<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[FPT Metrodata Indonesia Cyber Security]]></title><description><![CDATA[FMI Cyber Security News Threat Intelligence SOC, MSSP Pentest Red Team Blue Team]]></description><link>https://news.fmisec.com</link><image><url>https://cdn.hashnode.com/res/hashnode/image/upload/v1733298927036/865fc033-1834-4489-95db-82eeec26ef58.png</url><title>FPT Metrodata Indonesia Cyber Security</title><link>https://news.fmisec.com</link></image><generator>RSS for Node</generator><lastBuildDate>Tue, 21 Apr 2026 07:52:41 GMT</lastBuildDate><atom:link href="https://news.fmisec.com/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[British Scattered Spider hacker pleads guilty to crypto theft charges]]></title><description><![CDATA[A British man, believed to be the leader of the Scattered Spider cybercrime collective, has pleaded guilty in the United States to charges of wire fraud and aggravated identity theft.
In November 2024, U.S. prosecutors  24-year-old Tyler Robert Bucha...]]></description><link>https://news.fmisec.com/british-scattered-spider-hacker-pleads-guilty-to-crypto-theft-charges</link><guid isPermaLink="true">https://news.fmisec.com/british-scattered-spider-hacker-pleads-guilty-to-crypto-theft-charges</guid><category><![CDATA[Security]]></category><category><![CDATA[threat intelligence]]></category><dc:creator><![CDATA[Phong Xuan]]></dc:creator><pubDate>Mon, 20 Apr 2026 17:32:24 GMT</pubDate><enclosure url="https://www.bleepstatic.com/content/hl-images/2026/04/20/Hacker-spider-large_blue.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><img src="https://www.bleepstatic.com/content/hl-images/2026/04/20/Hacker-spider-large_blue.jpg" alt /></p>
<p>A British man, believed to be the leader of the Scattered Spider cybercrime collective, has pleaded guilty in the United States to charges of wire fraud and aggravated identity theft.</p>
<p>In November 2024, U.S. prosecutors  24-year-old Tyler Robert Buchanan and four other suspects of stealing at least $8 million in cryptocurrency after hacking at least a dozen companies through text-message phishing attacks between September 2021 and April 2023.</p>
<p>The list of breached organizations includes companies from a wide range of industries, such as entertainment, telecommunications, technology, business process outsourcing (BPO), and information technology (IT) suppliers, as well as cloud communications providers, virtual currency providers, and individuals.</p>
<p>"As part of the scheme, Buchanan and his co-conspirators conducted Short Message Service (SMS) phishing attacks by sending hundreds of SMS phishing messages to the mobile telephones of a victim company's employees. The messages purported to be from the victim company or a contracted IT or BPO supplier for the victim company," the Justice Department .</p>
<p>"The SMS phishing messages contained links to phishing websites designed to look like legitimate websites of a victim company or a contracted IT or BPO supplier. The websites then lured the recipient into providing confidential information, including personal identifying information (PII), and account usernames and passwords."</p>
<p>According to  , they used the stolen information to hijack the victims' email accounts in SIM swap attacks, allowing them to gain control of their phone numbers and virtual currency wallets and transfer millions to wallets they controlled.</p>
<p>Buchanan  in June 2024 in Palma de Mallorca, Spain, has been in U.S. federal custody since April 2025, and will be sentenced on August 21, 2026, facing a statutory maximum sentence of 22 years in prison.</p>
<p>Three of his accomplices (Ahmed Hossam Eldin Elbadawy, Evans Onyeaka Osiebo, and Joel Martin Evans) were also charged in November 2024 with wire fraud, wire fraud conspiracy, and aggravated identity theft and are facing up to 20 years in federal prison if found guilty.</p>
<p>Noah Michael Urban (known online as Sosa and Elijah), a fourth conspirator and another key member of the Scattered Spider cybercrime collective,  after  to wire fraud and conspiracy charges one year ago.</p>
<h2 id="heading-the-scattered-spider-hacking-collective">The Scattered Spider hacking collective</h2>
<p>Also tracked as , , , Starfraud, , and , the Scattered Spider gang is a loose-knit group of English-speaking threat actors (as young as 16) that orchestrates attacks using Telegram channels, Discord servers, and hacker forums.</p>
<p>, they're using various tactics to breach corporate networks, including social engineering, phishing, multi-factor authentication (MFA) bombing (targeted MFA fatigue), and SIM swapping.</p>
<p>Some Scattered Spider members are also believed to be part of "the Com," another hacking collective linked to violent incidents and cyberattacks.</p>
<p>Since the start of 2023, Scattered Spider has also partnered with several Russian ransomware gangs, including , , and .</p>
<p>In July 2024, UK police also , believed to have been involved in the 2023 MGM Resorts ransomware attack. Other high-profile attacks linked to this cybercrime group include breaches at , , , , , and .</p>
<p>AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.</p>
<p>At the Autonomous Validation Summit (May 12 &amp; 14), see how autonomous, context-rich validation finds what's exploitable, proves controls hold, and closes the remediation loop.</p>
<hr />
]]></content:encoded></item><item><title><![CDATA[The backup myth that is putting businesses at risk]]></title><description><![CDATA[*
Ransomware and other cyberthreats often dominate conversations about data loss, but they are not the only risks businesses face. Everyday issues such as hardware failures, accidental deletions and power outages can bring operations to a halt just a...]]></description><link>https://news.fmisec.com/the-backup-myth-that-is-putting-businesses-at-risk</link><guid isPermaLink="true">https://news.fmisec.com/the-backup-myth-that-is-putting-businesses-at-risk</guid><category><![CDATA[Security]]></category><category><![CDATA[threat intelligence]]></category><dc:creator><![CDATA[Phong Xuan]]></dc:creator><pubDate>Mon, 20 Apr 2026 17:32:23 GMT</pubDate><enclosure url="https://www.bleepstatic.com/content/hl-images/2024/01/04/Hacker_datacenter.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>*</p>
<p>Ransomware and other cyberthreats often dominate conversations about data loss, but they are not the only risks businesses face. Everyday issues such as hardware failures, accidental deletions and power outages can bring operations to a halt just as quickly.</p>
<p>The countermeasure businesses adopt is backing up their data. The assumption is simple — if data is saved, it can be restored. But this overlooks a critical factor. Backup does not keep a business running during a disruption. It only helps recover after the damage is done.</p>
<p>That gap is where the real risk lies. When systems are down, employees can’t work, customers can’t access services and revenue stops immediately. According to research by Oxford Economics, , or $540,000 per hour.</p>
<p>At that scale, even short interruptions are no longer acceptable. Organizations need more than data protection. They need business continuity.</p>
<p>In this article, we’ll look at how relying solely on backups leaves organizations exposed — and why a comprehensive business continuity and disaster recovery (BCDR) strategy is essential to keep operations running.</p>
<h2 id="heading-the-growing-gap-between-backup-and-recovery">The growing gap between backup and recovery</h2>
<p>Many small businesses are protected on paper, but not in practice. The issue is not whether data is backed up, but rather how quickly that data can be restored — and whether the business can function during that process.</p>
<p>The   by Datto, a Kaseya company, found that more than 60% of organizations believed they could recover in under a day. However, in practice, only 35% achieved that during real downtime events.</p>
<p>A common misconception among small businesses is that backup equals protection.</p>
<p>Imagine a ransomware attack encrypts a company’s systems.</p>
<p>With a traditional backup setup, the response is straightforward. Identify the breach, wipe affected systems and begin restoring data from backups. Depending on the size of the environment, this process can take hours or even days.</p>
<p>Now consider the same situation with a BCDR solution in place.</p>
<p>Instead of waiting for full restoration, systems can be quickly spun up from recent backups, often within minutes. Operations continue in a virtualized environment while the primary systems are restored in the background. The disruption is contained, and the business continues to run.</p>
<p>This is the gap many businesses overlook. Backup is designed to store and retrieve data while BCDR is designed to maintain operations.</p>
<p>Ransomware, cloud sprawl, and human error are putting data at risk.</p>
<p>See what 3,000+ IT and security pros reveal about today’s biggest threats, backup gaps, and how MSPs can strengthen cyber resilience across hybrid environments.</p>
<h3 id="heading-the-cost-of-downtime">The cost of downtime</h3>
<p>To better understand the cost of downtime, consider the following example. Let’s say your business has 100 employees, the average hourly revenue is $1,500 and the backup data set is 2 TB. Given these parameters, a full restore from a local backup using traditional backup software could take more than eight hours. The associated downtime would cost approximately $34,000 in lost revenue.</p>
<p>Beyond direct losses, downtime also affects reputation. Customers expect consistent access to services. When systems are unavailable, trust is affected. Delays, failed transactions and lack of access create friction that can push customers toward competitors. For service-based businesses, even a single disruption can lead to long-term client loss.</p>
<p>This is why business continuity is now a baseline requirement. It’s part of how businesses maintain operations and protect customer relationships.</p>
<h2 id="heading-the-right-bcdr-solution">The right BCDR solution</h2>
<p>Modern BCDR solutions allow systems to stay available through failover and rapid recovery, limiting financial losses and disruption.</p>
<p>Hybrid cloud backup is one of the most effective approaches. By combining local and cloud-based recovery, it delivers both speed and flexibility. Local backups provide near-instant recovery for common issues, while cloud replication protects against larger incidents such as ransomware or infrastructure failures.</p>
<p>If local systems are compromised by a ransomware attack, clean and isolated copies of data remain available in the cloud. Recovery does not depend on paying a ransom or negotiating access. The business retains control.</p>
<p>That continuity is what defines a strong BCDR solution. Datto BCDR is built around this principle, delivering the speed to recover from everyday disruptions and the reliability to handle larger failures without adding complexity for your business or clients.</p>
<h2 id="heading-turning-bcdr-into-a-growth-opportunity">Turning BCDR into a growth opportunity</h2>
<p>BCDR supports long-term growth for MSPs by supporting a recurring service model. At a time when it’s challenging to acquire new customers, this matters more than ever. The  by Kaseya found that 71% of MSPs consider acquiring new customers their biggest challenge.</p>
<p>This makes expanding services within existing accounts far more valuable. In this context, BCDR stands out as a category with steady adoption and strong growth, creating a clear opportunity for MSPs to build consistent revenue while strengthening client relationships.</p>
<h3 id="heading-how-to-have-a-winning-bcdr-sales-conversation">How to have a winning BCDR sales conversation</h3>
<p>Clients understand data loss. They can picture files disappearing. What they struggle to grasp is downtime and its impact on revenue and reputation. That gap often leads to underinvestment, with clients settling for basic backup and assuming they’re covered.</p>
<p>To bridge this gap, MSPs need to change how they frame the conversation.</p>
<p>Shift the conversation from technology to business impact</p>
<p>Most clients don’t think in terms of backup frequency or storage capacity. They think about whether their business can continue operating.</p>
<p>Instead of focusing on features, focus on outcomes:</p>
<ul>
<li><p>What happens if systems are unavailable for three hours?</p>
<ul>
<li><p>How much revenue is lost during that time?</p>
</li>
<li><p>How many employees are unable to work?</p>
</li>
<li><p>How long will it take to fully recover?</p>
</li>
</ul>
</li>
</ul>
<p>When framed this way, the discussion moves away from IT spend and toward business continuity. Tools like  can help quantify this impact. When clients see downtime expressed in financial terms, the value of BCDR becomes clearer.</p>
<p>Make recovery concepts easy to understand</p>
<p>Technical terms like recovery time objective (RTO) and recovery point objective (RPO) can create confusion if introduced too early.</p>
<p>Start with simple questions:</p>
<ul>
<li><p>If your systems are down for a full day, can your business operate?</p>
<ul>
<li>If you lose a day of data, what does that mean for revenue and customer commitments?</li>
</ul>
</li>
</ul>
<p>Then connect those answers to recovery metrics. Real scenarios help reinforce this. For example, if a business backs up data once per day and an incident occurs just before the next backup, all recent work is lost. For most organizations, that level of loss is not acceptable.</p>
<h3 id="heading-taking-the-next-step">Taking the next step</h3>
<p>Building and communicating a strong BCDR strategy requires the right tools and a clear way to show clients what is at stake and how to address it.</p>
<p>This  walks through this step by step. It includes practical examples, case studies and strategies that show how to position business continuity, quantify its value and turn it into a service clients understand and adopt.</p>
<p><strong> and start building a continuity strategy that works for both you and your clients.</strong></p>
<p>Sponsored and written by .*</p>
<hr />
]]></content:encoded></item><item><title><![CDATA[Critical flaw in Protobuf library enables JavaScript code execution]]></title><description><![CDATA[Proof-of-concept exploit code has been published for a critical remote code execution flaw in protobuf.js, a widely used JavaScript implementation of Google's Protocol Buffers.
