SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThe US National Institute of Standards and Technology (NIST) has updated its guidance for Domain Name System (DNS) security. The document, Secure Domain Name System (DNS) Deployment Guide, was last updated in 2013. The preface acknowledges that "since the previous version was published, the ways in which DNS is used and deployed have changed significantly, and this revision provides an updated set of discussions and recommendations for securing modern DNS deployments." The guidance offers five "high-level recommendations": employ protective DNS wherever technically feasible to provide additional networkwide security capabilities; encrypt internal and external DNS traffic wherever feasible; deploy DNS Security Extensions (DNSSEC) to protect the integrity of DNS data; deploy dedicated DNS servers to reduce attack surfaces; and follow all technical guidance on ensuring that DNS deployments and the DNS protocol are as secure and resilient as possible. The revised document addresses understanding DNS as a component of an organization's security strategy; managing threats to authoritative services; managing threats to recursive/forwarding services; and managing threats to stub resolvers. IT also includes a DNS Protocol tutorial.

I like the focus on encrypted DNS services. In security operations, encrypted DNS that removes visibility is often seen as a problem. But if implemented correctly, it does not have to harm internal visibility. DNSSEC is sadly still not widely adopted, even though it has never been easier with many registrars, DNS service providers, and DNS server software making deployment simpler than ever.

This version added a lot of good information on what is now called “Protective DNS” — essentially using available DNS information to both identify and mitigate threats. This requires that your DNS services be secure and highly available. If nothing else, use this guide to make sure yours meet those requirements.

The updated guidance doesn’t reference anything you’ve not already heard of. It’s time to sit down and read the guidance and start implementing those changes. You may want to use a service that provides protective DNS, DNSSEC, and hardened redundant servers. There is little reason to roll your own service.
Thirteen years, yeah probably time for a refresh on the security guidance. The five recommendations have all been around for about ten years or so. I would just add for the dedicated DNS server, ensure that the underlying operating system is configured securely using a CIS Benchmark.

DNS is a critical component of our infrastructure and can be used for both offensive and defensive purposes. I’m glad NIST highlights Protective as that should be a major component of your security practice. If you haven’t turned a service like that on, you should, as it’s easy to deploy and the win you get is massive.
Trivy, Aqua Security's open-source security scanner widely used in continuous integration/delivery (CI/CD) pipelines, has been compromised in ongoing supply chain attacks throughout late February and March 2026. In the first attack, the repository was renamed and made private, several releases and associated assets were deleted from GitHub, and a malicious artifact was pushed to the Open VSIX marketplace within the Trivy extension for VS Code. Analysis by Step Security revealed that an autonomous AI-powered bot was carrying out a widespread attack on multiple open-source CI/CD pipelines and had stolen a Personal Access Token (PAT) to take over the Trivy repository. Aqua removed the vulnerable workflow and VS Code extension artifact, revoked the token, and restored and republished the repository. However, on March 19, Trivy maintainers observed a threat actor using a credential stolen in the first attack "to publish a malicious Trivy v0.69.4 release, force-push 76 of 77 version tags in aquasecurity/trivy-action to credential-stealing malware and replace all 7 tags in aquasecurity/setup-trivy with malicious commits." Then on March 22, "a threat actor used compromised credentials to publish a malicious Trivy v0.69.5 and v0.69.6 DockerHub images." While the maintainers state they had rotated secrets and tokens, "the process wasn't atomic and attackers may have been privy to refreshed tokens." Users should rotate secrets, search for exfiltration artifacts, pin GitHub actions to full SHA hashes, and audit Trivy versions and GitHub Action references. You are affected if you used Trivy v0.69.4 binaries from GitHub, Deb, or RPM; v0.69.4 container images from GHCR, ECR public, or Docker Hub; container images v0.69.5 and v0.69.6 from Docker Hub; and GitHub Actions aquasecurity/trivy-action before 0.35.0 or aquasecurity/setup-trivy before 0.2.6. All malicious elements have been removed from all sources at the time of this writing.

