SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsOn August 11, 2025, Researchers from Palo Alto Networks (PAN) published a blog post on their observation of attacks exploiting a maximum-severity flaw discovered and patched in April 2025, which affects the Erlang programming language's Open Telecom Platform (OTP) libraries before versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. CVE-2025-32433, CVSS score 10.0, allows a malicious actor to gain unauthorized access to a system and execute arbitrary commands without valid credentials, by exploiting improper state enforcement by the secure shell (SSH) daemon. PAN notes, "OT and 5G environments use Erlang/OTP due to its fault-tolerance and scalability for high availability systems with minimal downtime," and remote commands are often executed through the native SSH implementation. While the US Cybersecurity and Infrastructure Security Agency (CISA) added the flaw to its Known Exploited Vulnerabilities catalog on June 9, PAN's observation of attacks beginning May 1 is the first public report of exploitation attempts. PAN saw that the education industry was hit hardest, and OT firewalls in healthcare, agriculture, media and entertainment, and high technology were "disproportionately affected." While utilities and energy, mining and aerospace, and defense sectors did not return detections, PAN analyzes this not as safety but "as potential evidence of detection weakness or delayed targeting." PAN provides analysis of the payloads, vulnerable attack surface, and distribution of exploitation attempts by geography, timing, industry, and correlation with OT firewalls, noting that "a significant number of OT firewalls are exposed to the internet." The researchers recommend applying current security patches, updating signatures in intrusion prevention systems, and monitoring environments closely, possibly also disabling the SSH server or restricting access with firewall rules if patching is not immediately possible.
Odds are you’re not going to be able to update your OT systems quickly, so make sure the entry points are secured. Make sure you only allow authorized devices to connect. Use external firewalls, not rules on the device itself. Make sure you have a confirmed window to apply the updates.
A CVSS score of 10.0 moves the vulnerability to the top of the evildoer's queue. The blog post validates that fact.
We continue to confuse the availability of a patch with its application. Timeliness requires both.
Palo Alto Networks
Dark Reading
SecurityWeek
The US Cybersecurity and Infrastructure Security Agency (CISA), along with several other US federal agencies and cybersecurity agencies in Australia, Canada, Germany, the Netherlands, and New Zealand, has published Operational Technology (OT) asset cybersecurity guidance for owners and operators. CISA writes, "This guidance ... provide[s] ... a systematic approach for creating and maintaining an OT asset inventory and supplemental taxonomy—essential for identifying and securing critical assets, reducing the risk of cybersecurity incidents, and ensuring the continuity of the organization's mission and services." Attacks against OT systems have been on the rise: in 2024, Dragos observed an 87 percent increase in "ransomware attacks against industrial organizations" over the previous year. And a new report from Dragos and the Marsh McLennan’s Cyber Risk Intelligence Center estimates "that indirect losses — often unaccounted for in traditional models — impact up to 70% of OT-related breaches, with worst-case scenarios estimating as much as $329.5 billion in global financial risk."
OT is no longer set it and forget it, and they are an active target. You need to not only have it in your asset inventory but also monitor and protect it while maintaining physical and logical separation. That means you are going to need to have talks with those system owners. Don’t forget to talk about ways to jointly qualify new systems and components, odds are you’re going to have sensors and other components reporting from odd, possibly remote locations, and you should know how they communicate. To be honest, OT is pretty cool and having at least one expert on your team will pay off.
The OT engineers and the Cybersecurity engineers need to share a common codebook to make their communications effective and efficient. Perhaps this is a step in that direction.
The Register
CISA
CISA
Manufacturers Alliance
SCWorld
BusinessWire
Dragos
On Tuesday, August 12, Microsoft released updates to address more than 100 vulnerabilities across their product lines. Of those, more than a dozen are rated critical. A moderate-severity privilege elevation vulnerability in the Windows Kerberos network authentication protocol (CVE-2025-53779) was previously publicly known. Adobe also released multiple updates this week to address nearly 70 vulnerabilities in Adobe Commerce, Illustrator, Photoshop, Animate, InDesign, InCopy and other products. Other vendors issuing updates this week include SAP (19 security notes, including three critical flaws affecting the SAP S/4 HANA ERP system); Intel (34 advisories addressing more than 60 vulnerabilities); and Google (updates for Android to address a pair of actively exploited Qualcomm vulnerabilities).
Don't overlook the Android updates, as the Qualcomm flaws are important to resolve. Keep an eye out for updates to SOC flaws; consider these computers in their own right with their own OS (firmware) which needs to be kept updated.
