Épisodes

  • RadioCSIRT - Your Cybersecurity update for Monday, November 17, 2025 (Ep. 489)
    Nov 17 2025
    Welcome to your daily cybersecurity podcast. 🛰️ RoningLoader analysis: new research unveils the stealthy capabilities of RoningLoader, a modular malware loader designed for evasion, payload staging, and long-term persistence across compromised environments. 🛑 Gh0st RAT impersonation campaigns: recent investigations reveal large-scale social-engineering operations delivering Gh0st RAT through impersonated organizations, using spoofed identities and fraudulent communication channels to compromise victims. 🎭 Online radicalisation via gaming platforms: Europol and partner nations report coordinated action against extremist groups exploiting gaming ecosystems for recruitment, covert communication, and distribution of illicit content. 🏢 IBM AIX/VIOS – Critical vulnerability: a newly disclosed high-severity flaw impacts IBM AIX and VIOS systems, enabling attackers to exploit privilege-escalation vectors. Patch guidance has been issued and should be applied promptly. 🐧 Rondodox botnet expansion: threat actors are actively weaponizing an unpatched XWiki RCE vulnerability, expanding the Rondodox botnet with automated exploitation routines targeting internet-facing systems. 📱 Rust adoption improves Android memory-safety posture: new assessments highlight significant reductions in memory-corruption issues within Android components rewritten in Rust, reinforcing the long-term shift toward safer systems languages. 🛍️ Holiday cyber scams warning: national security agencies urge increased vigilance amid a rise in fraudulent shopping campaigns, fake storefronts, phishing operations, and payment-data harvesting schemes targeting consumers ahead of seasonal sales. ⚡️ Don’t think — patch! 🚀 📚 Sources: 🔗 RoningLoader – Elastic Security Labs: https://www.elastic.co/security-labs/roningloader 🔗 Gh0st RAT Impersonation Campaigns – Unit42: https://unit42.paloaltonetworks.com/impersonation-campaigns-deliver-gh0st-rat/ 🔗 Online Radicalisation on Gaming Platforms – Europol: https://www.europol.europa.eu/media-press/newsroom/news/europol-and-partner-countries-combat-online-radicalisation-gaming-platforms 🔗 IBM AIX/VIOS CVE-2025-36250: https://cyberveille.esante.gouv.fr/alertes/ibm-aixvios-cve-2025-36250-2025-11-14 🔗 Rondodox Botnet Expands via XWiki RCE – Security Affairs: https://securityaffairs.com/184702/malware/rondodox-expands-botnet-by-exploiting-xwiki-rce-bug-left-unpatched-since-february-2025.html 🔗 Rust Adoption & Android Memory Safety – The Hacker News: https://thehackernews.com/2025/11/rust-adoption-drives-android-memory.html 🔗 Holiday Shopping Cyber-Scams – NCSC: https://www.ncsc.gov.uk/news/stay-alert-to-holiday-shopping-cyber-scams 📞 Share your feedback: 📧 radiocsirt@gmail.com 🌐 www.radiocsirt.org 📰 radiocsirtintl.substack.com #CyberSecurity #Malware #Gh0stRAT #Europol #IBM #Rondodox #Rust #Android #NCSC #RadioCSIRT 🎧
    Voir plus Voir moins
    14 min
  • RadioCSIRT – Your Cybersecurity Update for Sunday, November 16, 2025 (Ep.488)
    Nov 16 2025

    Welcome to your daily cybersecurity podcast.

    🛰️ DNS4EU: the European Union continues to advance its sovereign DNS resolver project, designed to reduce dependency on non-EU services. The initiative aims to deliver a secure, privacy-respecting, and resilient DNS infrastructure operated entirely within Europe, with integrated filtering and threat-detection capabilities.

    🛑 Ransomware – Q3 2025 Overview: recent analysis reveals continued growth in ransomware activity, driven by the increasing professionalization of threat groups, industrialized phishing operations, and expanding affiliate networks targeting SMEs, critical infrastructure, and interconnected suppliers.

    🎭 North Korean IT worker schemes: several U.S. nationals have pleaded guilty to acting as intermediaries for North Korean operatives posing as legitimate IT professionals to secure employment in sensitive American companies, bypassing sanctions and screening controls.

