🛡️ InfoSec Blue Team Briefing

Sunday, October 05, 2025

🎧 Audio Briefing

Download MP3

Good morning. This is your security briefing for Saturday, October 04, 2025, covering 18 articles across multiple threat categories. All attribution is by the article authors, and all article analysis is automated.

Researchers at arxiv.org have introduced OntoLogX, an AI agent that uses Large Language Models to extract structured Knowledge Graphs from cybersecurity logs. The system maps log events to MITRE ATT&CK tactics through ontology-guided analysis, enabling identification of adversarial behaviors from unstructured log data.

Hazcod has released 'shade', a proof-of-concept browser extension designed to detect shadow SaaS applications and insecure credentials. The tool helps organizations identify unauthorized cloud services and credential security issues within their environments.

Christos Gourzoulidis at NVISO has published a multi-part blog series providing real-world strategies for securing Microsoft Entra ID environments. The content covers hybrid identity hardening, Conditional Access configurations, and defense strategies against identity-based attacks including phishing and token theft.

A2AS, or Agent-to-Agent Security, is a new security framework designed to protect LLM-powered applications and AI agents. The framework includes behavior certificates, authenticated prompts, and runtime security controls to address threats like prompt injection and AI supply chain security.

Freebuf reports on XBOW, an AI-powered automated penetration testing platform that has topped HackerOne rankings by using multiple LLM models in a 'Model Alloy' approach. The platform implements deterministic validation systems to verify findings and aims for zero false positives, achieving 25-55% performance improvements in benchmark tests.

gULP version 1.0.0 has been released on GitHub by mentat-is. This open source security tool has reached its first major stable release and is designed for defensive security operations.

Discord has disclosed a security incident where an unauthorized party compromised a third-party customer service provider to access user data and extort a financial ransom. The breach impacted a limited number of users who had contacted Discord's Customer Support or Trust & Safety teams, and Discord has engaged law enforcement and forensics firms.

According to archive.ph, North Korean state agents have been conducting a long-term operation posing as legitimate IT workers to generate revenue for Kim Jong Un's nuclear weapons program. This campaign has successfully funneled an estimated $1 billion through fraudulent IT employment schemes.

Security researcher Paranoid Ninja details methods for establishing Command & Control infrastructure on Microsoft Azure, specifically hiding Brute Ratel C4 servers behind Azure services. The techniques evade JARM hash fingerprinting, domain categorization systems, and security monitoring tools that defenders use to identify malicious infrastructure.

A GitHub repository has been released demonstrating AI-powered CAPTCHA bypass techniques. The tool automates the solving of CAPTCHA challenges using artificial intelligence models, representing a novel attack technique that undermines a common web security control.

Security researchers have developed 'Battering RAM', a $50 hardware interposer attack that bypasses memory encryption on Intel SGX and AMD SEV-SNP confidential computing systems. The attack uses a custom-built interposer that passes boot-time trust checks then maliciously redirects protected memory addresses, and Intel and AMD have acknowledged the findings.

Researchers from UC Irvine have demonstrated Mic-E-Mouse, a novel side-channel attack that exploits high-performance optical mouse sensors to eavesdrop on audio by detecting surface vibrations. Testing achieved speech recognition accuracy of 42-61% on standard datasets using user-space software without system-level permissions.

Security researchers from Purdue University, Georgia Institute of Technology, and van Schaik LLC have demonstrated WireTap, a hardware-based attack that breaks Intel SGX by physically intercepting DRAM bus traffic. The attack extracts SGX attestation keys from servers and requires only basic electrical tools and commercially available equipment.

Faith2dxy provides technical analysis of CVE-2025-39946, a vulnerability in the Linux kernel's TLS subsystem patched in version 6.12.49. The vulnerability involves an out-of-bounds access on the frags array in the kernel TLS implementation, originally discovered through Google's kernelCTF program.

A security researcher details CVE-2025-4275, known as Hydroph0bia, a SecureBoot bypass vulnerability in Insyde H2O-based UEFI firmware that can be escalated to arbitrary code execution during firmware updates. The exploit chain involves leveraging Insyde's custom authenticated write variables and timing attacks before BdsDxe execution.

A research project at jupyter.securitybreak.io focuses on the classification of adversarial prompts related to AI and ML security. The notebook documents methods for identifying and categorizing malicious inputs designed to manipulate AI systems.

WithSecure's Strategic Threat Intelligence & Research Group reports on TamperedChef, a sophisticated malware campaign targeting European organizations through malicious advertising for fake PDF editor software. The malware operated as a fully functional decoy application for nearly two months before activating its credential-stealing payload.

Binarly Research Team discovered two new vulnerabilities in Supermicro BMC firmware, CVE-2025-7937 and CVE-2025-6198, that bypass a previous fix. These flaws allow attackers with administrative BMC access to perform malicious firmware updates and bypass BMC Root of Trust security features. This concludes today's briefing.

📰 Articles Covered