News

chat:CYBR Podcast Episode 9: June Teufel Dreyer

In this episode of chat:CYBR, Dr. June Teufel Dreyer discusses the evolving military strategy of China under Xi Jinping, focusing on their expanding military capabilities, particularly in cyber warfare. She highlights the implications of China’s actions in the Baltic Sea regarding fiber optic cables and the potential threats to global communications. The discussion also covers the cybersecurity landscape, emphasizing the need for the U.S. to adopt robust policies to counter China’s cyber threats. Dr. Dreyer concludes with thoughts on the importance of STEM education and the balance between

chat:CYBR Podcast Episode 9: June Teufel Dreyer2025-02-18T12:18:22-05:00

Critical Vulnerability in Meta Llama-Stack Threatens AI Systems

I. Targeted Entities

  • Organizations, researchers, and developers leveraging Meta's Llama-Stack for AI model inference and deployment. 

II. Introduction

A critical security vulnerability, CVE-2024-50050, has been identified in Meta's Llama-Stack framework, which is widely used for developing and deploying generative AI applications. This flaw allows attackers to achieve remote code execution (RCE) by exploiting unsafe deserialization of untrusted data via the pyzmq library (ZeroMQ python implementation). Specifically, the vulnerability arises from the use of the recv_pyobj method, which automatically deserializes Python objects using "pickle", a method known for its security risks when handling untrusted inputs. 

If exploited, this vulnerability could compromise AI inference servers, leading to data breaches, resource hijacking, unauthorized model manipulation, or full system compromise. Meta has assigned the flaw a CVSS score of 6.3 (medium), while Snyk and Oligo Security have categorized it as critical, assigning it scores of 9.3 and 9.8, respectively. 

This advisory provides details on the vulnerability and remediation steps to mitigate the risk. 

III. Additional Background Information

Llama-Stack is an open-source framework developed by Meta to streamline the development, deployment, and optimization of generative AI (GenAI) applications. It is primarily designed to support Meta's Llama family of models, offering a comprehensive set of tools and APIs for the entire AI development lifecycle, including: 

  • Model training and inference 
  • Memory management 
  • Evaluation and optimization

The framework is intended to accelerate innovation in the AI space by providing a standardized foundation for developers and enterprises working on Llama-based AI solutions. Since its introduction in July 2024, Llama-Stack has been backed by major AI ecosystem partners such as AWS, NVIDIA, Groq, Ollama, Together AI, and Dell. 

However, the discovery of CVE-2024-50050 has revealed a critical security flaw in Llama-Stack's default inference implementation, raising concerns about the security of AI frameworks that handle sensitive model deployments.

Technical Breakdown of the Vulnerability:

Insecure Deserialization:

  • The run_inference method in llama-stack uses recv_pyobj to receive serialized Python objects over a ZeroMQ socket. 
  • recv_pyobj automatically deserializes the received data using Python's pickle.loads method. 
  • The pickle module is inherently insecure when processing untrusted data, as it can execute arbitrary code during deserialization.

Exploitation Scenario:

If the ZeroMQ socket is exposed over the network, an attacker can send a maliciously crafted serialized object to the socket. When recv_pyobj unpickles the object using pickle.loads, the attacker's payload is executed, leading to arbitrary code execution on the host.

Code Analysis:

The recv_pyobj method in pyzmq is defined as follows:

def recv_pyobj(self, flags: int = 0) -> Any:
msg = self.recv(flags)
return self._deserialize(msg, pickle.loads)

This method:

  • Receives pickled data from the socket.
  • Passes the data to _deserialize along with pickle.loads for deserialization.
  • Deserialize executes pickle.loads, which deserializes the data without validation.

Unsafe Design:

The use of pickle.loads in recv_pyobj is unsafe by design, as it deserializes data from unverified sources.

The maintainer of pyzmq has acknowledged that recv_pyobj should only be used with trusted sources, similar to pickle itself.

