Ghosts in the House, Hidden Hands Wreaking Havoc, Look: No Hands, Access Redefined, Prestige Front: Dirty Tricks, and the Abuse of Trust. It's CISO Intelligence for Friday, 31st October 2025.

Not all specters wear sheets, shadow workers, invisible perils, raising the security game, getting blinded by status, and the art of exploitation.

Ghosts in the House, Hidden Hands Wreaking Havoc, Look: No Hands, Access Redefined, Prestige Front: Dirty Tricks, and the Abuse of Trust. It's CISO Intelligence for Friday, 31st October 2025.
đź’ˇ
"Gives me everything I need to be informed about a topic" - UK.Gov

Table of Contents

  1. The 2026 Digital Haunted House: Preparing for Ghost Identities, Poisoned Accounts and AI Havoc
  2. Hacktivists Run Amok in Canadian Cyber Playground: Cyber Agency Sounds Alarm
  3. Massive Surge of NFC Relay Malware Steals Credit Cards: A Cyber-Thriller in Broad Daylight
  4. WhatsApp’s Latest Magic Trick: Vanishing Passwords in Chat Backups
  5. Phishing Ain't Board: LinkedIn’s Latest Deception
  6. PhantomRaven: The Code-Breaking Specter Haunting npm

The 2026 Digital Haunted House: Preparing for Ghost Identities, Poisoned Accounts and AI Havoc

Not every ghost wears a sheet—some hide in your network.

What You Need to Know

Cybersecurity is facing an unprecedented transformation as we edge towards 2026. Emerging threats like ghost identities, poisoned accounts, and renegade AI agents are becoming realities, challenging the traditional paradigms of security. As board executives and senior management, your role is crucial in shaping strategic responses and allocating resources to combat these evolving threats. Immediate action is needed to anticipate and mitigate risks associated with these innovations. Prioritise investment in intelligence-led cybersecurity frameworks and foster a culture of security-conscious operations across your organisation.

CISO Focus: Advanced Persistent Threats and Emerging AI Risks
Sentiment: Strong Negative
Time to Impact: Immediate


As we fast approach 2026, the cybersecurity landscape is undergoing a seismic shift, with new forms of digital threats rising on the horizon. This isn't just a series of unfortunate events; rather, it's a full-on digital revolution—or perhaps, a cyberillogical one. Today, we delve into the unsettling yet fascinating world of digital threats poised to redefine the cyber battlefield.

The Rise of Ghost Identities

Ghost identities are the digital wraiths that haunt networks, created by malicious actors adept at crafting untraceable personas within systems. They leverage the rapidly advancing AI technology to fabricate hyper-realistic digital personas. These specters of the cyber realm present a formidable challenge. Ghost identities allow attackers to launch stealth operations, exfiltrate sensitive data, and execute cyber attacks without leaving a trace.

🔑 Key Concerns:

  • Untraceable account infiltration
  • Identity manipulation
  • Data exfiltration and espionage

Poisoned Accounts: A New Breed of Threat

Poisoned accounts, unlike their spectral cousins, are right under our noses. These accounts are legitimate but compromised, with their credentials repurposed for malicious acts. Imagine a trusted employee's account converting into a covert attack node overnight. This is a tangible and immediate threat as cyber adversaries embellish their arsenals with more sophisticated social engineering tools and insider deception tactics.

🛡 Mitigation Strategies:

  • Deploy robust identity and access management solutions
  • Enhance employee cybersecurity awareness training
  • Implement continuous account monitoring

AI Agents: The Unfettered Chaos

If your dreams of AI revolved around deliverance, think again. In the wrong hands, AI morphs into an ominous force, capable of orchestrating intricate cyber attacks with unmatched precision. These AI-driven agents can autonomously identify, adapt, and exploit network vulnerabilities, unleashing chaos at an unprecedented scale.

🤖 Potential Capabilities:

  • Automated vulnerability exploitation
  • Network reconnaissance
  • Unseen escalation of privilege

What Lies Ahead?

These threats signal an impending cyber storm that requires immediate action. As defensive strategies escalate, understanding what fuels these threats is imperative for organizations to stay afloat. Preparedness is your shield, and adaptation is your sword.

As we prepare for the digital battlefield of 2026, it becomes imperative to stay informed and agile. The future of cybersecurity is a delicate dance with innovation and forethought. Understanding the looming threats will serve not only as our guide but as an antidote to the chaos that lies ahead.


