CyberWire Daily - When GoAnywhere goes wrong.

Episode Date: October 14, 2025

Fortra confirms an exploitation of the maximum-severity GoAnywhere flaw. Harvard investigates a claim of a breach. Banking Trojan targets Brazilian WhatsApp users. Reduction-in-force hits CISA. SimonM...ed says 1.2 million hit by Medusa ransomware. Netherlands invokes the Goods Availability Act against a Chinese company. We have our Business Breakdown. On today’s Industry Voices, we are joined by Mickey Bresman sharing insights on hybrid identity security. And, beware of the shuffler. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On today’s Industry Voices, we are joined by Mickey Bresman, Semperis CEO, sharing insights on hybrid identity security and their HIP Conference. Mickey joined us as their 2025 Hybrid Identity Protection (HIP) Conference wrapped up.  If you want to hear the full conversation, you can tune in here. Selected Reading Fortra cops to exploitation of GoAnywhere file-transfer service defect (CyberScoop) Harvard Investigating Security Breach After Cybercrime Group Threatens To Release Stolen Data (The Crimson) WhatsApp Worm Targets Brazilian Banking Customers (Sophos News)  Government Shutdown Fallout: RIF Notices Hit CISA as Cyber Threats Rise (ClearanceJobs) SimonMed says 1.2 million patients impacted in January data breach (Bleeping Computer)  Netherlands invokes special powers against Chinese-owned semiconductor company Nexperia (The Record) UK fines 4chan over noncompliance with Online Safety Act (The Record)   Synechron acquires RapDev, Calitii, and Waivgen. (N2K Pro Business Briefing)   Hackers Rig Casino Card-Shuffling Machines for ‘Full Control’ Cheating (WIRED) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the Cyberwire Network, powered by N2K. We've all been there. You realize your business needs to hire someone yesterday. How can you find amazing candidates fast? Well, it's easy. Just use Indeed. When it comes to hiring, Indeed is all you need. Stop struggling to get your job post.
Starting point is 00:00:30 noticed. Indeed's sponsored jobs helps you stand out and hire fast. Your post jumps to the top of search results, so the right candidates see it first. And it works. Sponsored jobs on Indeed get 45% more applications than non-sponsored ones. One of the things I love about Indeed is how fast it makes hiring. And yes, we do actually use Indeed for hiring here at N2K Cyberwire. Many of my colleagues here came to us through Indeed. Plus, with sponsored jobs, there are no subscriptions, no long-term contracts. You only pay for results. How fast is Indeed?
Starting point is 00:01:08 Oh, in the minute or so that I've been talking to you, 23 hires were made on Indeed, according to Indeed data worldwide. There's no need to wait any longer. Speed up your hiring right now with Indeed. And listeners to this show will get a $75-sponsored job credit to get your job. more visibility at indeed.com slash cyberwire. Just go to indeed.com slash cyberwire right now and support our show by saying you heard about Indeed on this podcast.
Starting point is 00:01:39 Indeed.com slash cyberwire. Terms and conditions apply. Hiring? Indeed is all you need. Portra confirms an exploitation of the maximum severity go-anywhere flaw. Harvard investigates a claim of a breach. Banking Trojan targets Brazilian WhatsApp users. Reduction in force hits Sisa.
Starting point is 00:02:14 Simon Medd says 1.2 million hit by Medusa ransomware. Netherlands invokes the Goods Availability Act against a Chinese company. We have our business breakdown. On today's industry voices, we are. are joined by Mickey Bresman, sharing insights on hybrid identity security, and Aware of the Shuffler. Today is October 14, 2025. I'm Maria Vermazas, host of T-minus Space Daily sitting in for Dave Bittner, and this is
Starting point is 00:02:56 your Cyberwire Intel Briefing. Thank you for joining me today. Let's get into it. Security firm Fortra has belatedly confirmed in the wild exploitation of a maximum severity vulnerability in its Go Anywhere managed file transfer software, which was patched three weeks ago. The vulnerability is a decerealization flaw that allows an actor with a validly forged license response signature to deserialize an arbitrary actor-controlled object possibly leading to command injection.
