+in+Sophisticated+Social+Engineering+Attacks+by+Expanding+Cybercrime+Group&url=https://owlysec.com/cybercrime/airline-industry-targeted-in-sophisticated-social-engineering-attacks-by-expanding-cybercrime-group" onClick="javascript:window.open(this.dataset.href, '', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><span class="simplesocialtxt">Twitter</span> </button>
<button  rel="nofollow"  target="_blank"  class="simplesocial-linkedin-share" aria-label="LinkedIn Share" data-href="https://www.linkedin.com/sharing/share-offsite/?url=https://owlysec.com/cybercrime/airline-industry-targeted-in-sophisticated-social-engineering-attacks-by-expanding-cybercrime-group" onClick="javascript:window.open(this.dataset.href, '', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><span class="simplesocialtxt">LinkedIn</span></button>
</div>
<p>The post <a href="https://owlysec.com/cybercrime/airline-industry-targeted-in-sophisticated-social-engineering-attacks-by-expanding-cybercrime-group">Airline Industry Targeted in Sophisticated Social Engineering Attacks by Expanding Cybercrime Group</a> appeared first on <a href="https://owlysec.com">Owlysec - Cyber Security News</a>.</p>
]]></content>
		
			</entry>
		<entry>
		<author>
			<name>admin</name>
					</author>

		<title type="html"><![CDATA[Mustang Panda Targets Tibetan Community with PUBLOAD and Pubshell Malware in Espionage Campaign]]></title>
		<link rel="alternate" type="text/html" href="https://owlysec.com/cybercrime/mustang-panda-targets-tibetan-community-with-pubload-and-pubshell-malware-in-espionage-campaign" />

		<id>https://owlysec.com/?p=5626</id>
		<updated>2025-06-30T09:33:04Z</updated>
		<published>2025-06-30T09:33:04Z</published>
		<category scheme="https://owlysec.com/" term="Cybercrime" /><category scheme="https://owlysec.com/" term="Malware &amp; Threats" /><category scheme="https://owlysec.com/" term="Vulnerabilities" />
		<summary type="html"><![CDATA[<a href="https://owlysec.com/cybercrime/mustang-panda-targets-tibetan-community-with-pubload-and-pubshell-malware-in-espionage-campaign" title="Mustang Panda Targets Tibetan Community with PUBLOAD and Pubshell Malware in Espionage Campaign" rel="nofollow"><img width="150" height="150" src="https://owlysec.com/wp-content/uploads/2025/06/Mustang-Panda-Targets-Tibetan-Community-with-PUBLOAD-and-Pubshell-Malware-in-Espionage-Campaign-150x150.webp" class="webfeedsFeaturedVisual wp-post-image" alt="A recent cyber espionage operation has been linked to Mustang Panda, a threat group associated with China, as it intensifies efforts to spy on the Tibetan community. The campaign, observed in June 2025, employs spear-phishing emails themed around Tibetan issues to deliver custom malware strains designed to provide covert access to targeted systems. The attack lures make use of subjects tied to Tibet, including the 9th World Parliamentarians&#039; Convention on Tibet, discussions on China’s education policy in the Tibet Autonomous Region, and publications related to the 14th Dalai Lama. These tailored messages are crafted to appeal directly to individuals with ties to Tibetan affairs, increasing the likelihood of success. Victims are enticed to open malicious archives that contain both harmless-looking Word documents and content sourced from legitimate Tibetan websites. Hidden among these files is an executable disguised as a document, which initiates the infection process. Technical Details of the Attack Chain Once executed, the malware leverages DLL side-loading to deploy Claimloader, a stager responsible for launching the first-stage downloader known as PUBLOAD. PUBLOAD contacts an attacker-controlled server to retrieve the next payload: Pubshell. Pubshell is a lightweight backdoor that establishes a reverse shell, allowing adversaries direct access to the compromised system for command execution. Analysts note that Pubshell bears similarities to another Mustang Panda tool, TONESHELL. While both malware types are used to create reverse shells, Pubshell features a simplified design and requires specific commands to return results from executed tasks. Broader Campaign Patterns This activity is consistent with Mustang Panda’s known tactics, techniques, and procedures (TTPs). Similar operations have been observed targeting government, diplomatic, and military entities in regions including Taiwan, the United States, the Philippines, and Pakistan. These campaigns often rely on spear-phishing emails with links to Google Drive-hosted malicious archives (ZIP or RAR files), which ultimately deliver payloads like TONESHELL or PUBLOAD. One variant of the campaign aimed at Taiwan included the use of a USB worm called HIUPAN, which spreads the malware components via removable drives, further aiding lateral movement and persistence within target environments. Ongoing Threat Security researchers emphasize that Mustang Panda, and specifically the sub-group referred to as Hive0154, continues to evolve its malware arsenal and operational techniques. The group’s focus remains heavily concentrated on East Asia, targeting both private and public sector organizations. Their sophisticated tooling, rapid development cycles, and use of USB worms highlight the ongoing threat they pose in the cyber espionage arena. Organizations operating in the region, particularly those linked to sensitive political or diplomatic matters, are urged to maintain heightened vigilance, implement advanced phishing defenses, and monitor for indicators of compromise related to PUBLOAD, Pubshell, and associated tooling." style="display: block; margin-bottom: 5px; clear:both;max-width: 100%;" link_thumbnail="1" decoding="async" /></a><p>A recent cyber espionage operation has been linked to Mustang Panda, a threat group associated with China, as it intensifies efforts to spy on the Tibetan community. The campaign, observed in June 2025, employs spear-phishing emails themed around Tibetan issues to deliver custom malware strains designed to provide covert access to targeted systems. The attack [&#8230;]</p>
<p>The post <a href="https://owlysec.com/cybercrime/mustang-panda-targets-tibetan-community-with-pubload-and-pubshell-malware-in-espionage-campaign">Mustang Panda Targets Tibetan Community with PUBLOAD and Pubshell Malware in Espionage Campaign</a> appeared first on <a href="https://owlysec.com">Owlysec - Cyber Security News</a>.</p>
]]></summary>