    🏢 Cisco Catalyst Center: a newly disclosed critical vulnerability impacts the platform, enabling attackers to obtain privileged access within administrative environments. A security update is available and should be applied without delay in infrastructures dependent on Catalyst Center.

    🐧 Debian: the Debian Project has released new security updates affecting core components and widely deployed packages, with significant implications for server environments and systems relying on sensitive libraries and services.

    ⚡️ Don’t think — patch! 🚀

    📚 Sources:

    🔗 DNS4EU: https://blog.marcfredericgomez.fr/dns4eu-vers-un-dns-europeen-souverain-securise-et-respectueux-de-la-vie-privee/
    🔗 Check Point – State of Ransomware Q3 2025: https://research.checkpoint.com/2025/the-state-of-ransomware-q3-2025/
    🔗 North Korean IT Workers – The Record: https://therecord.media/multiple-us-nationals-guilty-pleas-north-korean-it-worker-scams
    🔗 Cisco Catalyst Center: https://cybersecuritynews.com/cisco-catalyst-center-vulnerability/
    🔗 Debian – Security Updates: https://www.debian.org/News/2025/20251115

    📞 Share your feedback:
    📧 radiocsirt@gmail.com
    🌐 www.radiocsirt.org
    📰 radiocsirtintl.substack.com

    #CyberSecurity #DNS4EU #Ransomware #NorthKorea #Cisco #Debian #RadioCSIRT 🎧🔥

    Voir plus Voir moins
    9 min
  • RadioCSIRT – Your Cybersecurity Update for Saturday, November 15, 2025 (Ep.487)
    Nov 15 2025

    Bonjour and Welcome to your daily cybersecurity podcast.

    🧩 AMD Zen 5: AMD confirms a critical flaw in the rdseed instruction causing severe entropy reduction, weakening cryptographic material generated on Zen 5 processors prior to microcode updates.

    🛡️ Akira Ransomware: CISA, the FBI, and international partners release major updates on newly observed TTPs and IOCs, highlighting widespread targeting of SMBs and multiple critical infrastructure sectors.

    🌐 FortiWeb: Active exploitation of CVE-2025-64446, a relative path traversal vulnerability enabling administrative command execution through crafted HTTP(S) requests.

    🏨 Fake Travel Platforms: A Russian-speaking threat actor registered over 4,300 domains imitating Booking, Airbnb, Expedia, and Agoda to steal payment card data via a multilingual phishing kit.

    🧬 FormBook Stealer: A new campaign chains weaponized ZIP archives, obfuscated VBS and PowerShell layers, and msiexec.exe injection to deploy an updated variant of the FormBook information stealer.

    💼 Logitech: The company confirms a data breach via exploitation of a third-party zero-day vulnerability, claimed by the Clop extortion group, with nearly 1.8 TB of data allegedly leaked.

    ⚡️ Don’t think — patch! 🚀

    📚 Sources:
    🔗 AMD Zen 5 RNG: https://www.tomshardware.com/pc-components/cpus/amd-confirms-zen-5-rng-flaw-when-random-isnt-random-enough
    🔗 Akira – CISA/FBI: https://www.cisa.gov/news-events/alerts/2025/11/13/cisa-fbi-and-partners-unveil-critical-guidance-protect-against-akira-ransomware-threat
    🔗 FortiWeb CVE-2025-64446: https://www.cisa.gov/news-events/alerts/2025/11/14/fortinet-releases-security-advisory-relative-path-traversal-vulnerability-affecting-fortiweb-products
    🔗 Fake Travel Sites: https://thehackernews.com/2025/11/russian-hackers-create-4300-fake-travel.html
    🔗 FormBook Campaign: https://cybersecuritynews.com/weaponized-zip-archives-and-multi-script-chains-used-to-deploy-formbook-malware
    🔗 Logitech / Clop: https://www.bleepingcomputer.com/news/security/logitech-confirms-data-breach-after-clop-extortion-attack

    📞 Share your feedback:
    📧 radiocsirt@gmail.com
    🌐 www.radiocsirt.org
    📰 radiocsirtintl.substack.com

    #CyberSecurity #AMD #Akira #Fortinet #Phishing #FormBook #Logitech #Clop #Ransomware #Infostealer #RadioCSIRT 🎧🔥

    Voir plus Voir moins
    11 min
  • RadioCSIRT - Your Cybersecurity Update for Friday, November 14, 2025 – Episode 486
    Nov 14 2025

    Welcome to your daily cybersecurity podcast.

