• Funding Crisis Threatens CVE Program—New Foundation Steps In to Maintain Operations

    The Common Vulnerabilities and Exposures (CVE) program—a cornerstone of global cybersecurity infrastructure—is facing major changes after its longtime operator, MITRE, announced that federal funding had lapsed as of April 16, 2025. The lapse prompted widespread concern from cybersecurity professionals, software vendors, and government officials who depend on CVE data to identify and manage software and hardware vulnerabilities.


    What Is CVE and Why It Matters

    The CVE program, developed and managed by MITRE under contract with the U.S. Department of Homeland Security (DHS), assigns unique identifiers to newly discovered security flaws in software and firmware. These identifiers—such as CVE-2024-43573—allow vendors, defenders, and researchers to speak a common language about vulnerabilities across platforms and tools.

    The CVE database supports a broader ecosystem of cybersecurity capabilities, including patch management, security scanning, intrusion detection, and threat intelligence. As former CISA Director Jen Easterly once described it, CVE functions as “the Dewey Decimal System for cybersecurity,” providing consistency and clarity across the industry.


    MITRE’s Contract Expiration and Warning Letter

    On April 15, MITRE Vice President Yosry Barsoum sent a letter to the CVE Board warning that the organization’s contract to manage and modernize the CVE program would expire the following day. The letter cited potential disruptions to vulnerability coordination, threat advisories, automated patching tools, and incident response processes if the service were to be interrupted.

    “If a break in service were to occur, we anticipate multiple impacts to CVE, including deterioration of national vulnerability databases and advisories, tool vendors, incident response operations, and all manner of critical infrastructure,” the letter stated.

    MITRE also clarified that while the CVE website would remain live, no new CVE identifiers would be issued until further funding or a structural alternative was in place.


    Industry Reaction: Alarm and Urgency

    The response from the cybersecurity community was swift and vocal. Security researchers expressed concern about the potential fragmentation of vulnerability tracking and the increased difficulty of coordinating patch cycles without a standardized system like CVE.

    John Hammond, principal researcher at Huntress, said the potential shutdown felt like losing “the language and lingo we use to address problems in cybersecurity.” Others noted that the lapse could force organizations to rely on vendor-specific disclosures, increasing confusion and slowing down response times to emerging threats.

    “This isn’t just an inconvenience,” said Matt Tait, COO at Corellium. “Without CVE, patch prioritization becomes more difficult, security tools lose consistency, and risk managers have to monitor multiple fragmented sources to track vulnerabilities.”


    A Rapid Turnaround: The CVE Foundation Is Born

    Just hours after the funding lapse, the CVE Board announced the formation of a new nonprofit, The CVE Foundation, to continue the program’s operations independently of the U.S. government. The foundation’s mission will be to maintain and evolve CVE as a global public good, free from reliance on a single federal sponsor.

    “While the program has grown tremendously under U.S. government support, its dependence on a single funding stream has created long-standing concerns about sustainability and neutrality,” the board wrote in a press release. “The foundation model allows us to address those concerns directly.”

    The foundation’s website, thecvefoundation.org, is now live, though at present it contains only the press announcement. More information on the foundation’s governance structure, membership, and transition plan is expected in the coming days.


    Interim Support from MITRE

    Later in the day on April 16, MITRE issued a separate statement confirming that it had secured “incremental funding” to keep the CVE and CWE (Common Weakness Enumeration) programs operational in the short term.

    “We appreciate the overwhelming support expressed by the global cyber community, industry, and government,” the statement read. “MITRE remains committed to CVE and CWE as global resources, and we continue to work with the government and stakeholders to support a smooth transition.”


    What’s Next?

    The transition to a nonprofit foundation marks a significant shift in how one of the most relied-upon cybersecurity standards is managed. While the continuity of operations has been preserved for now, the episode has raised important questions about how critical cybersecurity infrastructure is funded and governed.

    With the cybersecurity threat landscape continuing to evolve rapidly—and with CVEs playing a central role in everything from enterprise patch management to national critical infrastructure defense—how the foundation scales and sustains its operations will be closely watched.

    The creation of the CVE Foundation may ultimately prove to be a necessary and overdue modernization of a program that has become too important to rely on year-to-year contract renewals. But for now, the cybersecurity community is breathing a cautious sigh of relief.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

    Questions or concerns? Feel free to reach out to us any time –

    https://www.netizen.net/contact


  • March 2025: Trump Administration Advances AI Strategy, Tightens Restrictions on DeepSeek

    On March 15, the White House concluded a public comment period on its upcoming AI Action Plan. The Office of Science & Technology Policy (OSTP), alongside the National Science Foundation’s Networking and Information Technology Research and Development (NITRD) office, had issued a formal Request for Information (RFI) in February as required by President Trump’s AI Executive Order.

    The RFI invited input across 20 broad topic areas, including AI-related data privacy, safety standards, technical infrastructure, and government procurement. In total, 8,755 comments were submitted by stakeholders, ranging from nonprofit organizations and academia to industry groups and private companies.

    The finalized AI Action Plan is expected to be released by July 2025.


    NIST Expands AI Standards and Evaluation Efforts

    Throughout March, the National Institute of Standards and Technology (NIST) launched several initiatives to bolster AI safety, reliability, and standards development:

    • GenAI Image Challenge (March 19):
      NIST invited researchers and developers to participate in a benchmarking challenge evaluating generative AI systems—specifically image generators and image discriminators. The challenge aims to improve methods of detecting AI-generated visual content.
    • Adversarial ML Report (March 24):
      NIST published its final report, Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations (NIST AI 100-2e2025). The guidance defines attack types across the AI lifecycle and offers voluntary mitigations for securing predictive and generative systems. The report warns that adversarial attacks in real-world settings are growing more sophisticated and damaging.
    • AI Standards “Zero Drafts” Pilot (March 25):
      NIST announced a new standard-setting model where it will publish preliminary “zero draft” AI standards for community feedback before passing them to formal standards-developing organizations (SDOs). The pilot will begin with four topic areas:
      1. Transparency and documentation
      2. TEVV (Testing, Evaluation, Verification, and Validation)
      3. System architecture and terminology
      4. Reducing synthetic content risks

    NIST is soliciting stakeholder input on these priorities. No submission deadline has been set.