Is this the second time Trivy has been compromised? Yes. This time, however, the writeup is very interesting as it highlights the challenges with GitHub Actions and how the runners can be compromised. What’s interesting is that this is an AI-powered bot actively working on trying to attack every repo. This is the beginning of what I considered the LulzSec event. I think widespread exploitation is happening now, and many compromises will occur over the next few years with AI-powered systems.

Time to make sure to check your processes for using packages from GitHub repositories beyond just Trivy. Malicious (successful or otherwise) code injection into packages is just too common today to take chances or ignore the threat. If you have claims this is covered, ask for a demonstration.
GitHub
Aqua
GitHub
Archive
Step Security
SecurityWeek
The Hacker News
Ars Technica
BleepingComputer
Oracle has released an unscheduled Security Alert to address a critical vulnerability (CVE-2026-21992) affecting the REST WebServices component of Oracle Identity Manager and the Web Services Security component of Oracle Web Services Manager. Both are part of Oracle's Fusion Middleware suite. The flaw, which is remotely exploitable without authentication, could allow attackers to achieve remote code execution. It is not clear whether the vulnerability has been actively exploited. Users are urged to apply updates or mitigations as soon as possible.

CVE-2026-21992 has a CVSS score of 9.8. The primary fix is to update to the patched version of fusion middleware and/or web services manager.
All one has to read is “remotely exploitable without authentication” to know that it’s an immediate patch now. No need to wait for a CISA KEV entry to decide when to patch. If you require further rationale, look no further than the Langflow vulnerability… exploited within 20 hours of disclosure.
Oracle
Dark Reading
Help Net Security
The Hacker News
BleepingComputer
SecurityWeek
NIST
Researchers at Sysdig say attackers started exploiting a critical unauthenticated remote code execution (RCE) vulnerability in the Langflow open-source visual framework for building AI agents and Retrieval-Augmented Generation (RAG) pipelines within a day of its disclosure. The vulnerability (CVE-2026-33017) was disclosed on Tuesday, March 17, 2026, and the Sysdig Threat Research Team (TRT) detected exploitation within 20 hours of that disclosure. It appears the "attackers built working exploits directly from the advisory description and began scanning the internet for vulnerable instances." Within 25 hours, the attackers exfiltrated data, including "keys and credentials, which provided access to connected databases and potential software supply chain compromise."

The lesson here is the window from flaw to working exploit continues to shrink. This means don’t sit on fixes. More importantly make sure you’re limiting exposure by not only applying updates as quickly as possible but also keeping up on security best practices.
Sysdig
GitHub
Infosecurity Magazine
The Hacker News
SC Media
SecurityWeek
NIST
Ubiquiti has published a security advisory urging users to patch a maximum-severity flaw in the UniFi Network application, affecting official release version 10.1.85 and earlier, release candidate version 10.2.93 and earlier, and UniFi Express (UX) version 9.0.114 and earlier. CVE-2026-22557, CVSS score 10.0, allows an attacker with access to the network to manipulate system files and take over user accounts by exploiting a path traversal vulnerability in the UniFi Network application. The same advisory also covers a CVSS 7.7 authenticated NoSQL injection vulnerability allowing privilege escalation in the same versions of the UniFi app (CVE-2026-22557), and a CVSS 8.8 improper input validation vulnerability allowing unauthorized account access in UniFi Network Server version 10.1.85 and earlier (CVE-2026-22559). Users should update to UniFi Network application official release version 10.1.89 or later, release candidate version 10.2.97 or later, UniFi Express firmware 4.0.13 or later, and UniFi Network Server version 10.1.89 or later.