Impact

Severity: Critical

Consequences:

  • An attacker could craft a malicious serialized object using pickle and send it to the exposed ZeroMQ socket.
  • This can lead to full system compromise, data exfiltration, or further lateral movement within the network.
Vulnerability discovery, disclosure and patching

The vulnerability in llama-stack was discovered by Oligo, which leverages its advanced runtime detection capabilities to identify threats that traditional Software Composition Analysis (SCA) tools often miss. Oligo's Application Detection and Response (ADR) platform maintains an extensive database of runtime profiles for third-party libraries, enabling it to detect unusual behavior indicative of exploitation. In the case of llama-stack, Oligo's prebuilt profiles flagged the use of pickle for deserialization as anomalous, as no legitimate instances of code execution within the pickle processing flow had ever been recorded. This triggered an automatic incident report in the Oligo ADR platform, highlighting the potential for remote code execution (RCE) even though no CVE for llama-stack existed at the time. The attack graph and evidence, including Python call stack deviations captured via eBPF, were documented in the Oligo platform, confirming the exploit.

Oligo followed a responsible disclosure process to report the vulnerability to Meta, the maintainers of llama-stack. Meta's security team responded promptly, providing clear guidelines for disclosure through a GitHub issue. The vulnerability was assigned CVE-2024-50050 with a CVSS score of 9.3, reflecting its critical severity. Meta acknowledged the issue and worked collaboratively with Oligo to address it.

Meta released a patch in version 0.0.41 of llama-stack (llama-stack>=0.0.41), which replaced the insecure pickle serialization implementation with a type-safe Pydantic JSON implementation across the API. This change eliminated the risk of arbitrary code execution by ensuring safe deserialization of data. Additionally, pyzmq issued a fix and added a clear warning in its documentation about the risks of using recv_pyobj with untrusted data, emphasizing that it should only be used with trusted sources. The patch and warning can be found in the following commit: pyzmq commit f4e9f17.

Responsible Disclosure Timeline

29 Sep, 2024: Oligo reported the vulnerability to Meta.

30 Sep, 2024: Meta performed an initial evaluation of the report.

1 Oct, 2024: Meta confirmed that their teams were working on a fix.

10 Oct, 2024: Meta released the fix on GitHub and published version 0.0.41 to PyPi.

24 Oct, 2024: Meta issued CVE-2024-50050 to formally document the vulnerability.

This coordinated effort between Oligo and Meta ensured the timely identification, disclosure, and patching of the vulnerability, mitigating the risk of exploitation for users of llama-stack.

IV. MITRE ATT&CK

  • T1059.007 – Command and Scripting Interpreter: Python
    • The vulnerability allows attackers to execute arbitrary Python code via insecure deserialization using the pickle module.
  • T1190 – Exploit Public-Facing Application
    • Attackers can exploit the exposed ZeroMQ socket to send malicious payloads and gain initial access to the system.
  • T1068 – Exploitation for Privilege Escalation
    • Successful exploitation could allow attackers to execute code with the privileges of the llama-stack process, potentially escalating privileges.
  • T1531 – Account Access Removal
    • Attackers could disrupt operations by deleting or locking user accounts, causing denial of service.

V. Recommendations

  • Upgrade to Llama-Stack 0.0.41 or Later
    Organizations should immediately upgrade to Llama-Stack version 0.0.41 or later, as this update replaces the insecure pickle-based deserialization with a safer Pydantic JSON implementation. This eliminates the risk of arbitrary code execution by ensuring that only validated and structured data is processed. Additionally, ensure that all instances of pyzmq are updated to the latest version, as it now includes security advisories on using recv_pyobj with untrusted sources. Keeping software dependencies up to date is crucial to prevent attackers from exploiting known vulnerabilities.
  • Restrict Network Exposure
    ZeroMQ sockets should never be exposed to the internet or untrusted networks, as this dramatically increases the risk of exploitation. Organizations should apply firewall rules and access control lists (ACLs) to restrict access to inference servers, ensuring that only authorized systems and users can interact with them. Additionally, using VPNs, network segmentation, and private subnets can provide an added layer of security, further reducing the risk of unauthorized access.
  • Implement Secure Serialization Practices
    The use of unsafe deserialization methods like pickle.loads should be strictly prohibited, especially when handling untrusted data. Instead, organizations should adopt secure serialization formats such as JSON with Pydantic, which enforces strict type validation and eliminates the possibility of arbitrary code execution. Developers should also follow best practices by validating all incoming serialized data and ensuring that no dynamic code execution is allowed during deserialization.

VI. IOCs (Indicators of Compromise)

Displayed is the code vulnerable method in llama stack (Derived from Oligo Blog Security)

Displayed is the RCE code used to deserialize and unpickle the code, making said code no longer secure (Derived from Oligo Blog Security)

VII. Additional OSINT Information

To detect this vulnerability, having real time detection is essential for identifying and getting rid of the risk. Maintaing an extensive and constantly backed up database of profiles for third party libraries.  

 Patch 0.0.41 calls attention to this, it replaces the pickled serialization implementation with Pydantic JSON implementation across the API.

VIII. References

Oligo Security. (January 23, 2025). CVE-2024-50050: Critical Vulnerability in meta llama/llama-stack by Meta. https://www.oligo.security/blog/cve-2024-50050-critical-vulnerability-in-meta-llama-llama-stack 

The Hacker News. (Jan 26, 2025). Meta's Llama Framework Flaw Exposes AI Systems to Remote Code Execution Risks. https://thehackernews.com/2025/01/metas-llama-framework-flaw-exposes-ai.html 

SC Media. (January 27, 2025). Severe Meta Llama issue risks RCE in AI systems. https://www.scworld.com/brief/severe-meta-llama-issue-risks-rce-in-ai-systems 

Threat Advisory created by The Cyber Florida Security Operations Center. 

Contributing Security Analysts: Thiago Reis Pagliaroni, Nahyan Jamil

To learn more about Cyber Florida visit: www.cyberflorida.org  

Critical Vulnerability in Meta Llama-Stack Threatens AI Systems2025-02-11T10:58:10-05:00

2025 phaseZERO: Innovation Incubator Awardees Announced

phaseZERO

Cyber Florida at USF Announces Awardees of the phaseZERO: Innovation Incubator Seed Fund Program

February 11, 2025—Tampa, Fla—Cyber Florida at USF announces today the recipients of the phaseZERO Innovation Incubator seed fund program, a groundbreaking initiative designed to support early-stage cybersecurity startups in Florida. This year’s awardees—TrustConnect, LLC; Stablein Solutions; CyberMirage, LLC; and AI-Guardian Lab, LLC—presented innovative solutions to tackle critical cybersecurity challenges across industries.

PhaseZERO, an initiative under Cyber Florida’s commitment to fostering cybersecurity innovation, provides selected startups with seed funding and strategic mentorship to accelerate their business development. This year’s recipients bring diverse cutting-edge solutions to the cybersecurity landscape, from AI-driven workforce training to anti-web scraping technologies. Each recipient will receive $60,000 in funding, mentorship, and access to resources to refine their business strategies and accelerate market readiness. The phaseZERO initiative is part of Cyber Florida’s broader mission to strengthen the state’s cybersecurity ecosystem through education, research, and industry collaboration.

Three of the four innovative recipients are affiliated with the University of South Florida.

Awardees, their innovations, and a remark about the significance of receiving the award:

  • AI-Guardian Lab, LLC – Developing an AI-powered platform that safeguards teenagers from online human trafficking threats in gaming and social media environments. AI-Guardian aims to provide scalable solutions for schools and community programs using real-time behavior analysis and proactive intervention strategies.
    • Tingting Zhang, Ph.D., Muma College of Business School of Hospitality and Tourism Management, University of South Florida, stated, “We are deeply honored by the phaseZERO award, which fuels our passion to push the boundaries of cybersecurity. With this support, we have unleashed an AI-powered real-time monitoring and learning system. This innovation transforms our AI Guardian into a digital shield that swiftly alerts parents to hidden human trafficking risks on teens’ mobile devices.”
  • CyberMirage, LLC – Pioneering an advanced data loss prevention and anti-web scraping solution that incorporates obfuscated fonts, multi-layered image protection, and document security technologies. Their early-stage technology has already secured its first customer and is positioned for broader market adoption.
    • Yao Liu, Ph.D., Professor, Computer Science and Engineering, University of South Florida, stated, “Receiving support from the Cyber Florida PhaseZERO program is of great significance to us. This support will accelerate the development and launch of our initial product for data loss prevention against insider threats and web scraping. With this backing, we can expedite the commercialization of our technologies and bring our products to market much sooner.”
  • Stablein Solutions – Creating a Secure AI Automation Cybersecurity Framework that integrates machine learning and multi-layered security measures to optimize business processes. Their solution targets logistics and manufacturing industries, focusing on reducing manual processing costs and increasing workflow accuracy.
    • Marlena Harkless, COO, Stablein Solutions and Thomas Stablein, Ph.D., Muma College of Business School of IS & Management, University of South Florida, released this statement: “Receiving the PhaseZERO Cyber Florida grant is more than just a milestone for Stablein Solutions—it’s a pivotal moment of validation and potential. As a startup focused in AI powered process automation, this award will enable us to secure critical APIs and advance cybersecurity innovation, empowering us to transform our vision of a more secure digital landscape into a tangible reality. We are deeply honored to be selected and equally motivated to elevate our community’s technological infrastructure in 2025 and beyond. This grant isn’t just funding; it’s a catalyst for meaningful change, enabling us to push the boundaries of what’s possible in cybersecurity and contribute to Florida’s emerging reputation as a hub of technological innovation.”
  • TrustConnect, LLC—Developing CyberReady in the Workplace, an AI-assisted cybersecurity training platform that personalizes learning through gamification and social engagement. The platform, designed for medium to large enterprises, aims to reduce cyber incident risks by 30%.
    • Xueping Liang, Assistant Professor of Cybersecurity, Blockchain and Smart Cities, Florida International University, said, “We are honored to receive the phaseZERO award, as it represents a crucial step in translating our research into real-world impact. This award enables us to advance our customer discovery efforts, refine our commercialization strategy, and strengthen industry collaborations. It is an exciting opportunity to bridge the gap between academic research and practical business applications and solutions, ultimately contributing to innovation in cybersecurity and emerging technologies.”

Ernie Ferraresso, senior director of Cyber Florida at USF, emphasized the importance of supporting early-stage cybersecurity ventures in Florida. “The phaseZERO program reflects our commitment to nurturing cybersecurity innovation in Florida, reducing the barriers to getting high impact cybersecurity solutions into the marketplace. These awardees represent visionary and practical cybersecurity solutions, each addressing real-world challenges with groundbreaking technologies. We’re excited to support their journey and see their impact on the industry and cybersecurity.”

Contact Cyber Outreach Manager Jennifer Kleman, APR, CPRC, to coordinate interviews with the award recipients at Jennifer437@cyberflorida.org.

For more information about phaseZERO, visit cyberflorida.org/phasezero. For more information about Cyber Florida and its mission to advance cybersecurity in the state, visit cyberflorida.org. Read an update about a phaseZERO pilot program awardee, StudySpaces, co-founded by two USF alumni, in this blog post.

ABOUT CYBER FLORIDA AT USF
The Florida Center for Cybersecurity at the University of South Florida, commonly referred to as Cyber Florida at USF, was established by the Florida Legislature in 2014. Its mission is to position Florida as a national leader in cybersecurity through comprehensive education, cutting-edge research, and extensive outreach. Cyber Florida leads various initiatives to inspire and educate current and future cybersecurity professionals, advance applied research, and enhance cybersecurity awareness and safety of individuals and organizations.

ABOUT PHASEZERO: INNOVATION INCUBATOR
Cyber Florida at USF’s phaseZERO: Innovation Incubator supports Florida-based researchers and entrepreneurs in commercializing cybersecurity innovations and launching new businesses. Modeled after federal SBIR/STTR Phase I programs, it complements statewide initiatives like the Florida High-Tech Corridor and I-Corps. phaseZERO provides critical seed funding and mentorship to help entrepreneurs succeed. It advances Cyber Florida at USF’s mission to foster research partnerships, attract cybersecurity companies, and support new ventures in the state.