    Senate Confirms Michael Kratsios to Lead OSTP

    On March 25, Michael Kratsios was confirmed by the Senate (74-25 vote) as Director of the White House Office of Science & Technology Policy. Kratsios previously served in the Trump Administration as U.S. CTO and played a central role in the 2020 rollout of AI guidance for federal agencies.

    In written responses to the Senate Commerce Committee, Kratsios emphasized a sector-specific, risk-based approach to AI regulation and pledged to collaborate with the Department of Commerce on shaping the U.S. AI Safety Institute.

    The following day, President Trump issued a formal letter to Kratsios outlining three directives:

    1. Accelerate research to maintain U.S. technological supremacy in AI and related emerging technologies.
    2. Reduce regulatory barriers and revitalize the American science and technology base.
    3. Ensure that innovation drives broad economic benefits for all Americans.

    DeepSeek Draws Increased Scrutiny from Federal and State Leaders

    In response to national security concerns tied to Chinese AI firm DeepSeek, Congress and state officials increased pressure to restrict the company’s products from government environments.

    • Congressional Action:
      On March 3, Reps. Josh Gottheimer (D-NJ) and Darin LaHood (R-IL) sent letters to 47 state governors and the DC mayor urging bans on DeepSeek products on government devices. This follows their introduction of H.R. 1121, the No DeepSeek on Government Devices Act.
    • Attorneys General Back Federal Ban:
      On March 6, Montana Attorney General Austin Knudsen—joined by 20 other AGs—formally supported the bill, citing data privacy and national security concerns.
    • New State-Level Bans:
      South Dakota banned use of DeepSeek on state-issued devices on March 4. Oklahoma followed suit on March 21, prohibiting use or download of DeepSeek on government-owned systems and banning the input of state data into any product built on DeepSeek’s platform.

    These actions add to previously announced bans in New York, Virginia, Iowa, and Pennsylvania. In his announcement, Oklahoma Governor Kevin Stitt cited security risks, adversarial AI concerns, and regulatory compliance issues as driving factors behind the decision.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

    Questions or concerns? Feel free to reach out to us any time –

    https://www.netizen.net/contact


  • Understanding EDR, MDR, and XDR for Cyber Defense

    As ransomware and cyber extortion campaigns grow more complex, organizations are rethinking how they protect digital assets across endpoints, networks, and cloud infrastructure. In this changing threat landscape, three terms are appearing frequently: EDR (Endpoint Detection and Response), MDR (Managed Detection and Response), and XDR (Extended Detection and Response). While they share a common goal—detecting and stopping malicious activity—they differ significantly in scope, implementation, and suitability for various organizations.

    At a glance, EDR offers direct, granular control over endpoint security. MDR adds a human element, delivering security monitoring and response as a service. XDR takes a broader approach by integrating multiple telemetry sources to identify threats across environments.


    Understanding the Core of EDR

    EDR tools are focused on the devices that sit at the edge of your network—laptops, desktops, servers, and mobile endpoints. These tools continuously monitor device activity to catch and respond to suspicious behavior. In practical terms, that means if a developer opens a compromised file while working remotely, EDR software might flag unexpected registry changes or executable behavior, then isolate the machine to prevent spread.

    This approach is particularly helpful for mid-sized organizations with skilled security teams that prefer hands-on oversight. However, EDR platforms often generate high alert volumes, which can be overwhelming without dedicated staff.


    How MDR Takes Pressure Off In-House Teams

    MDR builds on EDR but wraps it in managed services, giving organizations access to expert analysts who monitor threats 24/7. For startups or businesses lacking a full security operations center, MDR fills a crucial gap. If attackers strike in the middle of the night, an MDR provider will detect, investigate, and respond before anyone in-house is even aware something went wrong.

    This approach is more costly than EDR alone but dramatically reduces the internal workload and expertise requirements. It’s especially helpful for teams suffering from alert fatigue or those trying to scale security efforts without building out a SOC from scratch.


    XDR’s Broader Scope for Complex Environments

    XDR goes beyond endpoint-level protection by correlating signals across multiple domains, including network traffic, cloud workloads, identity services, and endpoints. In organizations with hybrid environments—on-prem infrastructure mixed with SaaS platforms and cloud VMs—XDR offers an aggregated view of threats, helping security teams piece together the full picture of an attack.

    Rather than just alerting based on activity on a single endpoint, XDR can detect coordinated intrusions, lateral movement, and multi-stage malware infections that span devices and environments. However, the broader scope also brings challenges with deployment and integration, especially in large-scale IT environments.


    Comparing Their Strengths and Weaknesses

    Each of these tools comes with trade-offs. EDR is ideal for teams with technical depth who want visibility and control but can handle their own alerts. MDR outsources much of the effort, offering expert help at the cost of some customizability. XDR offers the richest telemetry and the most context, but its success depends on how well it integrates with your infrastructure.

    Cost also scales accordingly. EDR is often the least expensive but resource-intensive. MDR is priced higher due to the inclusion of human services. XDR tends to be the most expensive and powerful, best suited for large or mature organizations with a diverse attack surface.


    So, What’s the Right Fit?

    If your organization already has in-house cybersecurity expertise and needs high-fidelity visibility into endpoint activity, EDR is likely a good fit. If you’re struggling with resource limitations or lack dedicated staff for around-the-clock response, MDR offers a practical and effective middle ground. If your infrastructure spans multiple systems and you need centralized threat visibility, XDR provides the best situational awareness—particularly valuable in highly targeted or regulated sectors.

