Talk With an Expert

Internet Storm Center Tech Corner

SANS Internet Storm Center StormCast Tuesday, July 29, 2025

Parasitic SharePoint Exploits; Cisco ISE Exploit; MyASUS Vuln

https://isc.sans.edu/podcastdetail/9546

Parasitic SharePoint Exploits

We are seeing attacks against SharePoint itself and attempts to exploit backdoors left behind by attackers.

https://isc.sans.edu/diary/Parasitic+Sharepoint+Exploits/32148

Cisco ISE Vulnerability Exploited

A recently patched vulnerability in Cisco ISE is now being exploited. The Zero Day Initiative has released a blog detailing the exploit chain to obtain code execution as an unauthenticated user.

https://www.zerodayinitiative.com/blog/2025/7/24/cve-2025-20281-cisco-ise-api-unauthenticated-remote-code-execution-vulnerability

MyAsus Vulnerability

The “MyAsus” tool does not store its access tokens correctly, potentially providing an attacker with access to sensitive functions

https://www.asus.com/content/security-advisory/

SANS Internet Storm Center StormCast Monday, July 28, 2025

Linux Namespaces; UI Automation Abuse; Autoswagger

https://isc.sans.edu/podcastdetail/9544

Linux Namespaces

Linux namespaces can be used to control networking features on a process-by-process basis. This is useful when trying to present a different network environment to a process being analysed.

https://isc.sans.edu/diary/Sinkholing+Suspicious+Scripts+or+Executables+on+Linux/32144

Coyote in the Wild: First-Ever Malware That Abuses UI Automation

Akamai identified malware that takes advantage of Microsoft’s UI Automation Framework to programatically interact with the user’s system and steal credentials.

https://www.akamai.com/blog/security-research/active-exploitation-coyote-malware-first-ui-automation-abuse-in-the-wild

Testing REST APIs with Autoswagger

The tool Autoswagger can be used to automate the testing of REST APIs following the OpenAPI/Swagger standard.

https://github.com/intruder-io/autoswagger/

View Older Issues

Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.

Browse Archive