• What Are JWICS and SIPRNET? A Guide to Classified Government Networks

    The Joint Worldwide Intelligence Communications System (JWICS) and the Secret Internet Protocol Router Network (SIPRNET) are two of the U.S. government’s most secure and critical communication networks. Operated primarily by the Department of Defense (DoD) and the broader intelligence community, these classified communication networks serve as the digital backbone for transmitting sensitive and classified information, ranging from secret to top-secret clearance levels.

    JWICS, the top-secret communication network, is used primarily for gathering, analyzing, and disseminating highly classified intelligence. Agencies such as the NSA, CIA, and FBI depend on JWICS to collaborate securely on national security, foreign intelligence, and global military operations. SIPRNET, meanwhile, is classified at the secret level and used for daily classified communications, including secure emails, situation reports, and other mission-critical communications. It is heavily relied upon by the DoD and the State Department to coordinate operations and share classified data securely with other branches of government.


    Role in Control Rooms and Critical Infrastructure

    JWICS and SIPRNET are foundational cybersecurity technologies in environments such as control rooms, military operations centers, and emergency operations centers. These secure government networks are tasked with real-time monitoring, data aggregation, and secure decision-making, particularly during crises or military engagements.

    Facilities that manage critical infrastructure, power grids, water treatment facilities, and public health systems, rely on secure communication platforms. SIPRNET and JWICS help provide these mission-critical environments with reliable and encrypted communications channels. In military operations centers, they are used to coordinate with intelligence agencies and combat units across the globe. During emergencies like natural disasters, emergency operations centers depend on these secure communication networks to synchronize response activities.

    In these environments, network integrity and segregation are paramount. Console furniture often includes color-coded cable trays and secure infrastructure configurations that separate network lines and help operators quickly identify and troubleshoot connection issues. Physical and procedural controls complement the digital safeguards to maintain the integrity of these classified networks.


    Limitations and Security Challenges

    Despite their robust design, JWICS and SIPRNET are not without cybersecurity challenges. One major concern is vulnerability to cyberattacks. These classified communication systems are constant targets for foreign and domestic threat actors seeking to breach U.S. systems and exfiltrate sensitive government data.

    Additionally, both platforms are hampered by infrastructure and accessibility challenges. Access to JWICS is restricted to personnel with top-secret clearance, limiting its usability across broader government departments. SIPRNET, while more widely used, is geographically restricted and not typically accessible outside of the U.S. and its territories—a limitation that can complicate secure coordination with international allies.

    Technology also remains a concern. Many of the systems and hardware that support JWICS and SIPRNET are aging, making maintenance difficult and raising the risk of outages or newly discovered vulnerabilities. At a 2019 Intelligence and National Security Summit, DIA Deputy Director Suzanne White noted that JWICS usage has increased dramatically since its inception but that its modernization is now a top priority.

    Compounding these concerns is the human element. Even with top-tier encryption and advanced network monitoring, user error remains a significant risk. Lapses in protocol, poor password hygiene, or misconfigured access controls can undermine the overall security of these government communication systems. Stringent training and rigorous adherence to information security policies are required at all times.


    Threat Modeling for JWICS and SIPRNET

    To better understand the risk posture of JWICS and SIPRNET, it’s helpful to apply threat modeling. Both networks face distinct but overlapping threat vectors due to their classification levels and usage scope.

    For JWICS, the primary concerns include insider threats, advanced persistent threats (APTs), and exploitation of legacy systems. Since JWICS operates at the top-secret level, adversaries with nation-state capabilities pose the greatest risk. Threat actors may attempt to gain physical or credentialed access to JWICS-connected systems to exfiltrate intelligence or sabotage communications.

    SIPRNET, while at the secret level, still carries sensitive military and diplomatic information. Phishing, credential theft, and lateral movement from compromised unclassified systems present major risks, especially in joint environments where segmentation may not be flawless. The risk of supply chain compromise also exists, particularly in deployed or temporary access environments.

    Mitigating these threats requires rigorous access control, behavior-based anomaly detection, endpoint protection, and constant audit logging with cross-network correlation. Encryption of data in transit and at rest, alongside multi-factor authentication and user behavior analytics, are essential.


    Frequently Asked Questions (FAQ)

    What is the difference between JWICS and SIPRNET?

    JWICS operates at the top-secret level and is used primarily for intelligence sharing across the U.S. intelligence community. SIPRNET, on the other hand, is used for secret-level communication and is more broadly utilized across the DoD and State Department for day-to-day mission and operational needs.

    Can foreign partners access JWICS or SIPRNET?

    Access is tightly controlled. SIPRNET may be extended to select foreign allies under strict controls, but JWICS is not accessible to foreign governments due to its top-secret nature.

    Are these networks air-gapped?

    Both JWICS and SIPRNET are logically and physically isolated from the public internet. However, they are not truly air-gapped in all cases, especially when operating within large, interconnected military bases. External access is extremely limited and subject to rigorous controls.

    How are users vetted for access?

    Users must pass stringent background checks and hold active security clearances. JWICS users require a Top Secret clearance with SCI (Sensitive Compartmented Information) access, while SIPRNET users need a Secret clearance.

    What happens during a security incident?

    Any suspected breach or anomaly triggers an immediate incident response process, including network isolation, forensic analysis, user suspension, and reporting to the appropriate counterintelligence authorities.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

    Questions or concerns? Feel free to reach out to us any time –

    https://www.netizen.net/contact


  • Securing AI Data: Best Practices Across the AI Lifecycle

    Data used in machine learning is more than just an input; it defines the behavior, accuracy, and reliability of the resulting model. If that data is corrupted, intentionally manipulated, or poorly sourced, the downstream consequences can range from silent failure to exploitable vulnerability. Data poisoning, model inversion, statistical bias, and distribution drift are all rooted in data quality issues, and each introduces specific types of risk that increase over time if not detected.

    Since AI systems derive logic from data, an attacker who controls or modifies that data can influence the model’s decisions. A single corrupted dataset, if left unchecked, can compromise not just one model but an entire pipeline of downstream applications. For this reason, securing the data supply chain, validating the provenance of inputs, and verifying dataset integrity are as important as monitoring the model itself.


