SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsOn Wednesday, November 12, 2025, the US Cybersecurity and Infrastructure Security Agency (CISA) issued an update to a September emergency directive, to warn that federal agencies have incorrectly reported Cisco Secure Adaptive Security Appliance (ASA) and Firepower devices as patched against two actively exploited flaws. "CISA has identified devices marked as “patched” in the reporting template, but which were updated to a version of the software that is still vulnerable to the threat activity outlined in the ED." CISA mandates that agencies address the flaws immediately and implement additional temporary risk mitigation instructions if still in the process of complying. The update emphasizes that "agencies [must] update ALL ASA and Firepower devices, not just public-facing devices, to the latest patch immediately to avoid exploitation," and provides tables showing appropriate fixed software versions to ensure patches for both flaws — CVE-2025-20333 (remote code execution, CVSS 9.9) and CVE-2025-20362 (privilege escalation, CVSS 6.5) — are installed. Cisco published new advisories for the flaws on November 6 due to a newly observed attack, noting that the flaws had been exploited since May 2025.

When applying mitigations to a threat like this, don't stop with just your Internet-facing devices. Update internal and standalone devices as well. Be sure to follow the core dump and hunt instructions from CISA on your Internet-facing devices, regardless of your requirement to follow the ED.

You know what’s wild about this story? Not that there was a vulnerability in a Firewall — we have seen those, especially when you're talking about APT groups and their sophistication — no, what’s wild about this story is that these firewalls were first manufactured (announced), at least on the 5585-X side of the house, back in 2010. So, there is a real possibility that someone has been running the same firewall for 15 years at this point. Add to that the fact that even though the last day of support was in May, Cisco continued to patch various firmware against this attack for an older device. Then fast forward 6 months after disclosure, active exploitation, and patch release, and we still have devices that remain unpatched. I’m not sure what to make of this, but if there were a private company trying to claim cyber insurance for this, I think their insurance would drop them. This tells the attacker groups out there, don’t worry about 0 days, you can get by with N+X years by now and be OK.

Dealing with these CVEs demonstrates the limitation of patching as a strategy. Completeness is more important than timeliness but we hardly ever achieve either.
CISA
CISA
The Record
TechCrunch
MeriTalk
BleepingComputer
SecurityWeek
The UK Cybersecurity and Resilience Bill was introduced in Parliament earlier this week. The legislation "will reform and add to the existing Network and Information Systems (NIS) Regulations 2018, to increase UK defences against cyber attacks." The NIS Regulations apply to certain sectors of the UK economy, such as energy transportation, healthcare, drinking water, and digital infrastructure, as well as online marketplaces, search engines, and cloud computing services. The Cybersecurity and Resilience Bill is intended to expand the scope of the NIS Regulations to include data centers, managed service providers, large load controllers, and designated critical suppliers. It will require critical infrastructure operators to report "harmful cyber breaches ... to regulators, where they have the potential to cause significant impacts, with initial notification within 24 hours and a fuller report within 72 hours." Additionally, “if a data centre, or digital and managed service providers face a significant or potentially significant attack, they will have to notify customers which are likely to be impacted promptly so organisations can act fast to protect their business, people and services.”