ISC SANS
Krebs on Security
The Hacker News
SecurityWeek
The Register
Adobe
SecurityWeek
SCWorld
SecurityWeek
The State of New York's Attorney General is suing Zelle parent company Early Warning Services, LLC (EWS), over alleged poor cybersecurity in the electronic payment app that led to fraud. Over the last decade, electronic payment apps began to take a noticeable bite out of consumer transactions that had once been the purview of banks. According to the complaint, "Defendant Early Warning Services, LLC, or EWS, an entity created by a group of the largest banks in the United States, was called upon to address this competitive threat. EWS developed Zelle, a service that provided banks’ customers with access to a new, instant-payment network, referred to herein as the Zelle network. EWS hurried Zelle to market in an effort to fend off increasing competition from Venmo, Paypal, and newer entrants like Cash App." Zelle was launched in June 2017. Access to the Zelle network was easy, requiring only an email address or mobile number and a bank account or debit card number. Zelle allowed users to sign up multiple times, and to link multiple mobile numbers and email addresses to accounts. At some financial institutions, Zelle was automatically integrated into offered mobile and online banking services. By the beginning of 2019, it was evident that Zelle fraud was a problem. In mid 2019, "EWS ... developed and proposed a suite of modest, yet critical, security enhancements and changes to the rules governing the Zelle network that, working in combination, would reduce fraud over the Zelle network," but these were abandoned. This decision, combined with lax enforcement and knowing violations of banks' network rules, "caused catastrophic harm to millions of consumers." EWS finally adopted the security measures in 2023, and the effect was "immediate and immense": a significant decrease in fraudulent transactions on the Zelle network. The complaint alleges that EWS adopted the measures in 2023 "in response to outside pressure from the Senate and the Consumer Financial Protection Bureau." The lawsuit seeks restitution and damages for six years of EWS failing to take adequate steps to prevent fraudulent transactions on Zelle. During that time, more than $1 billion was stolen from consumers through the app.
The key quote in the complaint is: “A quick registration process and lack of verification made infiltration easy.” Allowing unverified access to your bank accounts was obviously NOT an advertised “feature.” The Zelle app has been shut down, though the service continues with some of the long-delayed security improvements, but Zelle continued to book profits even as customers continued have fraud impact their bank accounts. Since other states will likely file similar lawsuits, this is a good case study to convince management that building in security is always more profitable than putting customers at risk.
Zelle fraud has been an issue since they started, largely due to insufficient validation of users when signing up. Initially there was no recourse for fraud, including reports that those defrauded were referred to the fraudsters themselves to recover their money. EWS took steps to improve, and 99.5% of Zelle transactions have no problems. The CFPB and Senate can be powerful motivators for change. With the rise of online payment options - Zelle, CashApp, PayPal, Venmo, etc. make sure you know what the support organization is, including fraud, and understand their security, to make sure the risk is acceptable to you.
The US financial sector typically manages financial risk based on a dollar threshold. If the threshold is hit, they take action, if not, it’s an acceptable risk. EWS claims a 99.95% success rate, which appears to be in their acceptable risk range, but not what the NYS AG would claim as reasonable cybersecurity.
On August 12, 2025, Fortinet published a security advisory urging users to patch FortiSIEM (Security Information and Event Management) to fix a critical vulnerability affecting FortiSIEM versions 7.3.0 through 7.3.1, 7.2.0 through 7.2.5, 7.1.0 through 7.1.7, 7.0.0 through 7.0.3, and before 6.7.9. CVE-2025-25256, CVSS score 9.8, allows an unauthenticated attacker to execute unauthorized code or commands using crafted command-line interface requests, due to improper neutralization of special elements used in an OS command. Practical exploit code that does not appear to produce distinctive indicators of compromise has been found in the wild, but Fortinet does not mention active exploitation. Researchers at GreyNoise observed a sudden high volume of brute-force traffic targeting Fortinet SSL VPNs on August 3, 2025, noting that research shows "spikes like this often precede the disclosure of new vulnerabilities affecting the same vendor." Fortinet customers must upgrade to a fixed version, with a possible workaround of limiting access to the phMonitor port (7900).
This flaw can be exploited anonymously and doesn’t appear to have a high level of complexity. Block access to port 7900, then get the update deployed. As of late there aren’t any flaw specific IoCs, so you’re going to need to rely on your existing monitoring to detect malicious activity.
