SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsAccording to Mandiant, over a thousand SaaS environments have been impacted by ongoing supply chain compromises of Aqua Security's open-source scanner Trivy, and researchers predict that the impact may grow by an order of magnitude. In late February 2026 a threat actor's autonomous AI-powered bot stole one or more personal access tokens (PAT) that were then used through March to push malicious Trivy container images and force-push GitHub Actions version tags to commits that execute "TeamPCP Cloud stealer" when opened. Malicious Trivy images were also published to Docker Hub. The malware scrapes a wide range of credentials, harvests cloud metadata, enumerates Slack and Discord webhook URLs, and exfiltrates the stolen secrets. While Aqua Security rotated credentials upon detecting the breach, the process was not atomic, possibly allowing the attacker to capture refreshed tokens. Researchers have since reported multiple downstream attacks enabled by the compromise, possibly via implementations of Trivy. Sysdig observed the TeamPCP infostealer deployed in a GitHub action belonging to another software supply chain security developer, Checkmarx. Aikido Security reported attacks targeting the npm ecosystem and Kubernetes, spreading a persistent Python backdoor through "CanisterWorm," which steals npm tokens to propagate itself through developers' packages. A compromise in the PyPI ecosystem injected an infostealer and backdoor into LiteLLM, an open-source Python library for unifying LLM API calls, downloaded over 3.5 million times a day. The SANS Institute's Kenneth G. Hartman and Eric M. Johnson urge users to immediately pin every GitHub action to a full commit Secure Hash Algorithm; audit every workflow that uses the pull_request_target trigger; rotate any possibly exposed credentials across all affected services; and search for exfiltration indicators to verify compromise.

This is essentially the CI/CD GitHub equivalent of the 2020 SolarWinds system management software compromise, with several new wrinkles. See the SANS blog item and the March 25 webcast for immediate actions required. https://www.sans.org/webcasts/when-security-scanner-became-weapon

What is reported so far is likely just the tip of the iceberg. In my opinion, the most important lesson from this event is that you MUST be able to rotate credentials quickly. This will not work without solid secrets management. If you can’t rotate credentials routinely (weekly?), you are not doing it right. Include developer credentials, and do not just treat this as a production credential issue. And yes, it is hard.

The use of AI makes finding issues, such as exposed credentials, much easier. I’m reminded of something Ed Skoudis told me years ago when solving a CTF: Cheat to Win. Don’t panic — seriously look at leveraging AI to make sure you don’t have exposed or overlooked secrets, and that you’ve rotated them. Then leverage it to discover any exfiltration, maintain situational awareness, and target response actions.

One continues to assert that suppliers should be held liable for damages resulting from their distribution of malicious (as opposed to routinely poor quality, which the market has come to tolerate) code. It this slows down distribution, so be it.
SANS
SecurityWeek
The Register
The Hacker News
BleepingComputer
The Register
The Hacker News
Wiz
Sysdig
Aikido
On March 23, 2026, the US Federal Communications Commission (FCC) officially designated that all routers produced in a foreign country "pose an unacceptable risk to the national security of the United States or the security and safety of United States persons," apart from conditionally approved devices. New router models with any major stage of production (such as manufacturing, assembly, design, or development) taking place outside the US will be banned from receiving FCC authorization and entering the US market, even if the company is based in the US. The National Security Determination spurring this change contends "routers in the United States must have trusted supply chains so we are not providing foreign actors with potential built-in backdoors," and specifically mentions attacks by Salt Typhoon, a group known for their 2024 compromise of wiretapping infrastructure built into US telecoms under the Communications Assistance for Law Enforcement Act. The Determination cites publications from the National Institute of Standards and Technology (NIST) and the Cybersecurity and Infrastructure Security Agency (CISA) stating the critical position routers hold in network security and the consequences of router compromise, but does not offer evidence that domestically produced routers are more secure. This change does not impact the use and sale of previously approved router models, nor the import and sale of routers for use by the government. It also does not impact new routers produced in the US that contain components from abroad, with the exception of foreign modular transmitters. Manufacturers may apply by email to request conditional approval.

Compared to commercial systems, consumer devices tend to be simpler to secure. Don’t expose the admin interface to the internet, set a reasonably strong password, and you will stop >99% of attacks. I wish the rule would not just focus on the country of origin, but also establish minimum/baseline security requirements. What about devices manufactured in the US, but vulnerable enough to still be easily compromised? What about US-made devices loading updates from non-US sources?