The tool is highly popular in the Node Package Manager (npm) registry, wi...]]></description><link>https://news.fmisec.com/critical-flaw-in-protobuf-library-enables-javascript-code-execution</link><guid isPermaLink="true">https://news.fmisec.com/critical-flaw-in-protobuf-library-enables-javascript-code-execution</guid><category><![CDATA[Security]]></category><category><![CDATA[threat intelligence]]></category><dc:creator><![CDATA[Phong Xuan]]></dc:creator><pubDate>Sun, 19 Apr 2026 17:08:28 GMT</pubDate><enclosure url="https://www.bleepstatic.com/content/hl-images/2026/04/17/protobuf.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><img src="https://www.bleepstatic.com/content/hl-images/2026/04/17/protobuf.jpg" alt /></p>
<p>Proof-of-concept exploit code has been published for a critical remote code execution flaw in protobuf.js, a widely used JavaScript implementation of Google's Protocol Buffers.</p>
<p>The tool is highly popular in the Node Package Manager (npm) registry, with an average of nearly . It is used for inter-service communication, in real-time applications, and for efficient storage of structured data in databases and cloud environments.</p>
<p>In a report on Friday, application security company Endor Labs says that the remote code execution vulnerability (RCE) in protobuf.js is caused by unsafe dynamic code generation.</p>
<p>The security issue has not received an official CVE number and is currently being tracked as GHSA-xq3m-2v4x-88gg, the identifier assigned by GitHub.</p>
<p> that the library builds JavaScript functions from protobuf schemas by concatenating strings and executing them via the Function() constructor, but it fails to validate schema-derived identifiers, such as message names.</p>
<p>This lets an attacker supply a malicious schema that injects arbitrary code into the generated function, which is then executed when the application processes a message using that schema.</p>
<p>This opens the path to RCE on servers or applications that load attacker-influenced schemas, granting access to environment variables, credentials, databases, and internal systems, and even allowing lateral movement within the infrastructure.</p>
<p>The attack could also affect developer machines if those load and decode untrusted schemas locally.</p>
<p>The flaw impacts protobuf.js versions 8.0.0/7.5.4 and lower. Endor Labs recommends upgrading to 8.0.1 and 7.5.5, which address the issue.</p>
<p>The patch sanitizes type names by stripping non-alphanumeric characters, preventing the attacker from closing the synthetic function. However, Endor comments that a longer-term fix would be to stop round-tripping attacker-reachable identifiers through Function at all.</p>
<p>Endor Labs is warning that “exploitation is straightforward,” and that the minimal proof-of-concept (PoC) included in the  reflects this. However, no active exploitation in the wild has been observed to date.</p>
<p>The vulnerability was reported by Endor Labs researcher and security bug bounty hunter  on March 2, and the protobuf.js maintainers released a patch on  GitHub on March 11. Fixes to the npm packages were made available on April 4 for the 8.x branch and on April 15 for the 7.x branch.</p>
<p>Apart from upgrading to patched versions, Endor Labs also recommends that system administrators audit transitive dependencies, treat schema-loading as untrusted input, and prefer precompiled/static schemas in production.</p>
<p>AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.</p>
<p>At the Autonomous Validation Summit (May 12 &amp; 14), see how autonomous, context-rich validation finds what's exploitable, proves controls hold, and closes the remediation loop.</p>
<hr />
]]></content:encoded></item><item><title><![CDATA[NAKIVO v11.2: Ransomware Defense, Faster Replication, vSphere 9, and Proxmox VE 9.0 Support]]></title><description><![CDATA[*
The new release adds automated replication, support for newer VMware vSphere and Proxmox versions, and modern authentication for faster, safer recovery.
Sparks, Nevada – April 3rd, 2026 – NAKIVO Inc., trusted by over 16,000 organizations in 191 cou...]]></description><link>https://news.fmisec.com/nakivo-v112-ransomware-defense-faster-replication-vsphere-9-and-proxmox-ve-90-support</link><guid isPermaLink="true">https://news.fmisec.com/nakivo-v112-ransomware-defense-faster-replication-vsphere-9-and-proxmox-ve-90-support</guid><category><![CDATA[Security]]></category><category><![CDATA[threat intelligence]]></category><dc:creator><![CDATA[Phong Xuan]]></dc:creator><pubDate>Sat, 18 Apr 2026 16:14:18 GMT</pubDate><enclosure url="https://www.bleepstatic.com/content/posts/2026/04/15/nakivo-header.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>*</p>
<p>The new release adds automated replication, support for newer VMware vSphere and Proxmox versions, and modern authentication for faster, safer recovery.</p>
<p>Sparks, Nevada – April 3rd, 2026 – NAKIVO Inc., trusted by over 16,000 organizations in 191 countries, announced the general availability of , focused on fast, reliable, and proactive data protection.</p>
<p>As ransomware attacks evolve and downtime costs rise, v11.2 provides IT teams with tools to quicken recovery, support next-generation infrastructure, and maintain secure data protection without added complexity.</p>
<h2 id="heading-automated-real-time-replication">Automated Real-Time Replication</h2>
<p>At the core of v11.2 is an automated real-time replication engine. It keeps replica VMs synchronized with production workloads, allowing organizations to fail over to a recent replica within minutes after hardware failures, ransomware, or human error.</p>
<p>For businesses where every minute of downtime carries measurable financial or reputational consequences, this capability closes one of the most dangerous blind spots in traditional backup strategies: The window between the last scheduled job and the moment of failure.</p>
<h2 id="heading-support-for-vmware-vsphere-9-and-proxmox-ve-90-and-91">Support for VMware vSphere 9 and Proxmox VE 9.0 and 9.1</h2>
<p>Keeping your backup stack aligned with hypervisor versions is mission-critical for teams managing VMware, Proxmox, or hybrid environments. NAKIVO Backup &amp; Replication v11.2 addresses that directly while also tightening security and laying the groundwork for faster disaster recovery.</p>
<h3 id="heading-full-vmware-vsphere-9-support">Full VMware vSphere 9 Support</h3>
<p><img src="https://www.bleepstatic.com/images/news/security/n/nakivo/ransomware-defense/Full-VMware-vSphere-9-Support.jpg" alt /></p>
<p>The most significant update for VMware administrators: v11.2 delivers complete, production-ready support for vSphere 9, including vCenter Server 9.0.1.0, ESXi 9.0.1.0, and VDDK 9.0.1.0.</p>
<p>Earlier builds introduced initial compatibility, but v11.2 provides full readiness, enabling teams to upgrade their VMware infrastructure with confidence that NAKIVO will operate without disrupting existing jobs.</p>
<p>All core capabilities are fully operational under vSphere 9:</p>
<ul>
<li><p><strong>Agentless image-based backup and replication</strong> using Changed Block Tracking (CBT) for efficient, low-impact incrementals</p>
<ul>
<li><p><strong>Instant VM recovery</strong> to restore workloads in minutes, not hours</p>
</li>
<li><p><strong>Granular file-level and application-object recovery</strong> for Exchange and SQL workloads, without restoring the entire VM</p>
</li>
<li><p><strong>Built-in DR orchestration</strong> with failover, failback, and non-disruptive testing via Site Recovery</p>
</li>
<li><p><strong>Ransomware resilience</strong> through immutable backups, AES-256 encryption, air-gapped copies, and pre-recovery malware scanning</p>
</li>
<li><p><strong>Fast, deduplicated, compressed backups</strong> to minimize storage footprint across repositories</p>
</li>
</ul>
</li>
</ul>
<p>For organizations tracking the licensing shift away from standalone vSphere Standard and Enterprise Plus editions toward VMware vSphere Foundation 9.0, this update ensures NAKIVO keeps pace with where VMware is heading.</p>
<p>NAKIVO v11.2: OAuth 2.0 authentication, immutable backups, real-time replication, and ransomware resilience.</p>
<p>Stay ahead of evolving cyber threats with enterprise-grade security.</p>
<h3 id="heading-proxmox-ve-90-support-with-91-already-in-scope">Proxmox VE 9.0 Support, with 9.1 Already in Scope</h3>
<p><img src="https://www.bleepstatic.com/images/news/security/n/nakivo/ransomware-defense/Proxmox-V-9_0-Support-with-9_1-Already-in-Scope.jpg" alt /></p>
<p>NAKIVO's Proxmox support continues to mature. v11.2 brings full compatibility with Proxmox VE 9.0, and support for Proxmox VE 9.1 is already built in, letting Proxmox environments upgrade without risking protection gaps.</p>
<p>For environments running Proxmox at the edge, in cost-sensitive production, or as a VMware alternative, the full feature set includes:</p>
<ul>
<li><p><strong>Agentless host-level backup and replication</strong> with no guest agents required, keeping VM overhead minimal</p>
<ul>
<li><p><strong>Block-level incrementals</strong> via native change tracking, matching the efficiency of CBT in VMware environments</p>
</li>
<li><p><strong>Instant VM and file-level recovery</strong> for rapid restoration of individual machines or specific files</p>
</li>
<li><p><strong>Automated verification with screenshot confirmation</strong> to validate recoverability without manual intervention</p>
</li>
<li><p><strong>Immutable backups</strong> on S3-compatible and object storage targets, including AWS S3, Wasabi, Azure Blob, and Backblaze B2</p>
</li>
<li><p><strong>AES-256 encryption</strong> at source, in transit, and at rest with air-gapped copy options via tape or detached storage</p>
</li>
</ul>
</li>
</ul>
<p>For hybrid environments running VMware and Proxmox side by side, NAKIVO's unified management interface provides a single workflow that covers both platforms, which matters as infrastructure grows in complexity.</p>
<h2 id="heading-ransomware-defense-across-the-board">Ransomware Defense Across the Board</h2>
<p><img src="https://www.bleepstatic.com/images/news/security/n/nakivo/ransomware-defense/Ransomware-Defense-Across-the-Board.png" alt /></p>
<p>Ransomware protection in v11.2 is integrated into the architecture rather than isolated as a single feature. Immutability is supported across a wide range of targets, including AWS S3, Wasabi, Azure Blob, Backblaze B2, HPE StoreOnce, NEC HYDRAstor, and Dell EMC Data Domain. Pre-recovery malware scanning catches threats before they re-enter production. Air-gapped options — tape, detached USB, or offline NAS — provide a last line of defense when network-connected copies are compromised.</p>
<p>"<em>Our priority is to give customers a smooth and secure path forward as their environments evolve</em>," said Bruce Talley, CEO of NAKIVO. "<em>v11.2 focuses on compatibility, security, and consistent performance as virtualization platforms advance.</em>"</p>
<p>Matt Mitchell, Web Developer at SEHD at the University of Colorado Denver, said: "<em>With NAKIVO Backup &amp; Replication, I can recover VMware VMs within 10 minutes. With data deduplication, we were able to decrease storage space by 80%.</em>"</p>
<h2 id="heading-oauth-20-secure-email-notifications-by-default">OAuth 2.0: Secure Email Notifications by Default</h2>
<p><img src="https://www.bleepstatic.com/images/news/security/n/nakivo/ransomware-defense/OAuth-2_0-Secure-Email-Notifications-by-Default.png" alt /></p>
<p>v11.2 introduces native OAuth 2.0 authentication for email notifications, replacing the deprecated basic authentication that major providers like Google Workspace and Microsoft 365 are actively phasing out.</p>
<p>The shift to token-based authentication removes stored plain-text credentials from the equation, delivering a meaningful compliance and security improvement, particularly for organizations under regulatory scrutiny.</p>
<p>HPE StoreOnce users gain full support for VSA Gen 5, improving deduplication appliance integration and repository performance. The platform has also been updated to Java SE 24 and the latest Spring Framework, delivering stability improvements, security patches, and incremental gains in backup and restore throughput — benefits that compound over time in high-frequency backup environments.</p>
<h2 id="heading-enhanced-msp-direct-connect-for-multi-tenant-management">Enhanced MSP Direct Connect for Multi-Tenant Management</h2>
<p><img src="https://www.bleepstatic.com/images/news/security/n/nakivo/ransomware-defense/MSP-Direct-Connect-for-Multi-Tenant-Management.png" alt /></p>
<p>Managed service providers running multi-tenant environments gain efficiency through enhanced MSP Direct Connect. The updated interface provides single-pane visibility across multiple tenants, reducing overhead and accelerating response times.</p>
<p>For MSPs scaling their service portfolios, this improvement directly supports growth without a proportional increase in administrative burden.</p>
<h2 id="heading-the-bottom-line">The Bottom Line</h2>
<p>NAKIVO Backup &amp; Replication v11.2 is an operationally important release. It removes the compatibility friction that holds teams back from upgrading infrastructure, strengthens ransomware resilience, and tightens security in areas that are easy to overlook until they become a problem. For VMware administrators preparing for a vSphere 9 migration, Proxmox environments approaching a version upgrade, or any organization seeking to enhance recovery capabilities, v11.2 provides a robust foundation for operational stability.</p>
<h2 id="heading-availability">Availability</h2>
<p><strong>NAKIVO Backup &amp; Replication v11.2 is available now. Organizations can download the fully featured free trial at .</strong></p>
<p>Resources:</p>
<h2 id="heading-about-nakivo">About NAKIVO</h2>
<p>NAKIVO is a US-based corporation dedicated to delivering the ultimate backup, ransomware protection, and disaster recovery solution for virtual, physical, cloud, and SaaS environments. Over 16,000 customers in 191 countries trust NAKIVO with protecting their data, including global brands like Coca-Cola, Honda, Siemens, and Cisco.</p>
<p>Visit:</p>
<p>Sponsored and written by .*</p>
<hr />
]]></content:encoded></item><item><title><![CDATA[Microsoft Teams right-click paste broken by Edge update bug]]></title><description><![CDATA[Microsoft is warning that a recent Microsoft Edge browser update introduced a bug that breaks right-click paste in chats in the Microsoft Teams desktop client.