    Regardless of the approach, these solutions are not mutually exclusive. Some organizations combine EDR for granular control, MDR for expert oversight, and XDR for cross-environment threat correlation. The key is to match your decision to your organization’s risk exposure, IT complexity, and available internal resources.

    As cyber threats continue evolving, so too must your defense strategy. Choosing the right mix of detection and response tools can mean the difference between a quick containment and a costly breach.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

    Questions or concerns? Feel free to reach out to us any time –

    https://www.netizen.net/contact


  • Netizen: Monday Security Brief (4/14/2024)

    Today’s Topics:

    • Chrome 136 Patches 20-Year Privacy Loophole Linked to Visited Link Styling
    • Tycoon2FA Phishing Kit Evolves With Advanced MFA Bypass and Evasion Tactics
    • How can Netizen help?

    Chrome 136 Patches 20-Year Privacy Loophole Linked to Visited Link Styling

    Google has resolved a long-standing web privacy flaw in Chrome that allowed websites to detect a user’s browsing history by exploiting the browser’s styling of visited links. The fix, which lands in Chrome version 136, closes a gap that’s existed for over two decades and has been used in multiple real-world tracking techniques.

    Web browsers traditionally allow websites to visually distinguish between visited and unvisited links by applying different styles using the CSS :visited selector. A visited link often appears in purple instead of blue, which serves as a helpful user interface cue.

    However, this visual feedback creates an opportunity for malicious sites to check if certain links have been visited by measuring how they render. This side channel can be abused to reconstruct parts of a user’s browsing history.

    Even though browsers like Chrome blocked access to certain styling properties to mitigate this, researchers still demonstrated successful privacy attacks using techniques such as:

    • Timing-based inference
    • Pixel inspection
    • User interaction tracking
    • Process-level attacks

    These tactics made it possible to confirm whether a visitor had previously accessed certain URLs — across different sites — without any user interaction.

    Starting in Chrome 136, visited links are no longer treated globally. Instead, Chrome applies triple-key partitioning to store visited status using:

    1. The destination URL (the actual link)
    2. The top-level site (domain in the address bar)
    3. The frame origin (the frame or iframe where the link is displayed)

    With this change, a visited link will only appear as visited if it was clicked on the same site and within the same frame origin. This eliminates cross-site leakage while preserving the feature’s utility for single-site navigation.

    To maintain usability, Chrome includes a self-link exception. If a user visits a link on a given site, that link will still show as visited when viewed on that same site, even if it was originally clicked from a different domain. Since the site already knows which of its pages were visited, this doesn’t introduce new privacy risks.

    Google considered alternatives, including:

    • Deprecating :visited entirely: ruled out due to its UX value
    • Permissions models: considered too easy to exploit or mislead users

    Instead, partitioning provided the best balance of security and usability.

    This fix was introduced as an experimental flag in Chrome 132 and will be enabled by default in Chrome 136. Until then, users can manually activate it via the following flag:

    pgsqlCopychrome://flags/#partition-visited-link-database-with-self-links
    

    After setting the flag to “Enabled”, restart Chrome to apply the change. Note that this experimental version may still show unstable behavior in some contexts.

    As of now, other major browsers like Firefox and Safari have only partially mitigated the :visited link leakage issue. Chrome 136 sets a new benchmark in addressing this subtle but impactful privacy concern.


    Tycoon2FA Phishing Kit Evolves With Advanced MFA Bypass and Evasion Tactics

    The Tycoon2FA phishing kit—known for its ability to bypass multi-factor authentication (MFA) for Microsoft 365 and Gmail accounts—has received major updates that improve its stealth, obfuscation, and evasive capabilities.

    Originally identified by Sekoia in late 2023, the Tycoon2FA phishing-as-a-service (PhaaS) platform continues to evolve, with the latest findings from Trustwave detailing how its updated toolkit now evades detection more effectively and targets victims with increased precision.

    Key Technical Enhancements

    1. Unicode Obfuscation in JavaScript Tycoon2FA operators are now using invisible Unicode characters to embed binary data inside JavaScript payloads. This data is then decoded and executed at runtime, making static pattern detection and manual code inspection significantly more difficult. First reported by Juniper Threat Labs, this technique helps the payload fly under the radar of most email filters and endpoint detection tools.

    2. Self-Hosted CAPTCHA Using HTML5 Canvas The kit has moved away from using Cloudflare Turnstile in favor of a self-hosted CAPTCHA rendered via HTML5 canvas. The visual elements are randomized to avoid fingerprinting, allowing attackers to bypass domain reputation systems and detection based on CAPTCHA frameworks.

    3. Advanced Anti-Debugging and Analysis Evasion New anti-debugging logic detects common analysis tools like Burp Suite and PhantomJS. If these tools are identified, or if the CAPTCHA interaction fails (a potential sign of an automated scanner), the user is redirected either to a legitimate site like rakuten.com or is served a decoy page to break the analysis flow.

    These improvements make it more difficult for defenders to analyze infrastructure, reverse engineer payloads, or automate detection via browser-based sandboxing.

    In parallel with toolkit updates, Trustwave has observed a dramatic increase in the use of malicious SVG files in phishing campaigns—an 1,800% jump from April 2024 to March 2025. This surge is being fueled by Tycoon2FA and other PhaaS platforms like Mamba2FA and Sneaky2FA.

    SVG files are being disguised as voicemail alerts, logos, or shared documents and are weaponized with embedded JavaScript. These scripts often use multiple layers of obfuscation—such as base64, ROT13, XOR, and junk code—to evade detection by email scanners and endpoint tools.

    Upon rendering, the embedded code redirects the victim to fake Microsoft 365 login portals designed to harvest credentials.

    A recent campaign spoofed Microsoft Teams notifications, using an SVG file disguised as a voicemail message. When opened, the file launched a browser and executed obfuscated JavaScript to redirect the user to a phishing page mimicking the Office 365 login screen.

