SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThe UK's Home Office has reportedly served a Technical Capability Notice (TCN) under the Investigatory Powers Act (IPA) compelling Apple to give the government backdoor access to worldwide users' encrypted data in the company's cloud service. Although "under the law, the demand cannot be made public," and while the Home Office will neither confirm nor deny "any such notices," both the Washington Post, who first reported the news, and the BBC have spoken with anonymous "sources familiar with the matter." The alleged demand specifically targets Apple's end-to-end encrypted Advanced Data Protection (ADP) measures, and may apply in cases of national security risk, requiring a legal permission process to access the backdoor. Apple's history with similar cases and the company's prior statements show a pattern of opposing or refusing such demands. In the UK specifically, out of over 6,000 requests for iCloud data between 2020 and 2023, Apple complied only four times. Cybersecurity experts and privacy groups have expressed deep concern over the serious risks to users' security and privacy posed by breaking encryption with backdoors; the Electronic Frontier Foundation notes that "any 'backdoor' built for the government puts everyone at greater risk of hacking, identity theft, and fraud," and the UK's Big Brother Watch states that such a backdoor "will not make the UK safer, but it will erode the fundamental rights and civil liberties of the entire population."
It seems that the UK government and its advisors have not being paying attention to the recent Salt Typhoon attacks against US telcos where lawful intercept capabilities built into those networks were abused by hostile nation state actors to intercept traffic travelling over those networks. As I have said many times, "we can have strong encryption and accept that the cost will be its abuse by criminals while the internet is made more secure, or we can weaken encryption and accept that the cost will be its abuse by criminals while the internet is made insecure."
Governments will never learn from past failures in implementing 'back doors' in communication infrastructure. Proposing this before 'Volt Typhoon' is even fully evicted (or even identified as far as the UK is concerned) is actually kind of funny.
Encryption with a "government/law enforcement" backdoor is an oxymoron. Remember the clipper chip? We've seen this movie before, there is no effective way to restrict access to that back door, let alone prevent others from reverse engineering it. The concerns over decrypting iCloud data were exacerbated with the introduction of Advanced Data Protection for iCloud in iOS 16 which enables end-to-end for the majority of your iCloud data, and not even Apple can access this data.
If you thought the Cryptography War ended with Salt Typhoon, think again. Apparently governments will never gracefully consent to private communications for their citizens. As one might infer from Salt Typhoon, any such backdoor will become the target of choice for all the resources of China, Israel, Iran, Russia, and North Korea, not to mention NSA. It is unlikely that Scotland Yard, Special Branch, MI5, and GCHQ can protect any such backdoor better than the FBI, NSA, and the Telcos were able to protect CALEA. Such a facility, justified by terrorism and crime, will inevitably be used for surveillance, not limited to His Majesty's subjects.
Everyone is watching how Apple will handle this. A backdoor for the UK government is a universal backdoor for everyone. At least that's what it would appear on the surface. I don't know how that will work or if Apple will be okay with it. If you want to know what these backdoors can be used for just follow Salt Typhoon, CALEA, and all that mess.
Apple has been at the forefront in protecting the communication of users of its products. It was only a matter of time before some Government would demand access for national security purposes. One can understand the arguments, and each are valid. What's particularly interesting is the reach of the Investigatory Powers Act. If successful, other nations will surely follow in the UKÕs footsteps.
BBC
The Record
The Record
EFF
TechCrunch
The Shadowserver Foundation has detected an ongoing brute force attack on the login credentials of network devices, carried out at an increasing scale since January, 2025, daily employing up to 2.8 million compromised network devices worldwide. The attacks appear to target a wide range of edge devices including those from major manufacturers such as Palo Alto, Ivanti, and SonicWall, and appear to originate from routers and IoT devices mainly made by MikroTik, Huawei, Cisco, Boa, and ZTE. Shadowserver observes that the IP addresses involved may suggest a botnet employing residential proxy networks. BleepingComputer suggests changing and strengthening passwords, enforcing MFA, "using an allowlist of trusted IPs," and disabling unused web admin interfaces. In a separate story, last week, cybersecurity agencies from the Five Eyes countries (Australia, Canada, New Zealand, the UK, and the US) jointly published guidance for securing edge devices.
This is what we enable when we fail to properly manage the devices that we expose to the public networks.
What's particularly troubling about this attack is the number of compromised devices employed. It speaks to the poor job that IoT vendors have done embodying secure by design principles in their products. Hard-coding credentials in a product is no longer acceptable and vendors should be help accountable. In the meantime, prioritize MFA enforcement for all Internet facing devices.