In an advisory published on April 14, Microsoft says users are reporting that they are una...]]></description><link>https://news.fmisec.com/microsoft-teams-right-click-paste-broken-by-edge-update-bug</link><guid isPermaLink="true">https://news.fmisec.com/microsoft-teams-right-click-paste-broken-by-edge-update-bug</guid><category><![CDATA[Security]]></category><category><![CDATA[threat intelligence]]></category><dc:creator><![CDATA[Phong Xuan]]></dc:creator><pubDate>Sat, 18 Apr 2026 16:14:17 GMT</pubDate><enclosure url="https://www.bleepstatic.com/content/hl-images/2025/08/19/Microsoft-Teams.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><img src="https://www.bleepstatic.com/content/hl-images/2025/08/19/Microsoft-Teams.jpg" alt /></p>
<p>Microsoft is warning that a recent Microsoft Edge browser update introduced a bug that breaks right-click paste in chats in the Microsoft Teams desktop client.</p>
<p>In an advisory published on April 14, Microsoft says users are reporting that they are unable to paste URLs, text, or images into Teams chats when using right-click context menus, with the "Paste" option greyed out.</p>
<p>To work around the bug, Microsoft says users can still copy and paste content using keyboard shortcuts: Ctrl + C and Ctrl + V on Windows, or Cmd + C and Cmd + V on macOS.</p>
<p>"Impacted users report that they are unable to copy and paste URLs, text, and images in Microsoft Teams desktop client chats, as the paste option appears greyed out when using the right-click dropdown menu method," explains Microsoft.</p>
<p>"To bypass impact, we recommended that users attempt to copy the intended URLs, text, and images using Ctrl + C and paste using Ctrl + V for Windows, and corresponding Cmd + C and Cmd + V for Mac."</p>
<p>Microsoft says the bug is caused by a recent browser update that introduced a code regression in Microsoft Edge, which Microsoft Teams uses for certain functionality.</p>
<p>Admins on  and the  report that the problem is affecting users in corporate environments as well as individual users.</p>
<p>"I have multiple users on version 26072.519.4556.7438 experiencing this issue, including myself. Cannot right-click Paste, but CTRL+V and paste as text are allowed," an admin posted to the Microsoft Forums.</p>
<p><img src="https://www.bleepstatic.com/images/news/Microsoft/t/teams/edge-bug-breaks-copy-paste/teams-paste-greyed.jpg" alt /><strong>Paste option in Microsoft Teams is greyed out</strong></p>
<p>Other users said that reinstalling Teams or clearing the cache did not fix the problem.</p>
<p>Microsoft says it identified the cause and is rolling out a fix in stages while monitoring telemetry to confirm that systems are recovering.</p>
<p>As of the latest update on April 16, Microsoft has not provided an exact timeline for when the fix will be fully rolled out.</p>
<p>AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.</p>
<p>At the Autonomous Validation Summit (May 12 &amp; 14), see how autonomous, context-rich validation finds what's exploitable, proves controls hold, and closes the remediation loop.</p>
<hr />
]]></content:encoded></item><item><title><![CDATA[Webinar: From phishing to fallout — Why MSPs must rethink both security and recovery]]></title><description><![CDATA[Cyberattacks are evolving faster than many MSP and corporate defenses can keep up, with phishing now one of the primary drivers of modern cybercrime.
On Thursday, May 14, 2026 at 2:00 PM ET BleepingComputer will host a live webinar titled "**" with e...]]></description><link>https://news.fmisec.com/webinar-from-phishing-to-fallout-why-msps-must-rethink-both-security-and-recovery</link><guid isPermaLink="true">https://news.fmisec.com/webinar-from-phishing-to-fallout-why-msps-must-rethink-both-security-and-recovery</guid><category><![CDATA[Security]]></category><category><![CDATA[threat intelligence]]></category><dc:creator><![CDATA[Phong Xuan]]></dc:creator><pubDate>Fri, 17 Apr 2026 17:28:04 GMT</pubDate><enclosure url="https://www.bleepstatic.com/content/hl-images/2023/09/22/hacker-looking-at-computer-screens.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><img src="https://www.bleepstatic.com/content/hl-images/2023/09/22/hacker-looking-at-computer-screens.jpg" alt /></p>
<p>Cyberattacks are evolving faster than many MSP and corporate defenses can keep up, with phishing now one of the primary drivers of modern cybercrime.</p>
<p>On Thursday, May 14, 2026 at 2:00 PM ET BleepingComputer will host a live webinar titled "<em>**</em>" with experts from Kaseya.</p>
<p>The webinar explores how today's attacks unfold and why security and backup strategies must work together to reduce risk and ensure recovery.</p>
<p>The session will examine how AI-powered phishing, business email compromise, and ransomware campaigns are becoming more targeted and harder to detect, often bypassing traditional security controls. Even when threats are identified, delays in response or gaps in recovery planning can turn a contained incident into a full-scale outage.</p>
<p>Kaseya, known for its MSP-focused security and backup solutions, helps service providers take a more integrated approach to cyber resilience. By combining prevention, detection, and rapid recovery, MSPs can better protect client environments and maintain business continuity when incidents occur.</p>
<p>In this webinar, attendees will gain practical insight into how attackers are exploiting trusted infrastructure and SaaS platforms, and how MSPs can adapt their strategies to stay ahead of increasingly sophisticated threats.</p>
<h2 id="heading-security-alone-isnt-enough-anymore">Security alone isn’t enough anymore</h2>
<p>While preventing attacks remains critical, the reality is that not every threat can be stopped. Many MSPs discover too late that their security stack lacks the ability to respond quickly or recover effectively after a breach.</p>
<p>Modern attacks frequently move beyond initial access to data theft, account takeover, and ransomware deployment, making recovery capabilities just as important as detection.</p>
<p>This webinar will explore how integrating backup and disaster recovery into security strategies can significantly reduce downtime and limit the impact of an incident.</p>
<h3 id="heading-the-upcoming-webinar-will-cover">The upcoming webinar will cover:</h3>
<ul>
<li><p>Why AI-driven phishing and brand impersonation are outpacing traditional email security</p>
<ul>
<li><p>How attackers use trusted infrastructure and SaaS platforms to bypass defenses</p>
</li>
<li><p>Where MSP security strategies often fail after initial compromise</p>
</li>
<li><p>Why SaaS backups and BCDR planning are critical for cyber resilience</p>
</li>
<li><p>How leading MSPs combine prevention, detection, and rapid recovery</p>
</li>
</ul>
</li>
</ul>
<p>Don’t miss this opportunity to learn how to strengthen your MSP’s security posture and ensure your clients can recover quickly when incidents occur.</p>
<p><strong>➡ </strong></p>
<hr />
]]></content:encoded></item><item><title><![CDATA[Inside an Underground Guide: How Threat Actors Vet Stolen Credit Card Shops]]></title><description><![CDATA[*
The underground market for stolen credit card data has long operated as a volatile and highly deceptive ecosystem, where even experienced actors routinely fall victim to scams, exit schemes, and compromised services.
In recent years, this environme...]]></description><link>https://news.fmisec.com/inside-an-underground-guide-how-threat-actors-vet-stolen-credit-card-shops</link><guid isPermaLink="true">https://news.fmisec.com/inside-an-underground-guide-how-threat-actors-vet-stolen-credit-card-shops</guid><category><![CDATA[Security]]></category><category><![CDATA[threat intelligence]]></category><dc:creator><![CDATA[Phong Xuan]]></dc:creator><pubDate>Fri, 17 Apr 2026 17:28:03 GMT</pubDate><enclosure url="https://www.bleepstatic.com/content/posts/2026/04/14/header-imges.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>*</p>
<p>The underground market for stolen credit card data has long operated as a volatile and highly deceptive ecosystem, where even experienced actors routinely fall victim to scams, exit schemes, and compromised services.</p>
<p>In recent years, this environment has become even more unstable, driven by increased law enforcement pressure, internal distrust among criminals, and the rapid turnover of marketplaces. As a result, threat actors are increasingly forced to adopt more structured approaches to identifying reliable suppliers and minimizing risk within their own illicit operations.</p>
<p>A guide found on an underground forum by  analysts sheds light on how threat actors themselves navigate the volatile world of credit card (CC) marketplaces.</p>
<p>The document, titled “<em>The Underground Guide to Legit CC Shops: Cutting Through the Bullshit</em>”—provides a structured look at how actors attempt to reduce risk in an ecosystem plagued by scams, law enforcement infiltration, and short‑lived operations.</p>
<p>Analysis of the guide reveals more than just practical advice. It outlines a methodology for vetting carding shops, operational security practices, and sourcing strategies, effectively documenting how today’s fraud actors think about trust, reliability, and survivability.</p>
<p>While parts of the guide appear to promote specific services, suggesting a possible vested interest from its author, it still offers a valuable glimpse into the inner workings of the carding economy, and the evolving standards actors use to operate within it.</p>
<h2 id="heading-from-opportunistic-fraud-to-supplier-vetting-discipline">From Opportunistic Fraud to Supplier Vetting Discipline</h2>
<p>One of the most striking aspects of the guide is how it reframes carding from opportunistic fraud into a process‑driven discipline. Rather than focusing on how to use stolen cards, the document emphasizes how to evaluate suppliers.</p>
<p>This shift reflects a broader evolution within underground markets, where the primary risk is no longer just operational failure, but being defrauded by other criminals or interacting with compromised infrastructure.</p>
<p><img src="https://www.bleepstatic.com/images/news/security/f/flare/carding/cardhub-our-services.jpg" alt /><strong>Screenshot from one of the recommended shops in the guide, named "CardingHub"</strong></p>
<p>The author repeatedly stresses that legitimacy is not defined by branding or visibility, but by survivability. In other words, a “real” shop is one that continues operating over time despite law enforcement operations, scams, and internal instability.</p>
<p>This aligns with observed trends in underground economies, where the lifespan of marketplaces has become increasingly unpredictable, forcing actors to adopt continuous verification practices.</p>
<p>The guide makes it clear that what separates a “legitimate” shop from the rest isn’t branding or uptime, it’s the quality of the stolen data it delivers. References to “fresh bins” (BIN = Bank Identifiable Number) and low decline rates point directly to the sources behind the data, whether from  infections,  campaigns, or point-of-sale breaches. In this ecosystem, reputation isn’t built on promises but on consistently providing cards that actually work.</p>
<p>Shops that fail to maintain reliable data sources are quickly exposed, while those with steady access to fresh compromises rise to the top.</p>
<p>Carding actors are adopting disciplined workflows to source and test stolen financial data.</p>
<p>Flare continuously monitors underground forums and marketplaces, giving your team early visibility into exposed credentials, compromised cards, and emerging fraud infrastructure.</p>
<h2 id="heading-building-trust-in-a-trustless-market">Building Trust in a Trustless Market</h2>
<p>Transparency is another recurring theme. The guide highlights the importance of clear pricing models, real‑time inventory, and functional support systems, including ticketing and escrow services. These characteristics closely mirror legitimate e‑commerce platforms, underscoring how leading carding shops have adopted business practices designed to build user confidence and reduce friction.</p>
<p>Equally important is the role of community validation. The guide dismisses on‑site testimonials as unreliable, instead directing users toward discussions in closed or invite‑only forums. This reflects a broader fragmentation of the underground landscape, where trust is increasingly tied to controlled environments and long‑standing reputations.</p>
<p>Actors are encouraged to look for sustained discussion threads and historical presence, rather than isolated positive feedback.</p>
<p>The document also reveals a strong awareness of adversarial pressures. The emphasis on security‑first infrastructure, such as mirror domains, DDoS protection, and the absence of tracking mechanisms, suggests that operators are actively defending against both law enforcement monitoring and competing criminal groups.</p>
<p>In effect, these marketplaces function not only as distribution platforms, but as hardened environments designed to ensure operational continuity.</p>
<p><img src="https://www.bleepstatic.com/images/news/security/f/flare/carding/carding-hublisting.jpg" alt /><strong>Screenshot from one of the recommended shops in the guide, named "CardingHub"</strong></p>
<h2 id="heading-the-technical-checklist">The Technical Checklist</h2>
<p>Beyond high‑level principles, the guide introduces a step‑by‑step vetting protocol that provides insight into how threat actors conduct due diligence. Technical checks such as domain age, WHOIS privacy, and SSL configuration are presented as baseline requirements.</p>
<p>While these checks are relatively simple, they demonstrate an effort to apply structured analysis to what has historically been a trust‑based decision process.</p>
<p>The guide also highlights the importance of identifying mirror infrastructure and backup access points, noting that established operations rarely rely on a single domain. This reflects a practical understanding of the instability of underground services, where takedowns and disruptions are common. The presence of multiple access points is framed as an indicator of operational maturity and resilience.</p>
