Newsletters

Written content from the Risky Business Media team

Risky Bulletin: Academics pull off novel 5G attack

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

A team of academics has developed a novel attack that can downgrade 5G traffic to weaker states without using a rogue base station.

The attack uses a new software toolkit named Sni5Gect to intercept, sniff, and alter 5G data packets before the 5G authentication steps.

Once a 5G connection is altered, the attacker can crash the user's equipment (phone, tablet, or other device), harvest user equipment details, and finally downgrade it to a lower-generation connection where other attacks can be carried out with a higher success rate.

Risky Bulletin: MadeYouReset vulnerability enables unlimited HTTP/2 DDoS attacks

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

A new vulnerability in the HTTP/2 protocol can allow threat actors to launch nearly unlimited DDoS attacks to exhaust memory and crash servers.

The new attack is named MadeYouReset, was discovered by researchers at Deepness Lab, and is a variation of a previous attack known as HTTP/2 Rapid Reset.

The Rapid Reset attack was discovered in October 2023 after it was used to launch some of the largest DDoS attacks seen that year (Google, Amazon, and Cloudflare).

Drug Cartels Are the New APTs

Presented by

Tom Uren
Tom Uren

Policy & Intelligence

One by one, US federal government agencies are learning that the sensitive but unclassified information they hold is susceptible to theft by hackers. Unfortunately, education-by-breach is very costly.

Last week, Politico reported the electronic case filing system used by the federal judiciary had been breached in a "sweeping cyber intrusion". Hackers breached the Case Management/Electronic Case Files (CM/ECF) system that legal professionals use to upload and manage case documents. They also breached PACER, the system that gives the public limited access to some of the same data. 

The hack sounds just about as bad as can be, with officials concerned that Latin American drug cartels have obtained sensitive court data. Per Politico's follow-up reporting:

Risky Bulletin: Crypto-thieves turn their sights to Open VSX

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Crypto-thieves have found a new package repository to terrorize, and it's Open VSX, an independent database of Visual Studio Code extensions managed by the Eclipse Foundation.

While the VS Code editor has its official marketplace, Microsoft changed its licensing terms this year to block third-party code editors based on the original VS Code from using its marketplace to pull their extensions.

The change in policy, understandably, came after several AI-powered IDEs started cutting into VS Code's market share, all while Microsoft was paying to run and keep the VS Code marketplace online.

Risky Bulletin: Researcher scores $250,000 for Chrome bug

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Google has awarded a massive $250,000 reward to a bug bounty hunter for discovering a novel sandbox escape in the company's Chrome web browser.

The bug was reported in April and patched a month later, in May, with fixes also going out to the other Chromium browsers, such as Edge, Opera, Vivaldi, Brave, and others.

Tracked as CVE-2025-4609, the vulnerability resides in the ipcz library of Mojo, a Chrome component for managing how the browser's internal processes talk to each other.

Risky Bulletin: CISA tells federal agencies to mitigate on-prem-to-cloud Exchange attack

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

CISA has released a rare emergency directive ordering federal agencies to patch a new attack vector in Microsoft Exchange email servers.

Federal agencies have four days, until August 11, to address the issue and apply mitigations shared by Microsoft on Wednesday.

The guidance addresses a vulnerability (actually more of a design flaw) in hybrid environments, where Exchange on-premise servers sync data to an Exchange Online instance.

Risky Bulletin: Russia to designate ERPs as "critical information infrastructure"

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

The Russian government is planning to designate enterprise resource planning (ERP) software as "critical information infrastructure" and require all Russian businesses to migrate to a domestic solution.

The move comes after Russia updated its critical infrastructure law in April this year. The government ordered the operators of all critical infrastructure to migrate to Russian software by September this year.

The government also gave itself the power to designate new items as "critical information infrastructure." This is software large enough to cause nationwide disruptions in the case of a cyberattack, and ERP systems appear to be the first item classified in this new category.

Risky Bulletin: China with the accusations again

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

The Chinese government accused the US last week of trying to sneak backdoors into NVIDIA chips and of using Microsoft zero-days to hack and steal its military secrets.

Both accusations came via the Cyberspace Administration of China (CAC), the country's cybersecurity agency and internet regulator.

On Thursday, the CAC summoned American chipmaker NVIDIA to provide details of an alleged backdoor mechanism that could be embedded on chips sold in China.

Risky Bulletin: Russia spies on foreign embassies using local ISPs

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Russian intelligence services are hacking and spying on foreign embassies and their staff by tampering with their internet connections.

Russian espionage units are using the SORM traffic interception system installed at local ISPs to alter traffic and deliver malware payloads to embassy staff.

According to Microsoft, the campaign has been ongoing since at least last year. The company attributed the attacks to a group it tracks as Secret Blizzard, but more widely known as Turla.

The West's Tepid China Deterrence Is Not Working

Presented by

Tom Uren
Tom Uren

Policy & Intelligence

The exploitation of Microsoft SharePoint vulnerabilities by Chinese hackers is a near-exact re-run of the 2021 Microsoft Exchange server mass compromise event

The 2021 incident elicited a strong international diplomatic response, but this SharePoint saga makes it clear these efforts failed to deter China from embarking on a similarly damaging campaign again, four years later. A different, bigger picture, approach is needed. 

In both cases: