Brief #93: Trump Drops Russia Threats, Microsoft Copilot Leaks Private Data, NVIDIA's AI Red Teams

Nikoloz Kokhreidze

Nikoloz Kokhreidze

9 min read

Two critical Microsoft Copilot vulnerabilities exposing private repos and corporate data. Orange Group confirms 12,000 files stolen by HellCat ransomware affiliate. jQuery dominates high-risk OSS flaws.

mandos brief newsletter week 9 of 2025 cybersecurity leadership

Happy Sunday!

This week's cybersecurity landscape brings several developments worth your attention. As you enjoy your morning coffee, here's what's happening:

• The Trump Administration has quietly removed Russia from the cybersecurity threat list in both public statements and internal directives, despite Russia's previously established status as a major threat actor.

• Microsoft Copilot has a concerning vulnerability that allows it to access private GitHub repositories through Bing's caching mechanism, potentially exposing sensitive data from over 16,000 organizations.

• Many SOC Analysts are battling imposter syndrome despite years of experience and multiple certifications – a reminder that even seasoned professionals in our field share these feelings.

Dive into the full newsletter below.

Your feedback shapes Mandos Brief and I'd love to hear your thoughts about the content I share.

INDUSTRY NEWS

Trump Administration Drops Russia from Cybersecurity Threat List

  • Recent policy shift shows US no longer characterizing Russia as a cybersecurity threat in both public statements and internal directives, despite Russia being previously considered on par with China as a major threat actor.

  • State Department official Liesyl Franz omitted Russia from her UN speech on cyber threats, while a memo at the Cybersecurity and Infrastructure Security Agency (CISA) reportedly instructed analysts not to follow or report on Russian threats.

  • This change aligns with broader Trump administration efforts to improve relations with Moscow, including recent UN votes supporting Russia, despite intelligence agencies previously warning about Russia's enduring capabilities to target critical infrastructure.

Microsoft Copilot Exposes Private GitHub Repositories Through Bing Cache

  • Researchers discovered that Microsoft Copilot can access and reveal content from private GitHub repositories that were once public, even after they've been made private, through Bing's caching mechanism.

  • The vulnerability affects over 16,000 organizations including Fortune 500 companies, exposing 300+ private tokens and 100+ internal packages potentially vulnerable to dependency confusion attacks.

  • Despite Microsoft implementing a partial fix by disabling public access to cached pages, Copilot can still access this "zombie data" - information users believe is private but remains accessible through Microsoft's AI tools.

Orange Group confirms data breach after hacker leaks internal documents

  • A hacker named Rey, affiliated with the HellCat ransomware group, exfiltrated nearly 12,000 files (6.5GB) from Orange Group's Romanian branch, containing customer and employee information.

  • The threat actor gained access by exploiting compromised credentials and vulnerabilities in Orange's Jira software and internal portals, maintaining access for over a month before extracting data during a three-hour window.

  • Orange confirmed the breach occurred on a "non-critical back office application" with no impact on customer operations, and is working with authorities to mitigate the incident's effects.

LEADERSHIP INSIGHTS

Ransomware Remains Top Threat for 2025 as AI Agents Loom on Horizon

  • Ransomware continues as the primary cybersecurity concern with attacks becoming faster, stealthier, and more numerous in 2024, with the USA accounting for 51% of all known attacks.

  • While current generative AI has had limited impact on the threat landscape, the emergence of autonomous AI agents in 2025 could transform cybersecurity by enabling both defenders and attackers to scale operations dramatically.

  • The ransomware ecosystem is evolving with "dark horse" groups gaining market share as tools become more accessible, while attackers increasingly use legitimate administration tools (Living Off the Land tactics) to evade detection.

jQuery Dominates High-Risk Vulnerabilities in Open Source Software

  • The 2025 Black Duck Open Source Security and Risk Analysis report reveals that jQuery accounts for 8 of the top 10 high-risk vulnerabilities found in open source components, with 32% of scanned codebases containing this library.

  • Transitive dependencies represent 64% of open source components in applications, creating significant hidden risk as 81% of codebases contain high or critical-risk vulnerabilities, with nearly half introduced through these indirect dependencies.

  • Organizations face maintenance challenges with 90% of codebases containing outdated components and 56% containing license conflicts, highlighting the need for comprehensive Software Bill of Materials (SBOM) tracking.

Google Cloud Introduces Quantum-Safe Digital Signatures in Preview for Post-Quantum Cryptography Preparation

  • Google Cloud has released quantum-safe digital signatures in preview as part of their Cloud Key Management Service, following NIST's publication of quantum-safe cryptographic standards last summer.

  • Organizations should begin preparing for post-quantum cryptography now, as NIST suggests retiring current public-key cryptosystems by 2030-2035, and implementation will take significant time despite seeming like a distant concern.

  • The primary risks include "harvest now, decrypt later" attacks where adversaries collect encrypted data to decrypt once quantum computing advances, and the potential for CRQC (cryptographically-relevant quantum computers) to break existing cryptographic infrastructure.

📖
Discover my collection of industry reports, guides and cheat sheets in Cyber Strategy OS.

CAREER DEVELOPMENT

SOC Analyst Struggles with Imposter Syndrome Despite 2 Years of Experience

  • Despite having a cybersecurity degree and multiple certifications (Security+, BTL1, SC-900), this analyst feels their foundational knowledge is poor and struggles to investigate alerts in Microsoft Sentinel.

  • The analyst's learning approach may be ineffective - they spend more time writing notes than understanding concepts, and have difficulty applying information when investigating alerts.

  • Fellow professionals reassure that imposter syndrome is common in cybersecurity, with even industry experts sharing similar experiences throughout their careers, suggesting persistence and continuous learning are key to overcoming these feelings.