<p>Social intelligence gathering plays an equally significant role. Rather than relying on direct interactions with vendors, users are encouraged to analyze forum discussions, track vendor histories, and identify patterns of behavior over time.</p>
<p>Particular attention is given to detecting coordinated endorsement campaigns, such as multiple positive reviews originating from newly created accounts, a tactic frequently associated with scams.</p>
<h2 id="heading-operational-security">Operational Security</h2>
<p>Another critical component of the guide is its focus on operational security. The recommendations provided, while framed in the context of carding, closely mirror practices observed across a wide range of cybercriminal activities. Users are advised to avoid direct connections, utilize proxy services aligned with target geographies, and compartmentalize their environments through dedicated systems or virtual machines.</p>
<p>The discussion of cryptocurrency usage is particularly notable. The guide strongly discourages direct transactions from regulated platforms, instead advocating for intermediary wallets and privacy‑focused assets such as Monero. This reflects a growing awareness among threat actors of blockchain analysis capabilities and the risks associated with traceable financial flows.</p>
<p>Taken together, these OPSEC recommendations highlight an important shift: actors are no longer relying solely on tools to evade detection, but are adopting layered strategies designed to reduce exposure across the entire operational chain. This level of discipline suggests that even mid‑tier actors are increasingly adopting practices once associated with more advanced threat groups.</p>
<h2 id="heading-scale-vs-exclusivity">Scale vs. Exclusivity</h2>
<p>The guide further categorizes carding shops into distinct operational models, including large automated platforms and smaller, curated vendor groups. This segmentation reflects the diversification of the underground economy, where different actors prioritize scale, accessibility, or quality depending on their objectives.</p>
<p>Automated platforms are described as highly efficient environments, often featuring integrated tools and instant purchasing capabilities. These operations resemble legitimate online marketplaces in both structure and functionality, enabling users to quickly acquire and test data at scale.</p>
<p>In contrast, boutique vendor groups emphasize exclusivity, higher quality, and controlled access, often relying on invitation‑based systems and long‑term relationships.</p>
<h2 id="heading-commercial-interests-and-operational-reality">Commercial Interests and Operational Reality</h2>
<p>Despite its structured approach, the guide is not without bias. The inclusion of a direct endorsement for a specific platform suggests that the author may have a vested interest in promoting certain services. This is a common pattern in underground communities, where informational content is often used as a vehicle for subtle advertising or affiliate activity.</p>
<p>Such endorsements should be viewed with caution. However, they do not necessarily invalidate the broader insights provided by the guide. Instead, they highlight the complex interplay between information sharing and commercial interests within cybercriminal ecosystems.</p>
<p>From a defensive perspective, the guide offers valuable intelligence into how threat actors assess risk and make operational decisions. The emphasis on verification, community validation, and layered security reflects a level of maturity that complicates traditional disruption efforts. Rather than relying on single points of failure, actors are increasingly building redundancy and adaptability into their workflows.</p>
<p>Ultimately, the document serves as both a playbook and a signal. It demonstrates that the carding ecosystem became more structured, more cautious, and more resilient. For defenders, understanding these dynamics is critical to anticipating how these markets will continue to evolve, and where opportunities for disruption may still exist.</p>
<h2 id="heading-how-flare-can-help">How Flare Can Help</h2>
<p>Flare helps organizations stay ahead of fraud by continuously monitoring underground forums and marketplaces, revealing how threat actors source, vet, and use stolen credit card data. This provides early insight into attacker behavior, including how they optimize success rates, build trust, and adapt to defenses.</p>
<p>By turning this intelligence into actionable insights, Flare enables security teams to detect exposures, anticipate fraud campaigns, and disrupt attacker workflows-shifting from reactive response to proactive, intelligence-driven defense.</p>
<p><strong>.</strong></p>
<p>Sponsored and written by .*</p>
<hr />
]]></content:encoded></item><item><title><![CDATA[New ATHR vishing platform uses AI voice agents for automated attacks]]></title><description><![CDATA[A new cybercrime platform called ATHR can harvest credentials via fully automated voice phishing attacks that use both human operators and AI agents for the social engineering phase.
The malicious operation is advertised on underground forums for $4,...]]></description><link>https://news.fmisec.com/new-athr-vishing-platform-uses-ai-voice-agents-for-automated-attacks</link><guid isPermaLink="true">https://news.fmisec.com/new-athr-vishing-platform-uses-ai-voice-agents-for-automated-attacks</guid><category><![CDATA[Security]]></category><category><![CDATA[threat intelligence]]></category><dc:creator><![CDATA[Phong Xuan]]></dc:creator><pubDate>Thu, 16 Apr 2026 17:15:49 GMT</pubDate><enclosure url="https://www.bleepstatic.com/content/hl-images/2026/04/16/Robot.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><img src="https://www.bleepstatic.com/content/hl-images/2026/04/16/Robot.jpg" alt /></p>
<p>A new cybercrime platform called ATHR can harvest credentials via fully automated voice phishing attacks that use both human operators and AI agents for the social engineering phase.</p>
<p>The malicious operation is advertised on underground forums for $4,000 and a 10% comission from profits, and can steal login data for multiple services, including Google, Microsoft, and Coinbase.</p>
<p>Automation covers the entire telephone-oriented attack delivery (TOAD) stages, from luring targets over email to conducting voice-based social engineering and harvesting account credentials.</p>
<h3 id="heading-athr-attack-chain">ATHR attack chain</h3>
<p>According to researchers at cloud email security company Abnormal, ATHR is a complete phishing/vishing attack generator that offers brand-specific email templates, per-target customization, and spoofing mechanisms to make it appear as if the message originates from a trusted sender.</p>
<p>At the time of their analysis, the researchers observed that ATHR supported eight online services: Google, Microsoft, Coinbase, Binance, Gemini, Crypto.com, Yahoo, and AOL.</p>
<p>The attack starts with the victim receiving an email crafted to pass casual verification and even technical authentication checks.</p>
<p>"The lure is typically a fake security alert or account notification - something urgent enough to prompt a phone call but generic enough to avoid triggering content-based filters,"  in a report today.</p>
<p>Calling the phone number in the email routes the victim through Asterisk and WebRTC to AI voice agents driven by carefully crafted prompts that guide the victim through the data theft process.</p>
<p>The agents follow a multi-step script simulating a security incident. For Google accounts, they replicate the account recovery and verification process, using preset prompts that shape their tone, approach, persona, and behavior to mimic professional support staff.</p>
<p><img src="https://www.bleepstatic.com/images/news/u/1220909/2026/April/ATHR-Blog-2-AI-Agent-Script-Builder.jpg" alt /><strong>ATHR's AI agent script builder tool</strong>
<em>Source: Abnormal</em></p>
<p>The purpose of the fake recovery process is to extract a six-digit verification code that allows the attacker to gain access to the victim's account.</p>
<p>Although ATHR does offer the option to route the call to a human operator, the ability to use an AI agent is what sets it apart.</p>
<p>ATHR's dashboard gives operators control over the entire process and real-time data for each attack per target.</p>
<p>Through the ATHR panel, they control email distribution, handle calls, and manage phishing operations, monitoring outcomes in real time and receiving logs containing the stolen data.</p>
<p><img src="https://www.bleepstatic.com/images/news/u/1220909/2026/April/ATHR-Blog-1-Live-Dashboard.jpg" alt /><strong>ATHR main dashboard</strong>
<em>Source: Abnormal</em></p>
<p>Researchers at Abnormal warn that ATHR significantly reduces the manual effort for the operator and provides threat actors with an integrated platform that can handle all stages of a TOAD attack without the need to configure individual components.</p>
<p>This allows less technical attackers with no infrastructure to deploy automated vishing attacks from start to finish.</p>
<p>"The shift from a fragmented, manually intensive operation to a productized, largely automated one means TOAD attacks no longer require large teams or specialized infrastructure," Abnormal warns.</p>
<p>With the rise of ATHR-like cybercrime platforms, the researchers expect vishing attacks to become more frequent and more difficult to distinguish from legitimate communications.</p>
<p>Defending against such attacks requires a different approach, since the lure emails carry no reliable indicators, are customized to authenticate correctly, and appear as valid notifications.</p>
<p>However, detection is possible by checking the communication behavioral patterns between a sender and a recipient, and identifying if similar lures containing a phone number reached the organization within a short time frame.</p>
<p>Abnormal researchers say that modeling normal communication behavior across the organization can help AI-powered detection flag anomalies before targets make a call.</p>
<p>Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.</p>
<p>This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.</p>
<hr />
]]></content:encoded></item><item><title><![CDATA[Microsoft: April updates trigger BitLocker key prompts on some servers]]></title><description><![CDATA[Microsoft confirmed on Tuesday that some Windows Server 2025 devices will boot into BitLocker recovery after installing the April 2026 KB5082063 Windows security update.
BitLocker is a Windows security feature that encrypts storage drives to prevent ...]]></description><link>https://news.fmisec.com/microsoft-april-updates-trigger-bitlocker-key-prompts-on-some-servers</link><guid isPermaLink="true">https://news.fmisec.com/microsoft-april-updates-trigger-bitlocker-key-prompts-on-some-servers</guid><category><![CDATA[Security]]></category><category><![CDATA[threat intelligence]]></category><dc:creator><![CDATA[Phong Xuan]]></dc:creator><pubDate>Wed, 15 Apr 2026 17:42:36 GMT</pubDate><enclosure url="https://www.bleepstatic.com/content/hl-images/2024/05/24/windows-logo-locked.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><img src="https://www.bleepstatic.com/content/hl-images/2024/05/24/windows-logo-locked.jpg" alt /></p>
<p>Microsoft confirmed on Tuesday that some Windows Server 2025 devices will boot into BitLocker recovery after installing the April 2026 KB5082063 Windows security update.</p>
<p>BitLocker is a Windows security feature that encrypts storage drives to prevent data theft. Windows computers typically enter BitLocker recovery mode after hardware changes or events such as TPM (Trusted Platform Module) updates, to regain access to protected drives that have not been unlocked via the default unlock mechanism.</p>
<p>"Some devices with an unrecommended BitLocker Group Policy configuration might be required to enter their BitLocker recovery key on the first restart after installing this update," Microsoft .</p>
<p>"In this scenario, the BitLocker recovery key only needs to be entered once -- subsequent restarts will not trigger a BitLocker recovery screen, as long as the group policy configuration remains unchanged."</p>
<p>However, as the company explained, this only happens for very specific configurations, on systems where all the following conditions are met:</p>
<ol>
<li><p>$1</p>
<ol start="2">
<li><p>$1</p>
</li>
<li><p>$1</p>
</li>
<li><p>$1</p>
</li>
<li><p>$1</p>
</li>
</ol>
</li>
</ol>
<p>Microsoft added that this known issue is unlikely to affect personal devices, as impacted configurations are typically found on systems managed by enterprise IT teams.</p>
<p><img src="https://www.bleepstatic.com/images/news/u/1109292/2024/BitLocker%20recovery%20screen.png" alt /><em>BitLocker recovery screen (Microsoft)</em></p>
<p>​The company is now working on a solution to this issue and has shared temporary workarounds that allow installation of this month's security updates.</p>
<p>Admins are advised to remove the Group Policy configuration before deploying the KB5082063 update, and to ensure that BitLocker bindings use the PCR7 profile by following .</p>
<p>Those who can't remove the PCR7 group policy before installing can apply a Known Issue Rollback (KIR) on affected devices to prevent the automatic switch to the 2023 Boot Manager and to avoid triggering BitLocker recovery.</p>
<p>In May 2025, Microsoft  to address a similar issue that was causing Windows 10 systems to boot into BitLocker recovery after installing the May 2025 security updates.</p>
<p>One year earlier, in August 2024, Microsoft  triggering BitLocker recovery prompts across all supported Windows versions after .</p>
<p>In August 2022, Windows devices  after installing the .</p>
<p>Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.</p>
<p>This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.</p>
<hr />
]]></content:encoded></item><item><title><![CDATA[Rolling Networks: Securing the Transportation Sector]]></title><description><![CDATA[*
Author: Ben Wilkens, cybersecurity principal engineer, NMFTA
When they see an 80,000-pound vehicle rolling down the highway at 65 miles per hour, the first thing most people think about is not cybersecurity.