Vendor Diligence Questions

  1. How does your solution detect and neutralize ghost identities within a network?
  2. What measures are in place to prevent account poisoning and quickly identify compromised accounts?
  3. Can your offerings leverage AI to counteract the threats posed by hostile AI agents effectively?

Action Plan

  1. Conduct Comprehensive Threat Assessment:
    Initiate an in-depth analysis of the organization's current vulnerability to ghost identities, poisoned accounts, and AI threat agents.

  2. Upgrade Cyber Defenses:
    Invest in advanced threat detection systems that specialize in identifying ghost identities and AI-driven threats.

  3. Promote Cyber Hygiene:
    Enhance the organization's cybersecurity posture through regular training sessions focused on social engineering, insider threats, and identity management strategies.

  4. Implement Real-time Monitoring:
    Deploy tools for continuous network and identity monitoring to swiftly detect and respond to anomalous activities.

  5. Foster Resilience Culture:
    Encourage a holistic understanding of cybersecurity risks across the organization to cultivate a culture of vigilance and proactive defense.


Source: Preparing for the Digital Battlefield of 2026: Ghost Identities, Poisoned Accounts, & AI Agent Havoc


Hacktivists Run Amok in Canadian Cyber Playground: Cyber Agency Sounds Alarm

Hacktivists: Proving that meddling in critical infrastructure is all fun and games until someone messes with the water pressure.

What You Need to Know

Canada's critical infrastructure is under siege by hacktivists who have breached systems across various sectors, including water treatment, oil and gas, and agriculture. This cyber exposure is portrayed as a significant reputational threat to Canada. As leaders, swift action is paramount to fortify cybersecurity measures and ensure public safety and trust remain intact.

  • CISO focus: Critical Infrastructure Security
  • Sentiment: Negative
  • Time to Impact: Immediate

Hacktivists have breached Canada's critical infrastructure, raising alarms across industry sectors. The Canadian Centre for Cyber Security reports breaches in key systems such as a water treatment facility, an oil & gas firm, and an agricultural processing site. The hacktivists managed to manipulate industrial controls to detrimental effects and pose significant risks to public safety and reputation.

These vulnerabilities and exploits must be addressed immediately to prevent further disruption and enhance national cyber resilience.

Key Incidents:

  • Water Treatment Facility: The attackers tampered with water pressure values, leading to reduced service and potential safety issues.
  • Oil and Gas Company: An incident involving the manipulation of an Automated Tank Gauge resulted in false alarms.
  • Agricultural Facility: Temperature and humidity levels in a grain drying silo were manipulated, which, if undetected, could have compromised grain safety.

The Hacker Hook

Hacktivists exploit internet-facing Industrial Control Systems (ICS) to garner attention, tarnish organizational reputations, and undermine Canada's international image. They target systems such as Programmable Logic Controllers (PLCs), Supervisory Control and Data Acquisition (SCADA), Building Management Systems (BMS), and Industrial Internet of Things (IIoT) devices.

Defensive Recommendations

Organizations are urged to:

  • Maintain current inventories of all internet-accessible ICS devices.
  • Replace direct internet exposure with Virtual Private Networks (VPNs) and enforce two-factor authentication.
  • Implement intrusion prevention systems and conduct periodic penetration tests.
  • Regularly manage and remediate system vulnerabilities.

Stakeholder Engagement

The sentiment surrounding these breaches is negative, as hacktivists continue to pose serious challenges and threats to public safety and national reputation.

Municipalities and corporations are advised to engage with vendors on system security throughout deployment, maintenance, and end-of-life decommissioning. Critical exercise drills to enhance incident response coordination are highly recommended.

A Word on Collaboration

Detecting and reporting suspicious activity promptly to the Cyber Centre or Royal Canadian Mounted Police is crucial in bolstering Canada's cyber resilience. Through communal vigilance and cooperation, the nation can safeguard its digital frontiers.


Vendor Diligence Questions

  1. How do you ensure that your systems remain secure against hacktivist exploits targeting ICS devices?
  2. What measures are in place to monitor and mitigate internet exposure risks for critical infrastructure systems, and how frequently are they tested?
  3. Are your post-deployment support services configured to assist clients in aligning with national cyber defense protocols like those suggested by the Canadian Centre for Cyber Security?

