CyberWire Daily - The day the cloud got foggy.

Episode Date: October 20, 2025

An AWS outage sparks speculation. An F5 exposure and breach raise patching and supply-chain concerns. Salt Typhoon breaches a European telecom via a Netscaler flaw. A judge bans NSO Group from Whatsap...p. China alleges “irrefutable evidence” of NSA hacking. Connectwise patches adversary in the middle risks. A Dolby decoder flaw enables zero-click remote code execution on Android. A Cyber M&A and funding surge signals a busy consolidation cycle.  Our guest Jeff Collins, CEO of WanAware, sharing how hospital consolidations are reshaping IT asset visibility and what it takes to close these gaps. One man’s quest to make AI art legit.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Jeff Collins, CEO of WanAware, sharing how hospital consolidations are reshaping IT asset visibility and what it takes to close these gaps. Selected Reading Cyberattack: Did China just bring Amazon down, along with Robinhood, Snapchat - what happened? Here's what experts are saying (The Economic Times) F5 breach exposes 262,000 BIG-IP systems worldwide (Security Affairs) Salt Typhoon Uses Citrix Flaw in Global Cyber-Attack (Infosecurity Magazine) Israeli spyware company blocked from WhatsApp (Courthouse News Service) China Says It Found Evidence of US Cyber Attack on State Agency (Bloomberg) ConnectWise Patches Critical Flaw in Automate RMM Tool (SecurityWeek) Vulnerability in Dolby Decoder Can Allow Zero-Click Attacks (SecurityWeek) NSO Group acquired by American investors. LevelBlue to acquire Cybereason. (N2K Pro Business Briefing) Creator of Infamous AI Painting Tells Court He's a Real Artist (404 Media) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the Cyberwire Network, powered by N2K. Are you ready for AI in cybersecurity? Demand for these skills is growing exponentially for cybersecurity professionals. It's why Comptia, the largest vendor-neutral certification authority, is developing SEC AI Plus. It's their first ever AI certification focused on artificial intelligence and cybersecurity and is designed to help mid-career cybersecurity professionals demonstrate their competencies with AI tools. And that's why N2K's SEC AI Plus practice exam is coming out this year to help you prepare for this certification release in 2026. To find out more about this new credential and how N2K can help you prepare today,
Starting point is 00:00:55 check out our blog at certify. cybervista.net slash blog. And thanks. At TALIS, they know cybersecurity can be tough, and you can't protect everything. But with TALIS, you can secure what matters most. With TALIS's industry-leading platforms, you can protect critical applications, data and identities, anywhere and at scale with the highest ROI. That's why the most trusted brands and largest banks,
Starting point is 00:01:32 retailers, and health care companies in the world rely on TALIS to protect what matters most. Applications, data, and identity. That's TALES. T-H-A-L-E-S. Learn more at talusgroup.com slash cyber. An AWS outage sparks speculation, an F-5 exposure and breach raise patching in supply chain concerns. Salt Typhoon breaches a European telecom via a net-scaler flaw, a judge bans NSO group from WhatsApp.
Starting point is 00:02:18 China alleges irrefutable evidence of NSA hacking. ConnectWise patches adversary in the middle risks. A Dolby decoder flaw enables zero-click remote code execution on Android. We've got a cyber M&A and funding surge that signals a busy consolidation cycle. Our guest is Jeff Collins, CEO of WANaware, sharing how hospital consolidations are reshaping IT asset visibility and what it takes to close those gaps. And one man's quest to make AI art legit. It's Monday, October 20th, 20, 25.
Starting point is 00:03:02 I'm Dave Bittner, and this is your Cyberwire Intel briefing. Thanks for joining us here today. you with us and good to be back from a lovely week-long vacation last week. My thanks to Maria Vermazas for filling in on the mic. A widespread Amazon Web Services outage disrupted major apps worldwide, fueling attack rumors that sources say lack evidence. Amazon's status page reported increased error rates in latency in the U.S. East One region, cascading across services like Snapchat, Robin Hood, Roblox, and Fortnite. Down Detector logged thousands of reports in the United States, Canada, and Europe.
Starting point is 00:03:59 AWS said engineers were mitigating the issues and services were gradually recovering Monday morning. It's noteworthy that a single cloud region's failure can interrupt trading, communications, and gaming at scale. Security teams should stress test multi-region failover and vendor resilience. The speculation shows how routine outages can trigger geopolitical anxiety, so clear, timely incident communication remains essential. The Shadow Server Foundation found over 262,000 F5 Big IP systems exposed online, while F5 disclosed a nation-state breach with stolen Big IP source code. Over 130,000 exposed systems are in the United States.