    The combination of SVG-based delivery and advanced obfuscation represents a notable evolution in phishing operations, especially those offered as turnkey services to lower-tier cybercriminals. These changes point to a broader trend: phishing campaigns are becoming more modular, evasive, and automated—targeting enterprise platforms with precision tools that bypass both MFA and modern email defenses.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is a CMMI V2.0 Level 3, ISO 9001:2015, and ISO 27001:2013 (Information Security Management) certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 


  • Why Dark Web Monitoring is Essential for Data Security

    Dark web monitoring is the practice of continuously scanning hidden parts of the internet—often inaccessible through standard browsers—for signs that an organization’s sensitive data has been leaked, stolen, or exposed. Unlike standard search engines, dark web monitoring tools are tailored to identify compromised credentials, source code, intellectual property, and other confidential data circulating in criminal marketplaces, forums, and data dumps.

    These tools act as a critical layer in security programs by identifying risks that traditional antivirus software or endpoint protection can’t catch—namely, post-exfiltration activity. They help both organizations and individuals respond faster to incidents like breaches, data leaks, and credential thefts by alerting relevant stakeholders when data appears in underground channels.


    How It Works

    Dark web monitoring platforms operate by crawling and indexing dark web sources in real time or near real time. These include forums, marketplaces, encrypted chat platforms, peer-to-peer leak sites, and other areas used by cybercriminals to distribute or sell stolen data. Organizations can configure these tools to monitor specific keywords or indicators such as employee email addresses, company domains, customer records, or proprietary technology identifiers.

    When a match is detected, the tool generates an alert, which is usually integrated with a broader security incident response system. This alert can then be acted upon by relevant teams, such as security, legal, fraud prevention, or communications, depending on the nature of the exposure.


    Core Capabilities

    • Threat intelligence enrichment: Dark web monitoring feeds raw data into threat intelligence systems, helping analysts correlate exposure events with broader attack campaigns or known threat actors.
    • Threat hunting acceleration: By offering early indicators of compromise, these tools allow threat hunters to identify possible intrusions or leaks before traditional tools pick them up.
    • Incident response readiness: Integrated alerting and automated triage workflows reduce the time between detection and response, allowing teams to act before exposed information is weaponized.
    • Cross-platform integration: Data from dark web monitoring tools can be shared with SIEM, SOAR, or XDR platforms, offering a more complete security picture.

    Why It’s Essential

    Monitoring the dark web provides visibility into threats that don’t always manifest on the surface. Not every breach involves malware or unauthorized access—sometimes data leaks through vendors, accidental misconfigurations, or insider threats. These incidents may only become visible once the data is sold or discussed on dark web forums.

    In addition to stolen credentials, dark web chatter can reveal that an organization is being targeted or has already been compromised. This early warning can be critical, especially when attackers exploit third-party relationships to pivot across supply chains. It’s not just a post-breach tool—it’s an early detection system.


    Risks Uncovered by Dark Web Monitoring

    • Third-party data breaches
    • Corporate credential leaks
    • Impersonation campaigns
    • Domain spoofing
    • Insider data sales or accidental exposure
    • Trade secrets or source code being offered for sale
    • Fraudulent use of corporate branding

    Benefits of Implementation

    Dark web monitoring provides organizations with the ability to:

    • Detect and mitigate credential leaks before they’re used in attacks
    • Identify malicious activity tied to their brand or assets
    • Shorten the exposure window for stolen data
    • Improve threat intelligence accuracy by correlating underground signals with internal security telemetry

    Organizations can also discover whether they’ve been indirectly affected by supply chain breaches and determine if sensitive data has made its way into criminal hands.


    Who Should Use It?

    Any organization responsible for safeguarding sensitive data—including personally identifiable information, intellectual property, or access credentials—should consider deploying dark web monitoring. This includes financial institutions, healthcare providers, SaaS companies, public sector entities, and any business that manages customer records or proprietary technology.


    How Data Ends Up on the Dark Web

    Stolen data lands on the dark web through several techniques:

    • Phishing attacks that trick users into handing over login credentials
    • Malware infections, often deployed through loaders or botnets
    • Exploits targeting known vulnerabilities in unpatched systems
    • Man-in-the-middle attacks on insecure public networks
    • Keyloggers and screen scrapers embedded in infected endpoints

    Once acquired, these data sets are packaged and sold as “fullz” (full identity bundles), with pricing based on their value to cybercriminals.


    What to Do if Data Is Found

    If an organization receives an alert from a dark web monitoring service:

    • Initiate a password reset or account recovery for affected credentials
    • Investigate internal systems for signs of compromise
    • Notify affected parties if personal data is involved
    • Consider whether to notify regulators under applicable laws
    • Adjust defensive controls to prevent recurrence

    For consumers, the right move is to change passwords, enable two-factor authentication, and monitor for signs of identity theft. For businesses, the stakes are higher and the response must be swift to minimize reputational and legal fallout.


    Integrating Dark Web Monitoring Into Your Security Stack

    To get the most value from dark web monitoring:

    • Pair it with a strong asset inventory and vulnerability management program
    • Integrate alerts into your SIEM or SOAR for automated triage
    • Use it to validate threat actor tactics discussed in threat intelligence briefings
    • Combine it with identity and access management platforms to immediately revoke access when stolen credentials are found

    Dark web monitoring isn’t a silver bullet—but it fills a critical blind spot in many security programs. As cybercriminals increasingly rely on living-off-the-land tactics, credential theft, and supply chain compromise, visibility into the dark web becomes essential for early detection and effective defense.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

    Questions or concerns? Feel free to reach out to us any time –

    https://www.netizen.net/contact


  • Log4j Explained: What It Is, How It Works, and How to Fix It

    In December 2021, the cybersecurity community faced a major crisis when a critical zero-day vulnerability in Log4j, an open-source logging library widely used in Java-based systems, was discovered. Known as Log4Shell, this flaw exposed countless systems and applications to potential remote code execution (RCE) attacks. Below, we explain how the vulnerability works, the response it triggered, and best practices to mitigate its impact.