The intent here is understandable given the documented threat from state-sponsored actors such as Salt Typhoon, but policy built on geography rather than technical risk assessment is a blunt instrument. We are seeing similar proposals emerge under changes to the EU Cybersecurity Act, where there are moves to restrict certain technology vendors based on their country of origin being deemed a 'hostile state.' The problem with this approach is that it creates confusion and uncertainty in the market, and leaves organisations unclear on how to plan procurement and infrastructure decisions. Perhaps more concerning is what happens when geopolitical relationships shift. A vendor from a country considered friendly today may find itself on a restricted list tomorrow should international relations sour, creating further disruption for organisations that have built their infrastructure around those products. A more durable and technically credible approach would be to establish clear, enforceable security standards that any vendor must meet regardless of where they are headquartered or where their products are manufactured and then hold them to those standards consistently.

If the FCC and DHS can keep up with the speed of assessment and conditional approval needed to really have any positive impact on risk, great idea. If not, either extensions will be granted or approvals given without meaningful assessment — more paperwork, no gain in security.

Managing supply chain risk has to be ingrained/SOP. While this restriction seems extreme at first blush, the activities by Salt Typhoon warrant taking actions to prevent recurrence. The good news is these restrictions make understanding what is disallowed or needing exception easy. Make sure your controls are easy to understand and you include an exception process, which has been tested.
The US manufactures very few consumer routers. The FCC rule brings up some practical questions on how it will be implemented and what will be the collateral impact. Besides, the risk, if there is one, will still exist given the large installed base of foreign made routers.

Routers play a vital role in both public network and enterprise security. Their implementation, configuration, and maintenance leave a lot to be desired. This assessment is only a tiny step in reducing this risk.
CyberScoop
The Register
TechCrunch
The Record
FCC
FCC
FCC
The Port Authority at Spain's Port of Vigo was the target of a ransomware attack early the week. The incident was detected at 5:45 am local time on Tuesday, March 24, and affected servers used for cargo traffic management and other digital services; some portions of the port's network have been disconnected, and cargo operations are being managed manually. The Vigo Port Authority president said, "The port's operational services and physical functioning have not been affected, but the programs will not be reopened to the public until all security checks have been completed." There is currently no estimated date for resuming services as usual.

This attack appears to have targeted the port’s operational IT systems rather than industrial control systems, which is why cargo movement continued while scheduling and coordination platforms went offline. Many environments assume that keeping OT separate is sufficient, but this incident shows how operations depend on supporting IT services. From an administrative standpoint, this reinforces the need for strong segmentation between business systems, port logistics platforms, and any shared infrastructure, along with tightly controlled administrative access. The shift to manual operations also suggests limited resilience in application-layer recovery, highlighting the importance of tested backups, rapid system rebuild capability, and clear prioritization of which services must be restored first to resume normal operations.

No ransomware gang has taken credit for the attack despite reports of a ransom demand. The port is waiting for “everything to be clean” before restoring connections. Hopefully systems will be back online before the impact to freight traffic becomes significant.
Not a lot of details on the cyber incident. That said, how the adversary compromised the servers and total costs to regain full business operations would be valuable to cyber defenders. Hopefully the government of Spain will make this a requirement of the investigation.
On Tuesday, March 24, Apple released updates for multiple products, including iOS, iPadOS, macOS, Safari, tvOS, watchOS, visionOS, and Xcode. In all, this month's batch of patches addresses more than 80 security issues. The newest versions of iOS and iPadOS (26.4) include fixes for nearly 40 vulnerabilities. More than 20 of the vulnerabilities were also backported to older versions of iOS and iPad OS. macOS Tahoe 26.4 includes fixes for more than 75 vulnerabilities, and macOS Sequoia 15.7.5 and macOS Sonoma 14.8.5 each include fixes for more than 50 vulnerabilities. The updated versions of iOS, iPadOS, and macOS also include Apple's new Background Security Improvements.

Luckily, none of the vulnerabilities have been observed in attacks (yet). The “DarkSword” exploit kit that hit recently is mitigated with the iOS 26.3 update, released in February. But even for Apple users, exploit timelines are shrinking. Try to have your devices updated by the end of next week.