					<content type="html" xml:base="https://owlysec.com/cybercrime/mustang-panda-targets-tibetan-community-with-pubload-and-pubshell-malware-in-espionage-campaign"><![CDATA[<a href="https://owlysec.com/cybercrime/mustang-panda-targets-tibetan-community-with-pubload-and-pubshell-malware-in-espionage-campaign" title="Mustang Panda Targets Tibetan Community with PUBLOAD and Pubshell Malware in Espionage Campaign" rel="nofollow"><img width="150" height="150" src="https://owlysec.com/wp-content/uploads/2025/06/Mustang-Panda-Targets-Tibetan-Community-with-PUBLOAD-and-Pubshell-Malware-in-Espionage-Campaign-150x150.webp" class="webfeedsFeaturedVisual wp-post-image" alt="A recent cyber espionage operation has been linked to Mustang Panda, a threat group associated with China, as it intensifies efforts to spy on the Tibetan community. The campaign, observed in June 2025, employs spear-phishing emails themed around Tibetan issues to deliver custom malware strains designed to provide covert access to targeted systems. The attack lures make use of subjects tied to Tibet, including the 9th World Parliamentarians&#039; Convention on Tibet, discussions on China’s education policy in the Tibet Autonomous Region, and publications related to the 14th Dalai Lama. These tailored messages are crafted to appeal directly to individuals with ties to Tibetan affairs, increasing the likelihood of success. Victims are enticed to open malicious archives that contain both harmless-looking Word documents and content sourced from legitimate Tibetan websites. Hidden among these files is an executable disguised as a document, which initiates the infection process. Technical Details of the Attack Chain Once executed, the malware leverages DLL side-loading to deploy Claimloader, a stager responsible for launching the first-stage downloader known as PUBLOAD. PUBLOAD contacts an attacker-controlled server to retrieve the next payload: Pubshell. Pubshell is a lightweight backdoor that establishes a reverse shell, allowing adversaries direct access to the compromised system for command execution. Analysts note that Pubshell bears similarities to another Mustang Panda tool, TONESHELL. While both malware types are used to create reverse shells, Pubshell features a simplified design and requires specific commands to return results from executed tasks. Broader Campaign Patterns This activity is consistent with Mustang Panda’s known tactics, techniques, and procedures (TTPs). Similar operations have been observed targeting government, diplomatic, and military entities in regions including Taiwan, the United States, the Philippines, and Pakistan. These campaigns often rely on spear-phishing emails with links to Google Drive-hosted malicious archives (ZIP or RAR files), which ultimately deliver payloads like TONESHELL or PUBLOAD. One variant of the campaign aimed at Taiwan included the use of a USB worm called HIUPAN, which spreads the malware components via removable drives, further aiding lateral movement and persistence within target environments. Ongoing Threat Security researchers emphasize that Mustang Panda, and specifically the sub-group referred to as Hive0154, continues to evolve its malware arsenal and operational techniques. The group’s focus remains heavily concentrated on East Asia, targeting both private and public sector organizations. Their sophisticated tooling, rapid development cycles, and use of USB worms highlight the ongoing threat they pose in the cyber espionage arena. Organizations operating in the region, particularly those linked to sensitive political or diplomatic matters, are urged to maintain heightened vigilance, implement advanced phishing defenses, and monitor for indicators of compromise related to PUBLOAD, Pubshell, and associated tooling." style="display: block; margin-bottom: 5px; clear:both;max-width: 100%;" link_thumbnail="1" decoding="async" /></a><p data-start="243" data-end="593">A recent cyber espionage operation has been linked to Mustang Panda, a threat group associated with China, as it intensifies efforts to spy on the Tibetan community. The campaign, observed in June 2025, employs spear-phishing emails themed around Tibetan issues to deliver custom malware strains designed to provide covert access to targeted systems.</p>
<p data-start="595" data-end="969">The attack lures make use of subjects tied to Tibet, including the 9th World Parliamentarians&#8217; Convention on Tibet, discussions on China’s education policy in the Tibet Autonomous Region, and publications related to the 14th Dalai Lama. These tailored messages are crafted to appeal directly to individuals with ties to Tibetan affairs, increasing the likelihood of success.</p>
<p data-start="971" data-end="1227">Victims are enticed to open malicious archives that contain both harmless-looking Word documents and content sourced from legitimate Tibetan websites. Hidden among these files is an executable disguised as a document, which initiates the infection process.</p>
<h3 data-start="1229" data-end="1270">Technical Details of the Attack Chain</h3>
<p data-start="1272" data-end="1674">Once executed, the malware leverages DLL side-loading to deploy <em data-start="1336" data-end="1349">Claimloader</em>, a stager responsible for launching the first-stage downloader known as <em data-start="1422" data-end="1431">PUBLOAD</em>. PUBLOAD contacts an attacker-controlled server to retrieve the next payload: <em data-start="1510" data-end="1520">Pubshell</em>. Pubshell is a lightweight backdoor that establishes a reverse shell, allowing adversaries direct access to the compromised system for command execution.</p>
<p data-start="1676" data-end="1934">Analysts note that Pubshell bears similarities to another Mustang Panda tool, <em data-start="1754" data-end="1765">TONESHELL</em>. While both malware types are used to create reverse shells, Pubshell features a simplified design and requires specific commands to return results from executed tasks.</p>
<h3 data-start="1936" data-end="1965">Broader Campaign Patterns</h3>
<p data-start="1967" data-end="2424">This activity is consistent with Mustang Panda’s known tactics, techniques, and procedures (TTPs). Similar operations have been observed targeting government, diplomatic, and military entities in regions including Taiwan, the United States, the Philippines, and Pakistan. These campaigns often rely on spear-phishing emails with links to Google Drive-hosted malicious archives (ZIP or RAR files), which ultimately deliver payloads like TONESHELL or PUBLOAD.</p>
<p data-start="2426" data-end="2652">One variant of the campaign aimed at Taiwan included the use of a USB worm called <em data-start="2508" data-end="2516">HIUPAN</em>, which spreads the malware components via removable drives, further aiding lateral movement and persistence within target environments.</p>
<h3 data-start="2654" data-end="2672">Ongoing Threat</h3>
<p data-start="2674" data-end="3110">Security researchers emphasize that Mustang Panda, and specifically the sub-group referred to as Hive0154, continues to evolve its malware arsenal and operational techniques. The group’s focus remains heavily concentrated on East Asia, targeting both private and public sector organizations. Their sophisticated tooling, rapid development cycles, and use of USB worms highlight the ongoing threat they pose in the cyber espionage arena.</p>
<p data-start="3112" data-end="3399">Organizations operating in the region, particularly those linked to sensitive political or diplomatic matters, are urged to maintain heightened vigilance, implement advanced phishing defenses, and monitor for indicators of compromise related to PUBLOAD, Pubshell, and associated tooling.</p>
<div class="simplesocialbuttons simplesocial-round-icon simplesocialbuttons_inline simplesocialbuttons-align-left post-5626 post  simplesocialbuttons-inline-no-animation">
<button onClick="javascript:window.open(this.dataset.href, '_blank' );return false;" class="simplesocial-whatsapp-share"  rel="nofollow"  target="_blank"  aria-label="WhatsApp Share" data-href="https://api.whatsapp.com/send?text=https://owlysec.com/cybercrime/mustang-panda-targets-tibetan-community-with-pubload-and-pubshell-malware-in-espionage-campaign"><span class="simplesocialtxt">WhatsApp</span></button>
<button class="simplesocial-fb-share"  rel="nofollow"  target="_blank"  aria-label="Facebook Share" data-href="https://www.facebook.com/sharer/sharer.php?u=https://owlysec.com/cybercrime/mustang-panda-targets-tibetan-community-with-pubload-and-pubshell-malware-in-espionage-campaign" onClick="javascript:window.open(this.dataset.href, '', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><span class="simplesocialtxt">Facebook </span> </button>
<button class="simplesocial-twt-share"  rel="nofollow"  target="_blank"  aria-label="Twitter Share" data-href="https://twitter.com/intent/tweet?text=Mustang+Panda+Targets+Tibetan+Community+with+PUBLOAD+and+Pubshell+Malware+in+Espionage+Campaign&url=https://owlysec.com/cybercrime/mustang-panda-targets-tibetan-community-with-pubload-and-pubshell-malware-in-espionage-campaign" onClick="javascript:window.open(this.dataset.href, '', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><span class="simplesocialtxt">Twitter</span> </button>
<button  rel="nofollow"  target="_blank"  class="simplesocial-linkedin-share" aria-label="LinkedIn Share" data-href="https://www.linkedin.com/sharing/share-offsite/?url=https://owlysec.com/cybercrime/mustang-panda-targets-tibetan-community-with-pubload-and-pubshell-malware-in-espionage-campaign" onClick="javascript:window.open(this.dataset.href, '', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><span class="simplesocialtxt">LinkedIn</span></button>
</div>
<p>The post <a href="https://owlysec.com/cybercrime/mustang-panda-targets-tibetan-community-with-pubload-and-pubshell-malware-in-espionage-campaign">Mustang Panda Targets Tibetan Community with PUBLOAD and Pubshell Malware in Espionage Campaign</a> appeared first on <a href="https://owlysec.com">Owlysec - Cyber Security News</a>.</p>
]]></content>
		
			</entry>
		<entry>
		<author>
			<name>admin</name>
					</author>

		<title type="html"><![CDATA[CTEM in Practice: Turning Continuous Threat Exposure Management From Concept to Operational Reality]]></title>
		<link rel="alternate" type="text/html" href="https://owlysec.com/instruction/business/ctem-in-practice-turning-continuous-threat-exposure-management-from-concept-to-operational-reality" />

