As organizations deepen their reliance on cloud platforms and AI-driven workflows, cybersecurity threats are growing more sophisticated—and more severe. The first half of 2025 has already seen an alarming trio of risks: a misconfigured AWS policy that could compromise entire cloud environments, exposed sensitive applicant data through an AI chatbot, and the largest DDoS attacks ever recorded.
Here’s a deeper dive into what happened, who’s at risk, and how your team can respond.
Paradox AI Chatbot Exposes Personal Data of 64 Million Job Applicants at McDonalds
In July, McDonald’s AI hiring vendor, Paradox AI, came under scrutiny after reports revealed that its “Olivia” chatbot platform had left an admin account secured with the default password “123456.” This, combined with a misconfigured API, allowed unauthenticated access to chat logs containing personal data from more than 64 million job applicants. The logs reportedly included names, job preferences, and unstructured conversations—some of which may have exposed sensitive or identifying information. A complaint filed with the FTC accuses Paradox of misleading users about how their data was being collected and used, raising serious concerns about privacy and transparency in AI-powered recruitment systems.
This breach underscores the growing risks associated with outsourcing critical HR workflows to third-party AI platforms without robust security assessments or contractual safeguards. As AI continues to transform hiring and other operational areas, organizations must prioritize due diligence and implement strict access controls, especially when dealing with high volumes of personal or regulated data.
To manage these risks effectively, companies should begin aligning with emerging AI governance frameworks. ISO/IEC 42001 provides a comprehensive management system for AI, while the NIST AI Risk Management Framework offers practical guidance on identifying and mitigating AI-related harms. Adopting these standards can help organizations ensure that their AI tools not only comply with regulations but also earn the trust of users and stakeholders.
Recommended Best Practices:
- Vet all third-party AI tools for data security controls.
- Disable default credentials and enforce strong authentication.
- Ensure applicants are informed of how their data is collected and used.
AWS Organizations Policy Misconfiguration Enables Org-Wide Takeover
A major cloud vulnerability surfaced this month when researchers identified a dangerous misconfiguration in AWS’s AmazonGuardDutyFullAccess v1 policy. The issue? This managed policy included the organizations:RegisterDelegatedAdministrator permission with a Resource:* wildcard—allowing any AWS member account using the policy to register itself as an admin across the entire organization.
This means a single compromised account in a multi-account AWS setup could escalate privileges and seize control of the entire cloud environment. This is not a hypothetical—many organizations were using the v1 policy unaware of its scope. In the wrong hands, this flaw could allow threat actors to disable security controls, exfiltrate sensitive data, or spin up malicious resources across an enterprise AWS infrastructure with full administrative access.
AWS has since deprecated the vulnerable policy and released a safer AmazonGuardDutyFullAccess v2 version, which properly scopes permissions to specific resources. However, environments that haven’t proactively replaced v1 remain vulnerable. Security teams should conduct immediate audits of all attached managed policies, validate role assumptions, and enable CloudTrail logging to detect and respond to suspicious delegation or administrative events.
Mitigation Steps
- Identify and remove v1 of the AmazonGuardDutyFullAccess policy.
- Audit existing delegated administrator accounts for anomalies.
- Monitor AWS CloudTrail for RegisterDelegatedAdministrator events.
- Implement least privilege access policies and strict IAM role boundaries.
Hyper-Volumetric DDoS Attacks Reach Record-High Bandwidths
In its Q1 2025 report, Cloudflare revealed an unprecedented surge in hyper-volumetric DDoS attacks. Over 700 campaigns surpassed 1 Tbps or 1 billion packets per second (Bpps)—a level of attack previously considered rare. Some peaked at up to 6.5 Tbps and 4.8 Bpps, targeting industries including finance, cloud hosting, and online gaming. These attacks use Layer 7 protocols like HTTP/2 and infrastructure-layer vectors such as UDP reflection to overwhelm defenses. According to Cloudflare, the volume of attacks represents a 358 percent increase year-over-year, signaling a major shift in attacker capabilities.
What makes these attacks especially dangerous is their speed and scale. Most strike with little warning and reach full bandwidth within seconds. Attackers are increasingly using large botnets of compromised IoT devices to amplify traffic. Many also blend techniques to slip past traditional rate-limiting and filtering defenses. Targeted organizations report outages, degraded services, and significant financial impacts, even when mitigation tools are in place. This evolving threat landscape reinforces the urgency of adopting real-time detection, dynamic traffic routing, and layered mitigation strategies across both on-premise and cloud environments.
Recommendations for Resilience
- Enable rate limiting and anomaly detection at edge locations.
- Prepare an incident response plan with clear DDoS escalation paths.
- Coordinate with ISPs and upstream providers for layered mitigation.
Turning Risk Into Resilience: What Comes Next
To protect your environment from these evolving threats, consider a proactive cloud security posture assessment or DDoS defense audit. RSI Security offers flexible services tailored to your needs. Schedule a cloud security consultation or discuss AI compliance solutions for your organization today.
Contact Us Now!