    Lifecycle Security: Data at Every Stage

    NIST outlines six key stages in the AI lifecycle: Plan and Design, Collect and Process, Build and Use, Verify and Validate, Deploy and Use, and Operate and Monitor. Each of these stages introduces distinct risks; together, they form a continuous loop where security measures must be consistently applied.

    In the planning stage, organizations must define data governance strategies, threat models, and privacy-preserving controls. The design phase should integrate security considerations alongside performance and scalability goals, incorporating principles like least privilege and zero trust from the outset.

    During data collection and processing, organizations must assess the authenticity and quality of their inputs. This includes applying cryptographic hash verification, source validation, anonymization techniques, and secure transport. Data used for model training must be curated with care; provenance should be logged, and inputs must be protected from tampering or leakage.

    Model building introduces new attack surfaces, particularly when dealing with large, complex, or opaque model architectures. Secure environments should be used for training, and sensitive datasets should be processed only within trusted computing enclaves. Privacy-enhancing technologies like secure multi-party computation, differential privacy, and federated learning can further reduce exposure.

    Verification and validation require regular adversarial testing, audit trails, and automated anomaly detection systems. All new data introduced after deployment, including feedback or user interaction data, should be validated under the same controls as original training data.

    Deployment brings a shift in risk from internal to external exposure; systems must be hardened, interfaces must be secured, and all API interactions must be audited. In the final lifecycle stage, continuous monitoring is required to detect performance degradation or behavioral anomalies that may suggest data drift or compromise. Periodic retraining with fresh data may be necessary, provided that data meets the same integrity and provenance standards as the original sets.


    Supply Chain Risks and Data Poisoning

    The CSI emphasizes that the AI data supply chain is a key point of vulnerability. Organizations often ingest data curated by third parties or scrape content from public sources; while these datasets may appear authoritative, they can contain malicious, misleading, or expired content. Adversaries may exploit domain expiration or poorly validated sources to insert poisoned data into training pipelines, sometimes for as little as a few hundred dollars in resources.

    To mitigate this, curators should publish cryptographic hashes for all data files, allowing consumers to verify content integrity before use. Data consumers, in turn, should perform hash checks at the time of download and discard files that fail validation. Append-only ledgers and cryptographically signed provenance chains provide additional assurance and allow for historical audits.

    Foundation model providers should be able to attest to the quality of their training data; if they cannot, downstream users should treat those models as untrusted. Organizations relying on third-party datasets must request certification where possible, and avoid training on datasets that lack verified integrity, traceability, or author attribution.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

    Questions or concerns? Feel free to reach out to us any time –

    https://www.netizen.net/contact


  • How DISN Powers the U.S. Military’s Voice, Data, and Classified Networks

    The Defense Information Systems Network (DISN) is the primary enterprise telecommunications infrastructure for the United States Department of Defense. Managed by the Defense Information Systems Agency (DISA), DISN has evolved over more than four decades to support classified and unclassified communications across every domain of military and national security operations. Its architecture underpins mission-critical services ranging from global voice and video telephony to secure data transfer and battlefield coordination.


    Historical Background and Purpose

    In September 1991, the Office of the Secretary of Defense directed DISA to consolidate the communications infrastructure of military services and defense agencies under a unified network. This initiative included the standardization of transmission multiplexor systems using NET IDNX hardware and the integration of disparate IP router networks. DISA assumed central responsibility for managing two core IP networks: NIPRNet, for sensitive but unclassified communication, and SIPRNet, for secret-level data. A third system, the DISA ATM Network (DATM), was developed to support high-bandwidth multimedia traffic using Asynchronous Transfer Mode technology.


    Network Management Architecture

    DISN operates on a three-tiered management hierarchy designed to ensure global availability and rapid operational oversight. At the top of this structure is the Global Control Center (GCC), which provides centralized oversight and coordination through DISA’s C4I Network Systems Management Division. Beneath the GCC are the Regional Control Centers (RCCs), which manage the day-to-day operations of the network in defined geographic areas such as the continental United States, Europe, and the Pacific. Finally, Local Control Centers (LCCs), operated by individual military services or agencies, maintain their respective assets and manage localized connectivity into the wider DISN framework.


    NIPRNet, SIPRNet, and the Joint Interconnection Service

    DISN’s core includes multiple interconnected networks that serve different classification levels and operational roles. NIPRNet supports non-classified but sensitive communications and is built from legacy systems including the DLA Corporate Network and the DDN Pilot Network. The latter now functions as the Joint Interconnection Service (JIS), acting as a backbone for routing between different networks and ensuring controlled reachability with external systems, including the public internet. SIPRNet, by contrast, handles classified traffic and is completely isolated from external systems. Both networks are critical to enabling global command and control, logistical support, and intelligence sharing.


    Unifying Voice, Video, and Data Services

    One of the core advancements of DISN is its ability to unify voice, video, and data communications across a single infrastructure. Previously, these services were delivered through separate and often redundant systems. With DISN, users can transmit classified and unclassified information through a consolidated backbone that supports convergence. This integration improves efficiency, reduces costs, and enhances interoperability across units and agencies.


    ATM Technology in DISN

    At the heart of DISN’s backbone lies Asynchronous Transfer Mode (ATM), a protocol designed to handle voice, video, and data traffic simultaneously while guaranteeing distinct quality of service levels for each type. ATM supports media-agnostic transport, operating across copper, fiber, satellite, and even RF or laser channels, making it especially useful in environments where connectivity is difficult to maintain.

    ATM’s value to the Department of Defense is underscored by its efficiency. Compared to traditional point-to-point circuits like T1 lines, ATM delivers significantly better cost-per-bandwidth ratios. For example, a 1.5 Mbps T1 line might cost around $2,000 per month, while a 10 Mbps ATM circuit costs $2,850, a dramatic improvement in scalability and affordability.

    Encryption and Security Across the Network

    Security is central to DISN’s mission. All communications, particularly those transmitted over satellite or overseas links, are encrypted using NSA- and NIST-approved hardware. Bulk encryption devices such as the KG-95 and KG-189 protect point-to-point links, while the KG-75 (FASTLANE) is employed for ATM cell-level encryption. These encryption mechanisms ensure the confidentiality and integrity of both classified and unclassified communications across the entire network.