		<id>https://owlysec.com/?p=5623</id>
		<updated>2025-06-30T09:25:46Z</updated>
		<published>2025-06-25T09:20:57Z</published>
		<category scheme="https://owlysec.com/" term="Business" /><category scheme="https://owlysec.com/" term="Instructions" /><category scheme="https://owlysec.com/" term="Vulnerabilities" />
		<summary type="html"><![CDATA[<a href="https://owlysec.com/instruction/business/ctem-in-practice-turning-continuous-threat-exposure-management-from-concept-to-operational-reality" title="CTEM in Practice: Turning Continuous Threat Exposure Management From Concept to Operational Reality" rel="nofollow"><img width="150" height="150" src="https://owlysec.com/wp-content/uploads/2025/06/CTEM-in-Practice_-Turning-Continuous-Threat-Exposure-Management-From-Concept-to-Operational-Reality-150x150.webp" class="webfeedsFeaturedVisual wp-post-image" alt="Continuous Threat Exposure Management (CTEM) has emerged as a critical focus for organizations aiming to stay ahead of today’s dynamic cyber risks. While the concept promises enhanced resilience and reduced breach likelihood, the path from theory to execution is filled with challenges that security leaders must navigate. In a recent expert discussion at Xposure Summit 2025, cybersecurity leaders from diverse industries came together to share their real-world experiences in operationalizing CTEM. The panel featured security executives representing banking, healthcare, and hospitality sectors—each offering unique perspectives on how to apply CTEM in production environments. The Reality Behind the CTEM Promise CTEM became a major topic after predictions that organizations adopting it effectively could see a threefold reduction in breach risk by 2026. But as practitioners emphasized, achieving that benefit depends entirely on the ability to operationalize CTEM, not just adopt it as a concept. Panelists agreed on the essentials of building a strong CTEM program: begin with mastering asset inventory and identity management. Weak service accounts, excessive user permissions, and outdated logins represent significant security gaps. Addressing these exposures requires continuous vigilance—weekly checks for internal assets and daily scrutiny of external-facing systems. A key distinction highlighted was that CTEM is not vulnerability management. Instead of just patching software flaws, CTEM is about validating whether existing controls effectively block real-world attack techniques. Threat intelligence, therefore, becomes central to CTEM efforts, enabling security teams to simulate adversary behavior and test defenses under realistic conditions. Translating Security Efforts Into Risk Language Panelists shared how CTEM practices are reshaping how security leaders communicate with boards and regulators. The focus is shifting away from technical jargon, like CVSS scores, toward meaningful discussions about business risk. Boards want to know: Is the company’s exposure increasing or decreasing? Where is the risk concentrated? What mitigation steps are underway? Especially in regulated industries, leaders emphasized the importance of being prepared to provide clear answers on exposure, remediation timelines, and risk treatments—turning regulatory scrutiny into an opportunity for accountability and clarity. Measuring What Truly Matters CTEM success is not measured by the number of vulnerabilities patched. Instead, it’s about closing exploited attack paths and reducing exploitable risk in the environment. Security leaders shared how attack path validation has uncovered hidden risks, such as forgotten assets and over-permissioned accounts, making risk visible and actionable. Others described the value of conducting tabletop exercises that walk executives through simulated attack scenarios. The goal is to shift from focusing on technical metrics to enabling informed decisions about real risk and its potential business impact. From Strategy to Action The conversation concluded with practical advice on implementing CTEM without getting lost in alert noise. The key takeaways: stay focused on what’s exploitable, use threat intelligence to guide testing, and continuously align security priorities with business risk. Organizations adopting CTEM are finding that the journey requires more than technology—it demands cultural change, clear communication, and relentless focus on what matters most: reducing exposure to real threats." style="display: block; margin-bottom: 5px; clear:both;max-width: 100%;" link_thumbnail="1" decoding="async" /></a><p>Continuous Threat Exposure Management (CTEM) has emerged as a critical focus for organizations aiming to stay ahead of today&#8217;s dynamic cyber risks. While the concept promises enhanced resilience and reduced breach likelihood, the path from theory to execution is filled with challenges that security leaders must navigate. In a recent expert discussion at Xposure Summit [&#8230;]</p>
<p>The post <a href="https://owlysec.com/instruction/business/ctem-in-practice-turning-continuous-threat-exposure-management-from-concept-to-operational-reality">CTEM in Practice: Turning Continuous Threat Exposure Management From Concept to Operational Reality</a> appeared first on <a href="https://owlysec.com">Owlysec - Cyber Security News</a>.</p>
]]></summary>

					<content type="html" xml:base="https://owlysec.com/instruction/business/ctem-in-practice-turning-continuous-threat-exposure-management-from-concept-to-operational-reality"><![CDATA[<a href="https://owlysec.com/instruction/business/ctem-in-practice-turning-continuous-threat-exposure-management-from-concept-to-operational-reality" title="CTEM in Practice: Turning Continuous Threat Exposure Management From Concept to Operational Reality" rel="nofollow"><img width="150" height="150" src="https://owlysec.com/wp-content/uploads/2025/06/CTEM-in-Practice_-Turning-Continuous-Threat-Exposure-Management-From-Concept-to-Operational-Reality-150x150.webp" class="webfeedsFeaturedVisual wp-post-image" alt="Continuous Threat Exposure Management (CTEM) has emerged as a critical focus for organizations aiming to stay ahead of today’s dynamic cyber risks. While the concept promises enhanced resilience and reduced breach likelihood, the path from theory to execution is filled with challenges that security leaders must navigate. In a recent expert discussion at Xposure Summit 2025, cybersecurity leaders from diverse industries came together to share their real-world experiences in operationalizing CTEM. The panel featured security executives representing banking, healthcare, and hospitality sectors—each offering unique perspectives on how to apply CTEM in production environments. The Reality Behind the CTEM Promise CTEM became a major topic after predictions that organizations adopting it effectively could see a threefold reduction in breach risk by 2026. But as practitioners emphasized, achieving that benefit depends entirely on the ability to operationalize CTEM, not just adopt it as a concept. Panelists agreed on the essentials of building a strong CTEM program: begin with mastering asset inventory and identity management. Weak service accounts, excessive user permissions, and outdated logins represent significant security gaps. Addressing these exposures requires continuous vigilance—weekly checks for internal assets and daily scrutiny of external-facing systems. A key distinction highlighted was that CTEM is not vulnerability management. Instead of just patching software flaws, CTEM is about validating whether existing controls effectively block real-world attack techniques. Threat intelligence, therefore, becomes central to CTEM efforts, enabling security teams to simulate adversary behavior and test defenses under realistic conditions. Translating Security Efforts Into Risk Language Panelists shared how CTEM practices are reshaping how security leaders communicate with boards and regulators. The focus is shifting away from technical jargon, like CVSS scores, toward meaningful discussions about business risk. Boards want to know: Is the company’s exposure increasing or decreasing? Where is the risk concentrated? What mitigation steps are underway? Especially in regulated industries, leaders emphasized the importance of being prepared to provide clear answers on exposure, remediation timelines, and risk treatments—turning regulatory scrutiny into an opportunity for accountability and clarity. Measuring What Truly Matters CTEM success is not measured by the number of vulnerabilities patched. Instead, it’s about closing exploited attack paths and reducing exploitable risk in the environment. Security leaders shared how attack path validation has uncovered hidden risks, such as forgotten assets and over-permissioned accounts, making risk visible and actionable. Others described the value of conducting tabletop exercises that walk executives through simulated attack scenarios. The goal is to shift from focusing on technical metrics to enabling informed decisions about real risk and its potential business impact. From Strategy to Action The conversation concluded with practical advice on implementing CTEM without getting lost in alert noise. The key takeaways: stay focused on what’s exploitable, use threat intelligence to guide testing, and continuously align security priorities with business risk. Organizations adopting CTEM are finding that the journey requires more than technology—it demands cultural change, clear communication, and relentless focus on what matters most: reducing exposure to real threats." style="display: block; margin-bottom: 5px; clear:both;max-width: 100%;" link_thumbnail="1" decoding="async" /></a><p data-start="247" data-end="569">Continuous Threat Exposure Management (CTEM) has emerged as a critical focus for organizations aiming to stay ahead of today’s dynamic cyber risks. While the concept promises enhanced resilience and reduced breach likelihood, the path from theory to execution is filled with challenges that security leaders must navigate.</p>
<p data-start="571" data-end="928">In a recent expert discussion at Xposure Summit 2025, cybersecurity leaders from diverse industries came together to share their real-world experiences in operationalizing CTEM. The panel featured security executives representing banking, healthcare, and hospitality sectors—each offering unique perspectives on how to apply CTEM in production environments.</p>
<h3 data-start="930" data-end="969">The Reality Behind the CTEM Promise</h3>
<p data-start="971" data-end="1257">CTEM became a major topic after predictions that organizations adopting it effectively could see a threefold reduction in breach risk by 2026. But as practitioners emphasized, achieving that benefit depends entirely on the ability to operationalize CTEM, not just adopt it as a concept.</p>
<p data-start="1259" data-end="1644">Panelists agreed on the essentials of building a strong CTEM program: begin with mastering <strong data-start="1350" data-end="1369">asset inventory</strong> and <strong data-start="1374" data-end="1397">identity management</strong>. Weak service accounts, excessive user permissions, and outdated logins represent significant security gaps. Addressing these exposures requires continuous vigilance—weekly checks for internal assets and daily scrutiny of external-facing systems.</p>
<p data-start="1646" data-end="2028">A key distinction highlighted was that CTEM is not vulnerability management. Instead of just patching software flaws, CTEM is about validating whether existing controls effectively block real-world attack techniques. Threat intelligence, therefore, becomes central to CTEM efforts, enabling security teams to simulate adversary behavior and test defenses under realistic conditions.</p>
<h3 data-start="2030" data-end="2081">Translating Security Efforts Into Risk Language</h3>
<p data-start="2083" data-end="2453">Panelists shared how CTEM practices are reshaping how security leaders communicate with boards and regulators. The focus is shifting away from technical jargon, like CVSS scores, toward meaningful discussions about business risk. Boards want to know: Is the company’s exposure increasing or decreasing? Where is the risk concentrated? What mitigation steps are underway?</p>
<p data-start="2455" data-end="2703">Especially in regulated industries, leaders emphasized the importance of being prepared to provide clear answers on exposure, remediation timelines, and risk treatments—turning regulatory scrutiny into an opportunity for accountability and clarity.</p>
<h3 data-start="2705" data-end="2737">Measuring What Truly Matters</h3>
<p data-start="2739" data-end="3082">CTEM success is not measured by the number of vulnerabilities patched. Instead, it’s about closing exploited attack paths and reducing exploitable risk in the environment. Security leaders shared how attack path validation has uncovered hidden risks, such as forgotten assets and over-permissioned accounts, making risk visible and actionable.</p>
<p data-start="3084" data-end="3338">Others described the value of conducting tabletop exercises that walk executives through simulated attack scenarios. The goal is to shift from focusing on technical metrics to enabling informed decisions about real risk and its potential business impact.</p>
<h3 data-start="3340" data-end="3367">From Strategy to Action</h3>
<p data-start="3369" data-end="3635">The conversation concluded with practical advice on implementing CTEM without getting lost in alert noise. The key takeaways: stay focused on what’s exploitable, use threat intelligence to guide testing, and continuously align security priorities with business risk.</p>
<p data-start="3637" data-end="3850">Organizations adopting CTEM are finding that the journey requires more than technology—it demands cultural change, clear communication, and relentless focus on what matters most: reducing exposure to real threats.</p>
<div class="simplesocialbuttons simplesocial-round-icon simplesocialbuttons_inline simplesocialbuttons-align-left post-5623 post  simplesocialbuttons-inline-no-animation">
<button onClick="javascript:window.open(this.dataset.href, '_blank' );return false;" class="simplesocial-whatsapp-share"  rel="nofollow"  target="_blank"  aria-label="WhatsApp Share" data-href="https://api.whatsapp.com/send?text=https://owlysec.com/instruction/business/ctem-in-practice-turning-continuous-threat-exposure-management-from-concept-to-operational-reality"><span class="simplesocialtxt">WhatsApp</span></button>
<button class="simplesocial-fb-share"  rel="nofollow"  target="_blank"  aria-label="Facebook Share" data-href="https://www.facebook.com/sharer/sharer.php?u=https://owlysec.com/instruction/business/ctem-in-practice-turning-continuous-threat-exposure-management-from-concept-to-operational-reality" onClick="javascript:window.open(this.dataset.href, '', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><span class="simplesocialtxt">Facebook </span> </button>
<button class="simplesocial-twt-share"  rel="nofollow"  target="_blank"  aria-label="Twitter Share" data-href="https://twitter.com/intent/tweet?text=CTEM+in+Practice%3A+Turning+Continuous+Threat+Exposure+Management+From+Concept+to+Operational+Reality&url=https://owlysec.com/instruction/business/ctem-in-practice-turning-continuous-threat-exposure-management-from-concept-to-operational-reality" onClick="javascript:window.open(this.dataset.href, '', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><span class="simplesocialtxt">Twitter</span> </button>
<button  rel="nofollow"  target="_blank"  class="simplesocial-linkedin-share" aria-label="LinkedIn Share" data-href="https://www.linkedin.com/sharing/share-offsite/?url=https://owlysec.com/instruction/business/ctem-in-practice-turning-continuous-threat-exposure-management-from-concept-to-operational-reality" onClick="javascript:window.open(this.dataset.href, '', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><span class="simplesocialtxt">LinkedIn</span></button>
</div>
<p>The post <a href="https://owlysec.com/instruction/business/ctem-in-practice-turning-continuous-threat-exposure-management-from-concept-to-operational-reality">CTEM in Practice: Turning Continuous Threat Exposure Management From Concept to Operational Reality</a> appeared first on <a href="https://owlysec.com">Owlysec - Cyber Security News</a>.</p>
]]></content>
		
