Talk With an Expert

Internet Storm Center Tech Corner

Internet Storm Center StormCast Tuesday, March 25, 2025

Privacy Aware Bots; Ingress Nightmare; Malicious File Converters; VSCode Extension Leads to Ransomware

https://isc.sans.edu/podcastdetail/9378

Privacy Aware Bots

A botnet is using privacy as well as CSRF prevention headers to better blend in with normal browsers. However, in the process they may make it actually easier to spot them.

https://isc.sans.edu/diary/Privacy+Aware+Bots/31796

Critical Ingress Nightmare Vulnerability

ingress-nginx fixed four new vulnerabilities, one of which may lead to a Kubernetes cluster compromise. Note that at the time I am making this live, not all of the URLs below are available yet, but I hope they will be available shortly after publishing this podcast

https://www.darkreading.com/application-security/critical-ingressnightmare-vulns-kubernetes-environments

https://www.wiz.io/blog/ingress-nginx-kubernetes-vulnerabilities

https://kubernetes.io/blog/

FBI Warns of File Converter Scams

File converters may include malicious add-ons. Be careful where you get your software from.

https://www.fbi.gov/contact-us/field-offices/denver/news/fbi-denver-warns-of-online-file-converter-scam

VSCode Extension Includes Ransomware

https://x.com/ReversingLabs/status/1902355043065500145

Internet Storm Center StormCast Monday, March 24, 2025

Critical Next.js Vulnerability; Microsoft Trust Signing Platform Abuse

https://isc.sans.edu/podcastdetail/9376

Critical Next.js Vulnerability CVE-2025-29927

A critical vulnerability in how the x-middleware-subrequest header is verified may lead to bypassing authorization in Next.js applications.

https://zhero-web-sec.github.io/research-and-things/nextjs-and-the-corrupt-middleware

https://github.com/vercel/next.js/security/advisories/GHSA-f82v-jwr5-mffw

https://www.runzero.com/blog/next-js/

Microsoft Trust Signing Service Abused

Attackers abused the Microsoft Trust Signing Service, a service meant to help developers create signed software, to obtain short lived signatures for malware.

https://www.bleepingcomputer.com/news/security/microsoft-trust-signing-service-abused-to-code-sign-malware/

View Older Issues

Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.

Browse Archive