SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsAfter denying that a reported March 20, 2025 breach of Oracle Cloud took place, Oracle has now sent emails to customers informing them that "a hacker did access and publish user names" and encrypted or hashed passwords, specifying that the credentials were on "obsolete servers that were never a part of OCI," and therefore that "the Oracle Cloud -- also known as Oracle Cloud Infrastructure or OCI -- has NOT experienced a security breach." Oracle's notification email states that in the specific context of OCI, customer environments, customer data, and cloud service have not been compromised. Multiple news sources have received confirmation of the leaked data's authenticity from Oracle customers. Kevin Beaumont characterized Oracle's response as "wordplay," and asked, "How long was the attacker in the SaaS solution (that Oracle manage)? What did they do with the access? How long were they in for? Why were 'legacy' systems containing customer info left unmanaged and insecure?" Oracle is currently facing a class-action lawsuit over a separate breach of Oracle Health servers, also not publicly acknowledged by the company.
"No, it was an OLD plane that went down. It doesn't count as a crash!" The fastest way to lose trust is half-truths and evasiveness. I'm sure there are some great people doing great work there, but they're not putting their best foot forward.
Clarification of the scope of the breach is helpful. The identities were stolen from the Oracle Cloud Classic (OCC) Oracle Identity Manager (IDM) database which included usernames, emails and hashed passwords. It is positioned as a legacy service, so you should be moving away from it if you are using it, disabling any remaining OCC IDM accounts. If you have an OCI account, which should have a different password from OCC, make sure that you're enforcing MFA.
It would appear that Oracle is 'doubling-down' on their denial of a security breach of their network. If the servers were obsolete, then why not expunge all user data and take them off-line. It speaks to Oracle processes, or lack thereof. Honestly, it's not a good look for Oracle for being a responsible company.
There is an ongoing lawsuit about this. I'm unsure I want to weigh in because I would prefer to look at the court documents to determine what is provided to the judge. Here is what I can tell you: this level of uncertainty may not be good for Oracle overall as it is trying to attract more customers onto its platform.
As we noted last week, both orphan servers and data leak. Whether one calls this risk a "breach" is a matter of semantics. However, by whatever name, the risk must be identified and managed.
BleepingComputer
SecurityWeek
BlueSky
The US Office of the Comptroller of the Currency (OCC) told Congress that a February email system breach is considered a major cybersecurity incident. The breach was initially disclosed on February 26. The updated information provided to Congress says the OCC became aware of the incident on February 11. The breach led to the theft of "highly sensitive information relating to the financial condition of federally regulated financial institutions used in its examinations and supervisory oversight processes." The intruders had access to the email system for more than a year; in all, the incident compromised more than 150,000 emails from bank regulators dating back to 2023.
The attackers had access to OCC email accounts, via compromised administrator accounts, for about 20 months, and the compromise was detected because of unusual interaction between administrator accounts and their mailboxes, which hints that behavior detection capabilities were recently enabled. The takeaway is to both enable behavior detection capabilities, and validate administrator accounts, to include enforcing MFA. Don't forget to not only monitor creation, but also reactivation of accounts.
What's embarrassing is that the evildoer maintained persistence for over a year. It makes one wonder about the security controls in place, and oversight provided by the security staff. Let's worry less about who the threat actor is, and more on overhauling the security staff and monitoring of critical cybersecurity controls so that it 'happen again.
While often beneath our notice, for most organizations, e-mail is a mission critical application. It is valuable resource requiring necessary protection and an attack vector and amplifier. Let this report be a warning.
Bloomberg
Nextgov
Cyberscoop
The Record
OCC
In the wake of funding cuts affecting the Multi-State Information Sharing and Analysis Center (MS-ISAC), the Center for Internet Security (CIS) has said they will provide temporary gap funding so MS-ISAC can continue providing services to state and local governments. MS-ISAC has more than 18,000 members, who receive services that include "network intrusion detection, a malicious domain blocking and reporting service, endpoint detection and response, a cybersecurity self-assessment program and a 24/7 security operations center."
The MS-ISAC does wonderful work helping defend SLTTs who simply don't have the bench to do it all themselves. I sincerely hope they're able to continue their important work indefinitely!
Along with the FS-ISAC, the MS-ISAC has been a leader, effective and useful. A new funding model should be found. My understanding is that the FS-ISAC is funded by subscription by its members.