Depending on how you count or group them, there are 85 flaws being addressed. Just roll the patches. This update includes the fix in macOS/iPadOS/iOS 26.3.1(a). Make sure you have plans to get those macOS 14/15 systems onto macOS 26 — it may require replacement hardware, which may necessitate conversation about uses that depend on the Intel CPU and workarounds. Don’t arbitrarily decide to wipe or disable those older systems without understanding why they are still in use; those aren’t fun conversations.

The backporting of more than twenty fixes to older iOS and iPadOS versions is a welcome move, acknowledging the reality that not all users run the latest hardware. We seem to be at the dawning of a new threat landscape targeting iOS and iPadOS, demonstrated by the recent Coruna and DarkSword malware. My concern is that there may be a level of false security amongst Apple users; these patches and other future patches may not be applied in a timely manner and we may see a mass compromise of these platforms in time. If you have Apple devices in your corporate estate, consider creating a policy in your MDM tool to enforce a minimal patch level for any those devices.

Apple security updates have been timely and non-disruptive. Automatic updates should be the default for all but a tiny fraction of Apple users. However, Apple has concluded that some security updates should not be left to user discretion. Such discretion always leaves a window of opportunity for exploitation between the time that Apple publishes a release and most users have applied it. It now reserves the right to apply mandatory automatic security updates. I have already seen at least one such update.
Citrix has published a security bulletin for a pair of vulnerabilities affecting NetScaler Application Delivery Controller (ADC) and NetScaler Gateway. CVE-2026-3055 is a critical out-of-bounds read vulnerability. CVE-2026-4368 is a high-severity race condition vulnerability. Both flaws were discovered during an internal review, and Citrix has released updates to address the vulnerabilities. Users are urged to update to the following versions of the affected products: NetScaler ADC and NetScaler Gateway 14.1-60.58; NetScaler ADC and NetScaler Gateway 14.1-66.59 and later releases; NetScaler ADC and NetScaler Gateway 13.1-62.23 and later releases of 13.1; NetScaler ADC 13.1-FIPS and 13.1-NDcPP 13.1.37.262 and later releases of 13.1-FIPS and 13.1-NDcPP.

The actions are only required for self-hosted Citrix environments. If you’re running older versions of NetScaler ADC or NetScaler Gateway, you need to get to a supported version (ideally 14.1.x), as the older unsupported versions also have these flaws. While you’re looking at the environment, make sure you’re not exposing the management interface to the Internet and you’re enforcing MFA for all users.
Citrix
Infosecurity Magazine
Heise
BleepingComputer
SC Media
NIST
NIST
The Internet Systems Consortium (ISC) has released four security fixes for flaws in BIND 9 DNS software, two high-severity and two medium-severity. CVE-2026-3104 allows a remote attacker to create a memory leak in a BIND resolver by querying a specially crafted domain; when memory is not recovered by the name daemon ('named'), Resident Set Size memory can undergo unbounded growth and cause an out-of-memory condition. CVE-2026-1519 allows a remote attacker to induce excessive CPU consumption by creating a maliciously crafted zone that a BIND resolver encounters during DNSSEC validation. Disabling DNSSEC prevents exploitation, but ISC does not recommend this workaround. Both of these flaws carry CVSS score 7.5 and can lead to denial of service (DoS). CVE-2026-3119, CVSS score 6.5, allows a remote attacker to cause denial of service by exploiting the fact that 'named' "may crash when processing a correctly signed query containing a TKEY record." As a workaround, users can remove any TSIG keys that might be used by an attacker. CVE-2026-3591, CVSS score 5.4, allows a remote attacker to bypass access control lists (ACLs) using a specially crafted DNS request that causes an ACL to mismatch an IP address, due to a use-after-return flaw in the 'named' server when handling DNS queries signed with SIG(0). Users should update to BIND 9 versions 9.18.47, 9.20.21, or 9.21.20, or Supported Preview Edition versions 9.18.47-S1 or 9.20.21-S1.