The fact is, these massive vehicles are ...]]></description><link>https://news.fmisec.com/rolling-networks-securing-the-transportation-sector</link><guid isPermaLink="true">https://news.fmisec.com/rolling-networks-securing-the-transportation-sector</guid><category><![CDATA[Security]]></category><category><![CDATA[threat intelligence]]></category><dc:creator><![CDATA[Phong Xuan]]></dc:creator><pubDate>Wed, 15 Apr 2026 17:42:35 GMT</pubDate><enclosure url="https://www.bleepstatic.com/content/posts/2026/04/14/cybersecurity-lock-over-truck.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>*</p>
<p><em>Author: Ben Wilkens, cybersecurity principal engineer, NMFTA</em></p>
<p>When they see an 80,000-pound vehicle rolling down the highway at 65 miles per hour, the first thing most people think about is not cybersecurity.</p>
<p>The fact is, these massive vehicles are rolling networks packed with a wide range of communications systems, onboard sensors, cloud connected devices, and Wi-Fi signals. In other words, these mobile assets are loaded with potential attack surfaces.</p>
<p>Trucking is the backbone of one of the critical infrastructure sectors that is central to daily life in North America.</p>
<p>Trucks bring the fuel to our power stations, the medicine to our hospitals; they transport the food to our grocery stores and the fuel to our gas stations. Without trucks, many of these critical supplies run out within three days.</p>
<p>Cybercriminals have realized that this places an enormous amount of pressure on trucking and logistics companies to maintain 100% uptime, and they leverage this with ransomware and extorsion attacks every day.</p>
<p>This is the threat landscape that those working in cybersecurity in the transportation sector, from offensive security practitioners hunting for ways to penetrate the onboard systems that keep these vehicles rolling, to defenders securing the enterprises that support them, see when they look at trucks on the highway.</p>
<h2 id="heading-atypical-threat-vectors">Atypical Threat Vectors</h2>
<p>The threats posed by cybercrime in the transportation sector do not end with traditional cyberattacks.  take traditional cyberattack techniques and use them to facilitate the theft of physical cargo.</p>
<p>In 2025 alone there was over $725 Million in reported cargo theft losses according to a recent study from .</p>
<p>These cargo thieves take advantage of lapses in operational security, physical security and cybersecurity with laser-precision to impersonate legitimate brokers and carriers, steal credentials to freight booking sites (“load boards”), and con shippers and freight brokers into releasing freight to bad actors posing as legitimate truck drivers.</p>
<p>Take for example the theft of over $1 million dollars of  last Fall; Organized criminals using fabricated identities built a relationship with a freight broker by legitimately hauling multiple loads to build trust.</p>
<p>Once they had established this trust, they targeted this high value shipment by spoofing the GPS signals of onboard tracking devices while they hauled these two loads to their own facilities and they were able to make off with two entire truckloads of rare tequila before the theft was even detected.</p>
<p>Many legitimate drivers are also duped into hauling cargo to warehouses operated by criminals using the stolen digital identities of legitimate freight brokers.</p>
<p>Once delivered to the criminal’s warehouse by this unwitting accomplice, the freight is broken down into numerous other shipments and resold to unsuspecting customers or on the black market or even “Amazon like” store fronts.</p>
<p>Join security practitioners, motor carriers, and technology leaders at NMFTA’s Cybersecurity Conference on September 29 through October 2, 2026 in Long Beach, CA.</p>
<p>Attendees will learn about real-world insights and strategies to protect connected freight systems.</p>
<h2 id="heading-the-good-news-story">The Good News Story</h2>
<p>There is a good new story here too though; due to the fact that traditional cyberattack techniques are the primary methods of attack; core cybersecurity hygiene practices can significantly reduce the risk that trucking organizations face.</p>
<p>Many of the well know cybersecurity frameworks and standards (NIST RMF, ISO 27001, CIS Controls, etc.) apply directly in this instance. Multi-Factor Authentication (MFA), network segmentation, social engineering awareness training, and strict patching schedules are all familiar controls to everyone in cybersecurity.</p>
<p>The caveat here is that the vast majority registered trucking and logistics companies qualify as small businesses or are even single owner operators. This can make the adoption of these standards and attaining a hardened cybersecurity stance challenging.</p>
<p>This fact has led to the need for  of these controls, specifically tailored to the various scales of companies that operate in the sector. These are now freely available to the industry and are helping to move the needle in the right direction.</p>
<p>Reducing the cybersecurity risks that the transportation sector is facing is the mission that the cybersecurity team at the National Motor Freight Traffic Association, Inc.® (NMFTA)® supports through research and development, education, and providing opportunities for the security community in the industry to collaborate and share hard-won lessons learned.</p>
<p>Beginning over a decade ago with security research into the physical “rolling assets” (trucks and trailers) and deep dives into telematics systems and electronic logging devices (ELDs) used to monitor driver’s hours of service compliance, NMFTA has brought cybersecurity to the forefront of the conversation in the trucking industry.</p>
<p>More recently their aperture has widened to also include security in the enterprise by providing cybersecurity  as well as technical guides to help reduce the risk of cyber-enabled cargo crime.</p>
<p>Every year the NMFTA hosts an  unique in the sector where security practitioners, decision makers from across the transportation sector, and many of vendors that provide the industry with the tools needed to combat its security challenges gather to discuss lessons learned, tools of the trade, and the ways to secure the latest in emerging technologies.</p>
<p>The cyber threats facing the transportation sector are real, and they are complex. Through a combination of collaboration, research, and a healthy dose of good old fashioned hard work, this essential backbone of our society is rising to the challenge with the help of many dedicated cybersecurity professionals.</p>
<p>Like so many other industries, transportation is racing to stay one step ahead of cybercriminals’ intent on harm, and emerging technologies opening up a host of new threat vectors. But as someone who has lived and worked in this industry for over two decades, I am optimistic when I look to the future.</p>
<p>When I see a truck rolling down the highway, I see the leading edge of an industry rising to the latest cybersecurity challenges.</p>
<p><strong>Join security practitioners, motor carriers, and technology leaders at  to collaborate, share insights, and stay ahead of the evolving cyberthreats facing the transportation sector.</strong></p>
<p>Sponsored and written by .*</p>
<hr />
]]></content:encoded></item><item><title><![CDATA[European Gym giant Basic-Fit data breach affects 1 million members]]></title><description><![CDATA[Dutch fitness giant Basic-Fit announced that hackers breached its systems and gained access to information belonging to a million of its customers.
The company operates the largest gym chain in Europe, owning more than 1,700 clubs and over 430 franch...]]></description><link>https://news.fmisec.com/european-gym-giant-basic-fit-data-breach-affects-1-million-members</link><guid isPermaLink="true">https://news.fmisec.com/european-gym-giant-basic-fit-data-breach-affects-1-million-members</guid><category><![CDATA[Security]]></category><category><![CDATA[threat intelligence]]></category><dc:creator><![CDATA[Phong Xuan]]></dc:creator><pubDate>Tue, 14 Apr 2026 17:48:04 GMT</pubDate><enclosure url="https://www.bleepstatic.com/content/hl-images/2026/04/13/BasicFit.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><img src="https://www.bleepstatic.com/content/hl-images/2026/04/13/BasicFit.jpg" alt /></p>
<p>Dutch fitness giant Basic-Fit announced that hackers breached its systems and gained access to information belonging to a million of its customers.</p>
<p>The company operates the largest gym chain in Europe, owning more than 1,700 clubs and over 430 franchises in 12 countries, including the Netherlands, Belgium, France, Spain, and Germany.</p>
<p>In a disclosure published on its website earlier today, Basic-Fit states that club members impacted by the cyberattack have been informed directly.</p>
<p>“Today, Basic-Fit has notified the relevant data protection authority concerning unauthorized access to the system that records members’ visits to Basic-Fit clubs,” reads the.</p>
<p>“The unauthorized access was detected by our system monitoring processes and was stopped within minutes of discovery.”</p>
<p>Despite the claimed quick response, an investigation conducted with the help of external security experts found that the attacker exfiltrated data belonging to some Basic-Fit members, which includes the following:</p>
<ul>
<li><p>Full name</p>
<ul>
<li><p>Physical address</p>
</li>
<li><p>Email address</p>
</li>
<li><p>Phone number</p>
</li>
<li><p>Date of birth</p>
</li>
<li><p>Bank account details</p>
</li>
<li><p>Other membership information</p>
</li>
</ul>
</li>
</ul>
<p>It is important to note that customer data at Basic-Fit franchises has not been exposed in the incident, as it is stored on a separate system.</p>
<p>In the public disclosure, the company specified that the number of affected individuals in the Netherlands is 200,000. However, a spokesperson told BleepingComputer that the total number is around 1 million members in the Netherlands, Belgium, Luxembourg, France, Spain, and Germany.</p>
<p>The Basic-Fit representative noted that the gyms across Europe have around five million members.</p>
<p>According to the official disclosure, no identification documents or account passwords were accessed as a result of the data breach.</p>
<p>Based on data retention laws in the European Union, Basic-Fit is required to delete all personal data and membership automatically after two years.</p>
<p>Customers can access data in their My Basic-Fit app one year after termination. Information in the app should be removed automatically two months after uninstalling it from the device, and upon membership termination.</p>
<p>Basic-Fit says that its investigation of the incident's impact did not reveal that the data was leaked online. Nevertheless, the company will continue to monitor with the help of external experts.</p>
<p>Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.</p>
<p>This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.</p>
<hr />
]]></content:encoded></item><item><title><![CDATA[5 Ways Zero Trust Maximizes Identity Security]]></title><description><![CDATA[*
 of known initial access vectors in 2025. It’s the most common way for attackers to breach a network, and once inside, excessive permissions and limited visibility often allow them to escalate unchecked.
Zero Trust is positioned as the answer. In t...]]></description><link>https://news.fmisec.com/5-ways-zero-trust-maximizes-identity-security</link><guid isPermaLink="true">https://news.fmisec.com/5-ways-zero-trust-maximizes-identity-security</guid><category><![CDATA[Security]]></category><category><![CDATA[threat intelligence]]></category><dc:creator><![CDATA[Phong Xuan]]></dc:creator><pubDate>Tue, 14 Apr 2026 17:48:03 GMT</pubDate><enclosure url="https://www.bleepstatic.com/content/posts/2026/04/06/specops-mobile-device-lock.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>*</p>
<p> of known initial access vectors in 2025. It’s the most common way for attackers to breach a network, and once inside, excessive permissions and limited visibility often allow them to escalate unchecked.</p>
<p>Zero Trust is positioned as the answer. In theory, removing implicit trust and requiring every access request to be verified should improve security. But in practice, simply adopting Zero Trust principles isn’t enough.</p>
<p>If it’s implemented as a set of isolated controls rather than a cohesive identity strategy, gaps remain, and attackers will find them.</p>
<p>To truly strengthen identity security, Zero Trust must be applied with identity at its core: tightly governed, continuously validated, and fully visible across the environment. The following five approaches show how a well-executed Zero Trust model strengthens identity security in practical, measurable ways.</p>
<h2 id="heading-1-enforcing-least-privilege-access">1. Enforcing least privilege access</h2>
<p>It’s common for users to accumulate permissions over time as roles change, projects evolve, or temporary access isn’t revoked. The result is a level of access that far exceeds what users actually need for their job.</p>
<p>If attackers compromise that account, they inherit those same privileges, giving them a broader foothold from the outset.</p>
<p> applies the principle of least privilege to limit that exposure. Access is contingent upon specific requirements, rather than broad or permanent permissions. That means just-in-time access and time-bound privileges, with strict segmentation between systems and data.</p>
<p>If credentials are stolen, the potential impact is then contained. Attackers are far less able to escalate privileges or access sensitive systems, reducing both the likelihood and severity of a breach.</p>
<p>Verizon’s Data Breach Investigation Report found stolen credentials are involved in 44.7% of breaches.</p>
<p>Effortlessly secure Active Directory with compliant password policies, blocking 4+ billion compromised passwords, boosting security, and slashing support hassles!</p>
<h2 id="heading-2-continuous-context-aware-authentication">2. Continuous, context-aware authentication</h2>
<p> In a Zero Trust environment, treating authentication as a one-time event at login is a dangerous oversight. Attackers now use session hijacking and token theft to bypass initial checks entirely, moving through the network under the guise of a legitimate user.</p>
<p>They often leverage compromised devices to blend in with normal activity, remaining invisible to traditional security triggers.</p>
<p>Organizations need continuous, context-aware authentication to address this gap. Instead of relying solely on credentials, device health should also influence access decisions.</p>
<p>Solutions like  deliver that assurance. By binding identities to trusted devices, it prevents attackers from using passwords on their own hardware or unknown virtual environments.</p>
<p>If a device falls out of compliance, such as through a disabled firewall or missed update, users are prompted to fix it, and access can be restricted or revoked until they do.</p>
<p><img src="https://www.bleepstatic.com/images/news/security/t/token/have-the-key/Device-Authentication-1-orig.gif" alt /><em>Specops Device Trust</em></p>
<p>Additionally, Specops Device Trust supports Windows, macOS, Linux, iOS, and Android, enabling consistent device trust across an organization’s entire network, including BYOD and third-party devices.</p>
<p>This adds a crucial layer to  as credentials are far harder to abuse without a trusted device.</p>
<h2 id="heading-3-limiting-lateral-movement">3. Limiting lateral movement</h2>
<p>Zero Trust is designed to disrupt an attacker’s progression from initial compromise to privileged access. This involves segmenting access at a granular level and continuously verifying identity for each new request, rather than allowing unrestricted movement within the network.</p>
<p>Even users with legitimate access are limited to only the systems and data required for their role. This means that should an account be breached, the attacker’s ability to explore the environment, , or reach high-value assets is constrained at every step.</p>
<p>In practice, this containment can be the difference between a minor incident and a large-scale breach, turning what could have been widespread compromise into a far more manageable security event.</p>
<h2 id="heading-4-securing-remote-work-and-third-party-access">4. Securing remote work and third-party access</h2>
<p> and third-party collaboration have become standard, but they also introduce additional identity risk. Employees are logging in from unmanaged devices and networks, alongside vendors and partners.</p>
<p>In traditional models, this access is frequently overprovisioned or insufficiently monitored, creating gaps that attackers can exploit. A compromised third-party developer account, for example, offers a direct route into sensitive environments.</p>
<p>Zero Trust addresses this by treating every user and device as untrusted by default. Access is granted based on verified identity, device posture, and context, rather than network location or assumed trust.</p>
<p>This allows organizations to apply consistent security controls across all access points. Third-party users can be restricted to specific systems; sessions can be monitored more closely, and access can be revoked as soon as it’s no longer needed.</p>
<h2 id="heading-5-centralized-identity-governance-and-monitoring">5. Centralized identity governance and monitoring</h2>
<p>As identity environments grow, so does the challenge of maintaining visibility and control. Particularly in larger organizations, users, roles, applications, and permissions are spread across multiple systems, making it difficult for security teams to see who has access to what at any given time.</p>
<p>Zero Trust brings identity governance and monitoring into a more centralized model. Security teams can manage access policies, authentication events, and user activity from a single point, rather than in isolation.</p>
<p>Unusual access patterns, privilege changes, or policy violations can be detected and investigated more quickly, reducing the time attackers have to operate undetected.</p>
<h2 id="heading-implementing-zero-trust-identity-security-in-your-organization">Implementing Zero Trust identity security in your organization</h2>
<p>Moving toward a Zero Trust model is a journey, not a weekend project. You don't have to overhaul everything at once. Most organizations find the most immediate success by prioritizing phishing-resistant multi-factor authentication and device health checks first.</p>
<p>By starting with these high-impact controls, you can secure your most vulnerable entry points while gradually tightening least-privilege policies across the rest of your infrastructure.</p>
<p>Interested in seeing how Specops’ identity security services can help your organization move towards true Zero Trust authentication?</p>
<p>Contact us today or  to see our solutions in action.</p>
<p>Sponsored and written by .*</p>
<hr />
]]></content:encoded></item><item><title><![CDATA[Critical Marimo pre-auth RCE flaw now under active exploitation]]></title><description><![CDATA[Hackers started exploiting a critical vulnerability in the Marimo open-source reactive Python notebook platform just 10 hours after its public disclosure.