Action Plan

  1. Immediate Assessment: Conduct a full audit to identify existing vulnerabilities within ICS and IIoT systems.
  2. Engage Vendors: Immediately liaise with vendors to verify security protocols for all current systems and discuss potential enhancements.
  3. Update Protocols: Align current cybersecurity measures with the Canadian Centre for Cyber Security's Readiness Goals.
  4. Education and Training: Conduct regular workshops and simulations with staff to ensure rapid incident response.
  5. Report Anomalies: Establish clear protocols for reporting suspected breaches to the Cyber Centre.

Source: Security Affairs


Sentiment Analysis


Time to Impact


Massive Surge of NFC Relay Malware Steals Credit Cards: A Cyber-Thriller in Broad Daylight

Why break the bank when you can just tap and take?

What You Need to Know

The emergence of NFC relay malware has escalated into a substantial threat, predominantly affecting European consumers. This sophisticated technique exploits near-field communication (NFC) technology to covertly steal credit card information through relays. It is imperative for the board and executive management to prioritize enhanced security protocols and vigilant monitoring. Immediate action is required to mitigate risks and protect customer data. Your directive is to ensure that our cybersecurity infrastructure is bolstered against this technique, ensuring consumer confidence remains uncompromised.

CISO Focus: Cyber Frauds and Malwares
Sentiment: Negative
Time to Impact: Immediate


The recent surge in NFC relay malware, particularly targeting unwary Europeans, has alarmed cybersecurity experts. This new wave of technical pilfering involves exploiting NFC technology—the very tech underpinning conveniences like contactless payments and quick file sharing. It is essential for security managers and technologists to understand the modus operandi of these cyber villains to effectively combat them.

Unmasking NFC Relay Malware

The Mechanisms at Play

NFC relay malware leverages the seemingly innocuous nature of NFC technology, which operates on the principle of close-proximity interaction. Typically, NFC is employed in debit and credit card transactions where a simple wave or tap suffices to complete a payment. However, attackers have engineered malware capable of capturing and relaying this NFC communication. Essentially, the attackers add a sinister loop to your payment process: a 'man-in-the-middle' heist executed within milliseconds.

Attacks generally deploy a relay app—resolutely hidden on compromised devices—that receives intercepted signals from a legitimate user's card and transfers them to the hacker's payment platform. Intriguingly, the device serving as the relay point could be anything from a hacked smartphone to specialized equipment ingeniously crafted for anonymous, widespread theft.

The Broader Impact

This uptick holds significant ramifications, given that contactless transactions have burgeoned, especially in Europe. With convenience as the reigning emperor, NFC adoption has surged, leaving citizens exposed to these covert attacks. As the malware facilitates virtual pickpocketing, it poses both reputational and financial havoc.

Banks and financial institutions witness an escalation in fraudulent transactions slipping past traditional detection methods—largely due to the legitimate appearance of relayed transactions. Consequently, the financial ecosystem finds itself in a crossfire, caught between facilitating advanced consumer-tech experiences and safeguarding assets.

Immediate Measures: Fortifying the Fort

Given the sophistication of this malware, proactive defenses are vital:

  • Implement Enhanced Authentication: Utilizing multifactor authentication adds an essential layer of security by ensuring context-aware transactions, making it harder for intercepted data to be used without additional authentication steps.
  • Strengthen Network Protocols: A stringent review and fortification of NFC transaction protocols could help detect anomalies characteristic of relay attacks.
  • Educate and Vigilance: Launching customer-focused awareness campaigns explaining the nature of these attacks and encouraging consumer vigilance can substantially reduce incidences.

The Undisguised Truth: Cryptonite

The gravitas of NFC relay malware lies in its potential ubiquity and relative ease of permutation across digital platforms. Its adaptability across various devices underscores the aggravation it poses to pre-existing electronic cash systems. To combat its underhanded reach, technological insiders must arm digital interfaces with robust countermeasures designed to unmask these silent rogues—swiftly and efficiently.


Vendor Diligence Questions

  1. Does the vendor provide comprehensive multilayered security solutions that specifically address NFC technology vulnerabilities?
  2. How does the vendor's solution integrate with existing security infrastructure to enhance threat detection?
  3. Can the vendor provide real-time threat intelligence and analytics tailored for contactless payment technologies?