Reddit Thread Reveals Solo vCISO Experiences and Business Challenges

  • Solo virtual CISOs typically manage 2-8 clients simultaneously, with one professional recommending a maximum of 20 billable hours per week to avoid burnout while running their consultancy.

  • Successful vCISOs emphasize the importance of prior experience managing information security teams, strong organizational skills, and understanding that the role involves more compliance and governance work than technical security tasks.

  • Most vCISO services operate on a fixed fee model based on estimated monthly hours, with professionals noting that business communication skills and industry-specific experience are crucial for long-term success.

Cybersecurity Industry Undergoing Fundamental Shift in Required Skills Despite Talent Shortage

  • The cybersecurity field is experiencing a seismic transformation where traditional skills (endpoints, networks, operating systems) are no longer sufficient in an era of cloud computing, remote work, and AI.

  • Future cybersecurity professionals will need to be solution builders rather than configuration experts, similar to how software engineers operate - creating integrated, scalable security stacks using cloud technologies.

  • The industry parallels early 20th century farming's transformation, where employers increasingly prefer candidates with specialized cloud platform expertise and coding abilities over security generalists, sometimes even promoting software engineers directly into security roles.

AI & SECURITY

In case you missed: Five AI Agent Types Transforming Enterprise Cybersecurity

  • Modern security systems utilize different AI agent architectures, from basic reflex agents (simple if-then rules) to sophisticated learning agents that adapt over time.

  • Each agent type serves specific security functions - model-based agents maintain internal representations of network states, goal-based agents work toward security objectives, and utility-based agents balance competing priorities like security versus usability.

  • The future of cybersecurity lies in hybrid approaches that combine multiple agent types, allowing organizations to leverage the strengths of each architecture while minimizing their individual weaknesses.

Microsoft Copilot Studio Agents Vulnerable to Enumeration and Data Extraction

  • Microsoft's low-code AI agent platform has a security flaw allowing attackers to enumerate and access exposed agents through predictable URL patterns derived from tenant IDs and common agent names.

  • Once discovered, unauthenticated agents can serve as knowledge oracles, potentially leaking sensitive financial data from knowledge bases connected to SharePoint, Excel sheets, and other corporate resources.

  • Despite Microsoft updating default settings to warn about "No Authentication" configurations, the researchers believe many of the 100,000 organizations using Copilot Studio will still have misconfigured agents accessible to threat actors.

NVIDIA Defines LLM Red Teaming as Systematic Testing to Identify AI Vulnerabilities

  • LLM red teaming involves systematically testing AI models to identify vulnerabilities and unwanted behaviors, with two main categories: security red teaming (focusing on traditional security properties) and content-based red teaming (examining unwanted outputs).

  • Red teamers employ various strategies including social engineering, technical manipulation, and context exploitation, motivated by professional requirements, social factors, or personal interest in discovering model weaknesses.

  • NVIDIA uses red teaming as part of their Trustworthy AI process, with findings incorporated into their Model Card++ documentation and the open-source garak toolkit that tests LLMs against over 120 vulnerability categories.

MARKET UPDATES

Zscaler launches Asset Exposure Management service to improve cyber asset visibility

  • The new service consolidates data from multiple sources including Zscaler's Zero Trust Exchange platform (which processes 500 billion security transactions daily) to provide organizations with accurate asset inventory and risk visibility.

  • Asset Exposure Management helps identify security gaps by detecting assets lacking essential protection measures like EDR solutions or running outdated software, while automating remediation workflows.

  • The solution addresses challenges faced by IT teams in regulated industries like healthcare and financial services where asset tracking is crucial to avoid noncompliance penalties.

Archipelo Launches DevSPM Platform with $12M Funding to Secure Developer and AI-Generated Code

  • Archipelo has emerged from stealth with a new DevSPM (Developer Security Posture Management) platform that addresses security risks at their source—developer actions and AI-assisted coding workflows—before vulnerabilities reach production environments.

  • The San Francisco-based startup secured $12M in funding led by Dell Technologies Capital with participation from notable investors including Zoom CEO Eric Yuan, creating a new cybersecurity category focused on the 74% of security breaches caused by human error.

  • The platform offers four key capabilities: Developer Detection & Response, AI Code Risk Monitoring, Automated Developer Tool Inventory, and Developer Security Posture Analytics—already serving Fortune 500 enterprises in financial services, technology, and defense sectors.

Ransomware defense firm Mimic secures $50M Series A funding led by Google Ventures and Menlo Ventures

  • Mimic's SaaS platform detects ransomware in fractions of a second, with former Mandiant CEO Kevin Mandia joining the board and Greg Davison (ex-Mandiant/Google) appointed as Head of Revenue.

  • Seattle-based retailer REI has been announced as a major customer, with their CISO Mike Hughes highlighting Mimic's capabilities in early detection and rapid recovery as vital to their business continuity.

  • The company unveiled its new Signal Generator feature that allows customers to safely simulate ransomware impacts within their networks to test security posture without handling actual malware.

TOOLS

RoboShadow

A cybersecurity platform that offers vulnerability scanning, Windows Defender and 3rd party AV management, and MFA compliance reporting, among other features.

Zoho Vault

Zoho Vault is a secure password management tool that allows you to store and automatically fill in passwords on websites and apps.

CloudDefense.AI

CloudDefense.AI is a Cloud Native Application Protection Platform (CNAPP) that safeguards cloud infrastructure and cloud-native apps with expertise, precision, and confidence.


Before you go

If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!

For more frequent cybersecurity leadership insights and tips, follow me on LinkedInBlueSky and Mastodon.

Best, 
Nikoloz

Share With Your Network

Check out these related posts