The attack leverages compromised SOHO devices, but the initial attack vector to those devices is unknown. Those devices are attempting password/login attacks. Make sure that your devices are not only running the most current firmware but are also still supported. Change default passwords and disable WAN access to the management console. Make sure VPN or remote access services use MFA rather than password-based authentication. Lastly, make sure you're not only monitoring service use but also actively reviewing/managing users.
If you have an edge device with an N+1 day vulnerability and you get owned. Well, I mean, that's on you at this point. Honestly.
BleepingComputer
Gov Infosecurity
Shadowserver
Security Week
The UK military is fast-tracking cyber-recruits to ensure that 50 cyber specialist operational positions within the Royal Navy and Royal Air Force are filled by the end of the calendar year. Recruits entering through the 'cyber pipeline' will complete their basic training within a month rather than the regular ten weeks. They will then receive three months of specialized training at the Cyber Defence Academy.
It's a new day in the military with cyber skills very much in demand. For the recruit it's an opportunity to obtain skills that translate into high demand private sector jobs upon completion of military service. Well, done UK MoD, well done.
The UK is dropping the traditional basic (fitness and weapons) training, focusing instead on needed cyber skills to fill the gaps in their Navy and Air Force now. The British Army is slated to join the campaign in 2026. Since last July, the UK has also increased the starting compensation by 35% for recruits and removed 100+ outdated policies which block or slow recruitment to attract and retain candidates. My concern is the lack of comradery and defense skills developed in basic training may put these candidates at risk as they are still soldiers, particularly when deployed in the field.
gov.uk
UK Defense Journal
The Record
The Register
Apple has released iOS 18.3.1 and iPadOS 18.3.1 and 17.7.5 to address a vulnerability that was being actively exploited in targeted attacks. The flaw could be exploited to 'disable USB Restricted Mode on a locked device,' and was fixed through improved state management. The vulnerability was detected by Bill Marczak, a researcher at the University of Toronto's Citizen Lab, which 'focus[es] on research, development, and high-level strategic policy and legal engagement at the intersection of information and communication technologies, human rights, and global security.'
USB Restricted mode, introduced in iOS 11.4.1, prevents unauthorized USB data access to your locked device, and is one countermeasure to bad-USB attacks, mitigating some risks for travelers who don't always think twice before connecting for a charge. This protection was augmented in iOS 18, which introduced an inactivity reboot (after 72 hours), which makes forensic access to devices much harder as when the device is in "Before First Unlock" mode all encryption keys are in the secure enclave and not otherwise accessible without the device passcode. CVE-2025-24200, USB Restricted Mode bypass, doesn't have a CVSS score and while the bypass is a sophisticated physical attack, the update is worth applying to your iOS/iPad 17 & 18 devices now; it's under 500mb and only takes a few minutes to install.
Apple has done a fantastic job getting everyone to update their phones. I suspect that most people will update. What's interesting is the impact of this patch on physical access, as the exploit attacks the USB lockdown. Makes you wonder how they arrived at this exploit.
Apple also published updates for MacOS, but these updates did not fix any security issues.
TechCrunch
Bleeping Computer
Security Week
Security Online
Apple
Apple
NVD
Citizen Lab
The Cybersecurity and Infrastructure Security Agency (CISA) has published an Industrial Control Systems (ICS) advisory, warning that some versions of Trimble Cityworks, an infrastructure software tool for managing assets and work, are vulnerable to a flaw that is under active exploit. The flaw, CVE-2025-0994, CVSS score 8.6, allows an authenticated user "to execute arbitrary code on the IIS server due to deserialization of untrusted data." All versions of Trimble Cityworks prior to 15.8.9 and Cityworks with office companion prior to 23.10 are affected; Cityworks Online has been automatically patched, and Trimble urges users to update on-premises instances immediately. The indicators of compromise (IoCs) show that "attackers attempted to leverage the flaw to deploy payloads including obfuscated JavaScript code, a custom Rust loader used to load Cobalt Strike, and various other malicious executable and binaries." Local and federal government agencies use Trimble Cityworks to manage "airports, utilities, municipalities and counties," and all Federal Civilian Executive Branch agencies must patch by February 28.
The importance of sanitizing ALL input cannot be overstated. If your developers have never seen how easy it is to manipulate input data, perhaps a demonstration is in order. If your QA process isn't checking every input to make sure it's sanitized, you need to address that oversight. While a WAF can mitigate the risk on your applications, particularly COTS, the best fix remains within the application code itself as you need to continue to verify the WAF mitigations work throughout application lifecycles.
