CyberWire Daily

Inside Intel’s internal web maze.

10 snips
Aug 19, 2025
A researcher reveals shocking vulnerabilities within Intel's internal sites, endangering sensitive data. The Kimsuky group targets South Korean diplomatic missions, while a new DDoS flaw emerges despite past fixes. A ransomware attack on a drug company raises alarm bells. The podcast dives into the complexities of context switching for analysts in Security Operations Centers, highlighting the toll on productivity and potential automation solutions. With leaked malware code and rising digital fraud, the episode underscores the urgent need for stronger security measures.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Widespread Internal Web Failures

  • Intel's internal sites had multiple distinct vulnerabilities exposing employee and supplier data at scale.
  • Patching followed disclosure but Intel's bug bounty excluded website flaws, leaving the researcher unrewarded.
ANECDOTE

Diplomatic Phishing Led To Xenorat Deployment

  • The Kimsuky group sent at least 19 spear-phishing emails impersonating trusted contacts using password-protected zip files.
  • LNK files launched obfuscated PowerShell that fetched Base64 payloads from GitHub and deployed Xenorat RAT for full system control.
INSIGHT

New HTTP/2 DDoS Bypass

  • Made You Reset abuses HTTP/2 stream handling to trigger repeated backend work, bypassing Rapid Reset mitigations.
  • The flaw could affect up to one-third of websites and requires complex vendor-specific fixes.
Get the Snipd Podcast app to discover more snips from this episode
Get the app