Critical services will be expected to notify of attacks promptly, to include more timely notification of affected customers, which one hopes will shorten the breach-to-notification interval. Moreover, the bill introduces mandatory cybersecurity standards, which when fully adopted will help reduce the likelihood of successful compromise. The bill includes three levels of fines for non-compliance depending on severity: non-material contraventions at £1 million, material contraventions at £8.5 million and material contraventions resulting in significant impact or risk to services at £17 million as well as provisions for cost recovery, which should be the carrots and sticks needed for adoption.
An important piece of legislation for the UK and possibly a blueprint for other nations. Increased focus on critical infrastructure is required and has been for over a decade. Increasingly, both nation-state and cyber criminals are targeting the infrastructure that provides critical services to citizens. The one gap is requiring a minimum cybersecurity baseline for all sectors and providing an annual assessment of their resilience against attack.
BleepingComputer
Help Net Security
Bank Infosecurity
Industrial Cyber
UK Government
UK Government
UK Government
Google LLC has filed a complaint in a New York district court seeking injunctive relief and damages against 25 unnamed defendants believed to be based in China, who allegedly manage "a powerful phishing software kit" known as "Lighthouse." Offered by subscription in both SMS and e-commerce versions, Lighthouse includes hundreds of templates for fraudulent websites mimicking legitimate pages. The filing notes a focus on US targets, including a number of spoofed websites for US institutions such as "toll collection agencies, financial institutions, shipping companies, retail companies, and even state and local governments." The SMS version "enables scammers to distribute mass text messages to thousands of targets." The e-commerce version distributes lures primarily via ads and social media, and includes spoofed site templates aimed at stealing financial information, as well as a tool for creating new fraudulent sites or malicious storefronts on legitimate platforms. Lighthouse notifies its users if sites are flagged by Google or by browsers, and mimics MFA protection to deceive the target into confirming their payment card being added to a threat actor's digital wallet. Google alleges that a network of threat actor groups "connected to one another through historical and current business ties" collaborates to generate revenue using Lighthouse; various branches focus on development, data brokering, spamming, theft, money laundering, and administration, coordinating through Telegram. The complaint describes known phishing schemes spoofing sites for parcel delivery, road tolls and tickets, financial institutions, and e-commerce sites. The legal basis of the complaint is harm done to Google's customer trust and goodwill, because "at least 116 spoofed website templates featur[e] Google’s branding or logos (YouTube, Gmail, Google, or Google Play) on the sign-in screen in an attempt to make the fake websites appear legitimate." The filing alleges violation of the Racketeer Influenced and Corrupt Organizations (RICO) Act, the Lanham Act, and the Computer Fraud and Abuse Act, calling for judgment including injunctions, relief, and damages.

Google spent over $10M in Q3 2024 alone, fighting California proposed legislation that might impact its ability to ingest published content, so it is nice to see some expenditure from them aimed at reducing impact to those who view and click on their ads and often get scammed by schemes such as this one. Bad guys profiting from clicks needs to be impeded even if it reduces clicks on legitimate ads.

Google is also implementing new features to detect/block common scam messages, e.g., fake toll fees or package deliveries, and is adding malicious link protection to Google Messenger as well as adding recovery contacts to help victims recover from a successful account takeover/compromise attack. While these features will help raise the bar, be sure to consider the level/type of access you're granting and where Google will store parsed information, doubly so as they are planning to leverage AI.

Google’s 49-page complaint is very well drawn. It contains evidence of violation of specific laws and of damage to Google and the public at large. It seeks a temporary restraining order forbidding specific activity and financial damages. While it is unlikely that foreign national defendants will appear, offer a defense, or otherwise submit to the authority of the court, Google will likely ask for and receive a summary judgement. The cost of this suit is not trivial. While it seems unlikely that Google will receive all the relief and damages that it seeks, it may expect something useful.
An interesting twist by GOOG. Meanwhile companies like GOOG and META make tons of money off fake adverts. Perhaps the legal complaint is a backhanded way to keep the scammers on their platforms. OK, sarcasm aside, it’s highly unlikely that the 25 “Does” will ever see the inside of a US Court.

I’m not sure what the rules are in China around this, but it’s interesting that it was “simple.” I am hoping this demonstrates the ease with which motivated but not-so-sophisticated attackers can start to gain access into environments.
RegMedia
The Register
Ars Technica
SecurityWeek
The Record
WIRED
On Tuesday, November 11, Microsoft released updates to address more than 60 vulnerabilities, including a high-severity Windows kernel flaw (CVE-2025-62215) that is being actively exploited. The US Cybersecurity and Infrastructure Security (CISA) has added this CVE to the Known Exploited Vulnerabilities (KEV) catalog. The batch of Microsoft updates also includes fixes for several critical vulnerabilities, including a heap-based buffer overflow flaw in Microsoft Graphics Component (CVE-2025-60724) and a use-after-free issue in Windows DirectX (CVE-2025-60716). Other vendors have also published security updates this week: Adobe released fixes to address vulnerabilities in InDesign, InCopy, Photoshop, Illustrator, and other products; Cisco released seven security advisories, including one to address critical remote code execution vulnerabilities in Cisco Unified Contact Center Express; and Ivanti released updates for Ivanti Endpoint Manager to address three high-severity vulnerabilities.

