BFF? Passé Passwords, Network Chit Chat, The Russian Connection, The Real Quantum Leap, and High End Hacks. It's CISO Intelligence for Friday 2nd May 2025.
Beware of sudden cozying up syndrome, passwords are so passé now these days, letting the networks do the talking, from Russia with...intent, a quantum leap...or threat, and aiming high.
💡
"Gives me everything I need to be informed about a topic" - __UK.Gov__
Table of Contents
1. Interesting WordPress Malware That Wants to Be Your Friend
2. Microsoft Ditches the Old Login: Passkeys are the New Passwords
3. The Changing Face of SOC: Embracing Network Detection and Response
4. GRU-ewsome Attacks: APT28's Bold Moves in France
5. Crypto-Agility: Bend It Like Blockchain
6. Harrods' Cyber House of Horrors: When High Fashion Meets High Stakes
Sign up for CISO Intelligence.
21st century industry insights for the modern CISO
It won't hurt, I promise.
Email sent! Check your inbox to complete your signup.
No spam. Unsubscribe anytime.
Interesting WordPress Malware That Wants to Be Your Friend
_You thought malware was bad? Wait till it pretends to protect you!_
What You Need to Know
The Wordfence Threat Intelligence team has discovered a sophisticated malware masquerading as a legitimate WordPress anti-malware plugin named ‘WP-antymalwary-bot.php.’ It enables attackers to retain control over websites, hide its presence, and execute remote commands. Immediate attention and mitigation are required. Management should ensure timely updating of security measures and dissemination of awareness among technical teams.
CISO Focus: Web Security, Malware Defense
Sentiment: Strong Negative
Time to Impact: Immediate
*
Web administrators and site owners often trust their arsenal of security plugins; however, what if one of those plugins was your platform’s greatest enemy dressed as a friend? The Wordfence Threat Intelligence team has brought to light a sinister threat: a malware variant posing as a legitimate anti-malware plugin on WordPress. Disguised under the seemingly helpful moniker ‘WP-antymalwary-bot.php’, this malicious code serves a nefarious purpose while concealing its true intentions.
The Core Discovery
Initially unearthed during a routine clean-up by Wordfence security analysts in January 2025, this malware acts as an intricate Trojan horse. On the surface, it showcases itself as a standard plugin detected within the file system. Its real abilities, however, are far more insidious.
Key Functions:
Maintaining Access : Ensures attackers can repeatedly access the compromised site.
Stealth Operations : Hides its presence from the WordPress dashboard, ensuring unsuspecting site administrators remain oblivious.
Remote Code Execution : Allows attackers to remotely execute malicious commands, potentially altering the site’s operations.
C &C Communication: Utilizes ping functions to report back to a designated Command & Control server.
Propagation and Signature Development
The malware's reach isn't limited to a single site; it's crafted to crawl through directories, implanting itself and injecting malicious JavaScript to serve unwanted ads. After discovery, a malware signature was developed by January 24, 2025, initially rolled out to Wordfence premium customers. Free-tier users received the update by end of February after a deliberate delay for exclusive testing.
Defense Reinforcements
While the initial release of the malware signature formed the first line of defense, Wordfence bolstered protections with a new firewall rule released on April 23, 2025. This proactive measure thwarts the execution of the threatening file, extending an additional buffer of security exclusive, initially, to Premium, Care, and Response users. Free users are slated to receive similar protection by May 23, 2025.
Implications and Recommendations
The discovery of such adept malware disguised as a critical defense component underscores the sophisticated tactics attackers employ today. For enterprises relying heavily on WordPress infrastructure, staying one step ahead is crucial:
Regular Updates : Ensure all security plugins are updated promptly and follow guidelines from trusted cybersecurity vendors.
Vigilant Scrutiny : Incorporate advanced website monitoring solutions and manual checks at intervals to spot anomalies.
Comprehensive Backups : Regularly backup website files and databases to accomplish quick recovery if compromised.
The Real Cost of Complacency
Let this serve as a lighthouse for the cybersecurity community—where complacency exists, threats thrive. The potential damage to reputation and finances from a successful breach could be substantial. Over-reliance on popular security plugins without due diligence can leave critical gaps.