			</entry>
		<entry>
		<author>
			<name>admin</name>
					</author>

		<title type="html"><![CDATA[Building a Business Case for Agentic AI SOC Analysts: Transforming Security Operations for Efficiency and Impact]]></title>
		<link rel="alternate" type="text/html" href="https://owlysec.com/instruction/business/building-a-business-case-for-agentic-ai-soc-analysts-transforming-security-operations-for-efficiency-and-impact" />

		<id>https://owlysec.com/?p=5620</id>
		<updated>2025-06-30T09:20:40Z</updated>
		<published>2025-06-20T08:42:24Z</published>
		<category scheme="https://owlysec.com/" term="Business" /><category scheme="https://owlysec.com/" term="Developer" /><category scheme="https://owlysec.com/" term="Instructions" />
		<summary type="html"><![CDATA[<a href="https://owlysec.com/instruction/business/building-a-business-case-for-agentic-ai-soc-analysts-transforming-security-operations-for-efficiency-and-impact" title="Building a Business Case for Agentic AI SOC Analysts: Transforming Security Operations for Efficiency and Impact" rel="nofollow"><img width="150" height="150" src="https://owlysec.com/wp-content/uploads/2025/06/Building-a-Business-Case-for-Agentic-AI-SOC-Analysts_-Transforming-Security-Operations-for-Efficiency-and-Impact-150x150.webp" class="webfeedsFeaturedVisual wp-post-image" alt="Security operations centers (SOCs) today face a dual challenge: the threat landscape is becoming increasingly complex and relentless, while budget constraints and workforce shortages make scaling defenses harder than ever. Security leaders are tasked with reducing risk, improving response times, and safeguarding business continuity—often without the luxury of growing their teams or investing in costly new tools. At the same time, inefficiencies within many SOCs are draining valuable resources. Studies indicate that a significant portion of security alerts are false positives, with some reports estimating false positive rates as high as 99%. This flood of irrelevant alerts consumes analyst time, fuels burnout, and increases the risk of overlooking genuine threats that could harm the business. In this environment, security teams need solutions that enable them to do more with what they already have—enhancing productivity, improving precision, and aligning security efforts with core business goals. Agentic AI SOC Analysts: A New Model for Security Operations Agentic AI SOC Analysts represent a transformative shift in how organizations can approach security operations. By introducing intelligent automation that mimics the decision-making processes of skilled analysts, these AI-driven systems allow teams to focus human expertise on what matters most. The result is faster, smarter, and more effective security without increasing headcount or budget. Addressing the Talent Shortage The global shortage of cybersecurity professionals is well-documented, with estimates of a gap exceeding 4 million skilled workers worldwide. More critically, organizations struggle to find experienced analysts capable of managing complex investigations, responding to modern threats, and fine-tuning security processes. Agentic AI offers a solution by automating repetitive Tier 1 tasks—triage, initial investigations, data gathering—and by filtering out noise. This means that experienced analysts can direct their attention to high-impact threats and strategic initiatives, rather than getting bogged down by false positives or low-priority alerts. This approach not only improves efficiency but also helps retain top talent by reducing fatigue and enabling more meaningful work. Reducing Noise and Enhancing Focus Agentic AI applies contextual analysis, behavioral insights, and advanced correlation techniques to evaluate the true risk behind an alert. By suppressing low-value or redundant signals and prioritizing high-risk activity, these AI systems help SOC teams reduce alert fatigue and focus on genuine threats. Organizations that implement such solutions often see a reduction in false positives requiring analyst review by as much as 90%. Boosting Productivity and Speed AI SOC Analysts automate many of the repetitive steps involved in security investigations, including gathering evidence, pulling logs, correlating data, and drafting reports. This mirrors the workflows of experienced human analysts, allowing teams to resolve more incidents in less time. In turn, this frees up resources for proactive tasks like threat hunting and detection tuning. Continuous Learning and Improvement Unlike static automation playbooks, agentic AI evolves over time. These systems learn from analyst feedback, historical incident data, and new threat intelligence, continuously refining their accuracy and decision-making. This means your SOC gets smarter with use, turning automation into a long-term strategic asset. Driving Business-Aligned Metrics By deploying agentic AI SOC Analysts, organizations can improve key operational metrics, such as: Mean time to investigate (MTTI) and mean time to respond (MTTR) – Faster triage and automation-driven investigations help reduce exposure time. Dwell time – Quicker detection and response shrink the window available to attackers. Analyst productivity – Reduced manual work allows analysts to deliver higher value without expanding team size. Alert closure rates – A higher percentage of alerts are fully resolved, strengthening the organization’s overall security posture. Maximizing Value from Existing Investments Agentic AI solutions enhance the return on investment (ROI) from existing security infrastructure, integrating with tools like SIEM, EDR, cloud platforms, and identity systems. By ensuring every alert is investigated and no signal is ignored, organizations can get more from their current technology stack while closing coverage gaps. Moreover, AI-driven investigations act as a valuable training tool for junior analysts, helping them build skills more quickly and cost-effectively." style="display: block; margin-bottom: 5px; clear:both;max-width: 100%;" link_thumbnail="1" decoding="async" /></a><p>Security operations centers (SOCs) today face a dual challenge: the threat landscape is becoming increasingly complex and relentless, while budget constraints and workforce shortages make scaling defenses harder than ever. Security leaders are tasked with reducing risk, improving response times, and safeguarding business continuity&#8212;often without the luxury of growing their teams or investing in costly [&#8230;]</p>
<p>The post <a href="https://owlysec.com/instruction/business/building-a-business-case-for-agentic-ai-soc-analysts-transforming-security-operations-for-efficiency-and-impact">Building a Business Case for Agentic AI SOC Analysts: Transforming Security Operations for Efficiency and Impact</a> appeared first on <a href="https://owlysec.com">Owlysec - Cyber Security News</a>.</p>
]]></summary>

