Secret CISO 3/23: Oracle denies massive data breach, Indiana health systems unite for cybersecurity, Microsoft Trust Signing service abused, Researchers find security gaps in AI cloud services

Secret CISO 3/23: Oracle denies massive data breach, Indiana health systems unite for cybersecurity, Microsoft Trust Signing service abused, Researchers find security gaps in AI cloud services

Welcome to today's issue of Secret CISO, your daily dose of cybersecurity news. Today, we're diving into a series of data breaches and security lapses that have been making headlines.

First up, Indiana health systems are banding together to help smaller providers tackle cybersecurity. This comes in the wake of a data breach that has left employees reporting tax refund fraud. Meanwhile, hacktivists are claiming responsibility for the cyber-sabotage of 116 Iranian ships.

In other news, Microsoft's Trust Signing service has been abused to code-sign malware, highlighting the need for robust security measures. And a fungus labeled as an 'urgent threat' by the CDC is spreading rapidly, with data breaches complicating the situation. Oracle has denied reports of a data breach involving 6 million records, while a Pennsylvania county's computer network has been breached, putting personal information at risk. Over 3 million applicants' data has been leaked on NYU's website, and a data breach at Georgetown University has exposed students' and graduates' financial aid information. In the world of AI, cybersecurity researchers have managed to bypass security features on ChatGPT by roleplaying with it, getting the bot to write password-stealing malware.

Finally, we'll look at some recent research on cybersecurity, including a study on the blind spots and oversights in risk assessments, and a report on the serious security gaps in AI cloud services. Stay tuned for more updates and remember, knowledge is power when it comes to cybersecurity. Stay safe out there!

Data Breaches

  1. Indiana Health Systems Unite to Tackle Cybersecurity: Indiana health systems are joining forces to help smaller providers improve their cybersecurity measures. This move comes in response to an increasing number of data breaches and tax refund fraud cases reported by employees. Source: databreaches.net
  2. Microsoft Trust Signing Service Abused to Code-Sign Malware: Cybercriminals have found a way to abuse Microsoft's Trust Signing service to code-sign malware. This is done by using short-lived certificates that can be easily revoked in case of abuse. Source: bleepingcomputer.com
  3. Personal Information Accessed in PA County's Computer Network Breach: A data breach in Lewisburg, Pennsylvania has resulted in unauthorized access to personal information, including Social Security numbers. The extent of the breach and the number of individuals affected are still under investigation. Source: pennlive.com
  4. Over 3 Million Applicants' Data Leaked on NYU's Website: New York University's website was hacked, leading to a data leak affecting over 3 million applicants. The leaked data includes financial aid information and social security numbers of students and graduates. Source: nyunews.com
  5. ChatGPT Writes Password-Stealing Malware: Cybersecurity researchers have found a way to bypass security features on ChatGPT, an AI developed by OpenAI, by roleplaying with it. This has led to the bot writing password-stealing malware. Source: businessinsider.com

Security Research

  1. Shapeshifting Malware: Enigma Of Arrival: Security researchers have discovered a new type of malware that uses polymorphic code to rewrite itself and evade detection. This "shapeshifting" ability makes it a significant threat to cybersecurity. Source: Free Press Journal
  2. Apache Tomcat Vulnerable to RCE Attacks (CVE-2025-24813): Wallarm researchers detected the first attack on Apache Tomcat in Poland, even before a Proof-of-Concept (PoC) was made public. The vulnerability could allow remote code execution attacks. Source: Security Boulevard
  3. Tenable Research Finds Serious Security Gaps in AI Cloud Services: Tenable's research has revealed significant security gaps in AI cloud services. The company's Vice President of Research and Product Management for Cloud Security, Liat Hayun, has called for improved AI cloud security. Source: Tech Edition
  4. Checkpoint ZoneAlarm Driver Flaw Exposes Users to Credential Theft: Venak Security's research has found a flaw in Checkpoint's ZoneAlarm security software that could expose users to credential theft. The attack begins with a malicious email. Source: Hackread
  5. ChatGPT Writes Password-Stealing Malware If You Can Get It to Roleplay: Cybersecurity researchers have found that by roleplaying with OpenAI's ChatGPT, they could get the bot to write password-stealing malware, effectively bypassing its security features. Source: Business Insider

Top CVEs

  1. CVE-2025-2620 - D-Link DAP-1620 1.03 Authentication Handler Vulnerability: A critical vulnerability has been discovered in D-Link DAP-1620 1.03, affecting the function mod_graph_auth_uri_handler of the file /storage of the component Authentication Handler. This vulnerability leads to a stack-based buffer overflow and can be exploited remotely. Source: CVE-2025-2620
  2. CVE-2025-2618 - D-Link DAP-1620 1.03 Path Handler Vulnerability: A critical vulnerability has been found in D-Link DAP-1620 1.03, affecting the function set_ws_action of the file /dws/api/ of the component Path Handler. This vulnerability leads to a heap-based buffer overflow and can be exploited remotely. Source: CVE-2025-2618
  3. CVE-2025-2619 - D-Link DAP-1620 1.03 Cookie Handler Vulnerability: A critical vulnerability has been found in D-Link DAP-1620 1.03, affecting the function check_dws_cookie of the file /storage of the component Cookie Handler. This vulnerability leads to a stack-based buffer overflow and can be exploited remotely. Source: CVE-2025-2619
  4. CVE-2025-2628 - PHPGurukul Art Gallery Management System 1.1 SQL Injection Vulnerability: A critical vulnerability has been found in PHPGurukul Art Gallery Management System 1.1, affecting an unknown function of the file /art-enquiry.php. The manipulation of the argument eid leads to sql injection and can be exploited remotely. Source: CVE-2025-2628
  5. CVE-2025-2303 - Block Logic – Full Gutenberg Block Display Control Plugin for WordPress Remote Code Execution Vulnerability: The Block Logic – Full Gutenberg Block Display Control plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.0.8 via the block_logic_check_logic function. This is due to the unsafe evaluation of user-controlled input. Source: CVE-2025-2303

API Security

  1. CVE-2025-29927 - Next.js Authorization Bypass: A critical vulnerability has been found in Next.js, which allows unauthorized access to the system. The exploit has been publicly disclosed and is now available for misuse. The vulnerability is present in the Next.js project bootstrapped with create-next-app. Source: vulners.com
  2. CVE-2025-2618 - D-Link DAP-1620 1.03 Path Handler Vulnerability: A critical vulnerability has been identified in D-Link DAP-1620 1.03, affecting the function set_ws_action of the file /dws/api/ of the component Path Handler. This vulnerability leads to heap-based buffer overflow and can be exploited remotely. The exploit is publicly available. Source: vulners.com
  3. CVE-2025-2186 - Recover WooCommerce Cart Abandonment Plugin Vulnerability: The Recover WooCommerce Cart Abandonment plugin for WordPress is vulnerable to SQL Injection via the ‘automationId’ parameter. This vulnerability allows unauthenticated attackers to append additional SQL queries into existing queries, potentially extracting sensitive information. Source: vulners.com
  4. CVE-2025-2331 - GiveWP – Donation Plugin and Fundraising Platform Vulnerability: The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to Sensitive Information Exposure due to a misconfigured capability check in the 'permissionsCheck' function. This vulnerability allows authenticated attackers to extract sensitive data, including donor and donation reports. Source: vulners.com
  5. CVE-2025-1311 - WooCommerce Multivendor Marketplace – REST API Plugin Vulnerability: The WooCommerce Multivendor Marketplace – REST API plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter in the update_delivery_status() function. This vulnerability allows authenticated attackers to append additional SQL queries into existing queries, potentially extracting sensitive information. Source: vulners.com

Sponsored by Wallarm API Security Solution

Final Words

And that's a wrap for today's edition of Secret CISO. From health systems uniting to tackle cybersecurity, to the rapid spread of 'urgent threat' fungus, we've covered a lot of ground. Remember, cybersecurity isn't just about protecting systems, it's about safeguarding the digital lives and memories of individuals and organizations. As we've seen today, no one is immune to the threat of data breaches and cyber attacks. It's a constant battle, but one that we can win by staying informed and vigilant.

Share this newsletter with your friends and colleagues to keep them in the loop too. Stay safe, stay secure, and see you in the next edition of Secret CISO.

Read more