The fix is to update to the patched BIND version. Resist any temptation to disable DNSSEC, not just because it’s rolling back security but also because you’ll spend more time disabling, enabling, and dealing with failures than just updating your BIND servers in the first place.
ISC
ISC
ISC
ISC
Ubuntu
SecurityWeek
On April 20, an expert panel published its final report on the April 28, 2025 blackout that affected the Iberian Peninsula and a small area in southwestern France. The blackout began at noon local time, and some affected areas remained without power for 16 hours. The final report reiterates that there was not a single cause for the incident, "conclud[ing] that the blackout resulted from a combination of many interacting factors, including oscillations, gaps in voltage and reactive power control, differences in voltage regulation practices, rapid output reductions and generator disconnections in Spain, and uneven stabilisation capabilities. These factors led to fast increases of voltage and cascading generation disconnections in Spain, resulting in the blackout in continental Spain and Portugal." The panel published a factual report on October 3, 2025 that "describes the system conditions that prevailed on 28 April 2025, provides a detailed sequence of events during the incident and describes how the system was restored after the incident." The final report published last week "focus[es] on the identification and analysis of the root causes of the incident," and lists recommendations to help prevent future outages.

Sadly we won't see any vendors or so-called cybersecurity experts who initially cried wolf and blamed this outage on cyberattacks withdraw, retract, or amend their commentary. Then we wonder why as an industry we struggle to be taken seriously by businesses and governments.

The report notes what went well, such as disconnecting from the connecting European grid to prevent added outages, as well as noting areas for improvement, such as better configuration of renewable power providers to better supplement power in a similar situation. Download and read the report; you’ll want to discuss opportunities with your team.
There you have it, the blackout was not cyber related, but rather caused by contention for resources to maintain business operations. The only question remaining is whether the report actually results in reallocation of spending to make the necessary changes.

In Normal Accidents Charles Perrow taught us that accidents are often, not to say usually, the result of multiple failures. This is particularly true of Grid failures because grids are designed to tolerate component failure, load imbalance, and even some operator errors. Perrow shows us that most systems can be overwhelmed and are particularly vulnerable to operator error. He should be mandatory reading for those involved in the implementation and management of infrastructure.
On Thursday, March 19, ICT security at the Dutch Ministry of Finance "detected unauthorized access to systems for a number of primary processes within the policy department." The Ministry has blocked access to affected systems while it conducts an investigation. It has not yet been determined whether the intruders stole data. While the breach has not affected "services to citizens and businesses provided by the Tax and Customs Administration, Customs, and Benefits," some Ministry employees have experienced work disruptions.

ICT got lucky as none of their customer facing or government supporting services were impacted. The compromised systems remain offline while the investigation completes which is impacting their employees, who may disagree with my calling this lucky. Have a plan on how to manage impact of internal system outages. Your staff won’t relish unpaid leave or idle time at their desk as much as you may think, regardless of their improved solitaire scores.

Automatic controls, including separation and access control, of function (transactions and changes) and management alerts, are both effective and efficient. That said, they are not a substitute for management supervision.
Rijksoverheid
NL Times
RTL
The Record
BleepingComputer
On March 14, 2026, drivers in several US states were unable to start their cars due to a cyberattack on Intoxalock, a producer of ignition interlock breathalyzers. The devices check that a driver's blood alcohol is below a legal limit before starting the vehicle, and periodically throughout the drive. Because the devices must connect to Intoxalock servers in order to perform mandatory calibration once a month, service outages resulting from the cyberattack caused a portion of customers to miss the calibration, making their cars unable to start. Intoxalock told a Connecticut news source that up to 10 percent of that state's customers may have been impacted. The company’s status advisories call the disruption a "temporary system pause" that ended with restoration of their systems on March 22, but do not offer any details on the cyberattack; the page gives instructions to customers for acquiring a ten-day calibration extension and for proceeding with future calibrations and installations.

This incident is a perfect example of how cyberattacks can have very direct physical consequences for ordinary people. The dependency on continuous cloud connectivity for safety-critical devices like ignition interlocks highlights that resilience and offline fallback modes should be design requirements, not afterthoughts. Regulators overseeing these devices should be asking hard questions about vendor cyber resilience as part of product approval.

This is a case of the maximum tolerable outage window being exceeded. In this case a ten-day workaround is available, and the workaround meeting the compliance requirements for the system. (The driver still needs to pass the breath test). The takeaway is to review your resilience plans to see if your outage and recovery plans are still realistic, and adjust where needed. You may also want develop workaround scenarios where you aren’t able to recover services in the window intended. Then test both.
Expect more of these types of service disruptions as companies look to mergers and acquisitions for market growth. Government can help by requiring risk reviews and percentage caps on market consolidation.