The flaw allows remote code execution without authentication in Marimo versions 0.20.4 and earl...]]></description><link>https://news.fmisec.com/critical-marimo-pre-auth-rce-flaw-now-under-active-exploitation</link><guid isPermaLink="true">https://news.fmisec.com/critical-marimo-pre-auth-rce-flaw-now-under-active-exploitation</guid><category><![CDATA[Security]]></category><category><![CDATA[threat intelligence]]></category><dc:creator><![CDATA[Phong Xuan]]></dc:creator><pubDate>Mon, 13 Apr 2026 17:06:20 GMT</pubDate><enclosure url="https://www.bleepstatic.com/content/hl-images/2026/04/10/Marimo.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><img src="https://www.bleepstatic.com/content/hl-images/2026/04/10/Marimo.jpg" alt /></p>
<p>Hackers started exploiting a critical vulnerability in the Marimo open-source reactive Python notebook platform just 10 hours after its public disclosure.</p>
<p>The flaw allows remote code execution without authentication in Marimo versions 0.20.4 and earlier. It tracked as  and GitHub assessed it with a critical score of 9.3 out of 10.</p>
<p>According to researchers at cloud-security company Sysdig, attackers created an exploit from the information in the  and immediately started using it in attacks that exfiltrated sensitive information.</p>
<p>Marimo is an  Python notebook environment, typically used by data scientists, ML/AI practitioners, researchers, and developers building data apps or dashboards. It is a fairly popular project, with 20,000 GitHub stars and 1,000 forks.</p>
<p>CVE-2026-39987 is caused by the WebSocket endpoint ‘/terminal/ws’ exposing an interactive terminal without proper authentication checks, allowing connections from any unauthenticated client.</p>
<p>This gives direct access to a full interactive shell, running with the same privileges as the Marimo process.</p>
<p>Marimo disclosed the flaw on April 8 and yesterday released  to address it. The developers noted that the flaw affects users who deployed Marimo as an editable notebook, and those who expose Marimo to a shared network using --host 0.0.0.0 while in edit mode.</p>
<h3 id="heading-exploitation-in-the-wild">Exploitation in the wild</h3>
<p>Within the first 12 hours after the vulnerability details were disclosed, 125 IP addresses began reconnaissance activity, according to Sysdig.</p>
<p>Less than 10 hours after the disclosure, the researchers observed the first exploitation attempt in a credential theft operation.</p>
<p>The attacker first validated the vulnerability by connecting to the /terminal/ws endpoint and executing a short scripted sequence to confirm remote command execution, disconnecting within seconds.</p>
<p>Shortly after, they reconnected and began manual reconnaissance, issuing basic commands such as pwd, whoami, and ls to understand the environment, followed by directory navigation attempts and checks for SSH-related locations.</p>
<p>Next, the attacker focused on credential harvesting, immediately targeting the .env file and extracting environment variables, including cloud credentials and application secrets. They then attempted to read additional files in the working directory and continued probing for SSH keys.</p>
<p><img src="https://www.bleepstatic.com/images/news/u/1220909/2026/April/cred-theft.jpg" alt /><strong>Stealing credentials</strong>
<em>Source: Sysdig</em></p>
<p>The entire credential access phase was completed in less than three minutes, notes a  this week.</p>
<p>Roughly an hour later, the attacker returned for a second exploitation session using the same exploit sequence.</p>
<p>The researchers say that behind the attack appears to be a “methodical operator” with a hands-on approach, rather than automated scripts, focusing on high-value objectives such as stealing .env credentials and SSH keys.</p>
<p>The attackers did not attempt to install persistence, deploy cryptominers, or backdoors, suggesting a quick, stealthy operation.</p>
<p>Marimo users are recommended to upgrade to version 0.23.0 immediately, monitor WebSocket connections to ‘/terminal/ws,’ restrict external access via a firewall, and rotate all exposed secrets.</p>
<p>If upgrading is not possible, an effective mitigation is to block or disable access to the ‘/terminal/ws’ endpoint entirely.</p>
<p>Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.</p>
<p>This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.</p>
<hr />
]]></content:encoded></item><item><title><![CDATA[The silent “Storm”: New infostealer hijacks sessions, decrypts server-side]]></title><description><![CDATA[*
A new infostealer called Storm appeared on underground cybercrime networks in early 2026, representing a shift in how credential theft is developing. For under $1,000 a month, operators get a stealer that harvests browser credentials, session cooki...]]></description><link>https://news.fmisec.com/the-silent-storm-new-infostealer-hijacks-sessions-decrypts-server-side</link><guid isPermaLink="true">https://news.fmisec.com/the-silent-storm-new-infostealer-hijacks-sessions-decrypts-server-side</guid><category><![CDATA[Security]]></category><category><![CDATA[threat intelligence]]></category><dc:creator><![CDATA[Phong Xuan]]></dc:creator><pubDate>Mon, 13 Apr 2026 17:06:19 GMT</pubDate><enclosure url="https://www.bleepstatic.com/content/posts/2026/04/08/storm-cloud-infostealer.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>*</p>
<p>A new infostealer called Storm appeared on underground cybercrime networks in early 2026, representing a shift in how credential theft is developing. For under $1,000 a month, operators get a stealer that harvests browser credentials, session cookies, and crypto wallets, then quietly ships everything to the attacker's server for decryption.</p>
<p>To understand why enterprises should care, it helps to know what changed. Stealers used to decrypt browser credentials on the victim's machine by loading SQLite libraries and accessing credential stores directly. Endpoint security tools got good at catching this, making local browser database access one of the clearest signs that something malicious was running.</p>
<p>Then Google introduced App-Bound Encryption in Chrome 127 (July 2024), which tied encryption keys to Chrome itself and made local decryption even harder. The first wave of bypasses involved injecting into Chrome or abusing its debugging protocol, but those still left traces that security tools could pick up.</p>
<p>Stealer developers responded by stopping local decryption altogether and shipping encrypted files to their own infrastructure instead, removing the telemetry most endpoint tools rely on to catch credential theft.</p>
<p>Storm takes this approach further by handling both Chromium and Gecko-based browsers (Firefox, Waterfox, Pale Moon) server-side, where StealC V2 still processes Firefox locally.</p>
<p>Collected data includes everything attackers need to restore hijacked sessions remotely and steal from their victims: saved passwords, session cookies, autofill, Google account tokens, credit card data, and browsing history.</p>
<p>One compromised employee browser can hand an operator authenticated access to SaaS platforms, internal tools, and cloud environments without ever triggering a password-based alert.</p>
<p><img src="https://www.bleepstatic.com/images/news/security/v/varonis/storm-infostealer/marketplace-forum-post.jpg" alt /><strong>Storm's forum listing</strong></p>
<h2 id="heading-cookie-restore-and-session-hijacking"><strong>Cookie restore and session hijacking</strong></h2>
<p>Once Storm has decrypted the browser data, stolen credentials and session cookies are dumped directly into the operator's panel. Where most stealers require buyers to manually replay stolen logs, Storm automates the next step.</p>
<p>Feed in a Google Refresh Token and a geographically matched SOCKS5 proxy, and the panel silently restores the victim's authenticated session.</p>
<p><img src="https://www.bleepstatic.com/images/news/security/v/varonis/storm-infostealer/cookie-restore-panel.jpg" alt /><strong>Cookie restore panel with a completed session hijack</strong></p>
<p>Varonis Threat Labs has covered this class of attack before. Our  research demonstrated how stolen Azure Entra ID session cookies render MFA irrelevant, giving attackers persistent access to Microsoft 365 without ever needing a password.</p>
<p>The  analysis showed how phishing kits intercept session tokens in real time to defeat Microsoft 365 MFA. Storm's cookie restore is the same underlying technique, productised and sold as a subscription feature.</p>
<p>AI introduces a new breed of email threats that are more deceptive than ever. Varonis Interceptor is the AI-native email security solution built to stop today's most sophisticated threats before they ever reach your inbox.</p>
<p>Watch the Interceptor webinar to see how Varonis enables true AI-powered security outcomes.</p>
<h2 id="heading-collection-and-infrastructure"><strong>Collection and infrastructure</strong></h2>
<p>Beyond credentials, Storm grabs documents from user directories, pulls session data from Telegram, Signal, and Discord, and targets crypto wallets through both browser extensions and desktop apps. System information and screenshots are captured across multiple monitors. Everything runs in memory to reduce the chance of detection.</p>
<p><img src="https://www.bleepstatic.com/images/news/security/v/varonis/storm-infostealer/build-panel.jpg" alt /><strong>Build configuration with collection modules and file grabber rules</strong></p>
<p>On the infrastructure side, operators connect their own virtual private servers (VPS) to Storm's central servers, routing stolen data through infrastructure they control rather than a shared platform. This keeps the central servers insulated from takedown attempts, because law enforcement or abuse reports hit the operator's node first.</p>
<p>Team management supports multiple workers with permissions covering log access, build creation, and cookie restoration, so a single Storm licence can support a small cybercriminal operation with divided responsibilities.</p>
<p>Domain detection auto-labels stolen credentials by service, with rules visible for Google, Facebook, Twitter/X, and cPanel, making it straightforward for operators to filter and prioritise the accounts they want to exploit first.</p>
<p><img src="https://www.bleepstatic.com/images/news/security/v/varonis/storm-infostealer/domain-detection-rules.jpg" alt /><strong>Domain detection rules</strong></p>
<h2 id="heading-active-campaigns-and-pricing"><strong>Active campaigns and pricing</strong></h2>
<p>At the time of investigation, the logs panel contained 1,715 entries spanning India, the US, Brazil, Indonesia, Ecuador, Vietnam, and several other countries. Whether all of these represent real victims or include test data is difficult to confirm from panel imagery alone, but the varied IPs, ISPs, and data sizes look consistent with active campaigns.</p>
<p>Credentials tagged to Google, Facebook, Twitter/X, Coinbase, Binance, Blockchain.com, and Crypto.com appear across multiple entries, the kind of data that typically ends up on the  that feed account takeover, fraud, and initial access for more targeted intrusions.</p>
<p><img src="https://www.bleepstatic.com/images/news/security/v/varonis/storm-infostealer/storm-log-panel.jpg" alt /><strong>Storm’s log panel</strong></p>
<p><img src="https://www.bleepstatic.com/images/news/security/v/varonis/storm-infostealer/log-entries.jpg" alt /><strong>Log entries with cryptocurrency exchange hits</strong></p>
<p>Storm is sold on a tiered subscription: $300 for a 7-day demo, $900/month standard, $1,800/month for a team license with 100 operator seats and 200 builds. A crypter is required on top.</p>
<p>Builds keep running after a subscription expires, so deployed stealers continue harvesting data regardless of the operator’s license status.</p>
<p><img src="https://www.bleepstatic.com/images/news/security/v/varonis/storm-infostealer/storm-pricing.jpg" alt /><strong>The different prices and packages</strong></p>
<h2 id="heading-detecting-stolen-sessions"><strong>Detecting stolen sessions</strong></h2>
<p>Storm is consistent with a broader shift in the stealer market. Server-side decryption enables attackers to avoid tripping endpoint tools designed to catch traditional on-device decryption, and session cookie theft has been replacing password theft as the primary objective for a while now.</p>
<p>The credentials and sessions that stealers like Storm harvest are the start of what comes next: logins from unfamiliar locations, lateral movement, and data access that breaks established patterns.</p>
<h2 id="heading-indicators-of-compromise"><strong>Indicators of compromise</strong></h2>
<p>-
    <strong>Forum handle:</strong> StormStealer</p>
<p>    -
    <strong>Forum ID:</strong> 221756</p>
<p>    -
    <strong>Account registered:</strong> 12/12/25</p>
<p>    -
    <strong>Current version:</strong> v0.0.2.0 (Gunnar)</p>
<p>    -
    <strong>Build characteristics:</strong> C++ (MSVC/msbuild), ~460 KB, Windows only</p>
<p><em>This article originally appeared on the .</em></p>
<p>Sponsored and written by .*</p>
<hr />
]]></content:encoded></item><item><title><![CDATA[Over 20,000 crypto fraud victims identified in international crackdown]]></title><description><![CDATA[An international law enforcement action led by the U.K.'s National Crime Agency (NCA) has identified over 20,000 victims of cryptocurrency fraud across Canada, the United Kingdom, and the United States.