    What Is Log4j?

    Log4j is an open-source Java-based logging utility, maintained by Apache, that allows developers to integrate logging functionality into their applications. Logging enables software to track actions, errors, and performance issues, providing important insights for debugging and monitoring. The vulnerability resides in the communication feature of Log4j, which handles these logs and interacts with other services on the system.

    While Log4j itself is a common and useful tool, the flaw within it introduced severe security risks. Cybercriminals could exploit this weakness to inject malicious code into the log files, leading to arbitrary code execution on affected systems.


    How Does the Log4j Vulnerability Work?

    The Log4j vulnerability was first identified in the popular game Minecraft, where attackers found they could input malicious commands in the game’s chat system. These commands, once logged by Log4j, could trigger remote code execution (RCE) on the backend servers. This type of attack allows hackers to take control of systems remotely, a serious threat in any network environment.

    What made Log4Shell especially dangerous was its ease of exploitation. Attackers did not need to authenticate or have access to the system beforehand. They could exploit the vulnerability simply by entering specially crafted payloads into various input fields—such as chat boxes, forms, or even login screens—on a vulnerable platform.

    The vulnerability was given the highest Common Vulnerability Scoring System (CVSS) score of 10, indicating its severity. It impacted millions of devices, including widely used enterprise software, web servers, and cloud applications.


    The Technical Details of the Exploit

    Hackers exploited Log4j by taking advantage of its JNDI (Java Naming and Directory Interface) functionality. JNDI allows Java applications to fetch and load Java objects remotely. Normally, this feature is secure, but the vulnerability allowed attackers to direct JNDI lookups to malicious servers, which would then execute arbitrary code on the target system.

    To carry out the exploit, an attacker could use public Proof of Concept (PoC) code shared on platforms like GitHub. This code enabled attackers to set up fake LDAP servers and inject crafted payloads into vulnerable systems. Once the payload was processed by Log4j, the attacker could remotely execute commands, steal data, or deploy malware.


    Response to the Log4j Vulnerability

    The discovery of the Log4j vulnerability sent shockwaves through the cybersecurity community. Within days, security teams around the world scrambled to assess their environments and implement mitigations. The complexity and widespread impact of the flaw required immediate action across many sectors.

    As the flaw was disclosed, organizations were urged to quickly assess which systems were vulnerable and to disconnect internet-facing systems that weren’t essential for business operations. Simultaneously, security teams worked to identify patches from software vendors to address the vulnerability.

    The rapid nature of this crisis underscored the importance of coordinated responses from both internal IT teams and external technology providers. Many organizations spent several days applying patches, updating vulnerable systems, and testing security measures to ensure they were protected from exploitation.


    Impact of the Log4j Vulnerability

    The Log4j vulnerability had a far-reaching impact. Cybersecurity researchers quickly identified the vast number of systems affected, from enterprise software to consumer applications. While waiting for patches, security teams advised organizations to disable any non-essential, internet-facing systems. This was a critical step in preventing exploitation of the vulnerability before official fixes were made available.

    In the aftermath, millions of exploit attempts were recorded, with many resulting in successful Denial of Service (DoS) attacks. The massive scale of the issue prompted extensive collaboration among cybersecurity experts, vendors, and government agencies to manage the threat and minimize damage.


    How to Fix the Log4j Vulnerability

    To address the Log4j vulnerability, security teams should take the following steps:

    1. Update Log4j: The most straightforward mitigation step is to update Log4j to the latest version, which includes patches to resolve the vulnerability. Apache provided fixes that disable the vulnerable features and block the exploit.
    2. Apply Vendor Patches: In addition to updating Log4j itself, organizations should ensure that any third-party applications or frameworks that use Log4j are updated to patched versions. Many software vendors released their own patches, which must be applied as soon as possible.
    3. Use Workarounds: If an immediate patch isn’t feasible, Apache provided temporary workarounds, such as disabling certain features of Log4j or configuring systems to reject certain types of malicious input.
    4. Conduct a Vulnerability Assessment: Organizations should conduct thorough vulnerability assessments to identify any systems or software impacted by the Log4j flaw. This includes scanning for any instances of Log4j running in production systems and ensuring they are properly updated or remediated.
    5. Monitor for Exploitation: Finally, organizations should actively monitor their networks for signs of exploitation. This may include reviewing logs for suspicious activity, deploying intrusion detection systems, and investigating any unexpected system behavior.

    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

    Questions or concerns? Feel free to reach out to us any time –

    https://www.netizen.net/contact


  • Meta’s Controversial AI Training: Piracy Allegations Explained

    Meta is facing new allegations of digital piracy after reports surfaced that the company reuploaded 30% of the pirated books it downloaded for training its AI models. The findings suggest that beyond merely using shadow library content, Meta may have played an active role in sustaining the distribution of pirated books. This raises cybersecurity concerns, particularly regarding the integrity of AI training datasets, the security risks associated with using illicit sources, and the broader implications for intellectual property protection in an era of large-scale AI development.


    How Meta’s AI Training Contributed to Piracy

    Meta has been known to train its AI models, including the Llama series, on a dataset that reportedly included books from piracy sites such as Library Genesis (LibGen) and Z-Library. These shadow libraries have long been controversial due to their role in distributing copyrighted materials without authorization.

    Recent analysis indicates that when Meta downloaded these books through BitTorrent, its upload rate was unusually high, raising concerns that it contributed to ongoing piracy rather than merely consuming the content for training purposes. BitTorrent’s peer-to-peer structure means that when users download files, they also upload portions of them to other users. While this occurs automatically, Meta’s reupload volume suggests a significant level of participation in these piracy networks, whether intentional or not.