Get after your Microsoft, Adobe, Ivanti and Cisco updates. These devices and applications are all targets for exploitable flaws. The Microsoft update addresses more than 80 vulnerabilities, five of which are rated critical. Adobe's updates address multiple flaws in each impacted product, which have CVSS scores from 5.0 to 7.8. Note that both desktop and mobile app versions are impacted, so don't forget to check your mobile devices for updated versions.
SANS ISC
The Hacker News
BleepingComputer
NIST
Adobe
Cisco
Ivanti
SAP has published 26 new or updated security notes, including one for a critical (CVSS 10.0) hard-coded credentials issue in the non-GUI variant of SQL Anywhere Monitor (CVE-2025-42890). "A successful exploit poses the system’s confidentiality, integrity, and availability at high risk. The patch removes the SQL Anywhere Monitor completely. As a temporary workaround, SAP recommends to stop using SQL Anywhere Monitor and to delete any instances of SQL Anywhere Monitor database." Another security note addresses a critical (CVSS 9.9) code injection vulnerability in SAP Solution Manager (CVE-2025-42887); the fix "add[s] an input check that rejects most of the non-alphanumeric characters." SAP has also updated a security note that addresses a critical (10.0) deserialization vulnerability in SAP NetWeaver that was disclosed in October.

Thus far there has been no active exploitation of these flaws. Even so, get those updates moving; you're going to need an active SAP support account to download the fixes and instructions. Note that on SAP's patch day, November 11th, they released 18 new security notes as well as two updates to prior security notes. Note that some updates address multiple issues, so you’re not applying 18 updates for 18 security notes.
Ugh. Another report on a company using hard-coded credentials in a product. It’s a bad practice that must be avoided by software vendors. Both CISA, in their Secure by Design Principles, and NIST, in their Secure Software Development Framework (SSDF, SP 800-218), speak to this practice. Organizations can assess themselves against the SSDF using the recently published CIS Secure by Design: A Guide to Assessing Software Security Practices.
https://www.cisecurity.org/insights/white-papers/secure-by-design
BleepingComputer
SC Media
SAP
Onapsis
Arctic Wolf
NIST
NIST
NIST
This week, the US Cybersecurity and Infrastructure Security Agency (CISA) added four CVEs to the Known Exploited Vulnerabilities (KEV) catalog. In addition to the high-severity heap-based buffer overflow flaw in Microsoft Graphics Component (CVE-2025-60724), CISA added a critical out-of-bounds write vulnerability in WatchGuard Fireware OS (CVE-2025-9242); a critical improper access control flaw in Gladinet Triofox (CVE-2025-12480); and a critical out-of-bounds write in the libimagecodec.quram.so library in Samsung mobile devices (CVE-2025-21042). The vulnerabilities have mitigation due dates of between December 1 and December 3 for Federal Civilian Executive Branch (FCEB) agencies.

WatchGuard updated their original 10/21 report to indicate there are now signs of active exploitation. With CVE-2025-9242 having a CVSS score of 9.8, you really don't want to miss this one. The Triofox flaw, CVE-2025-12480, has a CVSS score of 9.1, so yeah, you're going to be patching, but make sure you read the enhancements/fixes page so you're aware of changes you need to adapt to.
The Hacker News
SC Media
BleepingComputer
NIST
NIST
NIST
NIST
Researchers from Quokka have published a report detailing serious security issues in Android-based network-connected digital picture frame devices running the Uhale app, including Amazon's bestselling digital frame as of March 2025. Quokka determined that many Uhale devices download and execute malware on boot, and possess "relaxed security controls and inadequate server identity verification" allowing local or remote takeover with little or no user interaction, as well as weaknesses that can be chained "to gain initial access, escalate privileges, and maintain persistence." The devices are at risk of malware delivery, remote code execution, unauthorized access to private files and photos, compromise for lateral movement on a network, data exfiltration from networked devices, botnet recruitment, and attempts at phishing, social engineering, and harassment. The researchers note that the studied devices, which all had an estimated sale of "over 30,000 units in recent months," all run EOL Android 6, which "remains prevalent in many budget and kiosk devices," especially in cases where "hardware longevity often outweighs software currency." However, the security issues in the report do not stem from known Android 6 vulnerabilities, but rather from "flawed app implementations and security oversights introduced by OEMs" such as Uhale, and therefore "could just as easily affect devices running newer Android versions if the same insecure practices are followed." In May 2025 Quokka contacted Uhale's parent company ZEASN through multiple channels to attempt responsible disclosure, but received no response. Quokka contends this is "a broader systemic problem in the software development and supply chain processes within this ecosystem of budget-friendly custom-purpose devices," emphasizing "the critical need for rigorous and continuous security assessments in the face of deep fragmentation."