Given the current quality of much of our software, it is prudent to hide as much of it from the Internet as possible. Given recent history of vulnerabilities in firewalls, consider layering them, at least for mission critical systems and applications. Ensure that sensitive data is encrypted at rest, keeping in mind that "cryptography is harder than it looks."
According to the CISA advisory this flaw can be exploited by an "authorised user." To reiterate previous commentaries, any critical management systems should not be internet facing and instead should be only accessible via a VPN with all accounts protected by MFA.
CISA
Trimble
The Record
SCMedia
The Hacker News
Bleeping Computer
Researchers at NowSecure have detected multiple security and privacy vulnerabilities in the DeepSeek app for iOS. NowSecure's assessment of the app turned up a number of risks, including unencrypted data transmission; weak and hardcoded encryption keys; unsecure data storage; data collection & fingerprinting; and data sent to China and subject to laws in PRC. NowSecure urges organizations to prohibit the use of the app, 'explore alternative AI platforms that prioritize mobile app security and data protection, [and] continuously monitor all mobile applications to detect emerging risks.'
The vulnerability research is troubling on several fronts. Like the UK Investigatory Powers Act (see NewsBites snippet), Government can demand access to the data stored by ByteDance. In this case however, the Chinese government has access to the unencrypted communications. The question becomes, is this simply poor coding practices exposed in one's rush to market, or something more devious? You can decide.
NowSecure
Ars Technica
The Hacker News
Gov Infosecurity
The UK's independent, non-profit Cyber Monitoring Centre (CMC) is now classifying cyber incidents by severity. CMC was initially conceived to provide quantifiable information for insurance companies to help them determine whether a cyber incident constitutes a systemic event; the organization will provide information to 'all security risk owners.' The CMC will evaluate incidents affecting organizations within the UK that are estimated to have 'a potential financial impact' of at least £100 million ($123.6 million). Categorization criteria include number of organizations impacted by the incident and the total estimated financial damages. For each evaluated incident, CMC staff members will provide a severity categorization from 1 to 5 and a report detailing how they arrived at the categorization. The CMC's classification system bears a resemblance to the scale used to classify hurricanes.
Well, I'm all for simplifying things. In this case, not sure it makes a whole lot of sense. The insured's state of defenses come into play, and they are not all equal. And, besides, it doesn't really solve any problem. That is, unless it's really just a feint to immunize the insurance industry. All I can say for now is meh.
Cyber Monitoring Centre
Cyber Monitoring Centre
The Register
Computer Weekly
A critical flaw in Orthanc Server could be exploited to disclose information, modify records, or cause denial-of-service conditions. The issue lies in missing authentication for a critical function and affects Orthanc Digital Imaging and Communications in Medicine (DICOM) Server versions older than 1.5.8. The US Cybersecurity and Infrastructure Security Agency (CISA) has published an Industrial Control System (ICS) Medical Advisory describing the issue. Users are urged to upgrade to the most recent version to Òenable the HTTP authentication by setting the configuration "AuthenticationEnabled": true in the configuration file.'
DICOM is a mess. It's a total mess. I am *very* surprised that we have not seen widespread exploitation. I'm telling you that after working in healthcare, people put DICOM servers on weird ports all over the place, and barely any scanners exist for it. It's a nightmare waiting to happen.
CVE-2025-0896, missing authentication, CVSS score 9.8, can be exploited remotely with a low level of complexity. In addition to applying the update and security configuration change, also minimize network exposure to your ICS devices, don't expose them to the Internet, and restrict internal access to verified systems. Take a look at CISA's latest ICS Defense-in-Depth Strategies guide to see if you're missing any updated approaches to keep your systems protected.
In a report to the London Stock Exchange, British engineering firm IMI plc has disclosed 'a cyber security incident involving unauthorised access to the Company's systems.' IMI has not provided many details beyond stating that they brought in third-party experts to investigate. IMIÕs disclosure comes roughly a week after another UK engineering firm, Smiths, disclosed a cyberattack.
Per Dragos, there were 119 ransomware attacks in 2024 targeting European companies, (UK, Germany and Italy most affected) and from July to September there were 394 attacks on the manufacturing sector globally, 56 of which targeted ICS systems. If you're in either of these categories, make sure you're up to speed on your cyber hygiene. Revisit the risks of exposed services, and consider newer compensating controls where access is only granted to continuously vetted devices.