Dubbed "Operation Atlantic," this joint action ...]]></description><link>https://news.fmisec.com/over-20000-crypto-fraud-victims-identified-in-international-crackdown</link><guid isPermaLink="true">https://news.fmisec.com/over-20000-crypto-fraud-victims-identified-in-international-crackdown</guid><category><![CDATA[Security]]></category><category><![CDATA[threat intelligence]]></category><dc:creator><![CDATA[Phong Xuan]]></dc:creator><pubDate>Sun, 12 Apr 2026 16:35:24 GMT</pubDate><enclosure url="https://www.bleepstatic.com/content/hl-images/2026/04/10/Hacker_bitcoin.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><img src="https://www.bleepstatic.com/content/hl-images/2026/04/10/Hacker_bitcoin.jpg" alt /></p>
<p>An international law enforcement action led by the U.K.'s National Crime Agency (NCA) has identified over 20,000 victims of cryptocurrency fraud across Canada, the United Kingdom, and the United States.</p>
<p>Dubbed "Operation Atlantic," this joint action took place last month, and it involved the NCA, the U.S. Secret Service, the Ontario Provincial Police, the Ontario Securities Commission, and multiple private industry partners.</p>
<p>"The NCA hosted law enforcement agencies at their London HQ and through real time intelligence sharing, technical capabilities and victim outreach, multiple fraud networks were disrupted across the world," the . "City of London Police, Financial Conduct Authority and other international law enforcement bodies also joined the weeklong action."</p>
<p>The investigators have also frozen more than $12 million in suspected criminal proceeds obtained through "approval phishing" attacks, in which scammers trick victims into granting them access to their cryptocurrency wallets, typically via investment scams. They also identified more than $45 million in stolen cryptocurrency connected to fraud schemes worldwide.</p>
<p>Officials said the public-private partnership model used in Operation Atlantic will be a core element of the U.K. government's recently announced , which connects industry data and law enforcement expertise to enable fraud prevention.</p>
<p>"Operation Atlantic is a powerful example of what is possible when international agencies and private industry work side by side," added Miles Bonfield, NCA Deputy Director of Investigations.</p>
<p>"This intensive action has led to the safeguarding of thousands of victims in the UK and overseas, stopped criminals in their tracks and helped save others from losing their funds."</p>
<p>The NCA added that, together with law enforcement and private-sector partners, it will continue to analyze intelligence gathered during this joint action to support other victims and pursue potential criminal activity.</p>
<p>Since January 2024, the FBI has also identified more than 8,000 victims of cryptocurrency investment fraud (also known as pig butchering) with support from the U.S. Secret Service, as part of . The FBI said that roughly 77% of those victims were unaware they were being scammed and that the estimated savings to victims is $511,511,288.</p>
<p>In its , the FBI said it received 61,559 complaints of cryptocurrency investment fraud last year, linked to $7.228 billion in losses and representing a massive 48% increase in complaints and a 25% increase in losses from 2024.</p>
<p>Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.</p>
<p>This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.</p>
<hr />
]]></content:encoded></item><item><title><![CDATA[Nearly 4,000 US industrial devices exposed to Iranian cyberattacks]]></title><description><![CDATA[The attack surface targeted by Iranian-linked hackers in cyberattacks against U.S. critical infrastructure networks includes thousands of Internet-exposed programmable logic controllers (PLCs) manufactured by Rockwell Automation.
According to a  issu...]]></description><link>https://news.fmisec.com/nearly-4000-us-industrial-devices-exposed-to-iranian-cyberattacks</link><guid isPermaLink="true">https://news.fmisec.com/nearly-4000-us-industrial-devices-exposed-to-iranian-cyberattacks</guid><category><![CDATA[Security]]></category><category><![CDATA[threat intelligence]]></category><dc:creator><![CDATA[Phong Xuan]]></dc:creator><pubDate>Sat, 11 Apr 2026 17:37:15 GMT</pubDate><enclosure url="https://www.bleepstatic.com/content/hl-images/2026/01/28/Hacker-typing.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><img src="https://www.bleepstatic.com/content/hl-images/2026/01/28/Hacker-typing.jpg" alt /></p>
<p>The attack surface targeted by Iranian-linked hackers in cyberattacks against U.S. critical infrastructure networks includes thousands of Internet-exposed programmable logic controllers (PLCs) manufactured by Rockwell Automation.</p>
<p>According to a  issued by multiple U.S. federal agencies on Tuesday, Iranian state-backed hacking groups have been targeting Rockwell Automation/Allen-Bradley PLC devices since March 2026, causing operational disruptions and financial losses.</p>
<p>"Iranian-affiliated APT targeting campaigns against U.S. organizations have recently escalated, likely in response to hostilities between Iran, and the United States and Israel," the authoring agencies warned.</p>
<p>"The FBI identified that this activity resulted in the extraction of the device's project file and data manipulation on HMI and SCADA displays."</p>
<p>As cybersecurity firm Censys reported one day later, three-quarters of more than 5,200 such industrial control systems found exposed online globally are from the United States.</p>
<p>"Censys data identifies 5,219 internet-exposed hosts globally responding to EtherNet/IP (EIP) and self-identifying as Rockwell Automation/Allen-Bradley devices," .</p>
<p>"The United States accounts for 74.6% of global exposure (3,891 hosts), with a disproportionate share on cellular carrier ASNs indicative of field-deployed devices on cellular modems."</p>
<p><img src="https://www.bleepstatic.com/images/news/u/1109292/2026/Internet-exposed%20Rockwell-Allen-Bradley-PLcs.png" alt /><em>Internet-exposed Rockwell/Allen Bradley PLCs (Censys)</em></p>
<p>​To defend against these ongoing attacks, network defenders are advised to secure PLCs using a firewall or disconnect them from the Internet, scan logs for signs of malicious activity, and check for suspicious traffic on OT ports (especially when it originates from overseas hosting providers).</p>
<p>Admins should also enforce multifactor authentication (MFA) for access to OT networks, keep all PLC devices up to date, and disable unused services and authentication methods.</p>
<p>This ongoing campaign follows  from nearly three years ago, when a threat group affiliated with the Iranian Government's Islamic Revolutionary Guard Corps (IRGC) and tracked as CyberAv3ngers targeted vulnerabilities in U.S.-based Unitronics operational technology (OT) systems.</p>
<p>CyberAv3ngers hackers compromised at least 75 Unitronics PLC devices in multiple waves of cyberattacks between November 2023 and January 2024, with half of those in Water and Wastewater Systems critical infrastructure networks across the United States.</p>
<p>More recently, the Handala hacktivist group ( to Iran's Ministry of Intelligence and Security)  from the network of U.S. medical giant Stryker, including employees' mobile devices and company-managed personal computers.</p>
<p>Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.</p>
<p>This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.</p>
<hr />
]]></content:encoded></item><item><title><![CDATA[ChatGPT rolls out new $100 Pro subscription to challenge Claude]]></title><description><![CDATA[OpenAI has rolled out a new Pro subscription that costs $100 and is in line with Claude's pricing, which also has a $100 subscription, in addition to the $200 Max monthly plan.
Until now, OpenAI has offered three subscription tiers.
First is Go, whic...]]></description><link>https://news.fmisec.com/chatgpt-rolls-out-new-100-pro-subscription-to-challenge-claude</link><guid isPermaLink="true">https://news.fmisec.com/chatgpt-rolls-out-new-100-pro-subscription-to-challenge-claude</guid><category><![CDATA[Security]]></category><category><![CDATA[threat intelligence]]></category><dc:creator><![CDATA[Phong Xuan]]></dc:creator><pubDate>Sat, 11 Apr 2026 17:37:14 GMT</pubDate><enclosure url="https://www.bleepstatic.com/content/hl-images/2023/03/24/ChatGPT-logo.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><img src="https://www.bleepstatic.com/content/hl-images/2023/03/24/ChatGPT-logo.jpg" alt /></p>
<p>OpenAI has rolled out a new Pro subscription that costs $100 and is in line with Claude's pricing, which also has a $100 subscription, in addition to the $200 Max monthly plan.</p>
<p>Until now, OpenAI has offered three subscription tiers.</p>
<p>First is Go, which costs approx $8, second is Plus for $20, and then the final tier is at $200, a jump of $180.</p>
<p>On the other hand, Anthropic does not offer an $8 subscription, but it has a $100 subscription that comes between the cheapest $20 and the expensive $200 subscription, and it works for the company because it caters to the coding audience.</p>
<p>OpenAI has realized that it needs to go after coders and enterprises, similar to Anthropic's strategy.</p>
<p>The company's answer is ChatGPT Pro, which is designed for people who rely on AI to get high-stakes, complex work done for $100.</p>
<p>After this change, OpenAI's offering looks like the following:</p>
<ul>
<li><p>Plus $20 – For lighter use. Try advanced capabilities like Codex and Deep Research for select projects throughout the week.</p>
<ul>
<li><p>Pro $100 – Built for real projects. For those who use advanced tools and models throughout the week, with 5x higher limits than Plus (and 10x Codex usage vs. Plus for a limited time).</p>
</li>
<li><p>Pro $200 – For heavy lifting. Run your most demanding workflows continuously, even across parallel projects, with 20× higher limits than Plus.</p>
</li>
</ul>
</li>
</ul>
<p>All Pro plans include access to advanced features, including:</p>
<ul>
<li><p>Pro models</p>
<ul>
<li><p>Codex</p>
</li>
<li><p>Deep research</p>
</li>
<li><p>Image creation</p>
</li>
<li><p>Memory</p>
</li>
<li><p>File uploads</p>
</li>
</ul>
</li>
</ul>
<p>OpenAI says the Pro plan also includes unlimited access to GPT-5 and legacy models, but it's not truly unlimited because the typical "Terms of Use" policies apply, including sharing of accounts.</p>
<p>Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.</p>
<p>This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.</p>
<hr />
]]></content:encoded></item><item><title><![CDATA[Supply chain attack at CPUID pushes malware with CPU-Z/HWMonitor]]></title><description><![CDATA[Hackers gained access to an API for the CPUID project and changed the download links on the official website to serve malicious executables for the popular CPU-Z and HWMonitor tools.