The core argument was the MS-ISAC functions were overlapping other CISA provided services, and CISA is facing cuts of their own. CIS's funding should last through the end of the fiscal year, allowing time to determine the long-term solution.
Meta has published a security advisory disclosing a "spoofing issue" in WhatsApp Desktop for Windows, fixed as of version 2.2450.6. CVE-2025-30401, CVSS score not yet provided, would allow an attacker to use a maliciously crafted "mismatch" attachment to cause the recipient to "inadvertently execute arbitrary code rather than view the attachment when manually opening the attachment inside WhatsApp," because the software would display the attachment according to its MIME type, but would select the file opening handler based on the filename extension. The flaw was reported through Meta Bug Bounty Submission by an external researcher. BleepingComputer notes that a similar flaw resulting in unwanted execution of Python and PHP attachments was patched by WhatsApp in July 2024.
CVE-2025-30401 is still getting updates, and currently has a CVSS score of 6.7. Regardless, if you're using the Windows Desktop WhatsApp, update it. While there are not reports of active exploits, WhatsApp has been actively, successfully targeted in the past, as such, you want to review having it on desktops.
Bug bounty programs have been available for well over a decade. They continue to prove their worth in finding critical vulnerabilities in both vendor and government programs. Product owners should not only focus on the immediate vulnerability but take the time to understand the root-cause for the vulnerability and fix it correctly.
BleepingComputer
The US Cybersecurity and Infrastructure Security Agency (CISA) has added five CVEs to their Known Exploited Vulnerabilities (KEV) catalog this week. The vulnerabilities include a use of hard-coded cryptographic key vulnerability in Gladinet CentreStack (CVE-2025-30406); a use-after-free vulnerability in Microsoft Windows Common Log File System (CLFS) Driver (CVE-2025-29824); an authentication bypass vulnerability in CrushFTP (CVE-2025-31161); and two vulnerabilities in Linux kernel: an out-of-bounds read issue (CVE-2024-53150) and an out-of-bounds access issue (CVE-2024-53197). The vulnerabilities have mitigation due dates between April 28 and April 30.
As government agencies go, CISA continues to be efficient and its services essential. Its funding is under pressure as much political as economic. It deserves our support.
The Hacker News
SecurityWeek
The Hacker News
Gov Infosecurity
NVD
NVD
NVD
NVD
NVD
CISA
Fortinet has released FortiSwitch updates to address "an unverified password change vulnerability [CWE-620] in FortiSwitch GUI [that] may allow a remote unauthenticated attacker to modify admin passwords via a specially crafted request." The issue was discovered internally. The flaw affects multiple versions of FortiSwitch; users are urged to update to versions 6.4.15, 7.0.11, 7.2.9, 7.4.5, or 7.6.1. For users unable to update immediately, Fortinet suggests a workaround that involves "disable[ing] HTTP/HTTPS access from administrative interfaces [and] configure[ing] trusted hosts to limit the hosts that can connect to the system."
The Hacker News
BleepingComputer
HIPAA Journal
Help Net Security
FortiGuard
NVD
On Tuesday, April 8, Microsoft released fixes for more than 120 security issues across their product line. Eleven of the vulnerabilities included in the April release are rated critical. Among the issues addressed this month is a zero-day vulnerability: a high-severity use-after-free issue in Windows Common Log File System (CLFS) Driver that can lead to local privilege elevation (CVE-2025-29824).
SANS ISC
KrebsOnSecurity
SecurityWeek
The Register
Help Net Security
NVD
MSRC
Tuesday, April 8 also saw security updates from many other vendors, including Adobe, which patched 30 vulnerabilities in ColdFusion, 11 critical, as well as multiple vulnerabilities in a variety of products; Ivanti, which addressed six vulnerabilities in Endpoint Manager; VMware, which addressed vulnerabilities in Tanzu Greenplum and Tanzu Greenplum Backup; Zoom; Google Chrome; Siemens; Schneider Electric; Rockwell Automation, and ABB.
