Unauthorized Access to Mythos, Plankey Withdraws CISA Nomination, New Display Security Device Strengthens Data Protection
In recent weeks, the cybersecurity landscape has witnessed several significant developments, highlighting ongoing vulnerabilities and the evolving nature of threats. These events underscore the critical need for robust security measures and vigilant oversight in both governmental and private sectors.
Tennessee Hacker Sentenced for Supreme Court Breaches
Nicholas Moore, a 25-year-old from Tennessee, has been sentenced to 12 months of probation after pleading guilty to a misdemeanor charge. Moore utilized stolen credentials to infiltrate the Supreme Court’s e-filing system on 25 separate occasions, as well as systems belonging to AmeriCorps and the Veterans Administration Health System. Instead of exploiting this access for financial gain, he reportedly shared screenshots of the breached accounts online, seemingly to impress peers. This incident raises concerns about the security of sensitive governmental systems and the potential for similar breaches in the future.
UK Military Mobilizes to Safeguard Undersea Communications
In response to perceived threats from Russian naval operations, the UK has deployed military assets, including warships and RAF P-8 maritime patrol aircraft, to protect vital undersea communications cables. Tony O’Sullivan, CEO of RETN, emphasized that the risks to these infrastructures extend beyond accidental damage. He stated, “Operators and enterprises can no longer assume routes are safe and stable when assessing resilience.” O’Sullivan advocates for engineered network resilience, highlighting the necessity of route diversity to prevent single points of failure and ensure visibility across international paths.
Lovable’s Data Exposure Incident
Lovable, a startup valued at $6.6 billion, faced backlash after a BOLA vulnerability allowed free account holders to access sensitive information from other users, including source code and chat histories. A researcher reported this flaw to HackerOne 48 days prior to its public disclosure. However, the issue was closed without escalation, as HackerOne presumed the exposure was intentional. Initially, Lovable characterized the situation as a design decision but later acknowledged that a backend change had inadvertently re-enabled access to public project chats, which had previously been secured.
Allegations of US Exploiting Backdoors in Iranian Infrastructure
Iranian state media reported that during an attack on Isfahan, networking equipment from major manufacturers, including Cisco and Fortinet, failed simultaneously despite being disconnected from the global internet. Local experts suspect these outages may have been caused by pre-installed firmware backdoors or supply chain compromises, enabling remote deactivation via satellite or internal signals. This incident raises serious questions about the security of critical infrastructure and the implications of state-sponsored cyber operations.
Unauthorized Access to Anthropic’s Claude Mythos
Anthropic’s AI model, Claude Mythos, was reportedly accessed by unauthorized users through a third-party vendor environment. Bloomberg News indicated that the interface, which allowed testing of Mythos’ advanced capabilities, was discovered by an external party. In response, Anthropic has restricted access to the compromised portal, highlighting the ongoing challenges of securing AI technologies against unauthorized access.
Data Breach at French State Agency
France Titres, the agency responsible for issuing passports and driver’s licenses, confirmed a security breach on its ANTS portal. This incident may have exposed the personal data of millions of users. A threat actor is currently attempting to sell a database containing approximately 19 million records, including names, birth dates, and unique account identifiers. This breach emphasizes the vulnerabilities present within governmental data management systems and the need for enhanced security protocols.
Sean Plankey Withdraws Nomination for CISA Director
Sean Plankey has withdrawn his nomination for the role of Director at the Cybersecurity and Infrastructure Security Agency (CISA) amid a prolonged confirmation stalemate in the Senate. This withdrawal leaves CISA without a permanent leader, compelling the White House to restart the search for a candidate capable of navigating a politically divided landscape. Nick Andersen is currently serving as Acting Director of CISA, a role that carries significant responsibilities in national cybersecurity defense.
UK’s NCSC Introduces Hardware Security Device
The UK’s National Cyber Security Centre (NCSC) has developed a new hardware security device named SilentGlass, aimed at preventing data exfiltration through high-resolution display links. This plug-and-play device actively blocks unexpected or malicious signals between HDMI and DisplayPort connections and screens. Recommended for high-threat environments, SilentGlass is now available for acquisition after successful testing in government organizations, marking a proactive step in safeguarding sensitive data.
Global Alert on Chinese Botnet Infrastructure
The FBI, CISA, and international partners have issued a joint advisory regarding a vast network of compromised SOHO routers and IoT devices linked to China-based threat actors. The state-sponsored group known as Volt Typhoon has leveraged this botnet to target critical infrastructure sectors. The advisory includes recommendations for organizations to defend against such covert networks, emphasizing the importance of vigilance in cybersecurity practices.
Google Enhances Enterprise Security Features
Google has rolled out new security capabilities within Chrome Enterprise and Android, aimed at bolstering enterprise-level defenses. Chrome Enterprise Premium now includes advanced data loss prevention features and tools to mitigate AI-related risks. Additionally, Google is enhancing mobile security by blocking sensitive data downloads on unmanaged devices. New controls in the Google Admin console allow for more granular policy enforcement, thereby reducing the attack surface for organizations.
These recent developments illustrate the multifaceted challenges faced in the realm of cybersecurity. As threats evolve, so too must the strategies and technologies employed to safeguard sensitive information and critical infrastructure.
Source: www.securityweek.com
Keep reading for the latest cybersecurity developments, threat intelligence and breaking updates from across the Middle East.