*
Vendor Diligence
**
1. How frequently do your cybersecurity tools undergo assessment and updates for new threats?
2. What measures do you implement to verify the authenticity and safety of third-party plugins?
3. Do your solutions offer real-time monitoring and alerts on unauthorized activities?**
Action Plan
Immediate Audit : Conduct a comprehensive audit of all installed plugins and scripts on company-related WordPress sites.
Awareness Campaign : Launch an internal campaign to inform stakeholders of the risks associated with this malware and guidelines for preventive measures.
Upgrade and Install : Consider upgrading to Wordfence Premium for timely access to critical security updates and firewall enhancements.
In an ecosystem as vast as WordPress, vigilance is non-negotiable. While Wordfence’s timely actions are commendable, it is incumbent on the rest of us to consistently question our trust in digital defenses. Stay alert, and remember: in the world of cybersecurity, it's not paranoia if they’re out to get you.
*
Source: Wordfence Blog
*
Microsoft Ditches the Old Login: Passkeys are the New Passwords
_Passwords are soooo last year—your passkey is your cyber keychain._
What You Need to Know
Microsoft has made a groundbreaking move by switching default settings for new accounts to passkeys, effectively pushing towards a passwordless future for its users worldwide. The shift affects approximately 1.5 billion users, dramatically altering the cybersecurity landscape. Executives and board members need to understand the implications of this change and explore its integration within your organization's security framework to stay ahead in the cybersecurity game.
CISO focus: Identity and Access Management, Authentication Security
Sentiment: Positive
Time to Impact: Immediate
*
In a bold move mirroring the futuristic visions of sci-fi movies, Microsoft has set "passkeys" as the default login method for its new accounts. This progression into a passwordless era not only enhances security but also propels us into an ease-of-access revolution that resonates with technological progression across industries.
Microsoft’s Paradigm Shift
Microsoft’s adoption of passkeys as the default method for new accounts correlates with the tech giant's commitment to phasing out traditional passwords. As part of their wider authentication strategy, Microsoft offers support for approximately 1.5 billion users globally—ushering in a new wave of cybersecurity measures that transcends previous limitations. These measures address the multifaceted challenges posed by passwords, from weak and reused passwords to susceptibility to phishing attacks.
The Nuts and Bolts of Passkeys
So, what exactly are passkeys? Passkeys are a new take on authentication, offering a seamless and secure login experience. Unlike traditional passwords, which are stored on servers, passkeys exist locally on your devices. As a result, they create an un-phishable security landscape. With end-to-end encryption and biometric authentication integration, passkeys ensure that only the intended user has access, significantly improving security measures.
Implications for Organizations
For businesses, the shift towards passkeys implies a necessary pivot in strategy. Organizations should evaluate their current authentication strategies and consider implementing passkeys for all users to ensure their systems and data remain secure. This could entail partnering with identity management solutions that accommodate passkey integration, updating user access protocols, and training staff on newly adopted procedures.
Benefits Over Traditional Methods
Security Enhancement: By utilizing cryptographic keys instead of shared secrets in the form of passwords, organizations can significantly mitigate the risk of data breaches and cyberattacks.
User Convenience: Passkeys eliminate the cumbersome process of creating, remembering, and managing passwords, bolstering end-user experiences.
Reducer of Phishing: Since passkeys aren't susceptible to phishing, this new method dramatically reduces the chances of credential theft.
The Password Problem
Passwords have long been a weak link in cybersecurity, with human error and brute force attacks breaching seemingly secure environments. According to Verizon’s Data Breach Investigations Report, compromised credentials account for over 80% of hacking-related breaches. This damning statistic underscores the urgent necessity for organizations to adopt stronger, more resilient authentication methods like passkeys.
Roll-out and Adoption Challenges
The main challenges facing the adoption of passkeys are largely transitional. Convincing users to adapt and ensuring compatibility across devices are topics of primary concern. However, Microsoft's gravitational pull in the tech industry sets a precedent which other technology companies are expected to follow, smoothing the path for widespread passkey adoption.
"Oh, Password, We Hardly Knew Ye"
The move by Microsoft could very well be the death knell for the traditional password. Companies should monitor this shift closely, staying agile and proactive in their cybersecurity strategies. This transitional era beckons organizations—large and small alike—to align with a security-conscious approach that not only protects their data but also fuels the future of digital identity verification.
*
Vendor Diligence Questions
1. How do vendors integrate passkeys into existing systems and what proven success do they have in this integration?
2. What are the protocols for securely managing and storing passkeys, and are these protocols regularly audited by third parties?