					<content type="html" xml:base="https://owlysec.com/instruction/business/building-a-business-case-for-agentic-ai-soc-analysts-transforming-security-operations-for-efficiency-and-impact"><![CDATA[<a href="https://owlysec.com/instruction/business/building-a-business-case-for-agentic-ai-soc-analysts-transforming-security-operations-for-efficiency-and-impact" title="Building a Business Case for Agentic AI SOC Analysts: Transforming Security Operations for Efficiency and Impact" rel="nofollow"><img width="150" height="150" src="https://owlysec.com/wp-content/uploads/2025/06/Building-a-Business-Case-for-Agentic-AI-SOC-Analysts_-Transforming-Security-Operations-for-Efficiency-and-Impact-150x150.webp" class="webfeedsFeaturedVisual wp-post-image" alt="Security operations centers (SOCs) today face a dual challenge: the threat landscape is becoming increasingly complex and relentless, while budget constraints and workforce shortages make scaling defenses harder than ever. Security leaders are tasked with reducing risk, improving response times, and safeguarding business continuity—often without the luxury of growing their teams or investing in costly new tools. At the same time, inefficiencies within many SOCs are draining valuable resources. Studies indicate that a significant portion of security alerts are false positives, with some reports estimating false positive rates as high as 99%. This flood of irrelevant alerts consumes analyst time, fuels burnout, and increases the risk of overlooking genuine threats that could harm the business. In this environment, security teams need solutions that enable them to do more with what they already have—enhancing productivity, improving precision, and aligning security efforts with core business goals. Agentic AI SOC Analysts: A New Model for Security Operations Agentic AI SOC Analysts represent a transformative shift in how organizations can approach security operations. By introducing intelligent automation that mimics the decision-making processes of skilled analysts, these AI-driven systems allow teams to focus human expertise on what matters most. The result is faster, smarter, and more effective security without increasing headcount or budget. Addressing the Talent Shortage The global shortage of cybersecurity professionals is well-documented, with estimates of a gap exceeding 4 million skilled workers worldwide. More critically, organizations struggle to find experienced analysts capable of managing complex investigations, responding to modern threats, and fine-tuning security processes. Agentic AI offers a solution by automating repetitive Tier 1 tasks—triage, initial investigations, data gathering—and by filtering out noise. This means that experienced analysts can direct their attention to high-impact threats and strategic initiatives, rather than getting bogged down by false positives or low-priority alerts. This approach not only improves efficiency but also helps retain top talent by reducing fatigue and enabling more meaningful work. Reducing Noise and Enhancing Focus Agentic AI applies contextual analysis, behavioral insights, and advanced correlation techniques to evaluate the true risk behind an alert. By suppressing low-value or redundant signals and prioritizing high-risk activity, these AI systems help SOC teams reduce alert fatigue and focus on genuine threats. Organizations that implement such solutions often see a reduction in false positives requiring analyst review by as much as 90%. Boosting Productivity and Speed AI SOC Analysts automate many of the repetitive steps involved in security investigations, including gathering evidence, pulling logs, correlating data, and drafting reports. This mirrors the workflows of experienced human analysts, allowing teams to resolve more incidents in less time. In turn, this frees up resources for proactive tasks like threat hunting and detection tuning. Continuous Learning and Improvement Unlike static automation playbooks, agentic AI evolves over time. These systems learn from analyst feedback, historical incident data, and new threat intelligence, continuously refining their accuracy and decision-making. This means your SOC gets smarter with use, turning automation into a long-term strategic asset. Driving Business-Aligned Metrics By deploying agentic AI SOC Analysts, organizations can improve key operational metrics, such as: Mean time to investigate (MTTI) and mean time to respond (MTTR) – Faster triage and automation-driven investigations help reduce exposure time. Dwell time – Quicker detection and response shrink the window available to attackers. Analyst productivity – Reduced manual work allows analysts to deliver higher value without expanding team size. Alert closure rates – A higher percentage of alerts are fully resolved, strengthening the organization’s overall security posture. Maximizing Value from Existing Investments Agentic AI solutions enhance the return on investment (ROI) from existing security infrastructure, integrating with tools like SIEM, EDR, cloud platforms, and identity systems. By ensuring every alert is investigated and no signal is ignored, organizations can get more from their current technology stack while closing coverage gaps. Moreover, AI-driven investigations act as a valuable training tool for junior analysts, helping them build skills more quickly and cost-effectively." style="display: block; margin-bottom: 5px; clear:both;max-width: 100%;" link_thumbnail="1" decoding="async" /></a><p data-start="242" data-end="657">Security operations centers (SOCs) today face a dual challenge: the threat landscape is becoming increasingly complex and relentless, while budget constraints and workforce shortages make scaling defenses harder than ever. Security leaders are tasked with reducing risk, improving response times, and safeguarding business continuity—often without the luxury of growing their teams or investing in costly new tools.</p>
<p data-start="659" data-end="1045">At the same time, inefficiencies within many SOCs are draining valuable resources. Studies indicate that a significant portion of security alerts are false positives, with some reports estimating false positive rates as high as 99%. This flood of irrelevant alerts consumes analyst time, fuels burnout, and increases the risk of overlooking genuine threats that could harm the business.</p>
<p data-start="1047" data-end="1254">In this environment, security teams need solutions that enable them to do more with what they already have—enhancing productivity, improving precision, and aligning security efforts with core business goals.</p>
<h3 data-start="1256" data-end="1320">Agentic AI SOC Analysts: A New Model for Security Operations</h3>
<p data-start="1322" data-end="1716">Agentic AI SOC Analysts represent a transformative shift in how organizations can approach security operations. By introducing intelligent automation that mimics the decision-making processes of skilled analysts, these AI-driven systems allow teams to focus human expertise on what matters most. The result is faster, smarter, and more effective security without increasing headcount or budget.</p>
<h3 data-start="1718" data-end="1752">Addressing the Talent Shortage</h3>
<p data-start="1754" data-end="2074">The global shortage of cybersecurity professionals is well-documented, with estimates of a gap exceeding 4 million skilled workers worldwide. More critically, organizations struggle to find experienced analysts capable of managing complex investigations, responding to modern threats, and fine-tuning security processes.</p>
<p data-start="2076" data-end="2537">Agentic AI offers a solution by automating repetitive Tier 1 tasks—triage, initial investigations, data gathering—and by filtering out noise. This means that experienced analysts can direct their attention to high-impact threats and strategic initiatives, rather than getting bogged down by false positives or low-priority alerts. This approach not only improves efficiency but also helps retain top talent by reducing fatigue and enabling more meaningful work.</p>
<h3 data-start="2539" data-end="2577">Reducing Noise and Enhancing Focus</h3>
<p data-start="2579" data-end="3013">Agentic AI applies contextual analysis, behavioral insights, and advanced correlation techniques to evaluate the true risk behind an alert. By suppressing low-value or redundant signals and prioritizing high-risk activity, these AI systems help SOC teams reduce alert fatigue and focus on genuine threats. Organizations that implement such solutions often see a reduction in false positives requiring analyst review by as much as 90%.</p>
<h3 data-start="3015" data-end="3050">Boosting Productivity and Speed</h3>
<p data-start="3052" data-end="3434">AI SOC Analysts automate many of the repetitive steps involved in security investigations, including gathering evidence, pulling logs, correlating data, and drafting reports. This mirrors the workflows of experienced human analysts, allowing teams to resolve more incidents in less time. In turn, this frees up resources for proactive tasks like threat hunting and detection tuning.</p>
<h3 data-start="3436" data-end="3475">Continuous Learning and Improvement</h3>
<p data-start="3477" data-end="3794">Unlike static automation playbooks, agentic AI evolves over time. These systems learn from analyst feedback, historical incident data, and new threat intelligence, continuously refining their accuracy and decision-making. This means your SOC gets smarter with use, turning automation into a long-term strategic asset.</p>
<h3 data-start="3796" data-end="3832">Driving Business-Aligned Metrics</h3>
<p data-start="3834" data-end="3931">By deploying agentic AI SOC Analysts, organizations can improve key operational metrics, such as:</p>
<ul data-start="3933" data-end="4429">
<li data-start="3933" data-end="4082">
<p data-start="3935" data-end="4082"><strong data-start="3935" data-end="4002">Mean time to investigate (MTTI) and mean time to respond (MTTR)</strong> – Faster triage and automation-driven investigations help reduce exposure time.</p>
</li>
<li data-start="4083" data-end="4174">
<p data-start="4085" data-end="4174"><strong data-start="4085" data-end="4099">Dwell time</strong> – Quicker detection and response shrink the window available to attackers.</p>
</li>
<li data-start="4175" data-end="4292">
<p data-start="4177" data-end="4292"><strong data-start="4177" data-end="4201">Analyst productivity</strong> – Reduced manual work allows analysts to deliver higher value without expanding team size.</p>
</li>
<li data-start="4293" data-end="4429">
<p data-start="4295" data-end="4429"><strong data-start="4295" data-end="4318">Alert closure rates</strong> – A higher percentage of alerts are fully resolved, strengthening the organization’s overall security posture.</p>
</li>
</ul>
<h3 data-start="4431" data-end="4477">Maximizing Value from Existing Investments</h3>
<p data-start="4479" data-end="4813">Agentic AI solutions enhance the return on investment (ROI) from existing security infrastructure, integrating with tools like SIEM, EDR, cloud platforms, and identity systems. By ensuring every alert is investigated and no signal is ignored, organizations can get more from their current technology stack while closing coverage gaps.</p>
<p data-start="4815" data-end="4963">Moreover, AI-driven investigations act as a valuable training tool for junior analysts, helping them build skills more quickly and cost-effectively.</p>
<div class="simplesocialbuttons simplesocial-round-icon simplesocialbuttons_inline simplesocialbuttons-align-left post-5620 post  simplesocialbuttons-inline-no-animation">
<button onClick="javascript:window.open(this.dataset.href, '_blank' );return false;" class="simplesocial-whatsapp-share"  rel="nofollow"  target="_blank"  aria-label="WhatsApp Share" data-href="https://api.whatsapp.com/send?text=https://owlysec.com/instruction/business/building-a-business-case-for-agentic-ai-soc-analysts-transforming-security-operations-for-efficiency-and-impact"><span class="simplesocialtxt">WhatsApp</span></button>
<button class="simplesocial-fb-share"  rel="nofollow"  target="_blank"  aria-label="Facebook Share" data-href="https://www.facebook.com/sharer/sharer.php?u=https://owlysec.com/instruction/business/building-a-business-case-for-agentic-ai-soc-analysts-transforming-security-operations-for-efficiency-and-impact" onClick="javascript:window.open(this.dataset.href, '', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><span class="simplesocialtxt">Facebook </span> </button>
<button class="simplesocial-twt-share"  rel="nofollow"  target="_blank"  aria-label="Twitter Share" data-href="https://twitter.com/intent/tweet?text=Building+a+Business+Case+for+Agentic+AI+SOC+Analysts%3A+Transforming+Security+Operations+for+Efficiency+and+Impact&url=https://owlysec.com/instruction/business/building-a-business-case-for-agentic-ai-soc-analysts-transforming-security-operations-for-efficiency-and-impact" onClick="javascript:window.open(this.dataset.href, '', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><span class="simplesocialtxt">Twitter</span> </button>
<button  rel="nofollow"  target="_blank"  class="simplesocial-linkedin-share" aria-label="LinkedIn Share" data-href="https://www.linkedin.com/sharing/share-offsite/?url=https://owlysec.com/instruction/business/building-a-business-case-for-agentic-ai-soc-analysts-transforming-security-operations-for-efficiency-and-impact" onClick="javascript:window.open(this.dataset.href, '', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><span class="simplesocialtxt">LinkedIn</span></button>
</div>
<p>The post <a href="https://owlysec.com/instruction/business/building-a-business-case-for-agentic-ai-soc-analysts-transforming-security-operations-for-efficiency-and-impact">Building a Business Case for Agentic AI SOC Analysts: Transforming Security Operations for Efficiency and Impact</a> appeared first on <a href="https://owlysec.com">Owlysec - Cyber Security News</a>.</p>
]]></content>
		