Fortinet
GreyNoise
BleepingComputer
The Register
Dark Reading
The Hacker News
Both Zoom and Xerox have released security bulletins addressing vulnerabilities in their products, with one critical flaw each. Zoom's flaws affect Zoom clients for Windows including versions of Zoom Workplace, Zoom Workplace VDI, Zoom Rooms, Zoom Rooms Controller, and Zoom Meeting SDK. CVE-2025-49457, CVSS score 9.6, allows an unauthenticated user to escalate privileges via network access due to an untrusted search path. CVE-2025-49456, CVSS score 6.2, allows an unauthenticated user to impact application integrity via local access due to a race condition in the installer. The former was reported by Zoom Offensive Security, and the latter by sim0nsecurity. Xerox's flaws affect FreeFlow Core before version 8.05. CVE-2025-8356, CVSS score 9.8, allows an unauthorized attacker to run arbitrary commands on the system due to a path traversal vulnerability that allows unauthorized access to files on the server. CVE-2025-8355, CVSS score 7.5, allows an attacker to cause a Server-Side Request Forgery (SSRF) by crafting a malicious XML containing references to internal URLS, due to improper handling of XML input that allows external entity injection. Both Xerox flaws were discovered and disclosed to Xerox by Jim Sebree from Horizon3.ai in late June 2025, and patches were released on August 8. Users of both companies' products should update to the latest available software versions.
You may want to push out the known good Zoom update rather than waiting on end users to deploy it. This flaw is specific to the windows version, but make sure all your Zoom clients are updated anyway.
The Hacker News
Zoom
Zoom
Heise
Xerox
Horizon3.ai
SecurityWeek
The US Cybersecurity and Infrastructure Security Agency (CISA) has added two flaws to its Known Exploited Vulnerabilities (KEV) catalog, both in N-able's network management platform N-central before version 2025.3.1. Both flaws carry CVSS score 9.4: CVE-2025-8875 allows local execution of code due to deserialization of untrusted data, and CVE-2025-8876 allows OS command injection due to improper input validation. N-able's security update, published the same day as CISA's alert, notes that the vulnerabilities require authentication to exploit. In statements to news sources, N-able confirmed that exploitation took place "in a limited number of on-premises environments," with no evidence of exploitation in cloud environments. CISA requires Federal Civilian Executive Branch (FCEB) agencies to update to N-central 2025.3.1 by August 20, and urges all organizations to patch immediately, warning that "these types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise."
August is a busy patch month. And the 20th is right around the corner. Rest assured, attackers aren’t just going to probe agency systems for these flaws. While these require authentication to exploit, don’t assume that is a sufficient barrier to entry unless you’ve got good MFA for all accounts. Also make sure you’re using N-central’s ability to forward audit logs to your central syslog server.
CISA
N-able
SecurityWeek
BleepingComputer
The Hacker News
Dark Reading
Italy's Agenzia per l'Italia Digitale (AGID) says cyber threat actors have been targeting hotels in that country through their booking systems, stealing data and offering it for sale. At least 10 hotels have been affected by the campaign; the compromised data are high-resolution scans of documents, such as passports, which were provided to prove identity when checking in to the hotels. CERT-AgID "intercepted an illegal sale of identity documents stolen from hotels operating in Italy." The cache of data is believed to contain information belonging to tens of thousands of individuals. The data were stolen between June and August 2025. Italy's Data Protection Authority has launched an investigation.
The current guidance is to check with your hotel to see if they’ve been breached. In Italy, and most countries outside the US, you’re required to present your passport for all parties to check-in; in the US, we are prompted for a driver’s license, which is scanned/recorded and reported. The security of that process is out of your control and opting out is not an option. While passports themselves are being updated with increased security, most systems outside Customs take the number and associated data without checking for the security of the original document. As I sit here waiting to board my plane home from Rome, it occurs to me that this is another reason to have your credit locked and monitored proactively.
Yet another example of information being collected, stored, and… pilfered. It’s not just an Italian problem. I just rented jet skis. Yep, they took a picture of my driver’s license, uploaded to some application, stored who knows where, for who knows how long? We now have digital wallets, but someone will want to charge you to access/process. Simple copying (err photocopying) is free. Identity theft will continue to be a problem.
One sure way of protecting data from disclosure is to erase it at the end of its use. Retention of data "just in case" is an unnecessary risk of leakage and damage to the brand.
CBC News obtained an internal memo indicating that Canada's House of Commons experienced a cybersecurity breach late last week. According to the communication, "a malicious actor was able to exploit a recent Microsoft vulnerability to gain unauthorized access to a database containing information used to manage computers and mobile devices." The threat actor stole or accessed non-publicly available information, including data related to House of Commons employees' work-related computers and mobile devices.
Whether the attackers exploited the recent SharePoint flaw, CVE-2025-53770, or the Exchange flaw, CVE-2025-53786, is not as important as making sure you’ve applied the fixes if you have on-premises SharePoint or hybrid Exchange. Then make sure that both your asset databases and device management systems are properly secured; this attack reminds us these are targets too.
It usually comes down to a race between the evildoer and the IT team that performs patch management. Unfortunately, the evildoer was quicker this time, as is often the case. We must, must find a way to automate patch management, else the cycle will continue.
Historically attacks against government have targeted the executive. However, we are now seeing successful attacks against legislatures and courts. Not clear what the motive is, but the risk is increasing and requires a response.