    Network Performance and Quality Metrics

    To maintain high availability and reliability, DISN is monitored using a set of defined performance standards. These include bit error rates, error-free seconds, degraded minutes, and residual error rates. Transmission delays, jitter, and bit count integrity are also measured, factors that are particularly important for voice and interactive applications. In satellite or line-of-sight radio scenarios, Forward Error Correction is used at either the physical or ATM layer to stabilize transmissions and minimize data loss.

    Availability is determined based on whether the bit error rate remains worse than 10^-3 for ten consecutive seconds. If so, the circuit is considered unavailable. Once the error rate improves to acceptable levels for ten consecutive seconds, the line is deemed available again. These strict thresholds ensure the network meets operational demands at all times.


    Strategic Role and Future Relevance

    DISN is not simply a communications utility; it is an operational enabler for the entire U.S. defense apparatus. It provides the infrastructure that allows warfighters, analysts, commanders, and policy makers to share information securely and in real time. Its ability to scale across environments, from fixed installations to tactical units in the field, makes it uniquely suited to modern warfare’s dynamic requirements.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

    Questions or concerns? Feel free to reach out to us any time –

    https://www.netizen.net/contact


  • Understanding and Detecting Lateral Movement in Enterprise Networks

    Lateral movement represents one of the most persistent and damaging tactics used by threat actors once they gain a foothold inside a network. Rather than exploiting a single endpoint and exfiltrating data immediately, attackers who employ lateral movement techniques methodically traverse the network in search of valuable assets, such as domain controllers, privileged credentials, and sensitive data repositories.

    This behavior is often difficult to detect because it mimics legitimate user activity, making it one of the preferred strategies in advanced persistent threats (APTs), ransomware operations, and insider compromise campaigns. To protect against these threats, security teams must understand how lateral movement works, what tools and techniques adversaries use, and how to monitor, detect, and contain such activity before it causes real damage.


    What Is Lateral Movement?

    In the post-compromise phase of an intrusion, lateral movement refers to the steps an attacker takes to explore a network and access additional systems or data beyond the initially breached asset. The attacker may pivot from system to system using stolen credentials, token reuse, or exploitation of weak internal services, such as SMB, RDP, or Windows Management Instrumentation (WMI).

    Unlike brute-force attacks or broad scanning activity, lateral movement is deliberate and often stealthy. It’s used to escalate privileges, locate critical systems, and gather intelligence about the network architecture—all while avoiding detection.


    Common Techniques Used in Lateral Movement

    Attackers rely on several tried-and-true methods to move across networks once initial access is gained. These techniques allow them to escalate privileges, access sensitive systems, and maintain stealth:

    1. Pass-the-Hash (PtH)

    This method uses stolen NTLM hashes to authenticate across systems without knowing the actual password. Attackers often dump hashes from memory and use tools like Mimikatz to replay them across trusted hosts.

    2. Pass-the-Ticket (PtT)

    By extracting Kerberos tickets from a compromised machine, attackers can impersonate legitimate users or services. Variants include Silver Ticket and Golden Ticket attacks, which provide either limited or broad access to resources across the domain.

    3. Remote Code Execution with WMI or SMB

    Using native tools like Windows Management Instrumentation (WMI) or Server Message Block (SMB), attackers can execute commands and scripts on other machines. These channels are often overlooked because they are essential to legitimate administrative tasks.

    4. Credential Dumping

    Credentials stored in memory, especially within the LSASS process, are a prime target. Tools such as Mimikatz, ProcDump, or custom scripts can extract these credentials for use in lateral authentication attempts.

    5. Living-off-the-Land Binaries (LOLBins)

    Rather than introducing new executables, attackers use trusted tools already present on the system, such as PowerShell, PsExec, cmd.exe, or net.exe. This tactic reduces their visibility and helps them evade endpoint detection systems.


    The Lateral Movement Lifecycle

    Lateral movement tends to follow a predictable pattern that aligns with the cyber kill chain model:

    1. Initial Access and Reconnaissance

    Access is often achieved via phishing, unpatched vulnerabilities, or compromised credentials. Once inside, attackers begin mapping the network, looking for system names, trust relationships, domain structures, and shared resources.

    2. Credential Harvesting

    Attackers identify key accounts and attempt to extract cached credentials or tokens from memory. Domain admin credentials are a prime target.

    3. Privilege Escalation

    With valid credentials or tokens, attackers attempt to elevate their privileges, often through local exploit chaining or lateral movement toward domain controllers.

    4. Lateral Propagation

    The attacker accesses additional hosts, repeating the process to reach higher-value targets. Movement is typically achieved through RDP, PsExec, WMI, or direct exploitation of internal services.

    5. Data Exfiltration or Impact

    Once goals are met, be it data theft, network control, or ransomware deployment, the attacker performs final operations, often leaving persistence mechanisms in place.


    Why Lateral Movement Is So Difficult to Detect

    Security tools that focus only on north-south traffic (external to internal) often miss lateral movement, which occurs east-west inside the network. Fileless techniques, use of legitimate admin tools, and credential reuse complicate detection.

    Attackers also tend to move slowly and strategically. On average, threat actors remain undetected for over 200 days in a compromised network: ample time to pivot, cover tracks, and identify weak points. Activity often resembles legitimate behavior, such as an IT admin using PsExec or a user accessing shared resources, which makes anomaly detection reliant on subtle indicators.


    Real-World Examples

    • WannaCry and NotPetya: Used the EternalBlue SMBv1 vulnerability (CVE-2017-0144) to move laterally within networks after initial infection.
    • SolarWinds SUNBURST: Attackers conducted extensive lateral movement within government and enterprise environments using compromised credentials and post-exploitation tools.
    • Conti Ransomware Group: Leveraged RDP, stolen credentials, and domain trust relationships to deploy ransomware payloads across enterprise networks.

    Strategies for Detection and Prevention

    1. Network Segmentation and Least Privilege Access

    Dividing internal networks into functional zones and applying strict access controls reduces an attacker’s ability to pivot. Implementing least privilege, particularly for domain admins, limits the blast radius of a credential compromise.

    2. Identity and Access Management (IAM) Monitoring

    Maintain tight control over user accounts and privileges. Use identity-based segmentation, conditional access policies, and enforce MFA everywhere, especially for admin accounts.

    3. Behavior-Based Detection Tools

    EDR and XDR platforms with behavioral analytics and machine learning capabilities can identify suspicious sequences—like credential use followed by remote code execution or unusual logon patterns.