The Record
Bleeping Computer
Tech Crunch
Security Week
ITPro
London Stock Exchange
In a 10-Q form filed with the Securities and Exchange Commission (SEC), newspaper publisher Lee Enterprises disclosed a "cyber incident" on February 3, 2025, that has resulted in an IT outage and disruption of the company's operations. Lee Enterprises "publishes 77 daily newspapers and 350 weekly and specialty publications in 26 states," and many of its news outlets experienced the effects of the attack, including days of problems with editorial and production applications, sometimes causing delayed or missed publications, as well as problems with reader subscription account access. The company notified its employees on the day of the attack that "data centers hosting applications and services used by Lee employees and media outlets were offline, including its systems for subscriber services," and "call center applications, some phone lines and other core systems, including [the] VPN for remote employees and single sign-on for accessing applications, were inaccessible." At time of this writing, the outages have not been resolved. The exact nature, scope, full impact of the attack, and anticipated recovery timeline have not been disclosed.
The digital news sites still have headers indicating services are undergoing maintenance affecting access to subscription accounts and the electronic edition. The most visible impact to analog subscribers was a loss of printed editions, and publishers are working to print and deliver these back issues. Lee Enterprises is not yet claiming the event is materially impactful but is keeping recovery details close.
SANS Internet StormCast Tuesday, February 11th, 2025
7zip and MoW; Apple 0-Day Fix; AMD Microcode Overwrite; Trimble CityWorks 0-Day; MageCart Update
https://isc.sans.edu/podcastdetail/9318
Reminder: 7-Zip MoW
The MoW must be added to any files extracted from ZIP or other compound file formats. 7-Zip does not do so by default unless you alter the default configuration.
https://isc.sans.edu/diary/Reminder+7Zip+MoW/31668
Apple Fixes 0-Day
Apple released updates to iOS and iPadOS fixing a bypass for USB Restricted Mode. The vulnerability is already being exploited.
https://support.apple.com/en-us/122174
AMD ZEN CPU Microcode Update
An attacker is able to replace microcode on some AMD CPUs. This may alter how the CPUs function and Google released a PoC showing how it can be used to manipulate the random number generator.
https://github.com/google/security-research/security/advisories/GHSA-4xq7-4mgh-gp6w
Trimble Cityworks Exploited
CISA added a recent Trimble Cityworks vulnerability to its list of exploited vulnerabilities.
Google Tag Manager Skimmer Steals Credit Card Info
Sucuri released a blog post with updates to the mage cart campaign. The latest version is injecting malicious code as part of the google tag manager / analytics code.
SANS Internet StormCast Monday, February 10th, 2025
Podcast Anniversary; SSL 2.0; Exposed DeepSeek Installs; Crypto Scam costs
https://isc.sans.edu/podcastdetail/9316
SSL 2.0 Turns 30 This Sunday
SSL was created in February 1995. However, back in 2005, only a year later, SSL 3.0 was released, and as of 2011, SSL 2.0 was deprecated, and support was removed from many crypto libraries. However, over 400k hosts are still exposed via SSL 2.0.
https://isc.sans.edu/diary/SSL+20+turns+30+this+Sunday+Perhaps+the+time+has+come+to+let+it+die/31664
DeepSeek News
Many articles cover various security shortcomings in the Chinese DeepSeek AI model. Remember that some of these issues are not unique to DeepSeek.
https://www.upguard.com/blog/deepseek-adoption
https://www.reversinglabs.com/blog/rl-identifies-malware-ml-model-hosted-on-hugging-face
https://www.wiz.io/blog/wiz-research-uncovers-exposed-deepseek-database-leak
Crypto Wallet Scam Not For Free
Didier looked closer at the recent dual signature crypto scams. These wallets are not free; attackers must spend money to set them up.
https://isc.sans.edu/diary/Crypto+Wallet+Scam+Not+For+Free/31666
Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.
Browse ArchiveWebcast | From Data to Decision: A Look into Babel Street's Cutting-Edge OSINT Solutions February 24, 12:30 pm ET In this webcast, explore how Babel Street empowers commercial enterprises, defense, intelligence, and law enforcement to harness the full potential of multilingual data from public, commercial, and deep/dark web sources, including ultra rare, hard-to-reach sources.
Survey | 2025 SANS SOC Survey: Facing Top Challenges in Security Operations | The goal of this survey is to collect data and deliver a supporting white paper for those looking to establish a new SOC or increase the efficiency and effectiveness of an existing SOC.
Webcast | Securing the Future with Microsoft Defender for Cloud: Best Practices and Insights | March 26, 1:00 ET | Join Dave Shackleford, and Microsoft's Dick Lake, as they explore practical approaches to securing cloud environments.
Webcast: March 4 at 1:00 ET | 2025 ICS Security Budget vs.