
China-linked group targets cloud workflows, Russian cyber espionage, agentic AI systems flaw & Nginx vulnerability / Intel Chat [#313]
Show notes
In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community.
Intercept and control AI agent activity with Viberails by LimaCharlie: viberails.io
- APT41, a China-linked threat group is deploying a previously undetected backdoor targeting Linux based cloud workflows.
- Fancy bear, also known as APT28 or Forest Blizzard, is a Russian cyber espionage group believed to operate on behalf of the country's military intelligence services, the GRU. Trend Micro research here.
- Anthropic’s Model Control Protocol widely used in agentic AI systems to connect AI agents with data sources, contains a design flaw that would enable large-scale supply chain attacks. Report here.
- There's a critical vulnerability in nginx-UI, a web-based management interface for Nginx servers, which is being actively exploited and could allow attackers to take full control affected systems.
Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform.
This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows. Start today for free at limacharlie.io.
← Previous
How do you know your AI agents are actually correct? With Dylan Williams from Spectrum Security / Defender Fridays [#312]
Next →
How can we improve global security? With J. Michael Daniel from Cyber Threat Alliance [#314]