    4. Honeypots and Deception Technologies

    Deploying decoy systems and credentials can trip silent alarms when attackers attempt lateral movement. These systems serve as early detection mechanisms without affecting legitimate operations.

    5. Log and Telemetry Correlation

    Use SIEM systems to collect logs from endpoints, domain controllers, and authentication systems. Correlating activity across these systems can reveal unusual movements that individual tools might miss.


    What Security Teams Need to Focus On

    The goal isn’t just stopping lateral movement, it’s reducing dwell time, improving visibility, and forcing adversaries to make more detectable moves. Security teams should invest in:

    • Credential hygiene (regular password resets, avoiding shared accounts)
    • Real-time telemetry from endpoints and servers
    • Visibility into inter-host communication
    • Continuous validation of identities and device trust

    A Zero Trust Architecture, while not a silver bullet, can significantly narrow the opportunity space for lateral movement by enforcing identity and access controls throughout the entire infrastructure.


    Final Thoughts

    Whether used by ransomware gangs or nation-state actors, lateral movement enables attackers to quietly prepare the most damaging stages of an attack. Organizations that treat internal traffic as trusted, fail to monitor east-west communication, or rely too heavily on perimeter defenses are placing themselves at risk.

    Effective defense requires deep visibility, smart segmentation, behavioral analytics, and a readiness to assume breach. Detection and response strategies that focus solely on the initial infection will always be too little, too late.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

    Questions or concerns? Feel free to reach out to us any time –

    https://www.netizen.net/contact


  • Netizen: Monday Security Brief (7/14/2024)

    Today’s Topics:

    • Fortinet Issues Critical Patch for SQL Injection Flaw in FortiWeb (CVE-2025-25257)
    • Critical eSIM Vulnerability in Kigen’s eUICC Cards Exposes Billions of IoT Devices to Security Risks
    • How can Netizen help?

    Fortinet Issues Critical Patch for SQL Injection Flaw in FortiWeb (CVE-2025-25257)

    Fortinet has released a security patch addressing a critical SQL injection vulnerability identified in its FortiWeb product. Tracked as CVE-2025-25257, the flaw poses a severe risk to affected versions of FortiWeb, potentially allowing unauthenticated attackers to execute arbitrary database commands on vulnerable instances. This issue carries a CVSS score of 9.6 out of 10, making it one of the most significant vulnerabilities discovered in recent times for the platform.

    The vulnerability stems from improper neutralization of special elements used in SQL commands, known as SQL injection (CWE-89). An attacker can exploit this weakness by crafting specially designed HTTP or HTTPS requests to inject malicious SQL code into FortiWeb. If successfully executed, this attack could allow the attacker to execute unauthorized SQL commands on the system, leading to the potential compromise of the database.

    The flaw specifically impacts several versions of FortiWeb, including:

    • FortiWeb 7.6.0 through 7.6.3 (upgrade to 7.6.4 or above)
    • FortiWeb 7.4.0 through 7.4.7 (upgrade to 7.4.8 or above)
    • FortiWeb 7.2.0 through 7.2.10 (upgrade to 7.2.11 or above)
    • FortiWeb 7.0.0 through 7.0.10 (upgrade to 7.0.11 or above)

    The vulnerability is tied to a function named get_fabric_user_by_token, which is associated with FortiWeb’s Fabric Connector component. This function is called by another function, fabric_access_check, which is triggered from multiple API endpoints. In particular, the endpoints /api/fabric/device/status, /api/v[0-9]/fabric/widget/[a-z]+, and /api/v[0-9]/fabric/widget are directly affected.

    The issue arises because attacker-controlled input, passed via a Bearer token Authorization header in specially crafted HTTP requests, is directly fed into an SQL query without proper sanitization. As a result, attackers can inject malicious SQL code, allowing them to manipulate or access sensitive data in the database.

    Furthermore, the vulnerability can be extended into a remote code execution attack. This is possible by exploiting the fact that the query is run as the “mysql” user, allowing attackers to insert a SELECT ... INTO OUTFILE statement, which writes a malicious payload to a file in the operating system. The payload could then be executed via Python, escalating the attack.

    Fortinet responded promptly to the discovery, issuing patches that replace the vulnerable query structure with prepared statements, mitigating the risk of SQL injection. This fix is a crucial improvement, as it directly addresses the core issue of inadequate input sanitization, which is the root cause of the flaw.

    The vulnerability was discovered by Kentaro Kawane from GMO Cybersecurity, who had previously reported a set of critical flaws in Cisco’s Identity Services Engine (ISE). His findings have been acknowledged in Fortinet’s advisory, further underlining the importance of vigilance in identifying such risks in widely used cybersecurity tools.

    As Fortinet has rolled out patches in versions 7.6.4, 7.4.8, 7.2.11, and 7.0.11, users are strongly advised to upgrade to these versions immediately to close the vulnerability. For those unable to apply the patches promptly, Fortinet recommends disabling the HTTP/HTTPS administrative interface as a temporary measure to mitigate the risk of exploitation.

    This vulnerability is particularly concerning given the history of exploitation of Fortinet products by threat actors in the past. The critical nature of this flaw, combined with its potential for remote code execution, makes it imperative that users act swiftly to update their systems and protect against potential attacks.

    Fortinet’s patch for CVE-2025-25257 addresses a severe vulnerability in its FortiWeb platform, one that could lead to unauthorized SQL command execution and potentially remote code execution. With a CVSS score of 9.6, this flaw poses a significant security risk to affected organizations, particularly those relying on FortiWeb for web application security. It is crucial that users upgrade to the latest versions or apply temporary mitigation measures to prevent exploitation.


    Critical eSIM Vulnerability in Kigen’s eUICC Cards Exposes Billions of IoT Devices to Security Risks

    A newly discovered vulnerability in eSIM technology has raised serious concerns about the security of billions of Internet of Things (IoT) devices, particularly those relying on Kigen’s eUICC (embedded Universal Integrated Circuit Cards) technology. The flaw, identified by Security Explorations, exposes devices to potential hacking attacks that could lead to unauthorized access, data theft, and malicious control over communications.

    The eSIM, or embedded SIM, is a digital SIM card embedded directly into devices, enabling users to activate cellular plans remotely without the need for a physical SIM card. The eUICC chip facilitates this process by allowing users to change operator profiles and remotely manage SIM data. However, a critical vulnerability has been found in the Kigen eUICC card’s implementation of the GSMA TS.48 Generic Test Profile, versions 6.0 and earlier.