Ubiquiti is delivering prosumer levels of devices. As such they have a lot of future protection, but you still need to secure the management interface, keep them updated, and replace EOL components. Don’t forget about choosing strong passwords or even MFA.
Microsoft has released an unscheduled update to address an issue some users encountered after installing the March 2026 Windows security update that was released earlier this month. In some cases, users reported they were unable to sign in to Microsoft apps and services: when attempting sign-in, they instead saw a "no internet" error message. The out-of-band update released on Saturday, March 21 is cumulative, "includ[ing] all protections and improvements from the March 2026 Windows security update released March 10, 2026." The update is available for Windows 11 versions 25H2 and 24H2 devices that receive standard Windows updates, and can be installed through Windows Update or the Microsoft Update Catalog. The issue does not affect users who employ Microsoft Entra ID for app authentication.

This is only for Windows 11 25H2 and 24H2! Windows 11 is predisposed to automatically apply updates like this, so make sure it’s being installed.
Microsoft
The Register
BleepingComputer
The Register
The US Food and Drug Administration (FDA) has issued a Class II recall for several GE HealthCare Centricity medical imaging products because "User login credentials may be exposed on the local client workstation, which could allow an unauthorized individual to potentially impact system availability and/or manipulate data." The vulnerability affects Centricity Universal Viewer Software Versions 5.0 SP6 through UV 5.0 SP7.1; 6.0 through 6.0 Sp10.4.1; and 7.0 through 7.0 Sp2.0.1. Centricity Universal Viewer is a device that displays medical images including mammograms, and data from various imaging sources. GE Healthcare notified affected customers about the issue at the end of January 2026, and the FDA posted the notice on Monday, March 23. The FDA defines a Class II recall as "a situation in which use of or exposure to a violative product may cause temporary or medically reversible adverse health consequences or where the probability of serious adverse health consequences is remote."

This recall highlights a broader issue across healthcare, where systems that are not directly exposed to the Internet are still reachable through interconnected hospital networks or remote vendor access. Imaging platforms like these typically reside on internal networks where segmentation rather than isolation is the norm. The practical implication is that a vulnerability like exposed credentials on a local workstation can still become a pivot point. Even without direct Internet exposure, an attacker who gains a foothold elsewhere (phishing, VPN compromise, vendor access) can move laterally into these systems.

This sounds confusing as the term recall is used. Short story is, GE published guidance to mitigate the risks of the flaw as well as announcing they are fixing the issue, so you have to implement GE’s guidance and apply the updates when notified. GE notified affected customers in early January.
Declaring a Class II recall ups the ante. That said, the vulnerability requires physical access to the workstation. Follow the guidance provided by GE HealthCare until a patch is made available.
Law enforcement authorities from Canada, Germany, and the US have taken steps to disrupt the command and control (C2) infrastructure used by multiple Internet of Things (IoT) botnets. The US Department of Defense Office of Inspector General’s (DoD OIG) Defense Criminal Investigative Service (DCIS) executed seizure warrants that targeted multiple U.S.-registered internet domains, virtual servers, and other infrastructure. The four botnets are estimated to have compromised more than three million IoT devices, and access to them was sold to cybercriminals who used them to launch distributed denial-of-service (DDoS) attacks measuring up to 30 terabits per second. Germany's Bundeskriminalamt (BKA) Cyber and Public Prosecutor’s Office in Cologne (ZAC NRW) and Canada's Royal Canadian Mounted Police (RCMP), Ontario Provincial Police (OPP) and Sûreté du Québec (SQ) are involved in targeting individuals who operated the botnets. The operation also received help from Netherlands Politie, EUROPOL’s PowerOFF team, and 20 private sector partners.

Another score for multi-agency law enforcement! The four botnets are Aisuru, Kimwold, JackSkid, and Mossad, which were composed of more than three million IoT devices. While these botnets are neutered, we need to make sure our IoT devices are secured, updated, and not directly internet accessible. Change them out before they are EoL, separate them with only necessary authorized access, and follow hardening guidance. Don’t make it any easier than it has to be to compromise these devices.