Starting point is 00:03:35 The U.S. cybersecurity and infrastructure security agency, or SISA, added the flaw to its known exploited vulnerabilities catalog two weeks ago, and Microsoft last week published a report on the active exploitation. Sisa and Microsoft both say the vulnerability is being used in ransomware campaigns. Researchers at Watchtower, who published, published a report on the vulnerability last month, note that some details of the exploitation are still unclear. Watchtower's CEO Ben Harris told CyberScoop that the exploitation implies that the attacker has somehow circumvented or satisfied the cryptographic requirements
Starting point is 00:04:12 needed to exploit this vulnerability. Harvard University has disclosed that it was compromised by a zero-day flaw affecting Oracle's e-business suite system, and the school is investigating a potential breach after the Klopp ransomware gang listed the university on its leak site. Oracle issued an emergency patch for the flaw last week. A Harvard spokesperson told bleeping computer
Starting point is 00:04:35 that Harvard is aware of reports that data associated with the university has been obtained as the result of a zero-day vulnerability in the Oracle E-Business Suite system. This issue has impacted many Oracle E-Business Suite customers and is not specific to Harvard. While the investigation is ongoing,
Starting point is 00:04:53 we believe that this incident impacts a limited number of parties associated with a small administrative unit. Upon receiving it from Oracle, we applied a patch to remediate the vulnerability. We are continuing to monitor and have no evidence of compromise to other university systems. Sophos describes a malware campaign targeting Brazilian WhatsApp users with a banking Trojan that's tailored for customers of Brazilian banks and cryptocurrency exchanges. The malware is delivered by tricking users into executing users. a malicious file attached to a self-spreading message received from a previously infected
Starting point is 00:05:29 WhatsApp web session. It then sends similar malicious messages to all of the victim's contacts. Sophos has observed first-stage power shell activity associated with this campaign in over 400 customer environments and on more than 1,000 endpoints. As the U.S. government shutdown drags on. Sisa is now facing reductions in force or riffs. threaten its already lean operations. With over 1,000 employees already departed this year, SISA had slated only 889 staffers to remain on duty during the shutdown, which is roughly 35% of its workforce. Last week, RIF notices began rolling out across the agency, putting the future
Starting point is 00:06:14 staffing levels of its critical cybersecurity divisions at risk. Experts warned that amid rising cyber threats, even temporary staffing gaps could hinder detection, response and information sharing. U.S. medical imaging provider Simon Med Imaging disclosed a data breach affecting 1.2 million patients stemming from unauthorized access between January 21st and February 5th, 2025. The breach was uncovered when a vendor notified Simon Med of a security incident on January 27th. Investigators confirmed suspicious network activity the next day.
Starting point is 00:06:50 Attackers claimed responsibility via the Medusa Ransomware Group, demanding $1 million and leaking data such as ID scans, patient details, and medical reports. Simon Med responded by resetting passwords, enforcing multi-factor authentication, deploying endpoint detection, and restricting third-party access. So far, Simon Med reports no confirmed misuse of the stolen data and is offering affected individuals' free identity protection services. The government of the Netherlands has invoked extraordinary powers to override business decisions at Nexperia, which is a semiconductor firm,
Starting point is 00:07:27 partly owned by China, citing serious governance shortcomings. Under the newly applied Goods Availability Act, Dutch authorities can block or reverse asset transfers and strategic moves, perceived as threats to critical technological know-how. Nexperia's parent, Wing Tech, condemned the decree as geopolitically motivated and vowed to appeal in court. The move reflects broader concerns over Chinese influence and, intellectual property transfer in the semiconductor sector, especially where cutting-edge technology
Starting point is 00:07:57 like lithography is involved. The UK regulator, Offcom, has issued a 20,000-pound fine to U.S.-based forum, Forchan, marking the first enforcement under the UK's Online Safety Act. The penalty stems from Forchan's failure to respond to legally mandated requests for its illegal harms risk assessment and other compliance documentation. Offcom will also impose an extra 100-pound daily fine for up to 60 days if the site still does not comply. For its part, For Chans' lawyers, contend that off-com lacks authority over a U.S. platform,
Starting point is 00:08:33 and they refuse to pay, arguing that the action conflicts with America's free speech protections. And now for our business breakdown, last week's business breakdown highlights a staggering $250 million raised across seven investments and 12 acquisitions. On the investment front, French open source security solution provider, Philigran, finished its series C round, raising $58 million. The funding will be used to accelerate the company's development of its open GRC platform, which is an open source platform for threat-informed cyber risk management. Alongside further developing this platform,
Starting point is 00:09:08 Philigran is also looking to scale its presence in Saudi Arabia, Japan, the United States, and the Dock region. For acquisitions, the digital consulting firm Cinecron acquired three companies as it looks to launch its new Global Service Now business. The three companies are RAPDEV, Calte, and WaveGen. RAPDiv is one of the world's largest data dog partners. WaveGen is the leading Appian partner, and Caltee Architects and delivers full-scale Service Now implementations. Alongside debuting a Global Service Now business,