    This vulnerability allows attackers to install non-verified, malicious applets on the eUICC, which could be used to tamper with operator profiles and extract sensitive information. The flaw is linked to an outdated version of the GSMA TS.48 standard, which is primarily used for radio compliance testing in eSIM products. Although GSMA released an updated version (v7.0) to mitigate this issue, previous versions remain widely used, exposing devices to security risks.

    Exploitation of this vulnerability requires physical access to the targeted eUICC and the use of publicly known keys. Once the attacker gains access, they can install a malicious JavaCard applet that can bypass security measures. The vulnerability enables the attacker to extract the Kigen eUICC’s identity certificate, which could allow them to download arbitrary mobile network operator (MNO) profiles in cleartext. This could result in unauthorized access to operator secrets, profile tampering, and even complete control over the eSIM profiles without raising red flags.

    Security Explorations, which reported the findings, further connected the vulnerability to previous research on Oracle’s Java Card technology. Earlier flaws, including a persistent backdoor issue in Gemalto SIM cards, also relied on Java Card technology, potentially creating a broader risk across various IoT devices.

    Though executing such an attack may seem complex, it is within the capabilities of advanced nation-state threat actors. Exploiting this vulnerability could allow attackers to deploy a stealthy backdoor within an eSIM card, intercepting all communications and compromising the device’s integrity. With control over the eSIM profile, attackers could even block remote access for the operator, falsify the profile’s state, or monitor all activity without detection.

    In some cases, the vulnerability could lead to a situation where the operator loses control of the profile, with no ability to disable or invalidate it. Such breaches would undermine the security and reliability of mobile network operators, making them more susceptible to ongoing attacks or data theft.

    In response to the findings, Kigen has released a patch addressing the issue in the latest GSMA TS.48 version 7.0, which restricts the use of the vulnerable test profile. However, devices running earlier versions of the standard remain exposed. The security of billions of IoT devices, including vehicles and consumer electronics, is now under scrutiny as manufacturers work to implement the necessary updates.

    While Kigen has made strides in addressing the vulnerability, the discovery raises broader concerns about the security of eSIM technology across the IoT ecosystem. Given the rapid proliferation of IoT devices and the growing reliance on eSIM technology for remote provisioning, it’s clear that comprehensive security measures need to be implemented to safeguard against similar vulnerabilities in the future.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is a CMMI V2.0 Level 3, ISO 9001:2015, and ISO 27001:2013 (Information Security Management) certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 


  • How PerfektBlue Bluetooth Exploits Could Compromise Vehicle Systems and User Data

    A set of four critical vulnerabilities discovered in OpenSynergy’s BlueSDK Bluetooth stack, dubbed “PerfektBlue,” has exposed millions of vehicles from multiple manufacturers to the risk of remote code execution (RCE). These vulnerabilities, identified by cybersecurity researchers at PCA Cyber Security, could potentially allow attackers to exploit infotainment systems in vehicles from major automakers like Mercedes-Benz, Volkswagen, and Skoda, along with a fourth unnamed original equipment manufacturer (OEM). The vulnerabilities, which can be chained together, allow attackers to take control of vehicles by leveraging Bluetooth connections.


    The Vulnerabilities

    The PerfektBlue vulnerabilities target the Bluetooth stack’s memory management and communication protocols, allowing attackers to exploit flaws in the system to gain unauthorized access. The vulnerabilities identified include:

    • CVE-2024-45434 (CVSS score: 8.0): A Use-After-Free issue in the AVRCP service
    • CVE-2024-45431 (CVSS score: 3.5): Improper validation of an L2CAP channel’s remote CID
    • CVE-2024-45433 (CVSS score: 5.7): Incorrect function termination in RFCOMM
    • CVE-2024-45432 (CVSS score: 5.7): Function call with incorrect parameters in RFCOMM

    Once an attacker successfully exploits these vulnerabilities, they can gain remote access to the In-Vehicle Infotainment (IVI) system, enabling them to track GPS coordinates, record audio, access contact lists, and potentially even execute lateral movements within the vehicle’s internal network. If additional vulnerabilities are present, the attacker could escalate their access to critical vehicle systems, including control over the engine and other essential functions.


    How the Exploits Work

    The attack requires that the attacker be within Bluetooth range of the vehicle and that the vehicle’s infotainment system is either actively pairing with a Bluetooth device or in pairing mode. The attacker can exploit the vulnerabilities to access the system and issue commands, taking control of audio functions or accessing private information. While no vehicle safety systems—such as steering, brakes, or driver assistance systems—are directly affected, the infotainment system’s vulnerability can serve as an entry point for further exploitation of the vehicle’s internal network, depending on its design and the system’s isolation protocols.


    Potential Impacts

    While the risks primarily concern non-critical functions like the IVI system, the exploitation of PerfektBlue could offer attackers a foothold into a vehicle’s broader network. In certain cases, where weak segmentation or inadequate gateway-level enforcement is present, this could lead to lateral movement into other vehicle control systems, potentially compromising safety-critical systems. Attackers could then manipulate or exfiltrate data, severely disrupting vehicle operation or extracting sensitive information.


    The Risk of Exploitation

    The exploitation of the PerfektBlue vulnerabilities requires that a series of conditions are met simultaneously: the attacker must be within a range of 5 to 7 meters, the vehicle’s ignition must be on, and the user must be actively pairing their device with the infotainment system. Even with these conditions in place, exploitation is still dependent on the attacker gaining the user’s consent during the pairing process. Despite these requirements, the risks associated with Bluetooth exploitation are clear, as it enables attackers to bypass traditional security measures and gain unauthorized access to vehicle systems.


    Manufacturer Responses

    In response to these vulnerabilities, manufacturers like Volkswagen have acknowledged the risks and emphasized that vehicle systems outside of the infotainment domain are secure from remote access. The company also stressed that the exploitation of these vulnerabilities has yet to be seen in the wild. Volkswagen has committed to addressing the security gap with software updates and urges vehicle owners to ensure their systems are up-to-date. In some cases, the company recommends that users visit a dealership to have the necessary updates installed.