In case you were distracted by the Microsoft patch set, don't overlook all your browsers (Edge, Chrome, Firefox, etc.) and Adobe products, which addresses 54 flaws. Don't forget to review Apple's updates March 31 and April 1st. With spring break, make sure things didn't (or don't) get missed or postponed.
https
Security Week
Security Week
Adobe
Ivanti
Zoom
ChromeReleases
Researchers at SentinelOne's SentinelLABS have observed a spam campaign targeting small and medium-size business websites' contact forms and chat widgets, using the chat API for OpenAI's gpt-4o-mini model to generate customized text, then automating sending large quantities of messages using the AkiraBot framework. The researchers note that "the use of LLM-generated content likely helps these messages bypass spam filters, as the spam content is different each time a message is generated. The framework also rotates which attacker-controlled domain is supplied in the messages, further complicating spam filtering efforts." OpenAI has disabled the API key involved and is continuing to investigate; SentinelLABS recommends using the set of rotating attacker-controlled domains as indicators of compromise and blocking them, as the content of the messages is not consistent.
I don't think a marketing campaign exists without ChatGPT involvement. Legit or not.
Evildoers will always use the tools available to them to carry out their crime. GenAI simply automates the process and expertly gets around the capabilities of spam filters. Those evildoers innovate just like defenders; some would say, even more quickly. The best defense remains implementation of a cybersecurity framework, like IG1 of the CIS Critical Security Controls.
Tools are neutral; most are subject to abuse and misuse. My Dad had a high speed grinder mounted on his work bench. When I was six or seven, I used it to sharpen one of his screw drivers to a sharp edge. Now ninety, I still remember his craftsman's respect for his tools.
Europol has published a report that "identifies potential ways of exploiting vulnerabilities, thus enabling law enforcement agencies to update their systems and detect such incidents during investigations." In addition to describing attack scenarios for a variety of biometric protections, the report offers mitigation suggestions, including raising awareness within law enforcement, adopting advanced evasion detection techniques, ensuring that biometric systems have security baked in from the beginning, collaborating with experts, establishing standardized reporting and data aggregation, and ensuring that data are processed securely. The report was created as a collaborative effort by Europol's Operational and Analysis Centre and the Europol Innovation Lab.
When was the last time you reviewed the risks around biometric authentication, particularly factoring in masks, deep fakes, voice replay, and artificial fingerprints? This report goes into great depth on how the biometrics are faked, and while directed towards law enforcement, includes risks and mitigations you may not have considered. Consider leveraging ISO/IEC 30107-3 when evaluating biometric systems with presentation attack detection capabilities.
These are not so much vulnerabilities as they are fundamental limitations of the technologies. Biometrics are much more about convenience than security but may be useful as evidence in systems of strong authentication. Even here they must be implemented in such a way as to compensate for these fundamental limitations such as counterfeiting or capture and replay.
Major industrial sensor manufacturer Sensata Technologies has filed an 8-K form with the US Securities and Exchange Commission (SEC) disclosing a "ransomware incident" involving encryption of company devices and theft of files, that took place on April 6, 2025, impacting "operations, including shipping, receiving, manufacturing production," and support functions, with no timeline given for full restoration of services. Interim measures are in place to maintain certain functions, and on learning of the attack Sensata proactively took its network offline, implementing response protocols and containment measures; third-party cybersecurity professionals are assisting with ongoing investigation. The company will notify individuals and regulatory authorities after reviewing the files that were accessed and stolen. The company does not currently expect the incident to have a material financial and operational impact between now and June 30, 2025.
Even large, well-resourced companies fall victim to ransomware attacks. In this case, a classic double-extortion ransom play. Once the investigation is complete it would be helpful to understand what security controls were in place and what was the root-cause of the successful attack. However, given the legalese in their 8-K filing, it's doubtful the company will be as forthcoming on those type of details. I do give them some props, however, for at least mentioning 'ransomware' in the filing.
SANS Internet Storm Center StormCast Friday, April 11, 2025
Network Infraxploit; Windows Hello Broken; Dell Update; Langflow Exploit
https://isc.sans.edu/podcastdetail/9404
Network Infraxploit
Our undergraduate intern, Matthew Gorman, wrote up a walk-through of
CVE-2018-0171, an older Cisco vulnerability, that is still actively being
exploited. For example, VOLT TYPHOON recently exploited this problem.
https://isc.sans.edu/diary/Network+Infraxploit+Guest+Diary/31844
Windows Update Issues / Windows 10 Update
Microsoft updated its "Release Health" notes with details regarding issues
users experiences with Windows Hello, Citrix, and Roblox. Microsoft also released an emergency update for Office 2016 which has stability problems after applying the most recent update.
https://learn.microsoft.com/en-us/windows/release-health/windows-message-center#3521
Dell Updates
Dell releases critical updates for its Powerscale One FS product. In particular, it fixes a default password problem.