3. How do vendors address interoperability issues with existing legacy systems and integrate passkey authentication seamlessly?
Action Plan
1. Assess Current Systems: Examine your company’s current authentication methods and identify areas for integration.
2. Plan the Transition: Work closely with IT and security teams to create a roadmap for transitioning from passwords to passkeys.
3. Staff Training: Implement a comprehensive training program for staff to ensure they understand and can navigate the passkey system effectively.
4. Vendor Partnerships: Engage with vendors to ensure that your organization can support and secure passkey implementation.
5. Customer Communication: Prepare communication strategies to update users about these changes and the benefits of using passkeys.
*
Source: Microsoft Sets Passkeys Default for New Accounts; 15 Billion Users Gain Passwordless Support
*
The Changing Face of SOC: Embracing Network Detection and Response
_When it comes to SOCs, who knew the network could run the show?_
What You Need to Know
Recent findings in an article highlight a trend where leading Security Operations Centers (SOC) are shifting towards Network Detection and Response (NDR) solutions to combat sophisticated cybersecurity threats. As board members and executive management, you need to understand the imperative of investing in NDR technologies that offer enhanced visibility and quicker response times against sophisticated threats. Your actionable decision is to integrate this new technology into your cyber defense strategy to ensure robust protection against evolving threats.
CISO Focus: Network Security
Sentiment: Positive
Time to Impact: Short (3-18 months)
*
Security Operations Centers (SOCs) are evolving to keep pace with the relentless sophistication of cyber threats. Nowhere is this more apparent than in the increased adoption of Network Detection and Response (NDR) solutions. Unlike traditional security measures, NDR harnesses the power of network data to detect and respond to anomalies in real time, offering a proactive defense stance highly sought after by top-tier SOCs.
The Shift to Network Detection and Response
The landscape of cyber threats is constantly evolving, making it imperative for businesses to adopt comprehensive security solutions that address these advanced threats head-on. Enter NDR, a novel approach favored by leading SOCs globally. Traditional security measures often struggle to keep up with the advanced techniques employed by modern-day cybercriminals. However, NDR leverages behavioral analytics, machine learning, and an array of data sources to paint a clearer picture of network activity in real-time.
Key Features of NDR:
Real-time Inspection: Constant monitoring of network traffic to detect anomalies instantly.
Behavioral Analytics: Utilizes machine learning to understand normal vs. malicious network behavior.
Comprehensive Visibility: Delivers a holistic view across all network segments.
Why Now?
The need for NDR has never been more critical. The article from The Hacker News underscores that over 70% of organizations have experienced at least one successful cyberattack in the last year. As traditional endpoint security solutions become less effective against these sophisticated attacks, many organizations recognize that NDR offers a critical layer of defense.
Emerging Threat Landscape
In recent years, SOCs have faced overwhelming pressure to process an increasing volume of alerts, often leading to analyst fatigue and overlooked threats. NDR tools drastically reduce false positives by providing context and automated threat detection, enabling analysts to focus on genuine threats.
Important Considerations:
Scalability: NDR solutions are designed to grow alongside your organization's network infrastructure.
Integration: Seamlessly works with existing security tools to enhance overall threat detection capabilities.
The Proactive Approach
What sets NDR apart is its ability to predict and prevent potential threats before they occur. By analyzing traffic patterns and endpoints, NDR creates a comprehensive understanding of network behavior, alerting SOCs to irregularities before they can escalate into full-blown cyber incidents.
Benefits of NDR:
Reduced Mean Time To Respond (MTTR): Swift identification and remediation of threats.
Cost-effectiveness: Lower operational costs by reducing false positives.
Enhanced Security Posture: Robust defense against lateral movement and data exfiltration attempts.
SOC Evolution
It's evident that the future of SOCs lies in adaptive and intelligent cybersecurity strategies. The integration of NDR technologies not only strengthens an organization's defense mechanisms but also empowers SOC teams with the insightful data needed to make informed security decisions.