			</entry>
		<entry>
		<author>
			<name>admin</name>
					</author>

		<title type="html"><![CDATA[New Flodrix Botnet Variant Exploits Critical RCE Vulnerability in Langflow AI Framework]]></title>
		<link rel="alternate" type="text/html" href="https://owlysec.com/vulnerabilities/new-flodrix-botnet-variant-exploits-critical-rce-vulnerability-in-langflow-ai-framework" />

		<id>https://owlysec.com/?p=5591</id>
		<updated>2025-06-18T07:58:58Z</updated>
		<published>2025-06-18T07:58:58Z</published>
		<category scheme="https://owlysec.com/" term="Malware &amp; Threats" /><category scheme="https://owlysec.com/" term="Vulnerabilities" />
		<summary type="html"><![CDATA[<a href="https://owlysec.com/vulnerabilities/new-flodrix-botnet-variant-exploits-critical-rce-vulnerability-in-langflow-ai-framework" title="New Flodrix Botnet Variant Exploits Critical RCE Vulnerability in Langflow AI Framework" rel="nofollow"><img width="150" height="150" src="https://owlysec.com/wp-content/uploads/2025/06/virtual-reality-artificial-intelligence-concept-mixed-media_641298-16943-150x150.webp" class="webfeedsFeaturedVisual wp-post-image" alt="A recently observed cyber campaign is actively exploiting a critical remote code execution (RCE) vulnerability in Langflow, an open-source visual development framework for AI applications, to deploy a new variant of the Flodrix botnet. The attackers are targeting unpatched Langflow servers exposed to the internet, taking advantage of a high-severity flaw tracked as CVE-2025-3248 (CVSS score: 9.8). This vulnerability, due to a missing authentication check, allows unauthenticated users to send specially crafted HTTP requests that trigger arbitrary code execution. Once exploited, the attackers execute downloader scripts that retrieve and install the Flodrix malware. The payload is delivered from a remote server located at 80.66.75[.]121:25565, indicating coordination through an established command-and-control infrastructure. Langflow addressed the issue in version 1.3.0, released in March 2025. However, many publicly accessible instances remain vulnerable, as confirmed by increased exploitation activity observed in recent weeks. Security researchers have also noted that attackers are leveraging publicly available proof-of-concept (PoC) exploits to perform reconnaissance and deliver malicious shell scripts to vulnerable servers. These compromised systems are then conscripted into a botnet primarily used for distributed denial-of-service (DDoS) attacks. System administrators are strongly urged to apply the latest Langflow updates and monitor for signs of unauthorized access or unexpected network traffic." style="display: block; margin-bottom: 5px; clear:both;max-width: 100%;" link_thumbnail="1" decoding="async" /></a><p>A recently observed cyber campaign is actively exploiting a critical remote code execution (RCE) vulnerability in Langflow, an open-source visual development framework for AI applications, to deploy a new variant of the Flodrix botnet. The attackers are targeting unpatched Langflow servers exposed to the internet, taking advantage of a high-severity flaw tracked as CVE-2025-3248 (CVSS [&#8230;]</p>
<p>The post <a href="https://owlysec.com/vulnerabilities/new-flodrix-botnet-variant-exploits-critical-rce-vulnerability-in-langflow-ai-framework">New Flodrix Botnet Variant Exploits Critical RCE Vulnerability in Langflow AI Framework</a> appeared first on <a href="https://owlysec.com">Owlysec - Cyber Security News</a>.</p>
]]></summary>