Starting point is 00:04:48 patch status remains unclear. F5 says attackers accessed Big IP development and engineering systems in August. The company reports containment, no tampering with source code or supply chain, and limited customer configuration data stolen. F5 is notifying clients. They filed a form 8K and delayed disclosure at the U.S. government's request. F5 privately links the action. activity to China Nexus Group UNC 52221 and warns about the brickstorm backdoor. Broad exposure plus uncertain patching increases exploitation risk. NCSC and SISA urge customers to locate F5 assets, secure management interfaces, assess for compromise, and apply current updates.
Starting point is 00:05:43 China-based group Salt Typhoon is exploiting a Citrix net-scaler gate. gateway flaw to infiltrate a European telecom, DarkTrace reports. In July, attackers moved from the gateway to Citrix Virtual Delivery agent hosts. Attackers hid behind soft ether VPN infrastructure. They deployed SnappyB, also called Deed Rat, via DLLL side-loading with antivirus executables from Norton, B-Cav, and Iobit. Command and Control used HTTP, and unidentified TCP with Internet Explorer headers observed. The case underscores persistent, stealthy tradecraft that blends into trusted software.
Starting point is 00:06:30 It highlights the need for anomaly-based detection and proactive defense across critical sectors. Organizations should harden exposed appliances and monitor lateral movement from remote access gateways. A federal judge barred NSO group from targeting WhatsApp and cut Meta's jury award to just over $4 million. U.S. District Judge Phyllis Hamilton found evidence Pegasus SpyWare could still infiltrate WhatsApp, granted a permanent injunction, and capped punitive damages at 9 to 1. Mehta's 2019 suit alleged violations of the Computer Fraud and Abuse Act and the California Comprehensive Computer Data Access and Fraud Act plus terms of service.
Starting point is 00:07:18 The injunction covers WhatsApp only. Hamilton wrote that NSO continued trying to bypass WhatsApp security and that the unauthorized access harms users' informational privacy. This matters because the order blocks data collection and addresses zero-click techniques while signaling consequences for commercial spyware targeting encrypted communications. China accused the U.S. NSA of hacking its national Time Service Center, citing irrefutable evidence and a detailed timeline. The Ministry of State Security said NSA exploited mobile phone vulnerabilities of center employees since March 25, 2022,
Starting point is 00:08:02 and used stolen credentials from April of 2023 to access computers. Private servers masked origins. The GEN facility supports high-precision time services and international time calculators, The claims point to risks for critical infrastructure that supports government, civil society, and industry. They also come amid escalating U.S.-China tensions and mutual cyber accusations. Defenders should review protections for time sources and monitor for credential abuse and mobile exploitation. ConnectWise has patched two adversary in the middle flaws, urging on-prem customers to update and enforce TLS 1.2. The first vulnerability with a CVSS of 9.6 exposed clear-text transmissions.
Starting point is 00:08:57 The second lacked integrity checks on downloads. Agents configured for HTTP or weak encryption risked intercepted communications or malicious update replacement. The patch enforces HTTPS for all agent traffic. The vulnerabilities meant local network attackers could view, modify and tamper with automate operations. Users should patch immediately and validate secure configurations. A Dolby Unified Decoder Flaw enables remote code execution,
Starting point is 00:09:33 including zero-click exploitation on Android, researchers from Google report. The decoder processes Dolby Digital Plus, AC4, and other formats. Project Zero found an out-of-bounds right. triggered by evolution data handling. Integer wrap caused an undersized buffer and bounds check failure, enabling override of struct members, including a pointer used on a following sync frame. Audio messages can trigger the flaw.
Starting point is 00:10:05 Android decodes audio automatically, enabling zero-click code execution in the Media Codec context. Microsoft addressed the issue in October updates with user interaction required on Windows, and Google included patches in Chrome OS releases. In this week's Business Roundup, cyber dealmaking accelerated across spyware, managed security, email, and identity,
Starting point is 00:10:32 as NSO confirmed a sale and major roll-ups advanced. NSO said a U.S. Investment Group acquired the firm for tens of millions, while keeping Israeli regulatory and operational, control. Calculist reported a Robert Simon's-led investor group, not confirmed by NSO. Level Blue agreed to acquire cyber reason, adding SoftBank Corp, SoftBank Vision Fund 2, and Liberty Strategic Capital as Level Blue investors, and aligning with prior Trustwave and Straus Friedberg deals. Kasea acquired Inky, which remained standalone, and joins Kasea 365
Starting point is 00:11:15 user. Pantera bought DevOcean to extend from adversarial testing to remediation. French MSSP No Moire acquired introgen, targeting 650 million euros revenue in 26. Capital flowed to core security segments. Resistant AI raised a $25 million series B. Pantheron secured $12 million in a Series A, Authenticate obtained $12 million in debt financing. SightHop raised 7.5 million pounds. Arkjet announced $8.3 million in a Series A. Mind the Hack closed a $2.8 million seed. Nymis raised $2 million.