    🤖 Anthropic faces controversy over claims that Claude enabled fully automated cyberattacks end-to-end. Several experts question the technical validity and highlight the lack of concrete evidence.

    🛡️ Fortinet confirms it silently patched a critical FortiWeb zero-day already exploited in active attacks. The discreet fix was intended to avoid tipping off threat actors monitoring patch cycles.

    📞 Cisco Unified CCX: multiple critical vulnerabilities expose call-center infrastructures to compromise, enabling remote code execution and unauthorized access to sensitive systems.

    🐉 Google initiates legal action to disrupt a major Chinese SMS phishing triad operating at international scale with a structured criminal infrastructure.

    📡 ASUS – CVE-2025-59367: a critical flaw allows attackers to remotely access ASUS DSL routers without authentication, providing full device takeover.

    🇰🇵 North Korean APT actors increasingly abuse JSON services to evade traditional detection and enhance the stealth of their command-and-control operations.

    🔍 CERT-FR – Operation EndGame: CERT-FR releases a comprehensive CTI analysis detailing an advanced campaign leveraging modular techniques and distributed infrastructures targeting strategic organizations.

    ⚡️ Don’t think — patch! 🚀

    📚 Sources:
    🔗 Anthropic: https://www.bleepingcomputer.com/news/security/anthropic-claims-of-claude-ai-automated-cyberattacks-met-with-doubt/
    🔗 Fortinet (FortiWeb Zero-Day): https://www.bleepingcomputer.com/news/security/fortinet-confirms-silent-patch-for-fortiweb-zero-day-exploited-in-attacks/
    🔗 Cisco Unified CCX: https://cyberpress.org/cisco-unified-ccx-flaws/
    🔗 Google – SMS Phishing Triad: https://krebsonsecurity.com/2025/11/google-sues-to-disrupt-chinese-sms-phishing-triad/
    🔗 ASUS – CVE-2025-59367: https://securityaffairs.com/184636/security/critical-cve-2025-59367-flaw-lets-hackers-access-asus-dsl-routers-remotely.html
    🔗 North Korean JSON Abuse: https://thehackernews.com/2025/11/north-korean-hackers-turn-json-services.html
    🔗 CERT-FR – End-Game: https://www.cert.ssi.gouv.fr/cti/CERTFR-2025-CTI-011/

    📞 Share your feedback:
    📧 radiocsirt@gmail.com
    🌐 www.radiocsirt.com
    📰 radiocsirtintl.substack.com

    #CyberSecurity #Anthropic #Fortinet #Cisco #Google #ASUS #NorthKorea #CERTFR #EndGame #CTI #RadioCSIRT 🎧🔥

    Voir plus Voir moins
    19 min
  • RadioCSIRT - Your Cybersecurity update for Thursday, November 13, 2025 (Ep. 485)
    Nov 13 2025

    ⚡️Welcome to your daily cybersecurity podcast.

    🌐 Google TAG: Q3 2025 bulletin — over 18,000 YouTube channels, 120 domains, and multiple coordinated networks taken down. Massive activity originating from China, Russia, Azerbaijan, Iran, and Turkey, along with seven distinct operations targeting Moldova.

    🛡️ CISA reports ongoing cyber threats against Cisco ASA and Firepower devices. Active exploitation, confirmed compromises, and immediate mitigation and patching strongly recommended.

    📊 Nagios (CERT-FR): security advisory published on multiple vulnerabilities affecting Nagios XI and related components. Risks include compromise, remote code execution, and privilege escalation — urgent updates required across all monitoring environments.