2025 phaseZERO: Innovation Incubator Awardees Announced2025-02-11T10:18:35-05:00

Industry Certification with CompTIA: OPK12 Webinar

Join Cyber Florida and CompTIA for an engaging and informative webinar designed to help educators navigate the evolving industry certification landscape. This session will explore the importance of industry certifications in preparing students for successful IT careers and highlight professional development opportunities for teachers, including CompTIA’s new OnDemand training. Learn about the upcoming Summer Professional Development Camp, designed to help educators upskill and earn certifications at their own pace, and explore key industry trends in Florida, the transition from IT Fundamentals+ to the new Tech+ certification, and how these changes are shaping the future of IT education. Don’t miss this opportunity to gain valuable insights and resources to support your students and your professional growth!
Topics to Be Discussed:
  • The importance of industry certifications for student success.
  • Teacher professional development opportunities with CompTIA OnDemand training.
  • Details about the Summer Professional Development Camp for educators.
  • Industry trends and workforce demands in Florida’s IT sector.
  • The transition from IT Fundamentals+ to the new Tech+ certification and its impact on IT education.


Industry Certification with CompTIA: OPK12 Webinar2025-02-10T09:26:58-05:00

StudySpaces

Jamshidbek “Jam” Mirzakhalov

Jamshidbek “Jam” Mirzakhalov

Axhens “Jesse” Mara

Axhens “Jesse” Mara

Cyber Florida’s phaseZERO: Incubation Innovator Seed Fund Awardee – StudySpaces

Receiving a seed fund grant from Cyber Florida at USF “has been a game-changer for StudySpaces,” says co-founder Axhens “Jesse” Mara. Along with co-founder Jamshidbek “Jam” Mirzakhalov, Mara launched StudySpaces with the goal of improving cybersecurity education through innovative, hands-on learning tools. The two met while studying at the University of South Florida, where they both earned their degrees and developed a shared passion for advancing cybersecurity training.

The funding has accelerated StudySpaces’ development, refined its platform, and brought its vision to life. This support has been transformative for a growing startup, allowing them to compete with larger industry players and expand their reach.

Looking ahead, the StudySpaces team plans to enhance its platform’s AI capabilities and expand its content engine to support more learning materials. They aim to equip more individuals with the cybersecurity skills needed to succeed by continually improving testing and training features.

For those looking to make an impact in cybersecurity education and research, the StudySpaces team emphasizes adaptability. “Focus on building tools that address real-world needs,” said Mara. “Listen to feedback, test your ideas continuously, and embrace new approaches. Practical, hands-on learning makes the biggest difference.”

Reflecting on the effect of Cyber Florida’s support, Mara shared, “The grant turned our vision into reality. StudySpaces is already helping people learn and gain skills more effectively by combining adaptive curriculum generation, testing, and tutoring. We are proud of what we’ve built and excited for the future as we continue to evolve and make a real impact.”

This is just the beginning for StudySpaces. With ongoing innovation and the support of programs like phaseZERO, the team is excited to refine their platform further and expand their influence on cybersecurity education.

StudySpaces2025-02-07T14:21:58-05:00

A Human Story in a Cyber World: The Awkward Hug

Jayson Street and Rex Wilson

Jayson Street and Rex Wilson

The humans behind the story, Jayson Street and Rex Wilson, demonstrate the awkwardest of awkward hugs at Sunshine Cyber Con 2024

By Rex Wilson, Cyber Florida Brand Manager

Jayson E. Street—the self-described hacker, helper, and human—is known for a lot of things. Not surprising for someone who robs banks for a living. (Legally, of course.) In his world, reputations tend to precede people. But among the many things Jayson is known for, one stands out: the awkward hug.

Before meeting him at Sunshine Cyber Con in 2024, I assumed an awkward hug was just a poorly executed embrace—one where both participants weren’t equally committed. That might be true in some circles, but not in Jayson’s world. When we finally met in person, he asked, “Do you want a little awkward or full throttle?” Like any self-respecting, socially awkward introvert, I went for full throttle. The result? The photo you see in this post—an unforgettable moment I’ll treasure for a long time.

But as much as I loved that interaction, it wasn’t even my most memorable Jayson moment of Sunshine 2024. That honor goes to a simple conversation we had between sessions.

