CCTR.3.JAN.26

Monday morning cyber coffee read CCTR.3.JAN.26.
Trusted intelligence sources indicate a potential high severity unauthenticated PII disclosure (set of chained vulnerabilities) affecting Salesforce Marketing Cloud instances. At this time, Salesforce has not yet verified or published this issue via an official Security Advisory.
Use the following search query to identify potentially affected assets within your environment.
(autonomous_system_organizations=SALESFORCE)
Organisations using Salesforce Marketing Cloud should remain alert for unauthenticated data exposure patterns and be prepared to respond rapidly….
Assume exposure until disproven
Monitor Salesforce streaming API for data changes
Monitor Salesforce Security Advisories here https://security.salesforce.com/security-advisories
A High risk unauthenticated remote code execution vulnerability CVE-2025-64155 has been identified in Fortinet FortiSIEM. The flaw allows an unauthenticated attacker with network access to a core FortiSIEM service to gain full administrative control of the appliance and escalate privileges to root. Fortinet FortiSIEM is a security operations platform providing SIEM capabilities. It is not a good look to have remote code execution vulnerabilities in your SIEM.
Patch your FortiSIEM and usual BAU stuffs. https://horizon3.ai/attack-research/vulnerabilities/cve-2025-64155-fortinet-fortisiem/
Microsoft has patched a vulnerability (Reprompt) in its Copilot AI assistant that allowed attackers to exfiltrate sensitive user data after a single click on a legitimate Copilot URL.

Copilot is deeply integrated into enterprise workflows and has access to contextual, user-specific data. Vulnerabilities like this can become high-trust data exfiltration channels, even without malware or obvious indicators of compromise. Traditional endpoint controls offer little protection in scenarios like this.
Reinforce user awareness around trusted-link abuse, even when URLs appear legitimate.
Incorporate AI assistants into threat models, detection logic and tabletop exercises https://www.varonis.com/blog/reprompt
In one week, an unconfirmed SaaS vulnerability, an unauthenticated RCE in a SIEM and high-trust data exfiltration via enterprise AI tools. Now is the time to assume compromise, validate trust boundaries and hunt beyond vendor advisories. This is why cyber risk must be tested continuously, not managed through assurance statements alone.
Last updated