Action Plan

  • Assess and Update: Evaluate current NFC-related security systems and immediately update protocols to include stronger encryption and real-time monitoring.
  • Collaborate with Financial Institutions: Engage with banks to coordinate on enhanced security standards and real-time fraud detection systems.
  • Educate Internal Teams: Conduct mandatory training sessions highlighting phishing tactics, malware variants, and protective strategies.
  • Incident Response Preparedness: Strengthen incident response plans for rapid containment and mitigation of identified threats.

Source: Massive surge of NFC relay malware steals Europeans’ credit cards


WhatsApp’s Latest Magic Trick: Vanishing Passwords in Chat Backups

Now you see it, now you don't! Passwords take a backseat as WhatsApp's wizardry goes wireless.

What You Need to Know

WhatsApp has introduced passwordless chat backups for both iOS and Android users, a move that could significantly alter how organizations manage data security and access controls. Boards and executive teams should assess the potential for this feature to enhance or undermine existing security protocols, depending on how it integrates with company policies. Understanding and evaluating its impact on operational security and compliance are crucial in navigating this update.

CISO focus: Data Protection and Access Control
Sentiment: Positive
Time to Impact: Short (3-18 months)


WhatsApp's latest update has pushed the envelope in digital communication security with the introduction of passwordless chat backups. By exploiting device biometrics like fingerprint or facial recognition, the app aims to simplify data recovery while maintaining robust encryption standards. This development may influence broader trends in data protection across various platforms, potentially serving as a blueprint for similar implementations industry-wide.

A Disappering Act: Welcome to the Password-Free Zone

On October 2023, WhatsApp quietly unveiled an innovation on par with Harry Houdini’s disappearing acts—passwords for chat backups have vanished. The digital smoke and mirrors behind this launch harness device-based biometrics such as fingerprints and facial recognition to authenticate user identity during the backup retrieval process. This seamless integration could democratize data recovery for millions of users, while setting new precedents in privacy measures.

Why the Abrupt Shift?

Password fatigue is a formidable foe. Studies (cite: Statista) reveal upwards of 15 billion cyber incidents annually are password-related breaches. By mitigating this vulnerability, WhatsApp aims to curb a significant portion of cyber threats targeting its extensive user base. Furthermore, as hacking methodologies become increasingly sophisticated, the rise of biometric security solutions signals a pivot toward more dependable, user-centric strategies (cite: Cybersecurity Ventures).

Behind the Curtain: How It Works

  • Device-Based Biometrics: The new approach employs facial recognition or fingerprint data already stored on user devices, combining convenience and rigorous security protocols to streamline the backup retrieval.
  • Encryption Assurance: The end-to-end encryption maintained by WhatsApp ensures that data remains unreadable, even in transit from device to cloud—a fundamental pillar in safeguarding sensitive communications.
  • Zero-Knowledge Proof: This feature implies that not even WhatsApp itself can access the decrypted backups, granting users total control over their private information.

The Ripple Effect on Cybersecurity

The implications of this security feature sweep across a spectrum of industries relying on digital communication. The proliferation of biometric technology, as reinforced by WhatsApp’s initiative, could catalyze a wave of similar adaptations in other major applications. Such developments pose pertinent questions for corporate policy and security measures.

Potential Pitfalls

While these advancements hint at a digitally secure utopia, they are not without potential drawbacks. Biometric reliance correlates with a new set of vulnerabilities—should one’s biometric data be compromised, the repercussions are notably irretrievable compared to resetting a password (cite: Forbes Technology Council). Moreover, as adoption increases, companies need to ponder implications related to return on investment, privacy concerns, and technological inclusivity.

In summary, while the magic of passwordless backup appears promising, it demands careful consideration from organizations aiming to integrate these updates without compromising structural integrity or compliance frameworks.


Vendor Diligence Questions

1**. Capability Assessment: What mechanisms does WhatsApp employ to ensure biometric data is not accessible beyond device-level confines?
2. Compliance Processes: How does this feature align with existing data protection and privacy regulations like GDPR or CCPA?
3. Risk Mitigation: Have risk assessment protocols been updated to align with newly identified vulnerabilities in biometric authentication?**

Action Plan

  1. Review and Update Policies: Analyze current data access and control policies. Amend to incorporate guidelines on biometric authentication and passwordless access.
  2. Security Audit: Conduct audits on integration levels between WhatsApp and internal communication tools, ensuring that all data touchpoints meet organizational security standards.
  3. Employee Training: Launch training sessions to inculcate best practices for using passwordless features securely within the work environment.
  4. Vendor Communication: Maintain open channels with WhatsApp’s security team for updated briefings and clarification on compliance issues.

Source: WhatsApp adds passwordless chat backups on iOS and Android
References: Statista, Cybersecurity Ventures, Forbes Technology Council


Phishing Ain't Board: LinkedIn’s Latest Deception

When the LinkedIn invite leaves you board and floundering, it might be a bait!

What You Need to Know

Executives are being targeted with sophisticated phishing attacks disguised as LinkedIn board invitations. These scams are designed to extract sensitive financial information and compromise corporate networks. C-suite executives and board members must stay vigilant and consult with cybersecurity teams to adopt stringent verification practices.

CISO focus: Social Engineering and Phishing Attacks
Sentiment: Negative
Time to Impact: Immediate


In a world where board invites often come with prestige, cybercriminals have tapped into this cultural nuance to stage sophisticated phishing attacks. Executives, particularly those in finance, are being targeted with alluring invitations to join supposed "boards" via LinkedIn, only to find that the invites were the first step into a treacherous trap.

The Layered Deception

National security advisories and cybersecurity firms have identified a spike in phishing campaigns where victims receive fake LinkedIn messages that appear to be legitimate appeals from reputable financial entities. Typically, these messages carry an air of urgency and allure, pushing recipients to click immediately on malicious links or download harmful attachments.

  • Target Demographic: The strategy specifically aims at executives in finance who frequently engage with board activities.
  • Method of Deception: Leveraging LinkedIn as a trusted professional platform, attackers have gained a foothold by using cloned profile images, adding a veneer of legitimacy to their fake invitations.

Anatomy of the Phishing Attack

These phishing emails are laced with certain hallmarks of authenticity and sophistication:

  1. Spearfishing Precision: Customized messages leveraging publicly available information about executives’ career interests and historical professional movements.
  2. Realistic Stylistics: Using logos, language, and formats parallel to actual board invitation templates.
  3. Stealthy Hooks: Email contains embedded links leading to phishing sites mimicking LinkedIn login pages or MS Office document downloads masquerading as future meeting details.

The Financial Magazine's survey estimates that nearly 68% of executives have received such hoax invites in the past three months alone, dictating an emergency response requirement.

Immediate Implications

The implications aren't limited to individual data breaches. Successful infiltration into executive accounts can lead to:

  • Network Compromise: The access to sensitive company data through compromised executive accounts poses risks of trade secret exposure.
  • Identity Theft: Direct access to executives’ credentials could spawn further spear-phishing attempts within their enterprise and personal networks.

Securing the Boardroom

Given the financial stakes, companies must initiate several strategies to counter these sophisticated attacks:

Education and Awareness:

  • Frequent training sessions updating employees, especially executives, about phishing tactics.
  • Stress the importance of verifying LinkedIn requests outside the email interface.

Technical Safeguards:

  • Leveraging AI for email filtering to flag potential phishing attempts.
  • Implementing multifactor authentication on all accounts, making it hard for attackers to succeed even with compromised credentials.

Incident Response Protocols:

  • Clearly defined roles for swift incident response if a phishing attempt is successful.
  • Regular security audits that include checking for software vulnerabilities that could be exploited.

Sabotaging the Phish

Understanding that cyber threats evolve, corporates must remain proactive by incorporating threat intelligence into their strategies. Collaboration with cybersecurity vendors and sharing data on the latest threats allows for developing better defense mechanisms.

  • Industry Collaboration: Cybersecurity isn’t siloed; industry-wide forums to discuss tactics ensure a united defense front.
  • Proactive Threat Simulation: Organizations should routinely conduct phishing simulations for executives to test their response protocols.

Vendor Diligence

  1. How does the vendor’s solution differentiate between legitimate and phishing attempts on professional networking platforms?
  2. What are the primary anti-phishing safeguards they employ that cater to executive and financial sector entities?
  3. How frequently is their threat database updated, particularly concerning emerging social engineering attack vectors?

Action Plan

  • Educate & Train: Schedule mandatory monthly security briefings for all high-level executives.
  • Technological Reinforcements: Review and upgrade all email security systems focusing on executive accounts.
  • Create a Response Taskforce: Establish an immediate response team dedicated to handling breaches originating from phishing attacks.