    This revelation underscores a broader cybersecurity risk: by sourcing data from shadow libraries, Meta’s AI training processes may have unknowingly incorporated manipulated or malicious files. Attackers frequently use these platforms to distribute trojanized PDFs or embedded malware, posing potential security threats to organizations handling such data.


    LibGen in Cybersecurity and Digital Piracy

    Library Genesis, commonly known as LibGen, emerged in the early 2000s as a resource for academic and scientific materials that were otherwise locked behind expensive paywalls. Initially, it was lauded by researchers and students for democratizing access to knowledge. However, it soon became a hub for widespread copyright infringement, hosting millions of pirated books across various genres.

    Despite repeated attempts to take it down, LibGen has survived through a decentralized structure, multiple domain mirrors, and support from the hacking and open-access communities. Over the years, law enforcement agencies, publishers, and cybersecurity experts have flagged the risks associated with these platforms.

    Several cybersecurity concerns stem from the use of shadow libraries like LibGen:

    • Malware Distribution: Cybercriminals have been known to embed malicious code in PDF and EPUB files, leading to credential theft, remote access trojans (RATs), and ransomware infections.
    • Data Integrity Issues: AI models trained on datasets from illicit sources may inherit inaccuracies, biases, or even manipulated information inserted by malicious actors.
    • Legal and Compliance Risks: Organizations using unauthorized datasets risk violating data protection laws, intellectual property regulations, and ethical AI development standards.

    Meta’s alleged role in reuploading pirated books only amplifies these risks, as it suggests a large-scale, corporate involvement in sustaining digital piracy ecosystems.


    Internal Concerns About Legality

    Court filings in the U.S. District Court for the Northern District of California reveal that Meta executives were aware of the legal risks associated with these datasets. Internal emails included in the lawsuit show employees expressing concerns about the company’s practices.

    One engineer remarked: “Torrenting from a [Meta-owned] corporate laptop doesn’t feel right.” Another suggested obtaining approval before proceeding, fearing legal consequences.

    Despite these concerns, Meta moved forward with its AI training, a decision that could have implications beyond copyright infringement, including potential cybersecurity threats arising from integrating unverified sources into its AI models.


    Legal and Ethical Implications

    Meta has attempted to justify its data collection under fair use, arguing that training AI models on copyrighted books transforms the material rather than reproducing it verbatim. However, copyright experts argue that reuploading pirated books, even unintentionally, weakens this defense.

    From a cybersecurity standpoint, the incident highlights the dangers of relying on data from shadowy sources. The practice of scraping content from piracy networks increases the risk of data poisoning, where adversarial modifications are introduced to compromise machine learning models. If AI training datasets are polluted with harmful inputs, the resulting models may exhibit biases, security vulnerabilities, or even hidden backdoors exploitable by threat actors.

    While AI companies like OpenAI and Microsoft have also leaned on the fair use argument in legal disputes, the act of redistributing copyrighted material—whether deliberate or incidental—could push Meta into more serious legal and security territory.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

    Questions or concerns? Feel free to reach out to us any time –

    https://www.netizen.net/contact


  • April 2025 Patch Tuesday Review Fixes 134 Vulnerabilities and One Exploited Zero-Day

    Microsoft’s April 2025 Patch Tuesday addresses a total of 134 vulnerabilities, including one actively exploited zero-day. This month’s release includes 11 critical vulnerabilities, all of which are remote code execution (RCE) flaws affecting widely deployed Microsoft services and components.


    Breakdown of Vulnerabilities

    The month’s patches address vulnerabilities in the following categories:

    • 49 Elevation of Privilege (EoP) vulnerabilities
    • 31 Remote Code Execution (RCE) vulnerabilities
    • 17 Information Disclosure vulnerabilities
    • 14 Denial of Service (DoS) vulnerabilities
    • 9 Security Feature Bypass vulnerabilities
    • 3 Spoofing vulnerabilities

    These totals do not include Mariner-related vulnerabilities or the 13 Microsoft Edge vulnerabilities that were addressed earlier in April. Non-security updates released today include the Windows 11 KB5055523 and KB5055528 cumulative updates, and the Windows 10 KB5055518 update.


    Zero-Day Vulnerabilities

    This month’s Patch Tuesday includes one zero-day vulnerability that was actively exploited in the wild.

    CVE-2025-29824 | Windows Common Log File System Driver Elevation of Privilege Vulnerability

    • Affects: Windows Server and Windows 11 (Windows 10 updates pending release)
    • This vulnerability allows a local attacker to gain SYSTEM-level privileges by exploiting a flaw in the Windows Common Log File System (CLFS) driver.
    • Microsoft has confirmed that this vulnerability was used in real-world attacks by the RansomEXX ransomware group.
    • The vulnerability was discovered by the Microsoft Threat Intelligence Center.
    • Microsoft has stated that the security updates for Windows 10 are not yet available but will be released soon, with customers notified via a CVE revision once published.

    Other Critical Vulnerabilities

    The other 11 critical vulnerabilities addressed this month are all categorized as remote code execution flaws. While specific CVEs were not highlighted in Microsoft’s early public documentation, they are expected to affect commonly targeted services and components, making timely patching especially important for enterprise systems.

    Adobe and Other Vendor Updates

    Other major vendors have also issued significant security updates this month:

    • Apache: Patched a maximum severity RCE vulnerability in Apache Parquet.
    • Apple: Released backported fixes for actively exploited flaws on older iOS and macOS devices.
    • Google: Published security updates addressing 62 Android vulnerabilities, including two zero-days used in targeted attacks.
    • Ivanti: Issued updates for April and previously patched a critical Connect Secure RCE vulnerability exploited by Chinese threat actors.
    • Fortinet: Released fixes for multiple products, including a serious bug in FortiSwitch allowing unauthorized admin password changes.
    • MikroTik: Rolled out updates as part of their April 2025 bulletin.
    • MinIO: Addressed a flaw involving incomplete signature validation, which impacted unsigned-trailer uploads.
    • SAP: Shipped fixes for several products, including three critical vulnerabilities.
    • WinRAR: Disclosed an issue where Mark of the Web attributes failed to propagate to extracted files, potentially weakening download protections.