Starting point is 00:12:02 Talion secured $2 million, while Hyperbunker raised $800,000 euros. The pattern points to bundling XDR, MDR, DFF, FIR, email security, and IAM at scale. Coming up after the break, Jeff Collins from WAN Aware shares how hospital consolidations reshape IT asset visibility and what it takes to close those gaps. And one man's quest to make AI art legit. Stay with us.
Starting point is 00:12:43 What's your 2 a.m. security worry. Is it, do I have the right controls in place? Maybe are my vendors secure? Or the one that really keeps you up at night? How do I get out from under these old tools and manual processes? That's where Vanta comes in. Vanta automates the manual work so you can stop sweating over spreadsheets, chasing audit evidence, and filling out endless questionnaires. Their trust management platform continuously monitors your systems, centralizes your data, and simplifies your security at scale. And it fits right into your workflows, using AI to streamline evidence collection, flag risks,
Starting point is 00:13:35 and keep your program audit ready all the time. With Vanta, you get everything you need to move faster, scale confidently and finally get back to sleep get started at vanta.com slash cyber that's v a nta.com slash cyber and now a word from our sponsor the johns hopkins university information security institute is seeking qualified applicants for its innovative master of science and security informatics degree program. Study alongside world-class interdisciplinary experts and gain unparalleled educational research and professional experience in information security and assurance. Interested U.S.
Starting point is 00:14:26 citizens should consider the Department of Defense's Cyber Service Academy program, which covers tuition, textbooks, and a laptop, as well as providing a $34,000 additional annual stipend. Apply for the fall 2026th semester and for this scholarship by February 28th. Learn more at c.j.j.u.edu slash ms.i. Jeff Collins is CEO of Wanaware. recently sat down with him to learn how hospital consolidations are reshaping IT asset visibility and what it takes to close the gaps. When we think about hospitals, especially health care institutions holistically over the last,
Starting point is 00:15:25 let's call it five years definitely, this even occurred prior to that, but there's a lot of consolidation going on. Lots of mergers, lots of acquisitions, lots of large institutions. Lots of large institutions buying up smaller hospitals, buying up smaller clinics, ambulatory surgery centers, etc. One of the things that we found is as those acquisitions happen, a lot of risk is happening within those organizations, specifically within the realm of assets that they just don't know about, which creates security and operational concerns and constraints, whether those assets or laptops or desktops. Maybe they're a machine that is used by a doctor or a nurse. IOT devices. You know, smart healthcare systems, smart EKG, smart patient monitors. All those types of things,
Starting point is 00:16:24 we see large amounts of these gaps within the healthcare space. Yeah, I mean, I can imagine just anybody who's visited a hospital lately, there's just so many devices. And of course, you know, they're all connected in one way or another these days. To what degree is this a matter of devices that are in active use or devices that are sitting in a storeroom somewhere or is the combo of both? Well, where we see the gap is really, you know, certainly active devices become problematic. The devices that are even more problematic, though, are those devices that are technically active, but nobody knows about them. They're connected to the hospital Wi-Fi network. They're connected to an Ethernet Jack plugged into a wall somewhere.
Starting point is 00:17:14 Those are the ones that become even more problematic because nobody knows they exist. They're not patched. They're not maintained. They're not controlled. Sometimes they have, you know, ubiquitous access outbound or ubiquitous access inbound, where, you know, if we're thinking about it from a security perspective, you know, a bad actor outside of the four walls or even inside of the four walls of a hospital can leverage those or inside of a health care facility. When we think about operational risk, oftentimes those
Starting point is 00:17:47 devices have risks. They can generate DDoS attacks. They can be leveraged to perform a whole multitude of attack vectors inside of a health care institution. Sometimes those devices are unknown, but they're part of something that is known. Maybe it's a back-end system, that's required for an MRI or for a CAT scan. That device goes down. Nobody has any idea that a device exists, and that becomes problematic across the board within that health care institution,
Starting point is 00:18:18 regardless of if they're a hospital or a physician's office or a surgery center or whatever it may be. So what is the typical fallout when a merger happens between a couple of medical facilities and they suddenly find they have to blend all of these devices. Yeah. So what we've seen certainly within our surveys that we've sent out,
Starting point is 00:18:46 and we do lots of surveys each year to try to understand what is the scope of this. You know, when we look at those surveys, certainly high percentages of organizations don't know everything that they have. When we think about Fallout, Fallout is somewhat hard. harder to measure. We can look at fallout in the realm of publicly disclosed breaches. Certainly, there's, you know, those keep continuing upward in trajectory. We see more and more of those every single year. As we see those breaches, those give us a good insight into what's going on, primarily because generally those breaches are disclosed where they started, and oftentimes
Starting point is 00:19:31 they're started from a machine that's either known or unknown, or a machine that has some level of compromise that could be leveraged by an attacker. Operational risks become harder, because oftentimes those don't get disclosed to the general public, because there's not really a regulatory constraint unless something happens and a patient outcome is affected directly, which is extremely problematic, but, you know, the reporting within that and the reporting of such is certainly noticeably less. Well, I mean, obviously this is your area of expertise, being able to inventory what's on someone's network. Can you help us understand, like, where do we stand today? What is the state of the art when it comes to best practices for trying to get a handle of what exactly you got on your network?