"Fail safe" will almost always inconvenience someone.
Intoxalock
TechCrunch
Ars Technica
WIRED
A US federal court in Indiana has sentenced a Russian man to nearly seven years in prison for providing assistance to multiple cybercrime groups as an "initial access broker." Aleksei Volkov found vulnerabilities in computer systems that allowed him to access those systems, then sold that access to others. Volkov was indicted in federal courts in Indiana and in Pennsylvania. He was arrested in Italy in 2024 and extradited to the US, where he pleaded guilty to charges in both indictments. The cases were consolidated in Indiana. Volkov has also agreed to pay restitution of $9.2 million. In a separate case, a US District Court Judge in Michigan has sentenced a Russian man to two years in prison for managing a botnet that was used in multiple ransomware attacks against US companies. Ilya Angelov pleaded guilty to conspiracy to commit wire fraud in October 2025.The judge also fined Angelov $100,000 and entered a $1.6 million money judgement against him.

Another win for the good guys. It’s essential for cyber criminals to not only get shut down but also face fines and jail time to make the consequences of their actions real and meaningful to others similarly inclined. If you’re a victim in a case, have a clear understanding of how much of any fine or financial recovery to expect, if any, up front to avoid disappointment.

Well done to all involved in bringing these criminals to justice. These sentences send a clear message that cybercrime is not a victimless pursuit and that law enforcement cooperation across borders is yielding real results.
Infosecurity Magazine
The Register
The Record
DoJ
The Record
The Hacker News
Detroit News
DoJ
SANS Internet Storm Center StormCast Friday, March 27, 2026
TeamPCP Update; DarkSword vs Patches; LangFlow Exploited
https://isc.sans.edu/podcastdetail/9868
TeamPCP Supply Chain Campaign: Update 001 - Checkmarx Scope Wider Than Reported, CISA KEV Entry, and Detection Tools Available
DarkSword and This Weeks iOS Updates
https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain
LangFlow Exploited
https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain
SANS Internet Storm Center StormCast Thursday, March 26, 2026
Apple Patches; SmartApeSG Update; Trivy/LiteLLM/TeamPCP Update; Google Accelerates Quantum Save Crypto Rollout
https://isc.sans.edu/podcastdetail/9866
Apple Patches (almost) everything again. March 2026 edition.
https://isc.sans.edu/diary/Apple+Patches+almost+everything+again+March+2026+edition/32830
SmartApeSG campaign pushes Remcos RAT, NetSupport RAT, StealC, and Sectop RAT (ArechClient2)
Trivy/LiteLLM/TeamPCP Updates
https://www.sans.org/webcasts/when-security-scanner-became-weapon
https://rosesecurity.dev/2026/03/24/sha-pinning-is-not-enough.html
Google Moves Up Quantum Crypto Deadline
https://blog.google/innovation-and-ai/technology/safety-security/cryptography-migration-timeline/
SANS Internet Storm Center StormCast Wednesday, March 25, 2026
IP KVM Usage; TeampPCP, Trivy, liteLLM and More
https://isc.sans.edu/podcastdetail/9864
Special Webcast about Trivy Supply Chain Attacks
https://www.sans.org/webcasts/when-security-scanner-became-weapon
Detecting IP KVM Usage
https://isc.sans.edu/diary/Detecting+IP+KVMs/32824
TeamPCP, Trivy, liteLLM, Iran and more
https://www.aikido.dev/blog/teampcp-stage-payload-canisterworm-iran
https://www.aquasec.com/blog/trivy-supply-chain-attack-what-you-need-to-know/
Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.
Protecting cloud applications starts with understanding runtime. Detection and response needs to happen where applications are running in production. Cloud Application Detection and Response (CADR) focuses on this approach. The "CADR for Dummies" book shows how teams identify threats and protect cloud applications and AI systems.
Take the Survey | 2026 SANS Survey on Unstructured Data. Share insights and benchmark your organization, helping to drive better tools, smarter strategies, and stronger security outcomes.
Free Virtual Summit | AI Summit Solutions Track, Chaired by Matt Bromiley | April 20-21, 2026
Webinar | When Trusted Senders Become Threats: Stopping BEC and Supply Chain Attacks with Self-Learning AI | Monday, April 27, at 10:30 AM ET.