					<content type="html" xml:base="https://owlysec.com/vulnerabilities/new-flodrix-botnet-variant-exploits-critical-rce-vulnerability-in-langflow-ai-framework"><![CDATA[<a href="https://owlysec.com/vulnerabilities/new-flodrix-botnet-variant-exploits-critical-rce-vulnerability-in-langflow-ai-framework" title="New Flodrix Botnet Variant Exploits Critical RCE Vulnerability in Langflow AI Framework" rel="nofollow"><img width="150" height="150" src="https://owlysec.com/wp-content/uploads/2025/06/virtual-reality-artificial-intelligence-concept-mixed-media_641298-16943-150x150.webp" class="webfeedsFeaturedVisual wp-post-image" alt="A recently observed cyber campaign is actively exploiting a critical remote code execution (RCE) vulnerability in Langflow, an open-source visual development framework for AI applications, to deploy a new variant of the Flodrix botnet. The attackers are targeting unpatched Langflow servers exposed to the internet, taking advantage of a high-severity flaw tracked as CVE-2025-3248 (CVSS score: 9.8). This vulnerability, due to a missing authentication check, allows unauthenticated users to send specially crafted HTTP requests that trigger arbitrary code execution. Once exploited, the attackers execute downloader scripts that retrieve and install the Flodrix malware. The payload is delivered from a remote server located at 80.66.75[.]121:25565, indicating coordination through an established command-and-control infrastructure. Langflow addressed the issue in version 1.3.0, released in March 2025. However, many publicly accessible instances remain vulnerable, as confirmed by increased exploitation activity observed in recent weeks. Security researchers have also noted that attackers are leveraging publicly available proof-of-concept (PoC) exploits to perform reconnaissance and deliver malicious shell scripts to vulnerable servers. These compromised systems are then conscripted into a botnet primarily used for distributed denial-of-service (DDoS) attacks. System administrators are strongly urged to apply the latest Langflow updates and monitor for signs of unauthorized access or unexpected network traffic." style="display: block; margin-bottom: 5px; clear:both;max-width: 100%;" link_thumbnail="1" decoding="async" /></a><p data-start="264" data-end="499">A recently observed cyber campaign is actively exploiting a critical remote code execution (RCE) vulnerability in Langflow, an open-source visual development framework for AI applications, to deploy a new variant of the Flodrix botnet.</p>
<p data-start="501" data-end="836">The attackers are targeting unpatched Langflow servers exposed to the internet, taking advantage of a high-severity flaw tracked as <strong data-start="633" data-end="650">CVE-2025-3248</strong> (CVSS score: 9.8). This vulnerability, due to a missing authentication check, allows unauthenticated users to send specially crafted HTTP requests that trigger arbitrary code execution.</p>
<p data-start="838" data-end="1105">Once exploited, the attackers execute downloader scripts that retrieve and install the Flodrix malware. The payload is delivered from a remote server located at <code data-start="999" data-end="1021">80.66.75[.]121:25565</code>, indicating coordination through an established command-and-control infrastructure.</p>
<p data-start="1107" data-end="1318">Langflow addressed the issue in <strong data-start="1139" data-end="1156">version 1.3.0</strong>, released in March 2025. However, many publicly accessible instances remain vulnerable, as confirmed by increased exploitation activity observed in recent weeks.</p>
<p data-start="1320" data-end="1648">Security researchers have also noted that attackers are leveraging publicly available proof-of-concept (PoC) exploits to perform reconnaissance and deliver malicious shell scripts to vulnerable servers. These compromised systems are then conscripted into a botnet primarily used for distributed denial-of-service (DDoS) attacks.</p>
<p data-start="1650" data-end="1803">System administrators are strongly urged to apply the latest Langflow updates and monitor for signs of unauthorized access or unexpected network traffic.</p>
<div class="simplesocialbuttons simplesocial-round-icon simplesocialbuttons_inline simplesocialbuttons-align-left post-5591 post  simplesocialbuttons-inline-no-animation">
<button onClick="javascript:window.open(this.dataset.href, '_blank' );return false;" class="simplesocial-whatsapp-share"  rel="nofollow"  target="_blank"  aria-label="WhatsApp Share" data-href="https://api.whatsapp.com/send?text=https://owlysec.com/vulnerabilities/new-flodrix-botnet-variant-exploits-critical-rce-vulnerability-in-langflow-ai-framework"><span class="simplesocialtxt">WhatsApp</span></button>
<button class="simplesocial-fb-share"  rel="nofollow"  target="_blank"  aria-label="Facebook Share" data-href="https://www.facebook.com/sharer/sharer.php?u=https://owlysec.com/vulnerabilities/new-flodrix-botnet-variant-exploits-critical-rce-vulnerability-in-langflow-ai-framework" onClick="javascript:window.open(this.dataset.href, '', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><span class="simplesocialtxt">Facebook </span> </button>
<button class="simplesocial-twt-share"  rel="nofollow"  target="_blank"  aria-label="Twitter Share" data-href="https://twitter.com/intent/tweet?text=New+Flodrix+Botnet+Variant+Exploits+Critical+RCE+Vulnerability+in+Langflow+AI+Framework&url=https://owlysec.com/vulnerabilities/new-flodrix-botnet-variant-exploits-critical-rce-vulnerability-in-langflow-ai-framework" onClick="javascript:window.open(this.dataset.href, '', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><span class="simplesocialtxt">Twitter</span> </button>
<button  rel="nofollow"  target="_blank"  class="simplesocial-linkedin-share" aria-label="LinkedIn Share" data-href="https://www.linkedin.com/sharing/share-offsite/?url=https://owlysec.com/vulnerabilities/new-flodrix-botnet-variant-exploits-critical-rce-vulnerability-in-langflow-ai-framework" onClick="javascript:window.open(this.dataset.href, '', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><span class="simplesocialtxt">LinkedIn</span></button>
</div>
<p>The post <a href="https://owlysec.com/vulnerabilities/new-flodrix-botnet-variant-exploits-critical-rce-vulnerability-in-langflow-ai-framework">New Flodrix Botnet Variant Exploits Critical RCE Vulnerability in Langflow AI Framework</a> appeared first on <a href="https://owlysec.com">Owlysec - Cyber Security News</a>.</p>
]]></content>
		
			</entry>
		<entry>
		<author>
			<name>admin</name>
					</author>

		<title type="html"><![CDATA[Spike in MOVEit Transfer Scanning Signals Renewed Threat of Mass Exploitation Campaigns]]></title>
		<link rel="alternate" type="text/html" href="https://owlysec.com/cybercrime/spike-in-moveit-transfer-scanning-signals-renewed-threat-of-mass-exploitation-campaigns" />

		<id>https://owlysec.com/?p=5617</id>
		<updated>2025-06-30T08:42:15Z</updated>
		<published>2025-06-15T08:36:14Z</published>
		<category scheme="https://owlysec.com/" term="Cybercrime" /><category scheme="https://owlysec.com/" term="Malware &amp; Threats" /><category scheme="https://owlysec.com/" term="Vulnerabilities" />
		<summary type="html"><![CDATA[<a href="https://owlysec.com/cybercrime/spike-in-moveit-transfer-scanning-signals-renewed-threat-of-mass-exploitation-campaigns" title="Spike in MOVEit Transfer Scanning Signals Renewed Threat of Mass Exploitation Campaigns" rel="nofollow"><img width="150" height="150" src="https://owlysec.com/wp-content/uploads/2025/06/Spike-in-MOVEit-Transfer-Scanning-Signals-Renewed-Threat-of-Mass-Exploitation-Campaigns-150x150.webp" class="webfeedsFeaturedVisual wp-post-image" alt="Organizations using Progress MOVEit Transfer are facing renewed security concerns as threat actors ramp up scanning efforts in search of vulnerable systems. Recent data shows a significant and sustained increase in reconnaissance activity targeting MOVEit Transfer deployments, raising fears of an impending wave of exploitation attempts. MOVEit Transfer is widely adopted by businesses and government agencies as a secure managed file transfer solution for sharing sensitive data. Its popularity and role in handling high-value information make it a prime target for cybercriminals seeking to breach enterprise environments. According to recent threat intelligence reports, scanning activity targeting MOVEit Transfer systems began surging on May 27, 2025, with over 100 unique IP addresses recorded in a single day—up from fewer than 10 per day prior to that date. The trend escalated further, reaching 319 unique IPs the following day. Since then, scanning has continued at elevated levels, fluctuating between 200 and 300 unique IPs daily. In total, 682 unique IP addresses have been linked to these scanning activities over the past 90 days. Alarmingly, 449 of these IPs were recorded within the past 24 hours alone. Among them, 344 IPs were deemed suspicious, while 77 were classified as malicious based on observed behavior. The majority of the scanning activity originates from the United States, with other hotspots including Germany, Japan, Singapore, Brazil, the Netherlands, South Korea, Hong Kong, and Indonesia. In addition to increased reconnaissance, there have been low-volume attempts to exploit two previously disclosed critical MOVEit Transfer vulnerabilities: CVE-2023-34362 and CVE-2023-36934. The former was infamously leveraged by Cl0p ransomware affiliates in 2023 as part of a widespread campaign that compromised over 2,700 organizations worldwide. Security experts warn that this surge in scanning could precede new mass exploitation efforts, as attackers search for unpatched systems to compromise. Administrators are strongly advised to: Ensure MOVEit Transfer systems are updated to the latest patched versions. Remove public exposure of MOVEit servers where not strictly necessary. Block suspicious IPs engaging in reconnaissance activity. Closely monitor network traffic for signs of exploitation attempts. The renewed attention on MOVEit Transfer highlights the persistent risk of supply chain and third-party software exploitation. Organizations are urged to adopt a proactive security posture to protect sensitive data and critical operations." style="display: block; margin-bottom: 5px; clear:both;max-width: 100%;" link_thumbnail="1" decoding="async" /></a><p>Organizations using Progress MOVEit Transfer are facing renewed security concerns as threat actors ramp up scanning efforts in search of vulnerable systems. Recent data shows a significant and sustained increase in reconnaissance activity targeting MOVEit Transfer deployments, raising fears of an impending wave of exploitation attempts. MOVEit Transfer is widely adopted by businesses and government [&#8230;]</p>
<p>The post <a href="https://owlysec.com/cybercrime/spike-in-moveit-transfer-scanning-signals-renewed-threat-of-mass-exploitation-campaigns">Spike in MOVEit Transfer Scanning Signals Renewed Threat of Mass Exploitation Campaigns</a> appeared first on <a href="https://owlysec.com">Owlysec - Cyber Security News</a>.</p>
]]></summary>