SANS Internet Storm Center StormCast Friday, August 15, 2025
Analysing Attack with AI; Proxyware via YouTube; Xerox FreeFlow Vuln; Evaluating Zero Trust @SANS_edu
https://isc.sans.edu/podcastdetail/9572
AI and Faster Attack Analysis
A few use cases for LLMs to speed up analysis
https://isc.sans.edu/diary/AI+and+Faster+Attack+Analysis+Guest+Diary/32198
Proxyware Malware Being Distributed on YouTube Video Download Site
Popular YouTube download sites will attempt to infect users with proxyware.
https://asec.ahnlab.com/en/89574/
Xerox Freeflow Core Vulnerability
Horizon3.ai discovered XXE Injection (CVE-2025-8355) and Path Traversal (CVE-2025-8356) vulnerabilities in Xerox FreeFlow Core, a print orchestration platform. These vulnerabilities are easily exploitable and enable unauthenticated remote attackers to achieve remote code execution on vulnerable FreeFlow Core instances.
https://horizon3.ai/attack-research/attack-blogs/from-support-ticket-to-zero-day/
SANS.edu Research: Darren Carstensen Evaluating Zero Trust Network Access: A Framework for Comparative Security Testing
Not all Zero Trust Network Access (ZTNA) solutions are created equal, and despite bold marketing claims, many fall short of delivering proper Zero Trust security.
SANS Internet Storm Center StormCast Thursday, August 14, 2025
Equation Editor; Kerberos Patch; XZ-Utils Backdoor; ForitSIEM/FortiWeb patches
https://isc.sans.edu/podcastdetail/9570
CVE-2017-11882 Will Never Die
The (very) old equation editor vulnerability is still being exploited, as this recent sample analyzed by Xavier shows. The payload of the Excel file attempts to download and execute an infostealer to exfiltrate passwords via email.
https://isc.sans.edu/diary/CVE201711882+Will+Never+Die/32196
Windows Kerberos Elevation of Privilege Vulnerability
Yesterday, Microsoft released a patch for a vulnerability that had already been made public. This vulnerability refers to the privilege escalation taking advantage of a path traversal issue in Windows Kerberos affecting Exchange Server in hybrid mode.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53779
Persistent Risk: XZ Utils Backdoor Still Lurking in Docker Images
Some old Debian Docker images containing the xz-utils backdoor are still available for download from Docker Hub via the official Debian account.
https://www.binarly.io/blog/persistent-risk-xz-utils-backdoor-still-lurking-in-docker-images
FortiSIEM / FortiWeb Vulnerabilities
Fortinet patched already exploited vulnerabilities in FortiWeb and FortiSIEM
https://fortiguard.fortinet.com/psirt/FG-IR-25-152 (CVE-2025-25256)
https://fortiguard.fortinet.com/psirt/FG-IR-25-448 (CVE-2025-52970)
SANS Internet Storm Center StormCast Wednesday, August 13, 2025
Microsoft Patch Tuesday; libarchive vulnerability upgrade; Adobe Patches
https://isc.sans.edu/podcastdetail/9568
Microsoft Patch Tuesday
https://isc.sans.edu/diary/Microsoft+August+2025+Patch+Tuesday/32192
https://cymulate.com/blog/zero-click-one-ntlm-microsoft-security-patch-bypass-cve-2025-50154/
libarchive Vulnerability
A libarchive vulnerability patched in June was upgraded from a low CVSS score to a critical one. Libarchive is used by compression software across various operating systems, making this a difficult vulnerability to patch
https://www.freebsd.org/security/advisories/FreeBSD-SA-25:07.libarchive.asc
Adobe Patches
Adobe released patches for 13 different products.
Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.
Browse ArchiveBeyond VirusTotal: Modern Threat Intelligence Without the Google Price Tag 10x the threat intelligence at a lower cost? Yup. See how ReversingLabs delivers deeper threat intel, flexible deployment, and transparent pricing - without forced bundles or vendor lock-in. Discover the smarter alternative to VirusTotal.
One unchecked box. No MFA. A massive breach. Fable uses adtech precision to stop risky actions in the moment—before they become headlines.
Webcast | SANS Cloud Security Exchange 2025 | Thursday, August 21, 2025 at 10:30AM ET Amazon, Google, & Microsoft are joining forces to deliver you the ultimate cloud strategy and insights experience, presented to you by their leading experts. Available to you live and recorded.
Webcast | Full Packet Capture as a Strategic and Regulatory Imperative | Monday, September 8, 2025 at 1:00 PM ET Join SANS Certified Instructor Matt Bromiley to learn how to strategically deploy FPC to meet mandates, enhance investigations, and strengthen Zero Trust.