    Mitigation and Protection

    While automakers are rolling out patches to mitigate these vulnerabilities, vehicle users should remain vigilant. As part of their precautionary measures, users are encouraged to check their pairing data during the connection process, ensuring that the displayed numbers match those on their device. Additionally, vehicle users should apply any available software updates promptly to protect their systems from exploitation.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

    Questions or concerns? Feel free to reach out to us any time –

    https://www.netizen.net/contact


  • Understanding SEO Poisoning and How to Defend Against It

    Search engine optimization (SEO) poisoning has emerged as a significant cyber threat, enabling malicious actors to exploit search engine algorithms to spread malware and gain unauthorized access to targeted systems. By manipulating search results and exploiting the trust users place in high-ranking pages, attackers can direct unsuspecting individuals to malicious websites. Once on these sites, users may inadvertently download malware that can compromise their devices and network, potentially leading to broader cyberattacks such as data exfiltration and ransomware deployment. This article takes a deep dive into the SEO poisoning technique, its growing prevalence, and provides essential defense strategies to mitigate its risks.


    The Mechanics of SEO Poisoning

    SEO poisoning works by manipulating search engine algorithms to artificially boost the ranking of malicious websites. These manipulated sites often look legitimate, appearing among the top results for popular search queries. Once a user clicks on the poisoned link, they are directed to a malicious webpage that may prompt them to download harmful files or execute malicious scripts. The effectiveness of SEO poisoning relies on the implicit trust users have in search engines, making them more likely to engage with a top-ranking link.

    To achieve this manipulation, cybercriminals often employ techniques like link farms and keyword stuffing to boost the perceived legitimacy of malicious sites. Link farms are networks of websites that exist solely to generate links to other websites, artificially inflating their authority in search engine rankings. By creating numerous backlinks from seemingly unrelated but high-traffic sites, attackers can make their malicious sites appear legitimate to search engines, thus improving their search result ranking.

    Keyword stuffing is another common tactic used to optimize the ranking of malicious sites. In this process, attackers overload a site’s content with an excessive amount of keywords related to trending topics or common search queries. This practice can be further amplified by utilizing auto-generated content that includes snippets from legitimate sources. By aligning these keywords with popular search terms, attackers increase the likelihood that their malicious site will be listed at the top of search results, luring users into clicking on it.


    The Attack Chain

    SEO poisoning is not a one-time occurrence but a series of actions designed to gradually deceive and lure users. The attack chain typically unfolds as follows:

    1. Research: Threat actors begin by analyzing search trends, identifying keywords and topics that are currently popular. This ensures that the malicious content they create aligns with high-interest subjects that are likely to attract significant traffic.
    2. Setup: The attackers then create or hijack a legitimate website, which they modify to include malicious content disguised as helpful or relevant. These pages are carefully crafted to appear authoritative and trustworthy.
    3. Optimization: With the malicious content in place, the attackers begin to optimize the site using SEO tactics like link farming and keyword stuffing. This boosts the site’s search ranking, making it appear more credible to search engines and users.
    4. Distribution: Once the site is sufficiently ranked, it begins to appear in search results for targeted keywords. Users, trusting the search engine’s judgment, are more likely to click on the link, believing it to be a legitimate and useful resource.
    5. Monetization: The ultimate goal of SEO poisoning is to profit from compromised systems. Once a user downloads the malicious content, the attacker gains access to their device, often selling that access to other cybercriminals, including those involved in ransomware or data theft operations.

    Why SEO Poisoning Is So Effective

    SEO poisoning is particularly effective because it leverages the inherent trust users place in search engine results. The implicit trust in high-ranking pages makes users less likely to question the legitimacy of the site. Since users actively search for specific information, they are already in a mindset of engaging with content that appears relevant to their needs, making them even more susceptible to malicious sites disguised as legitimate sources.

    Several psychological factors also contribute to the success of SEO poisoning attacks:

    • Implicit Trust in Search Engines: Users inherently trust the ranking system of search engines, assuming that higher-ranked sites are more reliable. This trust increases the likelihood that users will engage with malicious sites that are artificially ranked at the top.
    • Perceived Legitimacy Through Association: When a malicious site appears among legitimate, high-ranking search results, it gains an unwarranted sense of credibility. Users are more likely to click on it, unaware that they are interacting with a site designed to deceive them.
    • Navigational Trust: The voluntary nature of clicking on a search result gives users a sense of control and security, making them less cautious about potential risks. This sense of autonomy can lead users to overlook red flags and engage with malicious content.

    Real-World Example

    One of the clearest examples of SEO poisoning in action comes from a search for “army award ceremony protocol pdf.” A seemingly legitimate PDF download page appears in the top search results. However, upon visiting the page, the user unknowingly downloads a piece of malware called Solarmarker. This malware silently compromises the user’s system, leading to further malicious actions.

    Such incidents showcase how SEO poisoning can be deceptively effective, particularly when the malicious link appears alongside legitimate websites, further reinforcing the user’s belief in its authenticity.


    Case Study: Gootloader Malware and SEO Poisoning

    In a May 2023 case, ReliaQuest’s Threat Hunting Team discovered that an SEO poisoning attack served as the entry point for Gootloader malware. In this case, a user searched for information on the difference between “legal ruled and wide ruled paper” and was directed to a seemingly harmless forum page. This page contained a download link for a PDF file. Upon clicking the link, the user unknowingly downloaded a ZIP file containing a JavaScript-based malware payload. The malware then initiated a command-and-control (C2) connection, establishing a backdoor into the system. This backdoor, known as SystemBC, enabled attackers to remotely access the compromised device, eventually leading to data exfiltration and lateral movement across the network.


    Detection and Mitigation Strategies

    Detecting SEO poisoning requires analyzing search-engine queries and file download events. By correlating these two data sources, organizations can identify potential indicators of SEO poisoning, particularly when downloaded files mirror the terms used in the user’s search query. The use of forward proxy logging and endpoint telemetry is essential for detecting suspicious activity linked to SEO poisoning.

    To prevent SEO poisoning, organizations should take proactive measures, such as:

    • Enable File Extension Display: Users should be instructed to display file extensions in their operating system. This simple change helps prevent malware from masquerading as benign file types like PDFs.
    • Change Default Script Executor to Notepad: Setting Notepad as the default application for executing JavaScript and Visual Basic script files reduces the likelihood of accidental execution of malicious scripts.
    • Train Employees on Cyber Hygiene: Employees should be trained to recognize signs of SEO poisoning and be vigilant when interacting with search results, especially those that seem too good to be true.