					<content type="html" xml:base="https://owlysec.com/cybercrime/spike-in-moveit-transfer-scanning-signals-renewed-threat-of-mass-exploitation-campaigns"><![CDATA[<a href="https://owlysec.com/cybercrime/spike-in-moveit-transfer-scanning-signals-renewed-threat-of-mass-exploitation-campaigns" title="Spike in MOVEit Transfer Scanning Signals Renewed Threat of Mass Exploitation Campaigns" rel="nofollow"><img width="150" height="150" src="https://owlysec.com/wp-content/uploads/2025/06/Spike-in-MOVEit-Transfer-Scanning-Signals-Renewed-Threat-of-Mass-Exploitation-Campaigns-150x150.webp" class="webfeedsFeaturedVisual wp-post-image" alt="Organizations using Progress MOVEit Transfer are facing renewed security concerns as threat actors ramp up scanning efforts in search of vulnerable systems. Recent data shows a significant and sustained increase in reconnaissance activity targeting MOVEit Transfer deployments, raising fears of an impending wave of exploitation attempts. MOVEit Transfer is widely adopted by businesses and government agencies as a secure managed file transfer solution for sharing sensitive data. Its popularity and role in handling high-value information make it a prime target for cybercriminals seeking to breach enterprise environments. According to recent threat intelligence reports, scanning activity targeting MOVEit Transfer systems began surging on May 27, 2025, with over 100 unique IP addresses recorded in a single day—up from fewer than 10 per day prior to that date. The trend escalated further, reaching 319 unique IPs the following day. Since then, scanning has continued at elevated levels, fluctuating between 200 and 300 unique IPs daily. In total, 682 unique IP addresses have been linked to these scanning activities over the past 90 days. Alarmingly, 449 of these IPs were recorded within the past 24 hours alone. Among them, 344 IPs were deemed suspicious, while 77 were classified as malicious based on observed behavior. The majority of the scanning activity originates from the United States, with other hotspots including Germany, Japan, Singapore, Brazil, the Netherlands, South Korea, Hong Kong, and Indonesia. In addition to increased reconnaissance, there have been low-volume attempts to exploit two previously disclosed critical MOVEit Transfer vulnerabilities: CVE-2023-34362 and CVE-2023-36934. The former was infamously leveraged by Cl0p ransomware affiliates in 2023 as part of a widespread campaign that compromised over 2,700 organizations worldwide. Security experts warn that this surge in scanning could precede new mass exploitation efforts, as attackers search for unpatched systems to compromise. Administrators are strongly advised to: Ensure MOVEit Transfer systems are updated to the latest patched versions. Remove public exposure of MOVEit servers where not strictly necessary. Block suspicious IPs engaging in reconnaissance activity. Closely monitor network traffic for signs of exploitation attempts. The renewed attention on MOVEit Transfer highlights the persistent risk of supply chain and third-party software exploitation. Organizations are urged to adopt a proactive security posture to protect sensitive data and critical operations." style="display: block; margin-bottom: 5px; clear:both;max-width: 100%;" link_thumbnail="1" decoding="async" /></a><p data-start="235" data-end="573">Organizations using Progress MOVEit Transfer are facing renewed security concerns as threat actors ramp up scanning efforts in search of vulnerable systems. Recent data shows a significant and sustained increase in reconnaissance activity targeting MOVEit Transfer deployments, raising fears of an impending wave of exploitation attempts.</p>
<p data-start="575" data-end="861">MOVEit Transfer is widely adopted by businesses and government agencies as a secure managed file transfer solution for sharing sensitive data. Its popularity and role in handling high-value information make it a prime target for cybercriminals seeking to breach enterprise environments.</p>
<p data-start="863" data-end="1284">According to recent threat intelligence reports, scanning activity targeting MOVEit Transfer systems began surging on <strong data-start="981" data-end="997">May 27, 2025</strong>, with over 100 unique IP addresses recorded in a single day—up from fewer than 10 per day prior to that date. The trend escalated further, reaching 319 unique IPs the following day. Since then, scanning has continued at elevated levels, fluctuating between 200 and 300 unique IPs daily.</p>
<p data-start="1286" data-end="1767">In total, 682 unique IP addresses have been linked to these scanning activities over the past 90 days. Alarmingly, 449 of these IPs were recorded within the past 24 hours alone. Among them, 344 IPs were deemed suspicious, while 77 were classified as malicious based on observed behavior. The majority of the scanning activity originates from the United States, with other hotspots including Germany, Japan, Singapore, Brazil, the Netherlands, South Korea, Hong Kong, and Indonesia.</p>
<p data-start="1769" data-end="2126">In addition to increased reconnaissance, there have been low-volume attempts to exploit two previously disclosed critical MOVEit Transfer vulnerabilities: <strong data-start="1924" data-end="1942">CVE-2023-34362</strong> and <strong data-start="1947" data-end="1965">CVE-2023-36934</strong>. The former was infamously leveraged by Cl0p ransomware affiliates in 2023 as part of a widespread campaign that compromised over 2,700 organizations worldwide.</p>
<p data-start="2128" data-end="2319">Security experts warn that this surge in scanning could precede new mass exploitation efforts, as attackers search for unpatched systems to compromise. Administrators are strongly advised to:</p>
<ul data-start="2321" data-end="2600">
<li data-start="2321" data-end="2397">
<p data-start="2323" data-end="2397">Ensure MOVEit Transfer systems are updated to the latest patched versions.</p>
</li>
<li data-start="2398" data-end="2470">
<p data-start="2400" data-end="2470">Remove public exposure of MOVEit servers where not strictly necessary.</p>
</li>
<li data-start="2471" data-end="2530">
<p data-start="2473" data-end="2530">Block suspicious IPs engaging in reconnaissance activity.</p>
</li>
<li data-start="2531" data-end="2600">
<p data-start="2533" data-end="2600">Closely monitor network traffic for signs of exploitation attempts.</p>
</li>
</ul>
<p data-start="2602" data-end="2841">The renewed attention on MOVEit Transfer highlights the persistent risk of supply chain and third-party software exploitation. Organizations are urged to adopt a proactive security posture to protect sensitive data and critical operations.</p>
<div class="simplesocialbuttons simplesocial-round-icon simplesocialbuttons_inline simplesocialbuttons-align-left post-5617 post  simplesocialbuttons-inline-no-animation">
<button onClick="javascript:window.open(this.dataset.href, '_blank' );return false;" class="simplesocial-whatsapp-share"  rel="nofollow"  target="_blank"  aria-label="WhatsApp Share" data-href="https://api.whatsapp.com/send?text=https://owlysec.com/cybercrime/spike-in-moveit-transfer-scanning-signals-renewed-threat-of-mass-exploitation-campaigns"><span class="simplesocialtxt">WhatsApp</span></button>
<button class="simplesocial-fb-share"  rel="nofollow"  target="_blank"  aria-label="Facebook Share" data-href="https://www.facebook.com/sharer/sharer.php?u=https://owlysec.com/cybercrime/spike-in-moveit-transfer-scanning-signals-renewed-threat-of-mass-exploitation-campaigns" onClick="javascript:window.open(this.dataset.href, '', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><span class="simplesocialtxt">Facebook </span> </button>
<button class="simplesocial-twt-share"  rel="nofollow"  target="_blank"  aria-label="Twitter Share" data-href="https://twitter.com/intent/tweet?text=Spike+in+MOVEit+Transfer+Scanning+Signals+Renewed+Threat+of+Mass+Exploitation+Campaigns&url=https://owlysec.com/cybercrime/spike-in-moveit-transfer-scanning-signals-renewed-threat-of-mass-exploitation-campaigns" onClick="javascript:window.open(this.dataset.href, '', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><span class="simplesocialtxt">Twitter</span> </button>
<button  rel="nofollow"  target="_blank"  class="simplesocial-linkedin-share" aria-label="LinkedIn Share" data-href="https://www.linkedin.com/sharing/share-offsite/?url=https://owlysec.com/cybercrime/spike-in-moveit-transfer-scanning-signals-renewed-threat-of-mass-exploitation-campaigns" onClick="javascript:window.open(this.dataset.href, '', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"><span class="simplesocialtxt">LinkedIn</span></button>
</div>
<p>The post <a href="https://owlysec.com/cybercrime/spike-in-moveit-transfer-scanning-signals-renewed-threat-of-mass-exploitation-campaigns">Spike in MOVEit Transfer Scanning Signals Renewed Threat of Mass Exploitation Campaigns</a> appeared first on <a href="https://owlysec.com">Owlysec - Cyber Security News</a>.</p>
]]></content>
		
			</entry>
	</feed>