Starting point is 00:09:40 Sinecron is also looking to expand outside the financial sector into new markets, such as health care and energy. Additionally, SAIC, which is the Virginia-based defense contractor, has acquired Silver Edge Government Solutions for $205 million. With this acquisition, SAIC is looking to incorporate Silver Edge's flagship product, SOAR, into its offerings. And SOAR is a SaaS service that utilizes automation, AIML, data visualization, and cross-domain capabilities
Starting point is 00:10:09 to deliver turnkey, customizable software solutions to clients. And that wraps this week's business breakdown for deeper analysis on major business moves shaping the cybersecurity landscape, subscribe to N2K Pro, and check out thecyberwire.com every Wednesday for the latest updates. Stick around after the break on today's industry voices. We are joined by Mickey Bresman, sharing insights on how. hybrid identity security, and beware of the shuffler. What's your 2 a.m. security worry? Is it, do I have the right controls in place? Maybe are my
Starting point is 00:11:09 vendors secure? Or the one that really keeps you up at night? How do I? get out from under these old tools and manual processes. That's where Vanta comes in. Vanta automates the manual works, so you can stop sweating over spreadsheets, chasing audit evidence, and filling out endless questionnaires. Their trust management platform continuously monitors your systems, centralizes your data, and simplifies your security at scale. And it fits right into your workflows, using AI to streamline evidence collection, flag risks, and keep your program audit ready. all the time. With Vanta, you get everything you need to move faster, scale confidently, and finally, get back to sleep.
Starting point is 00:11:52 Get started at Vanta.com slash cyber. That's V-A-N-T-A-com slash cyber. And now, a word from our sponsor, Threat Locker, the powerful zero-trust enterprise solution that stops ransomware in its tracks. Allow listing is a deny-by-default software that makes application control simple and fast. Ring fencing is an application containment strategy, ensuring apps can only access the files, registry keys, network resources, and other applications they truly need to function. Shut out cybercriminals with world-class endpoint protection from Threat Locker. On today's industry voices, Dave Bittner recently sat down with Mickey Bresman,
Starting point is 00:12:50 some Paris CEO, and shared insights on hybrid identity security and their hip conference. Here's their conversation. So the identity security motion is keep on growing bigger and more important to the different audiences, both security and ideal operational ones. I think there are several interesting key. takeaways that I have from this event, where, first of all, we have the biggest number of attendees till date. I believe that we were at roughly 400 attendees, which is obviously great to see that it's
Starting point is 00:13:26 keep on growing. I think the main things that I have is takeaways from the conference is that it was very interesting to hear that Microsoft is committed to Active Directory security and support. and we had Microsoft speakers on stage. It was also interesting to see the type of audience that we had, where you had people that have responsibility for five domain controllers and all the way to more than 5,000 domain controllers. So it's a very diverse type of a group.
Starting point is 00:13:58 I think also an interesting takeaway was that hybrid environments will remain the standard for, God knows for how long, maybe even forever, as opposed to the previous thinking that potentially companies will be either on-prem, either in the cloud, reality-wise, the vast majority of that in this year all are suggesting that they see their companies remaining as hybrid. I think another interesting point was around the fact that, and that's my observation, that identity is more critical than ever, and it just continues to get more and more attention from the security teams
Starting point is 00:14:37 with the clear understanding that in the new, you know, modern enterprise with remote world, cloud applications, identity plays the biggest role in terms of how they actually defend the organization. And obviously, you cannot have a conference today without bringing up AI. But in this case, AI have a different application
Starting point is 00:15:00 for the identity security space. What I mean by that is one of the conclusions that is currently coming out from HIP is that agentic AI is actually introducing a new type of identities. So if traditionally organizations thought about identities as a human identity and there was another classification
Starting point is 00:15:23 of a machine identity, now all of a sudden we have a third bucket that is called agentic AI or basically agent identities because those are not humans, obviously, but they also don't be, like machine identities, and that requires a completely different approach on when we introduce this new type of an identity to the organization, how do we make sure that it is done
Starting point is 00:15:49 in a secured manner and is managed correctly in the organization? Well, what were some of the conversations around that topic with the Agentic AI? Where do you suppose we're headed? Yeah, that's a great one. I think there is a lot of questions that are coming up. Obviously, the adoption of agentic AI is, you know, it's infinity. It's just starting. And I think what we're seeing is companies trying to understand what does it actually
Starting point is 00:16:20 mean to their environments. As an example, one of the questions that customers are currently trying to answer for themselves is, will my organization have multiple agentic AI type of systems? Maybe I'm going to use Microsoft Copilot and at the same time I'm going to be using Gemini as an example. And that's most likely what's going to happen, at least from what I'm hearing. And then if that is indeed the case, then it creates a new type of a question. And again, I'm looking at right now from the identity point of view. Where will those identities be coming from?