Chalk up another win for forces for good. It is nice to see international cooperation across public and private sectors, and with law enforcement, produce positive results. Congratulations and thank you to all those involved in making the Internet that little bit safer.
Good work. Unfortunately, the devices remain vulnerable and may be potential victims for the next bot herd master(s).
Krebs on Security
WIRED
The Record
Justice
A federal jury in North Carolina has found a former data analyst for a Washington, DC-based tech company guilty on six counts of extortion. Cameron Nicholas Curry worked as a contractor for the unnamed company from August through December 2023. When he learned that his contract was not going to be renewed, Curry began formulating his scheme. He stole the data during the term of his contract, and immediately following his termination began sending emails to employees and executives, threatening to leak the sensitive company information if they did not pay a ransom. The company notified the FBI about the incident on December 14, 2023, and paid Curry's ransom demand the following month. Curry faces up to 12 years in prison. As CyberScoop observes, this incident "underscores [the] immeasurable risks companies accept when employees, or contractors placed in roles by a third-party recruitment company, as was the case with Curry, are allowed to access sensitive data on a company-owned laptop."

Limit access to sensitive information. Monitor and track its use where possible. DLP anyone? Make sure that features you already have for logging and limiting access are enabled and accesses are reviewed on a regular basis by data owners. Beyond insiders, AI has also been proven to access data so we really need to double down on access controls and verification. Remember: Want to know is not need to know, regardless of rank or clearance.

This, of course, is the age-old trusted insider issue. I guess DLP (Data Loss Prevention) was a buzz-acronym that got absorbed into the yawn-inducing Data Security Posture Management (DSPM), but here’s a way to jazz this one up to get backing: replace “contractor” with AI engine in the news item and pitch DSPM as a needed part of AI data governance.

A timely reminder that while we focus mostly on external threats to our systems and data, we need to remember to deal with the insider threat too. I regularly say that "those we trust the most are the ones that can hurt us the most," so it's important that when trusting your fellow employees you have controls in place to ensure any potential damage they may cause either accidentally, intentionally, or through coercion or social engineering, is limited.
There is always a risk when you allow a third-party contractor access to sensitive data, but that risk also exists for full-time employees. The case provides an opportunity for organizations to revisit their personnel security controls and adjust as needed.
SANS Internet Storm Center StormCast Tuesday, March 24, 2026
Tax Scam to EDR Kill; NetScaler Patches; gRPC-Go Authz Bypass
https://isc.sans.edu/podcastdetail/9862
From W-2 to BYOVD: How a Tax Search Leads to Kernel-Mode AV/EDR Kill
https://www.huntress.com/blog/w2-malvertising-to-kernel-mode-edr-kill
NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2026-3055 and CVE-2026-4368
https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX696300
gRPC-Go Authorization bypass via missing leading slash in :path CVE-2026-33186
https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3
SANS Internet Storm Center StormCast Monday, March 23, 2026
GSocket Backdoor in Bash; Oracle Security Alert; Rockwell Attacks
https://isc.sans.edu/podcastdetail/9860
GSocket Backdoor Delivered Through Bash Script
https://isc.sans.edu/diary/GSocket+Backdoor+Delivered+Through+Bash+Script/32816
Oracle Security Alert CVE-2026-21992 Released
https://blogs.oracle.com/security/alert-cve-2026-21992
Rockwell Automation Reiterates Customer Guidance to Disconnect Devices from the Internet and Harden PLCs to Protect from Cyber Threats
https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1771.html
Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.
Free Virtual Summit | AI Summit Solutions Track | April 20-21, 2026 Chaired by Matt Bromiley.
Webinar | Beyond Backup: Identity Resilience for the Modern Enterprise | Wednesday, April 22 at 1:00 PM ET
Webinar | Air-Gapped Security in a Connected World | Thursday, April 23 at 3:30 PM ET
Webinar | The Next Generation of Data Security | Tuesday, April 14 at 1:00 PM ET