*
Vendor Diligence Questions
1. How does your NDR solution integrate with our existing security infrastructure?
2. What is the scalability of your NDR solution in relation to network growth?
3. Can your solution provide historical data analysis for retrospective threat assessments?
Action Plan
1. Assess and evaluate current SOC capabilities regarding threat detection and response times.
2. Pilot an NDR solution to understand its impact on improving security posture and efficiency.
3. Train SOC analysts in utilizing NDR tools for enhanced detection and response strategies.
4. Conduct regular reviews to adapt and optimize NDR use as threats evolve.
*
Source: Why top SOC teams are shifting to Network Detection and Response
*
GRU-ewsome Attacks: APT28's Bold Moves in France
_When hackers are in your backyard, are cyber fences enough?_
What You Need to Know
The French Foreign Ministry has identified APT28, a notorious Russian military intelligence-linked hacking group, as being responsible for recent cyberattacks on various French entities, urging global crackdowns against such threats. This calls for immediate fortification of cybersecurity measures and international cooperation to counteract the growing menace of state-sponsored cyber activities.
CISO Focus: Cyber Espionage and APT Threats
Sentiment: Strong Negative
Time to Impact: Immediate
*
In a dramatic announcement, the French Foreign Ministry has publicly blamed APT28, a hacking group with alleged connections to Russia's GRU, for cyberattacks targeting critical French entities. This bulletin ruffles diplomatic feathers as it underscores the persistent menace of state-sponsored cyber espionage thriving within and beyond European borders.
The Attack and Attribution
* Who is APT28? : Also known as Fancy Bear, this group has a reputation for cyber espionage linked to a slew of high-profile breaches, including those against TV5Monde in 2015 and attempts to disrupt the 2017 French elections.
* Targets : Recent attacks have struck at public services, private firms, and, alarmingly, a key player in preparations for the upcoming 2024 Paris Olympic and Paralympic Games.
* Modus Operandi : This group often deploys spear phishing and malware to infiltrate its targets, displaying a clear pattern of methods previously attributed to GRU operations.
Diplomatic and Cybersecurity Ramifications
* France's Stand : Lauding the EU’s sanctions against the malefactors, France calls for further global sanctions and collective defense strategies to curtail similar threats.
* International Response : While facing continuous cyber threats, European nations, particularly those near Ukraine's borders, align closely in counteracting such threats.
* Global Context : These revelations cast a stark light on Russia's broader strategic intent, possibly intertwined with geopolitical maneuvers amid its ongoing conflicts, notably involving Ukraine.
Key Recommendations
The Ministry's stern warning necessitates immediate action:
1. Strengthen Cyber Defenses : Organizations must bolster cybersecurity frameworks, upgrading defenses against APT-style intrusions.
2. Increase Surveillance and Intelligence Sharing : Enhanced collaboration among nations can illuminate network perimeters to identify and neutralize threats beforehand.
3. Diplomatic Engagement : Deeper engagement at international forums, pressing for stringent sanctions against hacking entities, forms a crucial pillar to safeguard national interests.
The Looming Threat to Critical Infrastructure
APT28's targeting of entities essential to the French way of life underscores the vulnerability of national infrastructure to cyber sabotage. It serves as a wake-up call to ensure that protection is no longer an optional upgrade but an urgent necessity.
* Public Sector Impact : Attacks on public services can corrode public trust and disrupt societal functioning, as seen in prior European incidents.
* Private Sector's Role : Businesses, especially those in critical supply chains, must be active participants in national cybersecurity discourse.
* Sports and Events Security : The sports organization attack highlights the looming risk to large-scale public events, requiring specialized security measures for the 2024 Olympics.
Jouet de Fin: Be Aware, Anywhere
In these digital wilds, it's not just about building walls but engaging informed, proactive defense strategies to shield digital domains from pervasive espionage plagues like APT28.
*
Vendor Diligence Questions
1. Does your organization have a history of dealing with APT-related threats, and what measures protect against them?
2. How do you ensure that your security protocols are updated promptly in response to high-profile threats like those posed by APT28?
3. Can you demonstrate how you collaborate with international cybersecurity teams to preemptively counteract state-sponsored cyber threats?
Action Plan for CISO Team
1. Incident Response Drills : Conduct simulations to ensure readiness against APT28-style attacks.
2. Network Security Audit : Comprehensive review and strengthening of network defenses, focusing on entry points exploited by phishing and malware.
3. Staff Training : Continuous education and update sessions on the latest cyber threats and secure practices to minimize human error risks.