Starting point is 00:20:26 Yeah. So certainly best practice today is to leverage technologies that allow organizations to, number one, understand what assets they have without creating operational or security risk to the organization. There's lots of technologies out there that will do scanning, that you can deploy agents, you can deploy all those things. The risk is that anytime you do a scan or anytime, especially if it's an authentic, scan, and any time you deploy agents, that creates additional risk for the organization. As we talk to health care institutions, whether those are hospitals or all the way down the line, we find that generally speaking, they have technologies already that they could leverage to get this information. They just historically haven't had a great capability of correlating that data, tying it all collectively together and being able to action on it. And so, As we talk to organizations, that's really the big piece that we push on is, you know, don't go buy and deploy new scanners or don't go and deploy new agents. That creates additional risk, but rather leverage the technologies you have, whether they're endpoint protection technologies, whether they're existing firewalls, and all those individual components, and then how you can take all of that and collectively understand the scope of what you have, organization.
Starting point is 00:21:56 organizationally, and you can now quantify your risk, understand that, and then ultimately over time minimize and mitigate that risk, both from a cybersecurity as well as an operational perspective. What happens once you've gotten past that initial evaluation period, and now you've got, let's call it, ongoing monitoring of the situation? Because an organization like a hospital is practically a living, breathing organism of its own, right? Things are constantly changing when you're running a place at that scale. Yeah. Yeah. So once you've actually got those assets ingested, once you understand the
Starting point is 00:22:39 relationships, really the reality is this twofold. Number one, you have to make sure that quickly you can understand new assets. That living and breathing organism, which is a health care organization, whether it's a hospital or even a physician's office, the reality is, is they're constantly getting new technologies, deploying new technologies, changing older technologies out. That is a constant change that's happening. The reality is you have to be able to keep up with that. Getting an understanding of everything we have today is certainly that's a benefit, and we should applaud for that. But when the world changes tomorrow, there's only so much that we can rest on our laurels. And so the reality is that we have to continuously be
Starting point is 00:23:29 able to understand new things coming in. We have to have flexible systems that allow changes in technology, that allow innovation, which is drastically happening inside of the health care environment. All of us hear about AI, and we hear about how AI is changing all of this. and how AI is changing patient outcomes and technology stacks, and we have machine learning going on, and we have massive scale data lakes and data warehouses happening. All those things occur, but really that first big piece is you have to be able to adapt and change
Starting point is 00:24:03 as your environment evolves. The second major piece is once you've had that capability of evolving and understanding and being able to change with the business, the second thing you really have to do is to be, able to action upon that. So just because you have things and just because you have knowledge, if there's an outage, you know, you have to have the ability to resolve that quicker. Outages are operational.
Starting point is 00:24:30 If there's a breach, you have to be able to get to the source. Understanding what we call the blast radius. You know, when something happens, whether that's operational or cybersecurity related, that happens generally in one device or in one application. But that expands and grows oftentimes across an organization. If it's a breach, maybe it's one machine that was originally breached. And then that grew to a hundred or a thousand or sometimes even more than a thousand machines. If it's an operational risk, that may have been one machine that went down, but that was crucial in, let's say, the entire EHR system or the entire EMR system.