Starting point is 00:16:56 Meaning, is it reasonable to assume that we will still have the agentic AI identities exist in the same IDPs that we're having today? Or will it mean now that we will need to rethink the entire model? Because of a sudden, potentially those identities will not exist outside or will not be managed, will be probably a better way to put it, outside of the provider of those identities. To put it very simple. If my company is using Android as the identity source in the cloud, then I think it's reasonable to assume that their genetic identities will be managed in AndroidD. But if I'm now adopting Gemini as an example,
Starting point is 00:17:42 should I make the assumption that I'll be able to manage those identities in AndroidD as well? Or should I be starting to think of those identities existing only inside of Gemini, which is obviously a completely different type of an approach? Well, from the unique point of view that you and your colleagues at Sempris have, where are you seeing enterprises falling short when it comes to securing active directory? That's a very big question. Yeah. Look, there's a lot of interesting questions that are all things that we're seeing now in the industry.
Starting point is 00:18:19 By the way, another interesting point that I've seen coming here from the conference is active directory has been around for more than 25 years, which is typically seen as something in the technology space. We often refer to technology that has been here for a while. We will refer to it as a legacy, which will typically imply that, you know, it's not the best of what you can have and you should probably thinking about adopting something else. But the reality is what I'm hearing from customers is that that's not how they see it. What they see is the fact that Actuary has been around for 25 years, makes it very mature, and that maturity is actually seen as an advantage. So I think it was very interesting to see that many companies
Starting point is 00:19:08 got to this realization that they will continue and have Actuary as the core of the identity story for a long period of time. At this point, I'm no longer trying to make any predictions till when, because it made me forever. One of the examples that people kept using at the conference all the time is mainframe, where it's just there and it's been there and there have been multiple instances where people thought it will not be, but the reality is that it is still very much there. It basically requires organizations to rethink. If actor director is going to be the source of my identity story for my company for the years to come, then obviously I need to
Starting point is 00:19:54 rethink, how do I make sure that that system is secured? How do I make sure that that system is properly protected and managed? And obviously, I need to make sure that if something happens and somebody compromises that system, that I have a way to bounce back and have the system up and running in a relatively short period of time. I was looking through the Global Ransomware report that you all published earlier this year. One of the statistics that caught my eye was that 70% of companies paid the ransom when they were victimized. Do you have any advice for organizations of ways to drive down that number? For sure.
Starting point is 00:20:34 Well, Dave, you know, if you think about why would somebody decide to pay ransom, in most cases, the answer is going to be one of the two reasons. The first one, you just concluded that you have no way to bounce back in a reasonable amount of time. So let's say that, and I actually would argue that that is the biggest reason. So just to explain a bit, the second reason is going to be because you had a data that was stolen from the organization that you deemed to be so sensitive that if it would have been published, then it's going to hurt a tremendously. So maybe let's start with the second point. The second point to me is that even if you pay ransom, you actually should assume that that data still can be published because we've seen multiple times that the bad actors are not necessarily going to play. you know, by the rules, so to speak.
Starting point is 00:21:27 And it might be that they will take your money, but they will still go ahead and publish it. And we also see the instances where, you know, now it's a bit more organized. So you might have more than one group of bad actors actually walking against you. And we've seen without mentioning names, although it was very publicly covered.