    Recommendations for Users and Administrators

    Users and administrators are strongly encouraged to apply the April 2025 security updates without delay. Systems that rely on Windows Server and Windows 11 should receive immediate attention due to the active exploitation of CVE-2025-29824. Windows 10 users should monitor for the pending update release.

    Given the number of critical RCE vulnerabilities and the presence of a confirmed zero-day tied to ransomware activity, organizations should prioritize patch deployment, particularly on internet-facing systems and user workstations. As always, security teams should verify patch success through centralized management tools and remain alert for anomalies that may indicate pre-patch exploitation.

    Full details on these updates can be found in Microsoft’s Security Update Guide and corresponding KB articles.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is a CMMI V2.0 Level 3, ISO 9001:2015, and ISO 27001:2013 (Information Security Management) certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 


  • Netizen: Monday Security Brief (4/7/2024)

    Today’s Topics:

    • WinRAR Vulnerability Enables Mark of the Web Bypass and Silent Code Execution
    • Carding Tool Abusing WooCommerce API Downloaded 34,000 Times on PyPI
    • How can Netizen help?

    WinRAR Vulnerability Enables Mark of the Web Bypass and Silent Code Execution

    A newly disclosed vulnerability in the popular file archiver WinRAR allows attackers to bypass Windows’ built-in Mark of the Web (MotW) protections, enabling the stealthy execution of potentially malicious code. Tracked as CVE-2025-31334, the flaw affects all versions of WinRAR prior to the latest release, version 7.11.

    Mark of the Web is a Windows security feature that flags files downloaded from the internet by tagging them with an alternate data stream called Zone.Identifier. When a user attempts to run a file tagged with MotW, Windows displays a security warning, prompting the user to confirm whether the file should be executed. This helps prevent accidental execution of malware and is one of the OS’s primary mechanisms for defending against internet-delivered threats.

    The issue in WinRAR arises when a symbolic link (symlink) is embedded within an archive. If the symlink points to an executable file and the archive is opened using the WinRAR shell, the MotW flag is ignored entirely—even if the original file was downloaded from the internet and should have triggered a security warning.

    This means an attacker could craft an archive containing a symlink to a malicious executable and distribute it online. When the user extracts and runs the file using WinRAR, the system would execute the code without any MotW-based warning.

    It’s important to note that creating a symlink on a Windows system requires administrator-level permissions. While this adds some friction, it does not fully mitigate the risk—particularly in environments with weak privilege separation or systems already compromised in earlier stages of an attack.

    The vulnerability has been rated with a CVSS score of 6.8, placing it in the medium severity range. The bug was responsibly disclosed to WinRAR’s developer RARLAB by researcher Shimamine Taihei of Mitsui Bussan Secure Directions. The coordination was managed through Japan’s Information Technology Promotion Agency (IPA) and Japan’s Computer Security Incident Response Team (JPCERT/CC).

    WinRAR’s changelog for version 7.11 notes the fix simply:
    “If symlink pointing at an executable was started from WinRAR shell, the executable Mark of the Web data was ignored.”

    MotW bypasses have been increasingly targeted by both criminal and state-sponsored threat actors in recent years. Similar tactics have been used in other compression tools. For example, Russian cybercriminals recently exploited a bug in 7-Zip that failed to propagate MotW when using double compression techniques—allowing them to deploy malware like Smokeloader without triggering Windows alerts.

    MotW bypasses are attractive to attackers because they help sidestep one of the final lines of defense in environments where users download and open untrusted files. These flaws are especially valuable in phishing campaigns, drive-by downloads, or watering hole attacks.

    SOC teams should prioritize upgrading all endpoints to WinRAR 7.11 or later to ensure MotW tags are honored properly during archive extraction. While the CVSS score might not immediately suggest a critical risk, the potential to disable a key Windows security feature in user-facing workflows makes this bug particularly attractive to attackers focused on social engineering.

    Security teams should also monitor for symlink usage within archive contexts, especially in user-writable directories. Consider implementing detection logic for non-standard execution paths involving archive tools, and review telemetry for execution of binaries extracted from archives that should have been flagged with MotW.

    Lastly, this vulnerability serves as a reminder that endpoint protection strategies should not rely solely on operating system features like MotW. Defense-in-depth approaches—including behavior-based monitoring, application allowlisting, and user training—remain essential, especially when commonly used utilities like WinRAR can be used to subvert expected safeguards.


    Carding Tool Abusing WooCommerce API Downloaded 34,000 Times on PyPI

    A malicious Python package designed to validate stolen credit cards using legitimate WooCommerce stores has been downloaded more than 34,000 times from the Python Package Index (PyPI), highlighting the ongoing abuse of open-source ecosystems in support of cybercrime. The package, named disgrasya, was discovered by researchers at Socket and has since been removed from the repository—but not before it enabled wide-scale carding activity through automated abuse of online stores.

    Unlike typical supply chain attacks that rely on deception or typo-squatting to trick developers into installing fake libraries, the disgrasya package made no effort to disguise its purpose. In fact, the PyPI listing clearly stated: “A utility for checking credit cards through multiple gateways using multi-threading and proxies.” This bold description signaled that the authors weren’t concerned with flying under the radar, using PyPI as a high-traffic distribution platform to reach carding actors across the globe.

    According to Socket’s analysis, the malicious behavior was introduced in version 7.36.9—likely an intentional move to bypass security scans that are stricter for initial submissions. By delaying the addition of malicious code until a later version, attackers may have evaded automated analysis tools and code reviewers.

    The script targets WooCommerce stores that use the CyberSource payment gateway, a common configuration for online businesses. The tool automates a process that would normally require human interaction by programmatically emulating a full online shopping session.