    ⚡️ Don’t think — patch! 🚀

    📚 Sources:
    🔗 Google TAG – https://blog.google/threat-analysis-group/tag-bulletin-q3-2025/
    🔗 CISA – https://www.cisa.gov/news-events/news/cisa-identifies-ongoing-cyber-threats-cisco-asa-and-firepower-devices
    🔗 CERT-FR (Nagios) – https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0989/

    📞 Share your feedback:
    📧 radiocsirt@gmail.com
    🌐 www.radiocsirt.com
    📰 radiocsirtintl.substack.com

    #CyberSecurity #GoogleTAG #CISA #Cisco #Nagios #CERTFR #ThreatIntel #Monitoring #RadioCSIRT 🎧🔥

    Voir plus Voir moins
    9 min
  • RadioCSIRT – Your Cybersecurity update for Wednesday, November 12, 2025 (Ep.484)
    Nov 12 2025
    🧩 Welcome Everyone –Today 8 essential stories you can’t miss! 🐧 Curly COMrade: a Russian group abuses Hyper-V to hide Linux malware inside an Alpine VM, effectively bypassing EDR detection. 🇦🇺 ASIO Warning: Australia’s spy chief warns of high-impact cyber sabotage as authoritarian states prepare attacks on power, telecom, and water systems. 💻 OWASP Top 10 (2025): Broken Access Control remains the top web app risk, followed by security misconfiguration and software supply-chain failures. ☁️ Google Private AI Compute: secure AI processing in the cloud with hardware-level encryption, offering on-device privacy and Gemini-scale power. 🧰 Synology BeeStation (CVE-2025-12686): critical RCE flaw patched after its Pwn2Own Ireland 2025 demo — users urged to update immediately. 🧩 SAP SQL Anywhere Monitor (CVE-2025-42890): hard-coded credentials rated CVSS 10/10 — SAP advises disabling the module and deleting existing instances. 📶 TP-Link Ban Proposal: U.S. authorities consider banning TP-Link over national security concerns tied to Chinese influence and device vulnerabilities. 🕵️ Rhadamanthys Infostealer: operation disrupted, with cybercriminals losing server access — likely linked to Operation Endgame takedowns. 💻 Windows 11: Microsoft fixes Task Manager bug in KB5068861 update — background instances caused severe performance slowdowns. ⚡️ Don’t think twice — just patch! 🚀 📚 Sources: 🔗 Linux Magazine – https://www.linux-magazine.com/Online/News/Another-Linux-Malware-Discovered 🔗 The Register (ASIO) – https://www.theregister.com/2025/11/12/asio_cyber_sabotage_warnings/ 🔗 The Register (OWASP) – https://www.theregister.com/2025/11/11/new_owasp_top_ten_broken/ 🔗 The Hacker News (Google) – https://thehackernews.com/2025/11/google-launches-private-ai-compute.html 🔗 Security Affairs (Synology) – https://securityaffairs.com/184528/security/synology-patches-critical-beestation-rce-flaw-shown-at-pwn2own-ireland-2025.html 🔗 Security Affairs (SAP) – https://securityaffairs.com/184500/security/sap-fixed-a-maximum-severity-flaw-in-sql-anywhere-monitor.html 🔗 KrebsOnSecurity – https://krebsonsecurity.com/2025/11/drilling-down-on-uncle-sams-proposed-tp-link-ban/ 🔗 BleepingComputer (Rhadamanthys) – https://www.bleepingcomputer.com/news/security/rhadamanthys-infostealer-disrupted-as-cybercriminals-lose-server-access/ 🔗 BleepingComputer (Microsoft) – https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-windows-task-manager-bug-affecting-performance/ 📞 Share your feedback: 📧 radiocsirt@gmail.com 🌐 www.radiocsirt.com 📰 radiocsirtintl.substack.com #CyberSecurity #Samsung #LinkedIn #Clop #Allianz #NSO #Pegasus #RadioCSIRT 🎧🔥
    Voir plus Voir moins
    11 min
  • RadioCSIRT — November Patch Tuesday update (Ep. 483)
    Nov 12 2025

    Welcome to your special edition Patch Tuesday briefing 🕵️‍♂️🔥

    📌 Microsoft – November 2025 Patch Tuesday: 63 flaws fixed including 1 zero-day
    Microsoft has released patches for 63 vulnerabilities this month, including one zero-day actively exploited (CVE-2025-62215) affecting the Windows Kernel. Critical issues include RCE in GDI+ (CVE-2025-60724), Office (CVE-2025-62199), and Visual Studio (CVE-2025-62214), as well as an EoP in DirectX Graphics Kernel (CVE-2025-60716). Key “Exploitation More Likely” issues affect CEIP (CVE-2025-59512), CSC service (CVE-2025-60705) and multiple WinSock driver flaws (CVE-2025-60719, CVE-2025-62217, CVE-2025-62213).
    Prioritise: patch the zero-day immediately, deploy the critical updates without delay, and address the Important but high-risk EoPs. Also incorporate updates from Adobe, Cisco, SAP, QNAP, Google/Android and others into your patch window.