Source: LinkedIn phishing targets finance execs with fake board invites

PhantomRaven: The Code-Breaking Specter Haunting npm

npm stands for 'Never (Download) Poorly-Managed Packages.

What You Need to Know

A recent cyberattack, dubbed "PhantomRaven," has inundated the npm registry with multiple credential-stealing packages. As a key board or executive management member, it's critical to understand the gravity of this situation: npm, a popular repository for JavaScript developers, is a high-value target for attackers. The breach could potentially compromise millions of projects that rely on npm packages. Your immediate action is necessary to assess any exposure your projects might have had and support efforts to mitigate potential risks.

CISO Focus: Software Supply Chain Security
Sentiment: Strong Negative
Time to Impact: Immediate


In a recent cyber incident that underscores the vulnerabilities within the software supply chain, an attacker, or group of attackers, known as PhantomRaven has released a slew of malicious packages on npm, a widely used package manager for JavaScript. These packages are designed to extract credentials from users who inadvertently incorporate them into their projects. According to BleepingComputer, this attack exemplifies the increasing sophistication of threats targeting open-source ecosystems, which rely heavily on community trust and transparency.

Immediate Risks to Developers

  • Credential Theft: The primary aim of the PhantomRaven attack is to steal user credentials. If successful, this could lead to unauthorized access to sensitive systems, resulting in further exploits or data breaches.
  • Supply Chain Compromise: By infiltrating npm, attackers can potentially compromise any project that incorporates one of their malicious packages, creating a domino effect throughout the software development lifecycle.

Why npm?

The npm registry is integral to the software development ecosystem, especially in JavaScript projects. Its open nature makes it a fertile ground for attackers seeking to leverage user trust for broad-based attacks. With thousands of new packages uploaded daily, distinguishing a malicious package from a legitimate one can be akin to finding a needle in a haystack.

Mitigation and Defense Strategies

Developers and organizations should immediately assess their projects for dependencies on the compromised packages. Here are specific steps to mitigate the impact of the PhantomRaven attack:

  • Audit All Dependencies: Use tools like npm audit to scan projects for vulnerabilities. Regularly auditing dependencies can help identify malicious or compromised packages.
  • Implement Manual Reviews and Static Analysis: Incorporate policies for manual code reviews and use static analysis tools to detect anomalies in package code.
  • Use Dependency Scanning Services: Services like Snyk or GitHub Dependabot can automatically flag known vulnerabilities, including newly discovered malicious packages.

Industry and Community Response

The broader software community, alongside npm Inc., has taken significant steps to address and mitigate such threats. Coordination with security researchers and quick response teams has been crucial. There’s an increasing call for better monitoring and more stringent checks for new npm submissions to keep the ecosystem secure.

How This Affects the Future

The PhantomRaven attack serves as a chilling reminder of the broader implications of supply chain vulnerabilities. Security considerations must extend beyond traditional perimeters and closely inspect third-party and open-source components.

PhantomRaven proves that installing without due diligence can haunt you.


Vendor Diligence Questions

  1. How do you verify the integrity of open-source packages included in your software?
  2. What measures are in place to automatically detect and remove malicious packages from our environment?
  3. Can you provide a recent audit report of our current package dependencies?

Action Plan

  1. Immediate Audit and Remediation:

    • Task security teams to perform an immediate audit of all current npm dependencies.
    • Remove any identified malicious packages and replace them with secure alternatives.
  2. Enhance Security Protocols:

    • Update policies to include regular dependency audits as a standard practice.
    • Train developers on securely managing package dependencies and recognizing potential security risks.
  3. Collaborate and Share Information:

    • Engage with broader security communities to share information and learn from others' experiences with similar threats.
    • Work with npm and other package managers to improve security protocols and package vetting processes.
  4. Prepare for Incident Recovery:

    • Ensure that incident response plans include procedures for handling supply chain attacks.
    • Regularly update and test backup and recovery plans.

Source: PhantomRaven attack floods npm with credential-stealing packages


CISO Intelligence is lovingly curated from open source intelligence newsfeeds and is aimed at helping cybersecurity professionals be better, no matter what their stage in their career.

We’re a small startup, and your subscription and recommendation to others is really important to us.

Thank you so much for your support!

CISO Intelligence by Jonathan Care is licensed under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International