Latest Intelligence
Gaps in California Privacy Law: Half of Data Brokers Ignore Requests
The article highlights that half of data brokers in California are ignoring consumer requests for data access and deletion, indicating a significant gap in compliance with privacy laws. This situation underscores the need for standardized verification processes and stronger enforcement mechanisms to enhance consumer privacy protection. Read Original »
Nevada State Offices Closed Following Disruptive Cyberattack
Nevada state offices have been closed due to a disruptive cyberattack that affected state websites and phone lines. However, officials have confirmed that emergency services and personal data remain secure and unaffected by the incident. Read Original »
Infostealers: The Silent Smash-and-Grab Driving Modern Cybercrime
The article discusses how competition among malware-as-a-service developers has led to the evolution of infostealers, making them more sophisticated and accessible to cybercriminals. This trend is contributing significantly to modern cybercrime activities. Read Original »
CISA and Partners Release Joint Advisory on Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage Systems
CISA, alongside other U.S. agencies and international partners, has issued a Cybersecurity Advisory to address the ongoing threats posed by Chinese state-sponsored APT actors targeting critical infrastructure globally. These actors exploit vulnerabilities in telecommunications routers to maintain long-term access to networks, emphasizing the need for enhanced vigilance and remediation efforts in high-risk sectors. Read Original »
Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System
The article discusses the ongoing cyber threat posed by state-sponsored actors from the People's Republic of China, who are targeting global networks across various sectors to facilitate espionage. These actors exploit vulnerabilities in telecommunications and other infrastructures to maintain persistent access and gather intelligence on targets worldwide. Read Original »
Citrix Patches Exploited NetScaler Zero-Day
Citrix and CISA have issued emergency patches due to a zero-day vulnerability in NetScaler that is being actively exploited in the wild. This situation has prompted urgent action to protect federal agencies from potential threats. Read Original »
The 5 Golden Rules of Safe AI Adoption
The rapid adoption of AI by employees is transforming the workplace, but this growth is accompanied by a significant lack of control and safeguards. Security leaders face the challenge of ensuring safe AI use without hindering its adoption. Read Original »
Exploits and vulnerabilities in Q2 2025
The report highlights statistical data on vulnerabilities and exploits identified in Q2 2025, along with insights into the use of command and control (C2) frameworks. It aims to provide a comprehensive overview of the cybersecurity landscape during this period. Read Original »
Salesloft OAuth Breach via Drift AI Chat Agent Exposes Salesforce Customer Data
Hackers have breached Salesloft, a sales automation platform, to steal OAuth and refresh tokens linked to the Drift AI chat agent. This breach has been attributed to a threat actor known as UNC6395, indicating a significant data theft incident. Read Original »
Blind Eagle’s Five Clusters Target Colombia Using RATs, Phishing Lures, and Dynamic DNS Infra
Cybersecurity researchers have identified five distinct activity clusters associated with the threat actor Blind Eagle, which targeted Colombian government entities from May 2024 to July 2025. The attacks utilized RATs, phishing lures, and dynamic DNS infrastructure. Read Original »
African Law Enforcement Agencies Nab Cybercrime Syndicates
African nations are collaborating with Interpol and private-sector partners to combat cybercrime on the continent. Despite these efforts, there is a recognition that more actions are necessary to effectively disrupt cybercriminal operations. Read Original »
When One Hospital Gets Ransomware, Others Feel the Pain
The article highlights the consequences of inadequate cybersecurity measures, such as the lack of backup recovery and multifactor authentication, which lead to widespread suffering among hospitals and patients when one hospital is hit by ransomware. This situation emphasizes the interconnectedness of healthcare institutions and the ripple effects of security breaches. Read Original »
AI Agents in Browsers Light on Cybersecurity, Bypass Controls
The article highlights concerns regarding agentic browsers, which can automate tasks by accessing users' online accounts. While they offer benefits, these browsers also pose significant cybersecurity risks by potentially exposing organizational data and systems to various threats. Read Original »
1M Farmers Insurance Customers' Data Compromised
Farmers Insurance has reported a data breach affecting 1 million customers, but has not disclosed the specific types of personal data that were compromised. The company is notifying its customers about the incident. Read Original »
Philippines Power Election Security With Zero-Knowledge Proofs
The article discusses the implementation of zero-knowledge proofs in the Philippines to enhance the security of online voting systems. It highlights the country's potential as a model for secure e-voting, given that 34 other countries already utilize some form of electronic voting. Read Original »