    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

    Questions or concerns? Feel free to reach out to us any time –

    https://www.netizen.net/contact


  • The Echo Chamber Attack: A New LLM Security Threat

    The rapid advancement of large language models (LLMs) such as GPT-4 and Gemini-2 has significantly increased the capabilities of artificial intelligence systems. However, this progress has also exposed new vulnerabilities that malicious actors can exploit. One such threat, uncovered by NeuralTrust’s AI researcher Ahmad Alobaid, is the Echo Chamber attack—a sophisticated technique that bypasses LLM guardrails by exploiting the models’ reasoning capabilities through indirect manipulation. This article delves into the details of the Echo Chamber attack, how it works, its impact, and recommendations for mitigation.


    Attack Overview

    The Echo Chamber attack represents a novel form of jailbreak targeting LLMs. Unlike traditional attacks that rely on adversarial phrasing or obfuscation, the Echo Chamber attack subtly manipulates the model’s internal state through context poisoning. By introducing benign-seeming prompts that guide the model to dangerous conclusions, the attacker induces harmful outputs without ever explicitly requesting them. This clever use of indirect references and multi-turn reasoning bypasses traditional prompt filters and safety mechanisms, making it a potent weapon for adversaries.

    The core of the attack lies in its ability to manipulate the model’s memory and reasoning across multiple interactions. Over time, the subtle cues introduced by the attacker build upon each other, slowly steering the model towards generating harmful or non-compliant content. This creates a feedback loop, amplifying the attacker’s goal and bypassing the LLM’s safety controls.


    Example of the Echo Chamber Attack

    In a controlled experiment, the Echo Chamber attack successfully bypassed safety filters of a leading LLM. When explicitly asked to write a manual for creating a Molotov cocktail, the model initially refused. However, through the Echo Chamber attack, the LLM eventually provided a step-by-step guide, detailing the ingredients and construction process for the weapon. This was achieved by manipulating the model’s internal state over several turns, showing the power of context poisoning.


    How the Echo Chamber Attack Works

    The Echo Chamber attack is a multi-stage adversarial prompting technique. Initially, the attacker defines a harmful objective, such as generating hate speech, misinformation, or prohibited instructions, without directly mentioning it. Instead, the attacker plants benign-seeming prompts that subtly hint at the goal, such as asking the model to “refer back to the second sentence in the previous paragraph.” This seemingly innocuous request triggers the model to recall earlier content, often guiding it to harmful topics.

    In the next stage, the attacker introduces light semantic nudges that shift the model’s internal state. These prompts don’t directly point to harmful content but lay the groundwork for more damaging suggestions later. For example, a casual conversation about economic hardship can lead to frustrations, which are then exploited in subsequent interactions to escalate the conversation towards unsafe topics.

    Once the model begins to generate harmful content, the attacker can reference earlier prompts to reinforce the dangerous ideas. The key to the attack’s effectiveness is its subtlety—each prompt is designed to appear natural within the conversation, making it difficult for traditional safety mechanisms to detect.


    Effectiveness of the Attack

    NeuralTrust’s evaluation of the Echo Chamber attack demonstrated its effectiveness across multiple leading LLMs, including GPT-4.1-nano, GPT-4o-mini, GPT-4o, Gemini-2.0-flash-lite, and Gemini-2.5-flash. The attack achieved a success rate of over 90% in categories like Sexism, Violence, Hate Speech, and Pornography, while also performing strongly in areas such as Misinformation and Self-Harm. Even in stricter categories like Profanity and Illegal Activity, the attack’s success rate exceeded 40%, highlighting its wide applicability across various content domains.

    The attack typically achieved success within 1–3 turns, with the models showing increasing compliance as context poisoning took effect. Storytelling or hypothetical discussions were particularly effective, allowing the attacker to subtly steer the conversation towards the harmful objective.


    Why the Echo Chamber Attack Matters

    The Echo Chamber attack reveals a critical blind spot in LLM safety systems: their vulnerability to indirect manipulation via context and inference. Traditional defenses that focus on filtering explicit harmful content are insufficient when models can infer and build upon harmful objectives over multiple turns. This attack highlights a deeper flaw in current LLM alignment efforts, demonstrating that safety mechanisms must evolve to account for the subtle ways in which malicious actors can manipulate models.

    In practical applications such as customer support bots, productivity assistants, and content moderators, this type of attack could be used to extract harmful outputs without triggering alarms, leading to potential misuse in real-world scenarios.


    Mitigation Recommendations

    To defend against Echo Chamber-style jailbreaks, developers and vendors should consider implementing context-aware safety auditing. This approach involves dynamically scanning the conversation history to identify patterns of emerging risk. Toxicity accumulation scoring can also help detect when benign prompts begin to form harmful narratives. Additionally, training safety layers to recognize indirect manipulation and fine-tuning models to detect and block such attempts can significantly improve defense mechanisms.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is a CMMI V2.0 Level 3, ISO 9001:2015, and ISO 27001:2013 (Information Security Management) certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 


  • Microsoft July 2025 Patch Tuesday Fixes 137 Bugs, Including SQL Server Zero-Day

    Microsoft’s July 2025 Patch Tuesday includes updates for 137 vulnerabilities, among them one publicly disclosed zero-day. Fourteen flaws are classified as critical, with the majority involving remote code execution, while others relate to information disclosure and hardware-level side channel attacks affecting AMD processors.


    Breakdown of Vulnerabilities

    This month’s update includes:

    • 53 Elevation of Privilege vulnerabilities
    • 41 Remote Code Execution vulnerabilities
    • 18 Information Disclosure vulnerabilities
    • 8 Security Feature Bypass vulnerabilities
    • 6 Denial of Service vulnerabilities
    • 4 Spoofing vulnerabilities

    These totals do not include four Mariner or three Microsoft Edge vulnerabilities addressed earlier in the month. Non-security updates include patches for Windows 11 and Windows 10, though individual KB numbers were not listed in Microsoft’s summary release.


    Zero-Day Vulnerabilities

    One publicly disclosed zero-day is addressed in this month’s update.