While running around conducting interviews for a documentary, I kept noticing Jayson stationed at a table in a high-traffic area. Every time I passed by, he was engaged in conversation with different attendees—sometimes one-on-one, sometimes with three or four at once. Eventually, I caught a quiet moment with him and asked, Why park yourself in such a visible spot? Isn’t it exhausting to be ‘on’ all day?

“Yes,” he admitted. “But this might be the only chance some of these people have to connect with me in person, and I have to be there for them. Who knows what will come out of that conversation?”

That philosophy—being present, making space for connection—seems to define the way Jayson moves through life. And I admire it. Peopling can be hard, but the right conversations can be life-changing, soul-enriching.

This year, Jayson returns as our keynote speaker, and I couldn’t be more excited for his talk, How to Hack Like a Failure (Like Me!). But that wasn’t quite enough Jayson for us, so we also invited him to join our Do We Belong Here? podcast for a live recording—an epic combination in the making. And as the icing on the Sunshine cake, he’s bringing some of his hacker friends to launch our first-ever Hear from the Hackers track.

Want to experience all of this in person? Register for Sunshine Cyber Con today. It’s an awesome event—even if you’re not an awkward hugger.

A Human Story in a Cyber World: The Awkward Hug2025-02-05T13:14:24-05:00

No Password Required Podcast Episode 56 – Anmol Agarwal

No Password Required Podcast Episode 56 – Anmol Agarwal

No Password Required Podcast Episode 56 – Anmol Agarwal2025-02-21T10:59:01-05:00

Teacher Spotlight: Christine Ackerman

Christine Ackerman

Teacher: Christine Ackerman

School: Middleburg High School

County: Clay

Meet Christine Ackerman, a trailblazer in education! With 18 years of teaching experience, including the last five at Middleburg High School, Christine has transformed the Digital Information Technology curriculum. She pioneered a groundbreaking coding class, laying the foundation for her AP Computer Science Principles course leadership. Under her guidance, the class grew from just four students to an impressive 48. Today, Christine expertly navigates the fields of CSIT, exploring Device Configuration, Networking, and Cybersecurity.

Driven by a passion for bringing cutting-edge opportunities to her rural school, she opens doors to futures her students never thought possible. Last year, she proudly led 15 students to the CyberLaunch event in Orlando and eagerly awaits another inspiring journey this year.

Would you like to be featured in our Teacher Spotlight? To nominate yourself or another deserving teacher, complete the interest form below!

Teacher Spotlight: Christine Ackerman2025-02-03T13:22:43-05:00

Key Requirements & Resources for Cybersecurity Compliance

Florida Statute 282.3185 outlines important cybersecurity requirements for local governments. The table below highlights key focus areas and provides valuable resources to support compliance efforts.

Florida Statue Requirement Resources
282.3185(3)(a)1 Develop a basic cybersecurity training curriculum for local government employees. All employees with access to the local network must complete training within 30 days of employment and annually thereafter. Florida Digital Service Locals-Resource-Packet-2023v1.1.pdf

Cyber Florida’s FirstLine Flexible No-Cost Training Options

282.3185(4) Adopt cybersecurity standards consistent with best practices, such as the NIST Cybersecurity Framework. Cyber Florida’s NIST CSF 2.0 Risk Assessment
If your organization doesn’t have on-staff expertise, Cyber Florida will connect you with an expert who can help you complete the assessment. Attend a Cyber Florida virtual or in-person workshop. Email outreach@cyberflorida.org for upcoming dates and times.Attend a Cyber Florida virtual or in-person workshop.

18 Feb 2025 Virtual Workshop

14 March 2025 In-person Workshop

282.3185(4)(d) Notify the Florida Digital Service of your progress on cybersecurity standards. Florida Digital Service Attestation Form

These resources are designed to make meeting the requirements straightforward and achievable. Cyber Florida’s expertise and tools can help you identify opportunities, develop strong practices, and ensure your cybersecurity goals are aligned with our state’s cybersecurity goals.

If you have any questions or need further support, please don’t hesitate to contact Cyber Florida at https://cyberflorida.org/connect/ or email outreach@cyberflorida.org.

Thank you for your ongoing efforts to strengthen cybersecurity!

Key Requirements & Resources for Cybersecurity Compliance2025-02-05T12:11:21-05:00