    Here’s how the attack works:

    • The script crawls legitimate WooCommerce stores and collects product IDs.
    • It adds those products to a shopping cart using the site’s backend API.
    • It moves to the checkout page and harvests critical session data: a CSRF token and a capture context, which is a dynamic key used by CyberSource to tokenize credit card data securely.
    • Instead of sending the credit card details directly to CyberSource, the script transmits them to an attacker-controlled server (railgunmisaka.com), which mimics the payment gateway and returns a fake token.
    • That token is used to complete the checkout process on the WooCommerce site. If the transaction goes through, the card is logged as valid; if not, it’s discarded and the next card in the list is tested.

    This method allows the actor to verify thousands of stolen credit card numbers in a short time while leveraging legitimate infrastructure to avoid detection.

    Socket points out that this workflow is methodical, difficult to detect, and designed to blend into normal site activity. It’s particularly dangerous for merchants because traditional anti-fraud systems often can’t distinguish these fake checkouts from legitimate customer behavior—especially when the tool simulates a complete transaction path.

    Detection becomes even harder when attackers use proxies or botnets to distribute traffic across different IPs and regions, further mimicking normal web usage patterns.

    Though detection is difficult, there are several ways to make life harder for carding actors:

    • Block transactions under a certain threshold (e.g., <$5), which are commonly used for validation attempts.
    • Monitor for checkout patterns with high failure rates or sudden spikes in low-value orders.
    • Apply rate limits on checkout endpoints to slow down automated attacks.
    • Add CAPTCHA challenges during checkout to interrupt script-based submissions.
    • Track behavioral anomalies tied to repeated access from the same IP or region.

    Merchants using WooCommerce, especially those with CyberSource integration, should consider reviewing their site logs for suspicious automated checkout activity and audit past orders for signs of carding.

    Security teams should review web application logs for e-commerce properties to detect suspicious activity related to automated card validation. Look for checkout patterns involving low-value transactions, high error rates, or repeated requests originating from a limited IP pool. Integration monitoring tools and fraud prevention services should be configured to flag checkout endpoints for behavioral anomalies. SOC analysts should also ensure that payment APIs are not being indirectly abused through backend channels and should validate that session and payment token endpoints are not being exposed to external manipulation.

    Finally, any organization distributing Python packages internally or externally should closely monitor updates for malicious behavior introduced in later versions of a package—especially those with no clear use case or documentation.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is a CMMI V2.0 Level 3, ISO 9001:2015, and ISO 27001:2013 (Information Security Management) certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 


  • Splunk Releases Patches for Several High-Severity Vulnerabilities

    Splunk has released a series of security updates to address multiple vulnerabilities across its products, including two high-severity flaws affecting Splunk Enterprise and the Splunk Secure Gateway App. These vulnerabilities, if exploited, could allow attackers to execute arbitrary code or access sensitive information. Organizations using Splunk should take immediate action to apply the necessary patches.


    Details of the High-Severity Vulnerabilities

    Remote Code Execution Vulnerability (CVE-2025-20229)

    One of the most critical flaws addressed in this update is CVE-2025-20229, a remote code execution (RCE) vulnerability that could be exploited by low-privileged users. The flaw allows attackers to upload malicious files to the $SPLUNK_HOME/var/run/splunk/apptemp directory, potentially leading to unauthorized execution of code. This vulnerability has been assigned a CVSS score of 8.0, highlighting the urgency for patching.

    To mitigate this issue, Splunk has released updates for the following versions:

    • Splunk Enterprise: 9.4.0, 9.3.3, 9.2.5, and 9.1.8
    • Splunk Cloud Platform: 9.3.2408.104, 9.2.2406.108, 9.2.2403.114, and 9.1.2312.208

    Information Disclosure Vulnerability

    Another significant flaw affects both Splunk Enterprise and the Splunk Secure Gateway App. This vulnerability exposes user session and authorization tokens in clear text within the splunk_secure_gateway.log file when calling the /services/ssg/secrets REST endpoint. Attackers could exploit this by tricking victims into making requests within their browser, potentially leading to unauthorized access to sensitive data.

    Splunk has issued patches for this vulnerability in:

    • Splunk Enterprise: 9.4.1, 9.3.3, 9.2.5, and 9.1.8
    • Splunk Secure Gateway: 3.8.38 and 3.7.23

    For organizations that do not use Splunk Secure Gateway, Splunk recommends disabling or removing the app as a precautionary measure.


    Additional Vulnerabilities Addressed

    Beyond the high-severity issues, Splunk has also patched several medium- and low-severity vulnerabilities affecting various products, including:

    • Maintenance mode modifications and safeguard bypass issues in Splunk Enterprise
    • Information disclosure risks and user data manipulation vulnerabilities
    • Third-party package vulnerabilities in Splunk Enterprise, Splunk App for Data Science, DB Connect, and the Splunk Add-on for Microsoft Cloud Services

    What SOC Teams Need to Know

    Security Operations Center (SOC) teams should act swiftly to patch all affected Splunk deployments to mitigate potential exploitation risks. Key recommendations include:

    • Apply all relevant security patches immediately. Delaying updates increases the risk of exploitation.
    • Monitor access logs for unusual activity related to file uploads or API calls to /services/ssg/secrets.
    • Review privilege settings to limit access to sensitive files and directories.
    • Disable the Splunk Secure Gateway App if it is not required to minimize attack surface.
    • Stay informed about emerging threats, as attackers may attempt to exploit unpatched systems.

    Conclusion

    While Splunk has not reported any active exploitation of these vulnerabilities, organizations should not delay in applying these critical patches. Security teams must remain vigilant and proactive in monitoring for potential threats. Keeping software up to date remains one of the most effective defenses against cyberattacks.

    For a full list of security updates and technical details, refer to Splunk’s official advisory.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

    Questions or concerns? Feel free to reach out to us any time –

    https://www.netizen.net/contact