*
Source: industrial Cyber Article
*
Crypto-Agility: Bend It Like Blockchain
_Crypto-agility is not just an option; it’s the only viable escape route from quantum doomsday._
What You Need to Know
In an accelerating age of technology, the emergence of quantum computing poses an imminent threat to current encryption standards. A shift towards crypto-agility—adapting our cryptographic strategies to be resistant against quantum capabilities—is essential for safeguarding sensitive data. The executive board must prioritize understanding the implications of quantum advancements and invest in transitioning to cryptographic solutions that ensure future-proof security.
CISO Focus: Cryptography & Data Protection
Sentiment: Strong Positive
Time to Impact: Short (3-18 months)
*
The quantum revolution is poised to overturn the foundations of digital security developed over decades. At RSAC 2025, leaders in cybersecurity sounded the clarion call for immediate adoption of crypto-agility—an adaptive approach to cryptographic systems that ensures they remain secure even as quantum computing evolves.
The Quantum Threat
Quantum computing has heralded excitement and dread in almost equal measure. With its ability to solve complex problems at unprecedented speeds, quantum computing is set to outperform classical computers leading to breakthroughs in various fields. Unfortunately, it also possesses the capability to render classical cryptographic systems, like RSA and ECC, obsolete.
Imminence of Quantum Computing: Experts at RSAC 2025 warned that quantum computers might soon be capable of breaking widely-used cryptosystems, thus compromising sensitive data and critical infrastructure.
The Need for Crypto-Agility: Organizations must preemptively adopt crypto-agile solutions—strategies that incorporate flexibility to upgrade encryption protocols as soon as vulnerabilities surface, especially those exposed by quantum advancements.
Why Crypto-Agility Matters Now
Crypto-agility isn't just about defending against a future specter of quantum threats; it's a strategic approach that should be implemented immediately:
Risk Mitigation: Implementing crypto-agile systems today mitigates the risk posed by quantum computers tomorrow. The agility allows seamless transition and rapid upgrades in cryptographic protocols without disrupting operations.
Regulatory Compliance: As governments prepare for quantum threats, regulatory landscapes are expected to integrate quantum-resilient requirements. Early adoption ensures compliance and avoids last-minute scrambles.
Competitive Advantage: Timely and proactive shifts towards post-quantum cryptography afford companies a substantive edge over rivals, ensuring trustworthiness and reliability in the digital marketplace.
Implementing Crypto-Agility
Transitioning to crypto-agility requires a collaborative effort across technological and organizational realms:
Inventory Management: Begin with a comprehensive inventory of cyber assets, identifying which are vulnerable to quantum attacks and prioritizing crucial systems for an upgrade.
Adoption of Post-Quantum Algorithms: Implement algorithms currently believed to be secure against quantum attacks, such as lattice-based cryptography, supersingular elliptic curve isogeny cryptography, and hash-based signatures.
Continuous Monitoring and Adaptation: Establish mechanisms for continuous system evaluation and swiftly adapt to novel advancements or threats in the cryptographic spectrum.
RSAC 2025 Insights
At the forefront of this movement, RSAC 2025 served as a pivotal platform bringing forward key discussions and insights on crypto-agility:
Collaboration and Innovation: Engaging conversations drew industry thought-leaders and academic researchers to share cutting-edge cryptographic innovations essential for constructing quantum-proof digital environments.
Strategic Partnerships: Companies are urged to form strategic alliances to pool resources, share intelligence, and expedite the development of cryptographic solutions tailored for a post-quantum world.
The World Has Gone Quantum—Don’t Get Left Behind
The quantum era isn’t just approaching; it’s here, waiting on the vulnerabilities it will exploit. Crypto-agility might be the umpire that ensures your organization doesn’t get blindsided in the midst of the game.
*
Vendor Diligence Questions
1. What strategy does your company have in place for adopting post-quantum cryptography standards?
2. How frequently does your organization update and adapt its cryptographic methods?
3. Can you ensure minimal operational disruption during transitions to new encryption standards?**
Action Plan
Initiate a Quantum Threat Assessment: Lead a comprehensive analysis identifying present vulnerabilities and prioritizing key areas requiring cryptographic upgrades.
Develop a Crypto-Agility Policy: Craft a clear organizational policy backing the adoption of agile cryptographic solutions.
Engage in Training & Workshops: Facilitate workshops and training programs, focusing on educating teams about quantum threats and the importance of crypto-agility.
