Connect with us

Hi, what are you looking for?

AI Cybersecurity

Cyber Agencies Urge ISPs to Combat “Bulletproof” Hosts as CSA Launches AI Risk Framework

International cybersecurity agencies urge ISPs to combat “bulletproof” hosting providers fueling cybercrime, as malware reports surge by 38% in Q3 2025.

In an urgent call to action, international cyber agencies are rallying Internet Service Providers (ISPs) and network defenders to combat the proliferation of “bulletproof” hosting providers (BPHs). These entities, notorious for providing infrastructure that shields cybercriminals, have become increasingly intertwined with legitimate internet services. Meanwhile, the Cloud Security Alliance (CSA) has introduced a new risk assessment framework tailored for autonomous AI systems, while the Center for Internet Security (CIS) has launched fresh benchmarks and updates for various software products. Here are the key developments you need to know:

Combatting Bulletproof Hosting Providers

Cybersecurity agencies from Australia, Canada, the Netherlands, New Zealand, the U.K., and the U.S. have issued a joint advisory titled “Bulletproof Defense: Mitigating Risks From Bulletproof Hosting Providers.” This initiative aims to diminish the influence of BPHs that facilitate cyber operations targeting critical infrastructure and financial institutions.

These hosting providers often ignore legal processes and law enforcement requests, enabling the likes of ransomware attacks, data extortion, and malware distribution. They utilize techniques such as fast flux to obscure the identities of cybercriminals, complicating efforts to expose them.

Crucially, BPHs are not standalone entities; they increasingly lease infrastructure from legitimate ISPs and data centers, further complicating detection efforts. The advisory recommends several strategies for ISPs, including:

Advertisement. Scroll to continue reading.
  • Rigorous traffic analysis
  • Automated reviews of malicious resources
  • Robust standards for ISP accountability
  • Proactive filtering tools
  • Transparent communication regarding threats

Madhu Gottumukkala, Acting Director of CISA, emphasized that addressing BPHs is vital for safeguarding critical systems: “By shining a light on these illicit infrastructures, we are making it harder for criminals to hide.” In related actions, the U.S. Treasury recently sanctioned the Russia-based BPH company Media Land along with its network.

New Framework for Autonomous AI Risks

The CSA has unveiled a new risk assessment framework, the Capabilities-Based Risk Assessment (CBRA), designed specifically for assessing risks from autonomous AI systems. As conventional models may fall short, the CBRA evaluates AI systems across four dimensions:

  • System criticality
  • AI autonomy
  • Access permissions
  • Impact radius

This comprehensive approach allows organizations to quantify potential risks and align investment in governance accordingly. According to Pete Chronis, Co-Chair of the CSA AI Safety Initiative CISO Council, this framework helps enterprises manage their exposure to high-impact AI systems while promoting safe innovation.

Integrated with the CSA’s AI Controls Matrix (AICM), the CBRA enables organizations to apply security measures proportional to the identified risks, thus safeguarding vital AI infrastructures.

Updates from the Center for Internet Security

The CIS has released a new set of configuration benchmarks aimed at improving the security of various software products, including updates for Windows Server 2025 and multiple Linux distributions. New benchmarks cover:

  • Red Hat Enterprise Linux 10
  • Rocky Linux 10
  • AlmaLinux OS 10
  • IBM z/OS with RACF
  • FortiGate 7.4.x
  • Apple iOS/iPadOS 18 for Intune

In addition to the new benchmarks, CIS has introduced Build Kits that automate the configuration process for several platforms, enhancing security readiness across various operating systems and applications.

Cybersecurity Risks in Drone Detection Tools

As organizations invest in drone-detection systems to thwart malicious drone activities, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has raised concerns about the cyber vulnerabilities associated with these detection tools. In a recent guide, CISA warns that flaws can compromise the integrity of detection data, potentially allowing adversaries to exploit these systems.

Advertisement. Scroll to continue reading.

Common vulnerabilities identified include:

  • Insecure data collection and transfer
  • Malicious software within firmware updates
  • Weaknesses in connected devices

CISA’s guide urges critical infrastructure organizations to rigorously evaluate vendors on the security of their systems to prevent potential exploitation.

Malware Infections Surge

In a troubling trend, malware reports have surged by 38% from Q2 to Q3 2025, according to the CIS Multi-State Information Sharing and Analysis Center (MS-ISAC). The most prevalent malware in this period remains SocGholish, notorious for tricking users into downloading harmful software through fake update prompts. Following closely are CoinMiner and Agent Tesla, both of which target user credentials and sensitive data.

The return of older malware variants like Gh0st and the emergence of new threats such as Jinupd, a point-of-sale infostealer, highlight the evolving landscape of cybersecurity threats. The report emphasizes that the primary infection vector for this quarter was categorized as “Multiple,” indicating a complex and multifaceted approach among cybercriminals.

For further details on these malware trends, the CIS blog “Top 10 Malware Q3 2025” provides an in-depth analysis of current threats and countermeasures.

Advertisement. Scroll to continue reading.

These developments reflect a dynamic and evolving cybersecurity landscape, underscoring the urgent need for effective collaboration and innovative strategies in the fight against cybercrime and threats emanating from emerging technologies.

Rachel Torres
Written By

At AIPressa, my work focuses on exploring the paradox of AI in cybersecurity: it's both our best defense and our greatest threat. I've closely followed how AI systems detect vulnerabilities in milliseconds while attackers simultaneously use them to create increasingly sophisticated malware. My approach: explaining technical complexities in an accessible way without losing the urgency of the topic. When I'm not researching the latest AI-driven threats, I'm probably testing security tools or reading about the next attack vector keeping CISOs awake at night.

You May Also Like

AI Cybersecurity

One in five Australian businesses reported a cyber breach last year, highlighting the urgent need for enhanced cybersecurity as AI investments rise, warns CPA...

AI Technology

Huawei launches Flex:ai, an open-source platform promising a 30% boost in AI chip efficiency amid U.S. trade restrictions on semiconductor technology

AI Research

Brain Canada proposes a strategic $38.9M investment over five years to integrate AI into brain research, targeting innovations in mental health and personalized medicine.

Top Stories

States have enacted 252 AI legislative measures in 2025, prioritizing privacy and cybersecurity as federal oversight falters.

Top Stories

OpenAI launches global ChatGPT group chat feature, enabling collaboration for up to 20 users and transforming AI into a dynamic teamwork tool.

AI Marketing

Generative AI simulation tools are poised to disrupt the $140 billion market research industry by 2026, enabling faster, cost-effective insights through digital twins and...

Top Stories

AI music group Breaking Rust makes history as their song "Walk My Walk" becomes the first AI-generated track to top Billboard's Country Digital Song...

Top Stories

OpenAI partners with Foxconn to develop AI data center hardware in the U.S., boosting infrastructure amid $1.4 trillion commitment to AI advancements.

© 2025 AIPressa · Part of Buzzora Media · All rights reserved. This website provides general news and educational content for informational purposes only. While we strive for accuracy, we do not guarantee the completeness or reliability of the information presented. The content should not be considered professional advice of any kind. Readers are encouraged to verify facts and consult appropriate experts when needed. We are not responsible for any loss or inconvenience resulting from the use of information on this site. Some images used on this website are generated with artificial intelligence and are illustrative in nature. They may not accurately represent the products, people, or events described in the articles.