    📚 Sources:
    🔗 Marc Frederic GOMEZ Blog’s: https://blog.marcfredericgomez.com/microsoft-patch-tuesday-november-2025/
    🔗 Bleeping Computer – Microsoft November 2025 Patch Tuesday fixes 1 zero-day, 63 flaws: https://www.bleepingcomputer.com/news/microsoft/microsoft-november-2025-patch-tuesday-fixes-1-zero-day-63-flaws/
    🔗 Talos Intelligence Blog – Microsoft Patch Tuesday November 2025: https://blog.talosintelligence.com/microsoft-patch-tuesday-november-2025/
    🔗 Microsoft Security Update Guide – November 2025: https://msrc.microsoft.com/update-guide

    📞 Share your feedback:
    📧 radiocsirt@gmail.com
    🌐 www.radiocsirt.com
    📰 radiocsirtintl.substack.com

    #CyberSecurity #Microsoft #PatchTuesday #CVE202562215 #CERT #SOC #CSIRT #CISO #VulnerabilityManagement #BlueTeam #RadioCSIRT 🎧🔥

    Voir plus Voir moins
    8 min
  • RadioCSIRT - Your Cybersecurity update for Wednesday, November 11, 2025 (Ep. 482)
    Nov 11 2025

    🔐 KeePassXC: full transparency on AI use in development — no AI functions integrated, and every contribution is subject to full human review.

    🏢 NCSC (UK): launch of the Cyber Action Toolkit, a free and interactive tool designed to help small businesses strengthen their cybersecurity with simple, practical steps.

    💥 Triofox (CVE-2025-12480): active exploitation of a critical flaw (CVSS 9.1) allowing remote code execution through the built-in antivirus feature. Mandiant urges immediate patching.

    📱 APT37: the North Korean threat group is abusing Google Find Hub to geolocate and remotely wipe Android smartphones belonging to South Korean victims.

    💾 3CX: massive scans targeting FTP backup servers — reminder: avoid FTP for sensitive data and verify SSH/Telnet shared accounts.

    🕵️ Fantasy Hub: a new “spyware-as-a-service” for rent, complete with fake Android apps, customization kits, and customer support.

    🦊 Mozilla Firefox: new built-in defenses against fingerprinting, reducing online tracking without breaking website compatibility.

    ⚡️ Don’t think — patch! 🚀

    📚 Sources:
    🔗 Malwarebytes – Fantasy Hub : https://www.malwarebytes.com/blog/news/2025/11/fantasy-hub-is-spyware-for-rent-complete-with-fake-app-kits-and-support
    🔗 SANS ISC – 3CX FTP scans : https://isc.sans.edu/diary/rss/32464
    🔗 Bleeping Computer – Firefox anti-fingerprinting : https://www.bleepingcomputer.com/news/security/mozilla-firefox-gets-new-anti-fingerprinting-defenses/
    🔗 Bleeping Computer – APT37 / Find Hub : https://www.bleepingcomputer.com/news/security/apt37-hackers-abuse-google-find-hub-in-android-data-wiping-attacks/
    🔗 The Hacker News – Triofox exploit : https://thehackernews.com/2025/11/hackers-exploiting-triofox-flaw-to.html
    🔗 NCSC – Cyber Action Toolkit : https://www.ncsc.gov.uk/blog-post/cat-breaking-down-resilience-barriers
    🔗 KeePassXC – Code quality & AI policy : https://keepassxc.org/blog/2025-11-09-about-keepassxcs-code-quality-control/

    📞 Share your feedback:
    📧 radiocsirt@gmail.com
    🌐 www.radiocsirt.com
    📰 radiocsirtintl.substack.com

    CyberSecurity #KeePassXC #NCSC #Triofox #APT37 #3CX #Firefox #Spyware #RadioCSIRT

    Voir plus Voir moins
    11 min