July Threat Highlights Report

  1. Concerns Over Vulnerability Disclosure: The Zero Day Initiative raised issues regarding the lack of coordination in vulnerability disclosure processes, particularly highlighting instances where serious zero-days were patched without prior warning to researchers. This lack of communication can lead to security researchers opting to release exploits as zero-days, which could force vendors to respond more rapidly to vulnerabilities.
  1. AI Vulnerability Reporting Issues: There are significant concerns regarding the lack of structured vulnerability reporting and tracking for AI and large language models (LLMs). A researcher reported difficulties in getting a denial-of-service vulnerability acknowledged by Microsoft, which initially classified it as a product suggestion rather than a security issue. This reflects a broader issue of inadequate collaboration and transparency in the AI sector.
  2. Increased Exploits: There was a notable increase in detections of a 2017 Microsoft Office Equation Editor CVE, which was reportedly exploited by North Korean actors in attacks targeting the aerospace and defence sectors. This highlights ongoing threats from state-sponsored actors.
  3. Ransomware Impact: The report discusses the ongoing impact of a ransomware attack on Kadokawa Corporation, emphasizing the diverse sectors affected and the variety of data stolen. This incident illustrates the extensive ramifications of ransomware attacks on businesses.
  4. Law Enforcement Actions: International law enforcement agencies have successfully shut down a Russian AI bot farm involved in covert influence operations, seizing domains and social media accounts used for disinformation campaigns. This operation underscores the ongoing battle against cyber influence and propaganda.
  5. Cyber Threats to Major Events: The report includes an analysis of cyber threats facing the Paris 2024 Olympics, indicating that high-profile events attract significant unwanted interest from cyber adversaries.

Read report here!