Starting point is 00:25:15 That one individual machine became something that problematically took out the entire health care organization. And really that resolution time of being able to leverage this, provide benefit to the business itself is crucially important. What's your advice for that security professional who's looking at their own situation and is feeling intimidated by the potential for what they're going to find out? They're afraid that they might be overwhelmed with the information that's going to be presented to them. Well, what I would say is every health care cybersecurity professional should be concerned. The reason why is because what's happened historically, any time they've heard, I can get more information. What that is equated to is more non-actionable alerts, more non-actionable alerts, more non-action. actionable events. That's the reality of what has happened. You know, if I go back in my history,
Starting point is 00:26:20 25 years in technology, all of us that have been in the space a long time, that's what we've heard for 25 years. You can get this brand new technology and will give you all the inside in the world. And the reality is it was a whole bunch of alerts and a whole bunch of events that just wasted time. It's what cybersecurity people call the false positive. False positives are what break everything. That's what creates the work effort that can't be resolved. The key is, is you have to do this without getting false positives. Now, how do we do that? You do it by understanding context. Cybersecurity professionals understand that things are false positive because they understand the context around that alert. They can look at that alert. They can see it's associated with this device. They understand if they have a
Starting point is 00:27:14 compensating control that might be mitigating that. They understand if it's siloed, maybe it's in a zero-trust model where it's only that machine. Sure, that machine is breached. It's very low priority and very low risk to the organization. And while it came across as a critical event, it's really something that can be dealt with tomorrow or in a week or whatever it may be. It has no patient data on it. It really just has no priority to the organization. That's where cybersecurity professionals have historically provided that context. The key going forward is that technologies as well as processes and procedures have to be able to do that more systematically. Our cybersecurity professionals have to be able to focus on the risks that really matter
Starting point is 00:28:03 to the organization, those which require people, and the rest of this stuff, mitigating false positives, mitigating operational risk, doing all these types of things. Those all need to be done by systems, and they need to be done in a manner where we're not getting more and more alerts and metrics and all of this log information that's really just false positives that waste people's time. That's Jeff Collins, CEO of Wannerware. access to exclusive Amex pre-sale tickets can score you a spot trackside. So being a fan for life turns into the trip of a lifetime. That's the powerful backing of Amex. Pre-sale tickets for future events subject to availability and varied by race.
Starting point is 00:28:57 Turns and conditions apply. Learn more at amex.ca. This episode is brought to you by Peloton. A new era of fitness is here. Introducing the new Peloton Cross Training Tread Plus, powered by Peloton IQ, built for breakthroughs with personalized workout plans, real-time insights and endless ways to move. Lift with confidence.
Starting point is 00:29:18 While Peloton IQ counts reps, corrects form, and tracks your progress. Let yourself run, lift, flow, and go. Explore the new Peloton cross-training treadplus at OnePeloton.ca. And finally, Jason Allen is still fighting to prove that a robot-assisted masterpiece can, in fact, belong to its human co-pilot. In 2022, Alan stunned and infuriated the art world by winning the Colorado State Fair's fine arts competition with an image spun up by Mid Journey, the then-new AI Art Generator.
Starting point is 00:30:11 Since then, he spent three years in legal limbo, trying to convince the U.S. Copyright Office that his digital muse didn't steal his thunder. In August, he filed yet another brief, hoping to claim authorship over Theatre de Opera Spatial, and conveniently to sell limited edition oil-print elegraphs of it that promised the gravitas of a 19th-century masterwork, minus the hand cramps. insists the creative act lies in the hundreds of prompts he typed to coax the machine into beauty. Whether the courts will agree is anyone's guess. Whether it's art or algorithm, Alan's work has definitely sparked some creative debate. And that's the CyberWire. For links to all of today's stories, check out our daily briefing at thecyberwire.com. We'd love to know what you think of this podcast.
Starting point is 00:31:24 Your feedback ensures we deliver the insights that keep you a step ahead in the rapidly changing world of cybersecurity. If you like our show, please share a rating and review in your favorite podcast app. Please also fill out the survey in the show notes or send an email to Cyberwire at N2K. com. N2K's senior producer is Alice Carruth. Our Cyberwire producer is Liz Stokes. We're mixed by Trey Hester with original music by Elliot Peltzman.
Starting point is 00:31:51 Our executive producer is Jennifer Ibin. Peter Kilpe is our publisher, and I'm Dave Bittner. Thanks for listening. We'll see you back here tomorrow. Cyber Innovation Day is the premier event for cyber startups, researchers, and top VC firms building trust into tomorrow's digital world. Kick off the day with unfiltered insights and panels on securing tomorrow's.
Starting point is 00:32:41 technology. In the afternoon, the eighth annual Data Tribe Challenge takes center stage as elite startups pitch for exposure, acceleration, and funding. The Innovation Expo runs all day, connecting founders, investors, and researchers around breakthroughs in cybersecurity. It all happens November 4th in Washington, D.C. Discover the startups building the future of cyber. Learn more at cid. datatribe.com.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.