Langflow Vulnerability (possible exploit scans sighted) CVE-2025-3248
Langflow addressed a critical vulnerability end of March. This writeup by Horizon3 demonstrates how the issue is possibly exploited. We have so far seen one "hit" in our honeypot logs for the vulnerable API endpoint URL.
SANS Internet Storm Center StormCast Thursday, April 10, 2025
Getting Past PyArmor; CenterStack RCE; Android 0-Day Patch; VMware Tanzu Patches; Odd Win11 Directory; WhatsApp File Confusion; SANS AI Guide
https://isc.sans.edu/podcastdetail/9402
Getting Past PyArmor
PyArmor is a python obfuscation tool used for malicious and non-malicious software. Xavier is taking a look at a sample to show what can be learned from these obfuscated samples with not too much work.
https://isc.sans.edu/diary/Obfuscated+Malicious+Python+Scripts+with+PyArmor/31840
CentreStack RCE CVE-2025-30406
GladinetÕs CentreStack secure file-sharing software suffers from an inadequately protected machine key vulnerability that can be used to modify ViewState data. This vulnerability may lead to remote code execution, which is already exploited.
https://gladinetsupport.s3.us-east-1.amazonaws.com/gladinet/securityadvisory-cve-2005.pdf
Google Patches two zero-day vulnerabilities CVE-2024-53150 CVE-2024-53197
Google released its monthly patches for Android. Two of the patched vulnerabilities are already exploited. One of them was used by Serbian law enforcement.
Broadcom VMWare Tenzu Updates
Broadcom released updates for VMWare Tenzu. Many vulnerabilities affect the backup component and allow for arbitrary command execution.
https://support.broadcom.com/web/ecx/security-advisory?
Windows 11 April Update ads inetpub directory
The April Windows 11 update appears to create a new /inetpub directory. It is unclear why, and removing it appears to have no bad effects.
WhatsApp File Type Confusion/Spoofing
WhatsApp patched a file type confusion vulnerability. A victim may be tricked into downloading an executable disguised as an image
https://www.whatsapp.com/security/advisories/2025/
SANS Critical AI Security Guidelines
https://www.sans.org/mlp/critical-ai-security-guidelines
SANS Internet Storm Center StormCast Wednesday, April 9, 2025
Microsoft Patch Tuesday; Adobe Patches; OpenSSL 3.5 with PQC; Fortinet FortiSwitch
https://isc.sans.edu/podcastdetail/9400
Microsoft Patch Tuesday
Microsoft patched over 120 vulnerabilities this month. 11 of these were rated critical, and one vulnerability is already being exploited.
https://isc.sans.edu/diary/Microsoft+April+2025+Patch+Tuesday/31838
Adobe Updates
Adobe released patches for 12 different products. In particular important are patches for ColdFusion addressing several remote code execution vulnerabilities. Adobe Commerce got patches as well, but none of the vulnerabilities are rated critical.
https://helpx.adobe.com/security/security-bulletin.html
OpenSSL 3.5 Released
OpenSSL 3.5 was released with support to post quantum ciphers. This is a long term support release.
https://groups.google.com/a/openssl.org/g/openssl-project/c/9ZYdIaExmIA
FortiSwitch Update
Fortinet released an update for FortiSwitch addressing a vulnerability that may be used to reset a password without verification.
Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.
Browse ArchiveSymphony 2025 On Demand | Securing Code to Cloud to SOC: How Palo Alto Networks stays secure in the age of sophisticated cloud attacks Palo Alto Networks leads in cloud innovation, leveraging threat research and a scalable security program.
Webcast | Resiliency and Business Continuity in the Cloud Era | May 22, 1:00 pm ET Join Dave Shackleford and Chris Newman as they discuss: - How cloud use is growing and changing, with some emphasis on zero trust and user access strategies - The types of security controls most organizations have implemented in the cloud - Changing compliance and regulatory requirements - Why-and how-we need to rethink business continuity to ensure consistent coverage, even when outages occur Save your seat today.
Survey | 2025 SANS AI Survey: AI and Its Growing Role in Cybersecurity AI & Cybersecurity Leaders: Your Input is Needed.
Webcast | SANS 2025 CTI Survey Webcast & Forum: Navigating Uncertainty in Today's Threat Landscape | May 21, 10:30 am ETAs the cyber threat landscape continues to evolve, the past year has presented unique challenges and opportunities for cyber threat intelligence professionals.