*
Source: RSAC 2025: The time for crypto-agility adoption is now
*
Harrods' Cyber House of Horrors: When High Fashion Meets High Stakes
_When cybercriminals prefer shopping to hacking, you know it's not handbags they’re after._
What You Need to Know
The iconic British retailer Harrods recently fell victim to a sophisticated cyberattack, joining the growing list of retail giants targeted by threat actors. Leaders are expected to ensure the protection of customer data and brand trust. Immediate measures should be implemented to strengthen cybersecurity protocols and prepare for possible fallout in terms of brand reputation and customer loyalty.
CISO focus: Cyber Risk Management and Data Protection
Sentiment: Negative
Time to Impact: Immediate
*
The recent cyberattack on Harrods signals a worrying trend for high-end retailers, underscoring the necessity for robust security measures to safeguard customer and business data. As the doors of this luxurious department store appear closed to digital marauders, there lingers a stark reminder of how apparent vulnerabilities in the retail sector are being exploited.
The Skinny on the Harrods Hack
In a shock to the glamourous and genteel world of upscale shopping, Harrods, a name synonymous with luxury, has become the latest victim of cybercriminal ingenuity. Reports from Bleeping Computer detail a well-coordinated cyberattack aimed at penetrating the defenses of this iconic British brand, emphasizing a larger trend of attacks against top-tier retailers.
Impact Overview
Data Compromise : The breach potentially jeopardized customer personal information and financial details. This loss of data integrity could strike a significant blow to customer trust, a cornerstone for any luxury brand.
Business Operations : While Harrods' physical stores might remain open, the threat looms over online operations. With e-commerce sales crucial post-pandemic, any downtime could mean substantial revenue loss.
Brand Reputation : Known for its prestigious standing, the brand might face reputational damage—affecting both customer and investor confidence.
The Broader Trend: Retail Under Siege
Harrods' plight highlights a broader narrative—big-name retailers worldwide are increasingly falling prey to cyber threats. Notably, these cybercriminals are now shifting focus from mere financial gain to a more robust strategy aimed at destabilizing retailer credibility and operational integrity.
Possible Motivations:
Ransom Demands : Cybercriminals are cashing in on retailer desperation, offering data or systems back in exchange for hefty sums.
Market Manipulation : There's speculation some attacks aim to manipulate stock prices or subtly influence consumer behaviors.
Competitive Espionage : A more sinister line of thought suggests competitor-induced infiltration, though this remains speculative.
The Good, the Bad, and the Ugly
The Good
While the incident is an eye-opener, it also provides a critical opportunity for businesses to bolster their security frameworks.
The Bad
The incident lays bare several glaring cybersecurity vulnerabilities within the retail sector that remain inadequately addressed.
The Ugly
This cyber breach serves as a chilling harbinger of potential long-term damage if retailers continue to lag in fortifying their digital defense mechanisms.
Retailers on the Cyber Frontline: Equipping for Defense
So, what’s the silver lining in this digital conundrum for retail titans? Lessons learned from Harrods' digital debacle can arm similar entities with insights into prevention.
Immediate Safeguarding Steps :
Enhanced Network Security : Retailers must re-evaluate and fortify their existing cyber defenses, focusing on both network entry points and endpoint security.
Employee Training : Human error remains a significant vulnerability—regular training to recognize threats is paramount.
Incident Response Ramping : Thoughtfully designed and tested incident response plans can minimize repercussions in the face of a breach.
*
Vendor Diligence Questions
1. What strategies do you employ to ensure ongoing monitoring and protection against cyber threats?
2. How does your current system handle unusual activities, and what is your protocol for immediate response?
3. Can you provide recent examples of successfully defending against similar threats or breaches?
Action Plan
1. Immediate Risk Assessment : Review and analyze current cybersecurity measures with emphasis on weak points.
2. Training Sessions : Conduct mandatory cybersecurity training for all staff to identify and report suspicious activities.
3. Consult Experts : Engage cybersecurity firms to provide a thorough threat study and recommend advanced protection solutions.
4. Update Security Protocols : Implement the latest prevention, detection, and response technologies to bolster network security.
*
Source: Harrods the next UK retailer targeted in a cyberattack
*
_CISO Intelligence is lovingly curated from open source intelligence newsfeeds and is aimed at helping cybersecurity professionals be better, no matter what their stage in their career._
_We’re a small startup, and your subscription and recommendation to others is really important to us._
*Thank you so much for your support!(