Starting point is 00:21:48 We've seen those situations where you paid who you thought is the main ransomary group, But then another group showed up and said, well, we actually have not been paid. So we're going to publish your data in any case. So I think from that point of view, I know it's very tricky to decide if you should or should not be paying in order to get your data back. But my main point there is that even if you do pay, you can't really know if you will or will not get your data back. So let's assume for a minute that that is not the main decision in terms of should it be paying or not. meaning the data that have been stolen,
Starting point is 00:22:25 and let's go back to the first point, which I think is the more critical, how fast can I actually bounce back? And I will suggest to think about it, if I'm now taking the CEO point of view and my company was hit, I would want to know a couple of things. How fast can we go back to what is defined
Starting point is 00:22:45 as at least the minimal operational mode of my company? And probably the bigger question that I'm going to have, how much trust do I have in the numbers that are being put in front of me by my IT organization? If they're saying that they will bounce back as an example in a matter of 48 hours, can I really believe that that's what's going to happen? And the only way to do that, and that's the question of what can be done, is to make sure that you actually have your playbooks, your run books, all ready to go, that you know how to
Starting point is 00:23:19 approach your cyber insurance provider in the case of an emergency, you actually tested and tried to make sure that you understand what needs to happen if one of the decision makers is not available, like who becomes the next in line. You also tried your recovery process, not just by restoring a server, but you actually made sure that you understand how you will be communicating with the different teams. You understand what is the sequence of events that is going to take place. So basically you have a clear understanding of what is the bounce back process looks like. And if you have that and you can now speak to the management with the confidence of saying we've done it before, we are well organized, we are well planned and we can
Starting point is 00:24:05 guarantee that we, you know, guarantee is a big term here. But we are very confident that we can go live again in 24 hours. I guarantee to you in this case that the management will be very very unlikely to decide to pay ransom. That was Mickey Bresman, Sampera CEO, sharing insights on hybrid identity security and their hip conference. At Talas,
Starting point is 00:24:41 they know cybersecurity can be tough and you can't protect everything. But with Talas, you can secure what matters most. With Talis's industry-leading platforms, you can protect critical applications, data and identities, anywhere and at scale with the highest ROI. That's why the most trusted brands and largest banks, retailers, and healthcare companies in the world rely on Talis to protect what matters most. Applications, data, and identity. That's Talis. T-H-A-L-E-S. Learn more at talusgroup.com slash cyber.
Starting point is 00:25:18 With Amex Platinum, access to exclusive Amex presale tickets can score you a spot trackside. So being a fan for life turns into the trip of a lifetime. That's the powerful backing of Amex. Pre-sale tickets for future events subject to availability and varied by race. Terms and conditions apply. Learn more at amex.ca.ca. And finally, a group of researchers hacked an automatic card shuffler used in casinos by sneaking tiny sensors and wireless gear inside, basically turning a blackjack shoe into a spy
Starting point is 00:26:00 gadget. The mod lets them track cards positions as they get shuffled and deliver real-time advice to a player's phone. Wagers aside, it's a brilliant act of low-tech villainy meets high-tech mischief. Casinos, please take note, even your Shuffler might be listening. And that's The CyberWire. For links to all of today's stories, check out our daily briefing at TheCiberwire. We'd love to know what you think of our podcast. Your feedback ensures we deliver the insights.
Starting point is 00:26:45 that keep you a step ahead in the rapidly changing world of cybersecurity. If you like our show, please share a rating and review in your podcast app. Please also fill out the survey and the show notes or send an email to Cyberwire at N2K.com. N2K's senior producer is Alice Carruth. Our producer is Liz Stokes. We're mixed by Elliot Peltzman and Trey Hester with original music by Elliot Peltzman. Our executive producer is Jennifer Ibin.
Starting point is 00:27:11 Peter Kilfey is our publisher. And I'm your host, Maria Vermazas, in this. week for Dave Bittner. Thanks for listening. I'll see you tomorrow. Cyber Innovation Day is the premier event for cyber startups, researchers, and top VC firms building trust into tomorrow's digital world. Kick off the day with unfiltered insights and panels on securing tomorrow's technology. In the afternoon, the eighth annual Data Tribe Challenge takes center stage as elite startups pitch for exposure, acceleration, and funding.
Starting point is 00:28:12 The Innovation Expo runs all day, connecting founders, investors and researchers around breakthroughs in cybersecurity. It all happens November 4th in Washington, D.C. Discover the startups building the future of cyber. Learn more at cid. datatrib.com.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.