The two utilities have millions of users who rely on them for track...]]></description><link>https://news.fmisec.com/supply-chain-attack-at-cpuid-pushes-malware-with-cpu-zhwmonitor</link><guid isPermaLink="true">https://news.fmisec.com/supply-chain-attack-at-cpuid-pushes-malware-with-cpu-zhwmonitor</guid><category><![CDATA[Security]]></category><category><![CDATA[threat intelligence]]></category><dc:creator><![CDATA[Phong Xuan]]></dc:creator><pubDate>Fri, 10 Apr 2026 16:37:07 GMT</pubDate><enclosure url="https://www.bleepstatic.com/content/hl-images/2023/11/09/CPU-Z.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><img src="https://www.bleepstatic.com/content/hl-images/2023/11/09/CPU-Z.jpg" alt /></p>
<p>Hackers gained access to an API for the CPUID project and changed the download links on the official website to serve malicious executables for the popular CPU-Z and HWMonitor tools.</p>
<p>The two utilities have millions of users who rely on them for tracking the physical health of internal computer hardware and for comprehensive specifications of a system.</p>
<p>Users who downloaded either tool  recently that the official download portal points to the Cloudflare R2 storage service and fetches a trojanized version of HWiNFO, another diagnostic and monitoring tool from a different developer.</p>
<p>The name of the malicious file is HWiNFO_Monitor_Setup, and running it launches a Russian installer with an Inno Setup wrapper, which is atypical and highly suspicious.</p>
<p>Users reported that downloading the clean hwmonitor_1.63.exe from the direct URL was still possible, indicating that the original binaries were intact, but the distribution links appear to have been poisoned.</p>
<p>The externalized download chain was also confirmed by  and @vxunderground, who reported that a fairly advanced loader using known techniques, tactics, and procedures (TTPs) is involved.</p>
<p>“As I began poking this with a stick, I discovered this is not your typical run-of-the-mill malware,” .</p>
<p>“This malware is deeply trojanized, distributes from a compromised domain (cpuid-dot-com), performs file masquerading, is multi-staged, operates (almost) entirely in-memory, and uses some interesting methods to evade EDRs and/or AVs such as proxying NTDLL functionality from a .NET assembly.”</p>
<p>The researcher claims that the same threat group targeted users of the FileZilla FTP solution last month, suggesting that the attacker is focusing on widely used utilities.</p>
<p>The downloaded ZIP is flagged by 20 antivirus engines , although not clearly identified. Some classify it as Tedy Trojan, and others as Artemis Trojan.</p>
<p>Some researchers on Virustotal say that the fake HWiNFO variant is an infostealer malware.</p>
<p>BleepingComputer has contacted CPUID to learn more about what happened, the date of the compromise, the affected versions, and what impacted users should do. A spokesperson has provided the following statement.</p>
<p>"Investigations are still ongoing, but it appears that a secondary feature (basically a side API) was compromised for approximately six hours between April 9 and April 10, causing the main website to randomly display malicious links (our signed original files were not compromised). The breach was found and has since been fixed." - CPUID</p>
<p>The same person told us that the hackers hit them at a time when the main developer was away on holiday.</p>
<p>Currently, it appears that CPUID has fixed the problem and now serves clean versions for both CPU-Z and HWMonitor.</p>
<p>Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.</p>
<p>This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.</p>
<hr />
]]></content:encoded></item><item><title><![CDATA[Analysis of one billion CISA KEV remediation records exposes limits of human-scale security]]></title><description><![CDATA[*
Author: Saeed Abbasi, Senior Manager, Threat Research Unit, Qualys
With Time-to-Exploit now at negative seven days and autonomous AI agents accelerating threats, the data no longer supports incremental improvement. The architecture of defense must ...]]></description><link>https://news.fmisec.com/analysis-of-one-billion-cisa-kev-remediation-records-exposes-limits-of-human-scale-security</link><guid isPermaLink="true">https://news.fmisec.com/analysis-of-one-billion-cisa-kev-remediation-records-exposes-limits-of-human-scale-security</guid><category><![CDATA[Security]]></category><category><![CDATA[threat intelligence]]></category><dc:creator><![CDATA[Phong Xuan]]></dc:creator><pubDate>Fri, 10 Apr 2026 16:37:06 GMT</pubDate><enclosure url="https://www.bleepstatic.com/content/posts/2026/04/08/qualys-looking-over-datacenter.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>*</p>
<p><em>Author: Saeed Abbasi, Senior Manager, Threat Research Unit, Qualys</em></p>
<p><strong>With Time-to-Exploit now at negative seven days and autonomous AI agents accelerating threats, the data no longer supports incremental improvement. The architecture of defense must change.</strong></p>
<p><strong>What Leaders Need to Know</strong></p>
<p>Analysis of CISA's Known Exploited Vulnerabilities over the past four years shows critical vulnerabilities still open at Day 7 worsened from 56% to 63% despite teams closing 6.5x more tickets. Staffing cannot solve this.</p>
<p>Of the 52 tracked weaponized vulnerabilities in our study, 88% were patched more slowly than they were exploited — half were weaponized before any patch existed.</p>
<p>The problem is not speed. It is the operational model itself.</p>
<p>Cumulative exposure, not CVE counts, is the true risk metric that security teams now need to measure. While dashboards reward the sprint to get patches implemented, breaches exploit the tail. AI is not another attack surface — instead, the transition period where AI-powered attackers face human defenders is the industry's most dangerous window.</p>
<p>In response, defenders have to implement their own autonomous, closed-loop risk operations.</p>
<h2 id="heading-the-broken-physics">The Broken Physics</h2>
<p> from the Qualys Threat Research Unit, analyzing more than one billion CISA KEV remediation records from across 10,000 organizations over four years, quantifies what the industry has long suspected but never proved at scale. The operational model underpinning enterprise security is broken.</p>
<p>Vulnerability volumes have grown 6.5 times since 2022. According to , the average Time-to-Exploit has collapsed to negative seven days; in other words, adversaries are weaponizing the most serious vulnerabilities before patches exist. The percentage of critical vulnerabilities still open at seven days has climbed from 56 percent to 63 percent.</p>
<p>Yet this is not for lack of effort. Organizations closed 400 million more vulnerability events annually now than they did at baseline. Teams work harder, but it fails to make the difference where it counts. Our researchers call this the "human ceiling" — a structural limit no amount of staffing or process maturity can overcome. The constraint is not effort. It is the model itself.</p>
<p>Of 52 high-profile weaponized vulnerabilities tracked with complete exploitation timelines, 88 percent were remediated slower than they were exploited. As an example, Spring4Shell was exploited two days before disclosure, yet the average enterprise needed 266 days to remediate.</p>
<p>Similarly, the flaw in Cisco IOS XE was weaponized a month early; average close was 263 days.</p>
<p>The attacker's advantage was measured in days. The defender's response was measured in seasons. This is not an intelligence failure. It is an operationalization failure.</p>
<p>To understand the future around risk operations, AI and managing remediation at scale, come to ROCON EMEA, the Risk Operations Center Conference.</p>
<p>Join your peers and learn more about automated remediation.</p>
<h2 id="heading-the-manual-tax-and-risk-mass">The Manual Tax and Risk Mass</h2>
<p>The report identifies a "Manual Tax" — the multiplier effect where long-tail assets that human processes cannot reach drag exposure from weeks into months. For Spring4Shell, average remediation was 5.4 times the median.</p>
<p>The median tells a manageable story. The average tells the truth. Infrastructure systems face a harsher reality: for Cisco IOS XE, even the median was 232 days — compared to endpoint medians consistently under 14. When the best-case outcome is eight months, the Manual Tax is no longer a multiplier. It is the baseline.</p>
<p>Looking at average figures is no longer helpful for decision-making. Instead, looking at Risk Mass — vulnerable assets multiplied by days exposed — captures what CVE counts obscure around cumulative exposure. A companion metric, Average Window of Exposure (AWE), measures the full duration from weaponization to remediation across the environment.</p>
<p>As an example, Follina was weaponized 30 days before disclosure with an average close at Day 55.</p>
<p>However, the AWE stretched to 85 days. While the blind spot before disclosure accounted for 36 percent of that 85 days, the long tail of patching accounted for a further 44 percent. In total, pre-disclosure and long tail together represent 80 percent. The sprint that gets measured makes up less than 20.</p>
<p>At the same time, of 48,172 vulnerabilities disclosed in 2025, only 357 were remotely exploitable and actively weaponized. Organizations are burning remediation cycles on theoretical exposure while genuinely exploitable gaps persist.</p>
<h2 id="heading-why-the-gap-will-widen">Why the Gap Will Widen</h2>
<p>Cybersecurity has long operated as a derivative of technology shifts — Windows security followed Windows, cloud security followed cloud. Leading practitioners and investors now argue AI breaks that pattern. It is not merely a new surface to defend; it is a fundamental transformation of the adversary itself.</p>
<p>Offensive agents can already discover, weaponize, and execute faster than any human-staffed operation can respond. The remediation data proves humans cannot keep pace today. Autonomous AI ensures the gap will accelerate tomorrow.</p>
<p>The transition period — where AI-powered attackers face human-speed defenders — represents the industry's most dangerous window, compounded by the structural vulnerabilities that dominate the near term: attack surfaces expanded beyond what teams can govern, identity sprawl that outpaces policy, and remediation workflows still built on manual execution.</p>
<p>The traditional scan-and-report model was built for lower volumes of CVEs and longer exploit timelines. What replaces it is an end-to-end Risk Operations Center: embedded intelligence arriving as machine-readable decision logic, active confirmation validating whether a vulnerability is actually exploitable in a specific environment, and autonomous action compressing response to the timescale the threat demands.</p>
<p>The objective is not to eliminate human judgment but to elevate it, shifting practitioners from tactical execution to governing the policies that direct their own autonomous systems.</p>
<p>The organizations already winning the physics gap are not winning with larger teams. They are winning because they have removed human latency from the critical path.</p>
<h2 id="heading-how-security-teams-can-close-the-risk-gap">How Security Teams can close the Risk Gap</h2>
<p>The scan-and-report model — discover, score, ticket, manually route — was built for lower volumes and longer exploit timelines.</p>
<p>What replaces it is an end-to-end Risk Operations Center: embedded intelligence arriving as machine-readable decision logic, active confirmation validating whether a vulnerability is actually exploitable in a specific environment, and autonomous action compressing response to the timescale the threat demands.</p>
<p>The objective is not to eliminate human judgment but to elevate it — shifting practitioners from tactical execution to governing the policies that direct autonomous systems. The organizations already winning the physics gap are not winning with larger teams. They are winning because they have removed human latency from the critical path.</p>
<p>Time-to-Exploit will not return to positive numbers. Vulnerability volume will not plateau. The reactive model has hit a hard mathematical ceiling.</p>
<p>The only remaining question is whether organizations will use the architecture to match the mathematics — before the window between human-scale defense and autonomous-scale offense closes for good.</p>
<p><strong> for insights into how companies manage remediation at scale with automation and AI, and how you can make that difference right now.</strong></p>
<p>Sponsored and written by .*</p>
<hr />
]]></content:encoded></item><item><title><![CDATA[Eurail says December data breach impacts 300,000 individuals]]></title><description><![CDATA[Eurail B.V., a European travel operator that provides digital passes covering 33 national railways, says attackers stole the personal information of over 300,000 individuals in a December 2025 data breach.
Eurail is a Netherlands-based company that s...]]></description><link>https://news.fmisec.com/eurail-says-december-data-breach-impacts-300000-individuals</link><guid isPermaLink="true">https://news.fmisec.com/eurail-says-december-data-breach-impacts-300000-individuals</guid><category><![CDATA[Security]]></category><category><![CDATA[threat intelligence]]></category><dc:creator><![CDATA[Phong Xuan]]></dc:creator><pubDate>Thu, 09 Apr 2026 16:25:33 GMT</pubDate><enclosure url="https://www.bleepstatic.com/content/hl-images/2026/04/09/High-speed_train_Europe.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><img src="https://www.bleepstatic.com/content/hl-images/2026/04/09/High-speed_train_Europe.jpg" alt /></p>
<p>Eurail B.V., a European travel operator that provides digital passes covering 33 national railways, says attackers stole the personal information of over 300,000 individuals in a December 2025 data breach.</p>
<p>Eurail is a Netherlands-based company that sells Interrail and Eurail passes for multi-country train travel across Europe, passes that are also available to young Europeans through the EU's .</p>
<p>When it disclosed the incident in February, the company said the attackers gained access to travelers' sensitive information, including full names, passport details, ID numbers, bank account IBANs, health information, and contact details (email addresses, phone numbers), after breaching its customer database.</p>
<p>Eurail also warned at the time that the threat actors had published a sample of the stolen data on Telegram and were attempting to sell it on the dark web.</p>
<p>"The evidence showed that an unauthorized actor transferred files from our network on December 26, 2025," the European train travel company  sent to affected individuals on March 27.</p>
<p>"We reviewed the files involved and, on February 25, 2026, determined that they contained some of your information. The information included your name and passport number."</p>
<p>The same day, Eurail  with the Office of Oregon's Attorney General that the resulting data breach impacted 308,777 individuals.</p>
<p><img src="https://www.bleepstatic.com/images/news/u/1109292/2026/Eurail_Oregon_data_breach_filing.jpg" alt /><em>Eurail data breach filing with Oregon's OAG (BleepingComputer)</em></p>
<p>​While Eurail said that it didn't store financial information or passport photocopies on the compromised systems, the European Commission  in a separate alert that this type of data (as well as health information) may have been exposed for young travelers who received a Pass through the DiscoverEU program.</p>
<p>Eurail told customers whose information was exposed in the breach to remain vigilant against potential phishing attacks and scams, and advised them to update their Rail Planner app account passwords and reset them on any other platform where they're also used.</p>
<p>The company added that customers should monitor their bank account activity and report any suspicious transactions to their bank as soon as possible.</p>
<p>Last month, the European Commission also  after the Europa.eu web platform was hacked in a cyberattack claimed by the ShinyHunters extortion gang.</p>
<p>Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.</p>
<p>This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.</p>
<hr />
]]></content:encoded></item></channel></rss>