Be alert not only for IoT devices running old, unsupported, OS versions, but also for insecure implementations sitting on a current OS. Consider carefully which network to connect these devices to, if any. For example, while a smart TV has a lot of cool online functions, it will likely outlast the support for its OS, and it's far easier and cheaper to replace an external streaming device (AppleTV, Roku, Amazon Fire TV, Google Chromecast, etc.) than a TV which still works well.
This report highlights two concerns for end-users: 1) The importance of patch management and updating of software; and 2) Security best practices getting dismissed in a rush to get products into the marketplace. The US Trust Mark program and EU Cyber Resilience Act attempt to address both concerns via a labeling scheme that provides consumers with an easy way to identify IoT devices that meet basic cybersecurity requirements, encouraging manufacturers to prioritize security. Now we just need manufacturers to adopt the labeling scheme.

Of course, these devices were never intended to be connected to a public network. We really need "safe use" labelling.
Synnovis, a company that provides pathology services to UK healthcare organizations, has completed a forensic investigation of the 2024 ransomware attack that resulted in the theft of patient data. Synnovis did not pay the demanded ransom, and has "begun notifying the organisations whose data was affected and expect[s] to conclude this process by 21 November 2025." The company does not plan to contact affected individuals directly; instead, the affected healthcare organizations are expected to notify affected patients. There has been no formal estimate of the number of people affected by the incident. The ransomware attack disrupted patient care at numerous NHS healthcare facilities and led to blood shortages; earlier this year, "King's College Hospital NHS Trust confirmed that the disruption caused by Synnovis's supplier breach contributed to the death of a patient."

Within four months of the June 2024 attack, Synnovis had built a new blood transfusion platform; five months after the attack, they completed cloud migration of their core systems. Essentially every compromised system was replaced. Seventeen months to conduct the needed data review and begin patient notification is excessively long. Beyond keeping your forensic and rebuild teams separate so they can operate in parallel, consider putting a max duration on the forensic analysis and deciding what recourse would be taken should it be reached or exceeded. For customers/patients, not a bad time to check the subscription length of any ID monitoring/credit restoration services you're currently subscribed to. If you're electing to not renew them, make sure you're clear on their data retention/deletion options for past subscribers.
Eighteen months of investigation (err, untangling of data records); that may be a new high mark to begin the process of notifying individuals. While we’re on the subject of data: how does a company flourish if it doesn’t have a well thought out data management plan? Companies recognized the importance of data well over a decade ago. One wonders what the cost of the investigation was. For the victims, if their information hasn’t been used in 18 months, likely it will never be used.

Ransomware attacks against healthcare, infrastructure, and economic welfare (e.g., JLR), constitute reckless disregard for life and limb. His Majesty's Government does not play around.
HIPAA Journal
The Register
The Record
BleepingComputer
Synnovis
Between November 10 and 13, law enforcement authorities dismantled infrastructure that was being used to support the Rhadamanthys infostealer, the VenomRAT (Remote Access Trojan), and the Elysium botnet. Europol and Eurojust coordinated Operation Endgame with the help of law enforcement authorities in 11 countries and more than a dozen private organizations. In all, one person was arrested, 11 locations were searched, 20 domains were seized, and more than 1,000 servers were taken down or disrupted. The malware operations had infected hundreds of thousands of computers and stolen millions of account credentials. The operations involved authorities in Australia, Belgium, Canada, Denmark, France, Germany, Greece, Lithuania, the Netherlands, the United Kingdom, and the United States, with support from Cryptolaemus, Shadowserver and RoLR, Spycloud, Cymru, Proofpoint, Crowdstrike, Lumen, Abuse.ch, HaveIBeenPwned, Spamhaus, DIVD, Trellix and Bitdefender.