    CVE-2025-49719 | Microsoft SQL Server Information Disclosure Vulnerability

    Affects: Microsoft SQL Server
    This flaw allows a remote, unauthenticated attacker to access data from uninitialized memory due to improper input validation. It can be exploited over a network without prior authentication. Administrators are advised to install the latest version of Microsoft SQL Server and update the Microsoft OLE DB Driver (version 18 or 19).

    Microsoft has not shared details on how the disclosure occurred, but no active exploitation has been reported.


    Other Critical Vulnerabilities

    Microsoft addressed several critical remote code execution vulnerabilities this month, including:

    • CVE-2025-49704, a remote code execution vulnerability in Microsoft SharePoint, which can be exploited remotely by authenticated users over the internet.
    • Multiple Microsoft Office RCEs that can be triggered by opening a crafted document or viewing it in the preview pane.

    Security updates for Microsoft Office LTSC for Mac 2021 and 2024 were not available at the time of release but are expected soon.


    AMD and Other Vendor Updates

    Security updates from other major vendors include:

    • AMD: Disclosed new transient execution side channel vulnerabilities based on Microsoft’s research into microarchitectural leakage boundaries.
    • Cisco: Released patches for various issues, including one involving hardcoded SSH root credentials in Unified Communications Manager (Unified CM).
    • Fortinet: Issued updates for FortiOS, FortiManager, FortiSandbox, FortiIsolator, and FortiProxy.
    • Google: Released a fix for an actively exploited Chrome zero-day (CVE-2025-6554). No Android patches were issued in the July 2025 bulletin.
    • Grafana: Addressed four Chromium-related vulnerabilities affecting the Image Renderer plugin and Synthetic Monitoring Agent.
    • Ivanti: Delivered updates for Ivanti Connect Secure, Policy Secure, EPMM, and EPM. None of the issues were reported as exploited.
    • SAP: Released fixes for several products and reclassified CVE-2025-30012 in SAP Supplier Relationship Management as a critical flaw, now rated 10.0.

    Recommendations for Users and Administrators

    Organizations should prioritize patching Microsoft SQL Server, Office, and SharePoint deployments, especially those accessible from external networks. While the SQL Server flaw is not known to be exploited, its public disclosure increases the risk of future exploitation. Systems with outdated OLE DB drivers should be updated alongside SQL Server patches.

    Security teams should also review AMD’s disclosure on transient scheduler attacks, as well as vendor patches from Cisco, Google, and SAP addressing high-severity and actively exploited vulnerabilities.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is a CMMI V2.0 Level 3, ISO 9001:2015, and ISO 27001:2013 (Information Security Management) certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 


  • Netizen: Monday Security Brief (7/7/2024)

    Today’s Topics:

    • Taiwan NSB Warns of Security Risks from China-Developed Apps
    • Understanding the Relationship Between NIS2 and the EU Cyber Resilience Act
    • How can Netizen help?

    Taiwan NSB Warns of Security Risks from China-Developed Apps

    Taiwan’s National Security Bureau (NSB) has issued a public warning about the security risks posed by China-developed apps such as RedNote (Xiaohongshu), Weibo, TikTok, WeChat, and Baidu Cloud, citing concerns over excessive data collection and the transfer of personal data to China.

    This alert follows a comprehensive inspection of these apps, conducted in collaboration with the Ministry of Justice Investigation Bureau (MJIB) and the Criminal Investigation Bureau (CIB). The NSB identified significant security issues across the apps, including the collection of sensitive personal data such as facial recognition, clipboard content, contact lists, location data, and more. Additionally, all the apps were found to transmit data back to servers in China, raising concerns about the potential misuse of this information.

    According to the NSB’s analysis, RedNote violated all 15 security indicators evaluated, followed by Weibo and TikTok with breaches in 13 categories, and WeChat and Baidu Cloud with violations in 10 and 9 areas, respectively. The warning highlights that companies operating in China are required by law to hand over user data for national security and intelligence purposes, further amplifying the privacy risks for Taiwanese users.

    This move follows similar actions in other countries like India, which banned Chinese apps over security concerns, and Canada, which recently ordered TikTok to cease operations. The U.S. has also extended its ban on TikTok, leaving its future uncertain. As global concerns over data privacy grow, the NSB urges the public to exercise caution when using China-made apps, stressing the importance of protecting personal and business data.


    Understanding the Relationship Between NIS2 and the EU Cyber Resilience Act

    The European Union has introduced two significant regulations aimed at strengthening cybersecurity: the NIS2 Directive and the Cyber Resilience Act (CRA). Both are designed to address vulnerabilities in essential services and digital products within the EU, with an emphasis on secure-by-design principles and comprehensive cybersecurity practices.

    The NIS2 Directive, effective from January 2023, mandates that essential service providers in sectors like energy, transport, healthcare, and finance implement strong risk management practices, report incidents promptly, and collaborate across EU member states. This regulation is crucial for maintaining the security and reliability of critical infrastructure, especially as cyber threats continue to evolve. NIS2 requires that organizations designated as “essential” or “important” within the EU ensure robust cybersecurity controls are in place. Member states have until October 2024 to integrate this directive into their national laws, with full compliance required within 21 months.

    On the other hand, the Cyber Resilience Act (CRA) focuses on the security of digital products. Effective from December 2024, the CRA mandates that manufacturers incorporate cybersecurity features into their products before they can be marketed within the EU. This “secure-by-design” approach ensures that digital products, whether hardware or software, undergo rigorous security assessments, are regularly updated throughout their lifecycle, and meet established EU cybersecurity standards. The CRA applies to all products with digital components, aiming to reduce vulnerabilities and safeguard users from potential cyber threats.

    While NIS2 focuses on securing essential services, the CRA addresses the security of products entering the EU market. These two regulations complement each other and aim to establish a consistent and strong cybersecurity framework across the EU. However, organizations must navigate the distinct requirements of each regulation to ensure full compliance.

    For many companies, aligning with both NIS2 and CRA requirements may appear daunting, but the regulations share common principles with existing frameworks like NIST CSF and ISO 27001. Companies with mature security practices will likely find that enhancing their existing frameworks will enable them to meet EU-specific requirements more efficiently. For smaller enterprises, particularly those in the product development space, the transition may involve substantial investments in technology, training, and new processes to meet these security standards.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is a CMMI V2.0 Level 3, ISO 9001:2015, and ISO 27001:2013 (Information Security Management) certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans.