Secret CISO 9/23: TransUnion, Miami Breaches; MalTerminal AI Ransomware; Microsoft God Mode Flaw; L1TF Cloud Exploit; PivotX CMS XSS Risk

Secret CISO 9/23: TransUnion, Miami Breaches; MalTerminal AI Ransomware; Microsoft God Mode Flaw; L1TF Cloud Exploit; PivotX CMS XSS Risk

Welcome to today's edition of Secret CISO, where we unravel the intricate web of cybersecurity challenges that have surfaced across industries. In a world where data breaches are becoming alarmingly frequent, today's stories highlight the critical need for robust security measures and the legal ramifications of failing to protect sensitive information.

We begin with a series of data breaches that have rocked major organizations, from TransUnion to California International Bank, each revealing vulnerabilities that threaten consumer trust and corporate integrity. As legal experts delve into potential class action lawsuits, these incidents serve as stark reminders of the importance of transparency and swift action in the face of data compromise.

In parallel, the cybersecurity landscape is witnessing a new wave of sophisticated threats powered by AI, with MalTerminal ransomware leveraging GPT-4 to outsmart traditional defenses. Meanwhile, vulnerabilities in Microsoft’s Entra ID and the emergence of tools like EDR-Freeze underscore the relentless evolution of cyber threats and the pressing need for vigilant security practices.

Our exploration continues with critical vulnerabilities that expose systems to exploitation, from cross-site scripting in PivotX CMS to path traversal in txtai framework. These flaws highlight the ongoing battle to secure software environments against increasingly cunning adversaries.

Join us as we delve deeper into these stories, unraveling the complexities of cybersecurity and the ever-present need for innovation and resilience in safeguarding our digital world.

Data Breaches

  1. TransUnion Data Breach: TransUnion has confirmed the authenticity of a data breach letter that reveals compromised consumer information, including Social Security numbers and dates of birth. This breach has raised significant concerns about identity theft and the security of personal data. The incident underscores the importance of robust cybersecurity measures and transparency in handling such breaches. Source: WGAL
  2. Miami Management Potential Data Breach: Miami Management is under scrutiny for a potential data breach that may affect both clients and employees. Legal experts are investigating the incident, which could lead to a class action lawsuit. This situation highlights the ongoing vulnerabilities in data management and the legal implications of data breaches. Source: Class Action
  3. Red Coats Data Breach: A data breach involving Red Coats has exposed sensitive information, including Social Security numbers. Attorneys are actively investigating the breach, and affected individuals are encouraged to participate in a class action lawsuit. This breach emphasizes the critical need for companies to protect personal data and the potential legal consequences of failing to do so. Source: Class Action
  4. Lorain County Data Breach: Lorain County has announced a data security incident that may have exposed personal information, including Social Security and bank details of employees and vendors. The breach highlights the risks associated with data management in government entities and the importance of timely communication with affected parties. Source: Cleveland.com
  5. California International Bank Data Breach: California International Bank has reported a data breach that potentially compromised customer data. Legal investigations are underway, and affected customers are advised to take precautions against identity theft. This incident underscores the ongoing challenges financial institutions face in safeguarding sensitive information. Source: PR Newswire

Security Research

  1. MalTerminal Powered by GPT4 Generates Sophisticated Ransomware: Security researchers from SentinelLabs have uncovered a new ransomware strain, MalTerminal, that leverages GPT-4 to enhance its sophistication. This marks one of the earliest known instances of large language models being used to create more advanced and evasive ransomware threats. The discovery underscores the growing intersection of AI and cybersecurity threats. Source: Cyber Press.
  2. Microsoft Patches Critical Entra ID Vulnerability CVE-2025-55241: A critical vulnerability in Microsoft's Entra ID, identified as CVE-2025-55241, was patched after being discovered by security researchers. The flaw was linked to a legacy component in the Microsoft Graph API, posing significant risks to users. This patch highlights the importance of addressing legacy system vulnerabilities to maintain robust security. Source: WebProNews.
  3. New EDR-Freeze Tool Uses Windows WER to Suspend Security Software: A new tool, EDR-Freeze, exploits the Windows Error Reporting (WER) framework to suspend security software, allowing potential attackers to bypass security measures. By leveraging a race condition, this tool can effectively neutralize endpoint detection and response systems, posing a significant threat to enterprise security. Source: BleepingComputer.
  4. God Mode Vulnerability Lets Attackers Access Any Resource in Microsoft Cloud Tenants: Security researcher Dirk-Jan Mollema revealed a critical validation error in Microsoft's token-based service communication, dubbed the "God Mode" vulnerability. This flaw could allow attackers to access any resource within Microsoft cloud tenants, posing a severe security risk. The discovery emphasizes the need for rigorous validation processes in cloud services. Source: GBHackers.
  5. Researchers Earn $150,000 for L1TF Exploit Leaking Data From Public Cloud: Security researchers have been awarded $150,000 for discovering an exploit that leaks data from public cloud environments, known as L1TF Reloaded. This vulnerability combines elements of the older L1TF exploit, highlighting ongoing challenges in securing cloud infrastructure against sophisticated attacks. Source: SecurityWeek.

Top CVEs

  1. CVE-2025-52367: A Cross Site Scripting vulnerability in PivotX CMS v.3.0.0 RC 3 allows remote attackers to execute arbitrary code through the subtitle field. This vulnerability poses a significant risk as it can be exploited to compromise the integrity of web applications using this CMS. Source: Vulners.
  2. CVE-2025-47910: The http.CrossOriginProtection feature can be bypassed using the AddInsecureBypassPattern method, leading to unintended request forwarding without proper validation. This flaw can expose applications to cross-origin attacks, potentially compromising sensitive data. Source: Vulners.
  3. CVE-2025-10854: The txtai framework is vulnerable to path traversal attacks due to improper handling of symbolic links in compressed tar files. This allows attackers to write files anywhere in the filesystem, posing a severe security risk when loading untrusted embedding indices. Source: Vulners.
  4. CVE-2025-35042: Airship AI Acropolis has a default administrative account with the same credentials across installations, making it susceptible to unauthorized access. If the default password is not changed, attackers can gain administrative privileges, compromising the system's security. Source: Vulners.
  5. CVE-2025-57437: Blackmagic Web Presenter HD firmware version 3.3 exposes sensitive information through an unauthenticated Telnet service. This includes device configuration data, which can be exploited to hijack live streams or perform network attacks. Source: Vulners.

Final Words

As we wrap up today's edition of Secret CISO, it's clear that the digital landscape is fraught with challenges and opportunities alike. From the alarming data breaches at TransUnion and Miami Management to the sophisticated ransomware threats powered by AI, the need for robust cybersecurity measures has never been more critical. Each incident we covered today serves as a stark reminder of the vulnerabilities that persist in our systems and the relentless efforts required to safeguard our digital world.

Whether it's the exposure of sensitive information in the Red Coats breach or the critical vulnerabilities patched by Microsoft, staying informed and proactive is key to navigating these turbulent waters. The discoveries of new exploits and vulnerabilities, such as the God Mode flaw in Microsoft cloud tenants and the L1TF Reloaded exploit, highlight the ongoing battle between security professionals and cyber adversaries.

We hope this newsletter has provided you with valuable insights and actionable information to bolster your security strategies. If you found today's content helpful, please consider sharing Secret CISO with your friends and colleagues. Together, we can build a more secure digital future by spreading awareness and fostering a community of informed cybersecurity advocates.

Thank you for joining us today. Stay vigilant, stay informed, and we'll see you in the next edition of Secret CISO.

Read more

Secret CISO 9/25: Boyd & RBC Breaches Expose Insider Threats; CISA Warns of 'Shai-Hulud'; Mandiant Unveils Chinese Espionage; Google Chrome Vulnerabilities Demand Urgent Patches

Secret CISO 9/25: Boyd & RBC Breaches Expose Insider Threats; CISA Warns of 'Shai-Hulud'; Mandiant Unveils Chinese Espionage; Google Chrome Vulnerabilities Demand Urgent Patches

Welcome to today's edition of Secret CISO, where we unravel the intricate web of cybersecurity threats and vulnerabilities that are shaping the digital landscape. In this issue, we delve into a series of alarming data breaches that have rocked various sectors, from casinos to healthcare, underscoring the relentless

By Secret CISO
Secret CISO 9/24: Boyd & Stellantis Breaches Expose Data, SolarWinds & Supermicro Flaws Threaten Security, Iran Targets EU Aerospace, AI App Risks Supply Chains

Secret CISO 9/24: Boyd & Stellantis Breaches Expose Data, SolarWinds & Supermicro Flaws Threaten Security, Iran Targets EU Aerospace, AI App Risks Supply Chains

Welcome to today's edition of Secret CISO, where we unravel the tangled web of cybersecurity breaches and vulnerabilities that continue to challenge our digital defenses. In this issue, we delve into a series of alarming incidents that underscore the persistent threats facing organizations and individuals alike. Boyd Gaming

By Secret CISO
Secret CISO 9/22: Crypto.com Transparency, DPWH Cyber Protests, Stellantis & UBS Breaches, ChatGPT Exploit Unveiled, Utah's Security Research Boost

Secret CISO 9/22: Crypto.com Transparency, DPWH Cyber Protests, Stellantis & UBS Breaches, ChatGPT Exploit Unveiled, Utah's Security Research Boost

Welcome to today's edition of Secret CISO, where we unravel the intricate web of cybersecurity events shaping our digital world. In a landscape where transparency and secrecy dance a delicate tango, Crypto.com stands firm against allegations of undisclosed data leaks, asserting their commitment to regulatory transparency. Meanwhile,

By Secret CISO