The data included about 2 million impacted email addresses, 7.4 million passwords, and 100,000 crypto wallets. Not a bad time to check your status on haveibeenpwned.com or politie.nl/checkyourhack to see if your email is impacted.

The way I read this article is that all this infrastructure was either run by individuals still at large or by just one person. Either scenario is interesting. One to watch, as this is a late-breaking development.

It will be nice if this effort proves to be "Endgame" rather than whack-a-mole.
Europol
The Record
The Register
Help Net Security
The Hacker News
BleepingComputer
CyberScoop
SANS Internet Storm Center StormCast Friday, November 14, 2025
SmartApeSG and ClickFix; Formbook Obfuscation Tricks; Sudo-rs Vulnerabilities; SANS Holiday Hack Challenge
https://isc.sans.edu/podcastdetail/9700
SmartApeSG campaign uses ClickFix page to push NetSupport RAT
A detailed analysis of a recent SamtApeSG campaign taking advantage of ClickFix
https://isc.sans.edu/diary/32474
Formbook Delivered Through Multiple Scripts
An analysis of a recent version of Formbook showing how it takes advantage of multiple obfuscation tricks
https://isc.sans.edu/diary/32480
sudo-rs vulnerabilities
Two vulnerabilities were patched in sudo-rs, the version of sudo written in Rust, showing that while Rust does have an advantage when it comes to memory safety, there are plenty of other vulnerabilities to worry about
https://ubuntu.com/security/notices/USN-7867-1
SANS Holiday Hack Challenge
SANS Internet Storm Center StormCast Thursday, November 13, 2025
OWASP Top 10 Update; Cisco/Citrix Exploits; Test post quantum readiness
https://isc.sans.edu/podcastdetail/9698
OWASP Top 10 2025 Release Candidate
OWASP published a release candidate for the 2025 version of its Top 10 list
https://owasp.org/Top10/2025/0x00_2025-Introduction/
Citrix/Cisco Exploitation Details
Amazon detailed how Citrix and Cisco vulnerabilities were used by advanced actors to upload webshells
https://aws.amazon.com/blogs/security/amazon-discovers-apt-exploiting-cisco-and-citrix-zero-days/
Testing Quantum Readiness
A website tests your services for post-quantum computing-resistant cryptographic algorithms
https://radar.offseq.com/threat/free-test-for-post-quantum-cryptography-tls-abf9df69
SANS Internet Storm Center StormCast Wednesday, November 12, 2025
Microsoft Patch Tuesday; Gladinet Triofox Vulnerability; SAP Patches; Ivanti Updates
https://isc.sans.edu/podcastdetail/9696
Microsoft Patch Tuesday for November 2025
https://isc.sans.edu/diary/Microsoft+Patch+Tuesday+for+November+2025/32468/
Gladinet Triofox Vulnerability
Triofox uses the “host” header in lieu of proper access control, allowing an attacker to access the page managing administrators by simply setting the host header to localhost.
https://cloud.google.com/blog/topics/threat-intelligence/triofox-vulnerability-cve-2025-12480/
SAP November 2025 Patch Day
SAP fixed a critical vulnerability, fixed default credentials in its SQL Anywhere Monitor
https://onapsis.com/blog/sap-security-patch-day-november-2025/
Ivanti Endpoint Manager Updates
https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2025-for-EPM-2024?language=en_US
Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.
Browse ArchiveReduce risk and move faster in Azure. This practical cheat sheet is designed for cloud security and vulnerability management teams working in Azure, with actionable best practices to streamline vulnerability scanning, prioritize risks based on real-world context, and remediate faster using Azure-native tools.
Survey Result Forum | November 19, 2025 @ 10:30 AM ET Join the SANS Institute for our annual “2025 ICS/OT Survey Forum: The State of ICS/OT Cybersecurity” where expert reveal insights, trends, threats and hands-on strategies from the latest survey. Earn 4 CPEs — register now to defend your infrastructure and strengthen your OT posture.
We need your knowledge: Take the 2026 SANS Identity Threat Detection and Response (ITDR) Survey. Share your insights to help shape how organizations identify and manage identity exposures. Be entered into a drawing to be one of four $100 AWS gift card winners.
Did you miss Cyber Solutions Fest Fall 2026? No worries, now you can see all 5 days in their entirety on-demand & download all of the 40+ presentation for free.